Policy Sentry IAM Least Privilege Policy Generator Logo

Policy Sentry IAM Least Privilege Policy Generator

0
Free
1 saves
Updated 11 March 2025
Visit Website

Policy Sentry IAM Least Privilege Policy Generator Step 1: Create the Template Step 2: Copy/paste ARNs Step 3: Write-policy command Tutorial Installation Package managers Shell completion Step 1: Create the Template Step 2: Copy/paste ARNs Step 3: Write-policy command Cheat sheets Policy Writing cheat sheet IAM Database Query Cheat Sheet Local Initialization (Optional) Other Usage Commands Python Library usage Docker Terraform References Documentation For walkthroughs and full documentation, please visit the project on ReadTheDocs. See the Salesforce Engineering Blog post on Policy Sentry. Overview Writing security-conscious IAM Policies by hand can be very tedious and inefficient. Many Infrastructure as Code developers have experienced something like this: Determined to make your best effort to give users and roles the least amount of privilege you need to perform your duties, you spend way too much time combing through the AWS IAM Documentation on Actions, Resources, and Condition Keys for AWS Services. Your team lead encourages you to build security into your IAM Policies for product quality, but eventually you get frustrated due to project deadlines. You don't have an embedded security person on your team who can write those IAM Policies for you, and there

FEATURES

SIMILAR TOOLS

OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.

Free

A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.

Free

A list of disposable email domains to detect or block disposable accounts

Free

An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.

Free

KeeFarce allows for the extraction of KeePass 2.x password database information from memory using DLL injection and CLRMD.

Free

Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.

Free

Securely store and access AWS credentials in a development environment.

Free

CredStash is a tool for managing and securely storing credentials.

Free

Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.

Free

PINNED

Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved