AWS IAM Change Intelligence
We bring actionable insights to Terraform code reviews so you can stop seeing stars and start visualizing access outcomes.
Request Beta Access
We're building a powerful toolkit for cloud teams working with Terraform and AWS. Join the waitlist and we'll notify you when we're ready for you to give it a spin!
Review with clarity. Change with confidence.
IAM Pulse compares code to cloud for a more accurate assessment of what could happen downstream if an AWS IAM change is applied in Terraform
Gain IAM visibility in your infra code
IAM policies & configurations are parsed out from Terraform repositories to isolate & analyze permission sets.
Determine risk impact of changes
Actionable insights behind permission changes dropped in a GitHub pull request to support collaborative peer reviews.
Visualize & navigate access vectors
An intuitive data visualization model to better demonstrate multi-dimensional access paths & object relationships.
IAM Impact Analysis
Eliminate the guesswork when working with IAM in Terraform through helpful insights behind code changes.
Differences in Access Outcomes
- Types of changes that would modify the actions or relationships that determine identity and resource access
Possible Breaking Changes
- Types of changes that deny previously allowed actions that could impact production apps & services
Potential Escalation Paths
- Types of changes that add transitive access paths across accounts or roles that may not be intentional
A mental map of your AWS environments to better orient and explore the impact of making changes
Calculate Permission Sets
- See the aggregate evaluation logic across different policy types and boundaries
Simulate Access Outcomes
- Follow how permissions plus context determine whether select actions are allowed or denied
Compare Changes Visually
- Visualize proposed changes in a before and after mode with diff elements highlighted for review
How It Works
Impact analysis is where static and dynamic analysis meet to derive meaning and truths you wouldn't get from code or account scans alone.
We scan and model IAM changes in Terraform directly from the code diff
We determine the nature and impact of any IAM changes, and deliver a summary
We model all objects and relationships in an account and run IAM simulations
Get a Taste in the Playground
Follow example "what if" scenarios that demonstrate our fresh visual approach to tackling head-scratching IAM challenges
Traversing Access Paths From a Specific AWS RDS Instance
Working backward from a resource to see who can access it based on which policie...
Handling Implicit Differences in AWS IAM Defaults
What happens when you encounter implicit differences in AWS services?
Changing AWS S3 Shadow Permissions
Removing S3:* in favor of explicit actions to better control access to sensitive...
Join the beta waitlist
Enter your email to get notified when our product becomes available to try.
Sign Up for the community
Create your member profile to get involved with our content, programs, and events.