Keep AWS Identity & Access Management (IAM) in compliance with
the Principle of Least Privilege
of granted AWS permissions
are not used in 90 days.
How it works
We passively monitor AWS cloud activity to see which permissions are used
Then visualize service usage summary and show findings
Finally, build security advices to take away unused permissions
Automatic workflow to cut permissions with easy rollback option
Extension for developers to simple request additional permissions
Inspired by NETFLIX Repokid
With a few clicks in the portal, connect your AWS accounts to the system
Continuously analyze cloud events
Automatically analyze all cloud activity via AWS Cloud Trail events
Get findings and
IAMkeeper intelligently detect policy permissions that need to be reduced or updated
Review detailed findings and advices for further remediation or prevention
We started IAMkeeper as an internal tool within our organization to support administrator's and developer's demands to allocate and control cloud permissions in AWS.
Now we are here to make it publicly available and help other teams and organizations to simplify the way to follow the standard security advice of granting least privilege, hiding all complexities of managing AWS policies.