Repokid Logo

Repokid

Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.

1,142
Visit website
Claim and verify your listing
1
0
Nikoloz Kokhreidze
Nikoloz Kokhreidze

Founder & Fractional CISO

Not sure if Repokid is right for your team?

Book a 60-minute strategy call with Nikoloz. You will get a clear roadmap to evaluate products and make a decision.

Align tool selection with your actual business goals

Right-sized for your stage (not enterprise bloat)

Not 47 options, exactly 3 that fit your needs

Stop researching, start deciding

Questions that reveal if the tool actually works

Most companies never ask these

The costs vendors hide in contracts

How to uncover real Total Cost of Ownerhship before signing

Repokid Description

Repokid is an AWS IAM permission management tool that automatically removes unused service permissions from IAM role inline policies. The tool integrates with Access Advisor through Aardvark to analyze service usage patterns and identify permissions that grant access to services that are not being utilized. It operates by scanning IAM roles within an AWS account and removing permissions for services that have not been accessed. Repokid requires a DynamoDB table for storing role information and uses specific table structures with primary keys and global secondary indexes for efficient data organization. The tool supports both cloud-based and local development environments, with Docker Compose available for local DynamoDB instances. The system requires appropriate IAM permissions to function across AWS accounts and can be configured through a JSON configuration file. It provides a systematic approach to implementing the principle of least privilege by automatically pruning unnecessary permissions from IAM roles.

Repokid FAQ

Common questions about Repokid including features, pricing, alternatives, and user reviews.

Repokid is Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.. It is a IAM solution designed to help security teams with Governance, Security Automation, IAM.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

14
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

8
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →