Machine identity trust graph
Every machine identity path, clear to you.
Identrail traces how AWS IAM roles, Kubernetes service accounts, GitHub Actions, and OIDC claims can reach sensitive resources, then packages the proof and safest first fix for the owner.
- Collection
- Read-only by default
- Coverage
- AWS, K8s, GitHub, OIDC
- Output
- Evidence and first fix
- Open-core under Apache-2.0
- Read-only onboarding model
- Self-hosted and hosted paths
- Public docs and release history
Production workspace / AWS IAM
AssumeRole path detected- 01GitHub Actions OIDC token verifiedrepo: payments-api / deploy-production.ymlVerified
- 02AssumeRole path detectedsts:AssumeRole reaches billing-prod in 4 hopsActive
- 03Privilege boundary inheritedaws:PrincipalTag condition allows broad namespace reuseReview
- 04Evidence packet assembledJWT claims, trust policy, and API call proof attachedReady
Reviewed across your identity stack
- AWS IAM
- Kubernetes
- GitHub
- OpenID
- Terraform
- Docker
- PostgreSQL
- Prometheus
Why teams miss machine identity risk
Signals only matter when they reveal the path.
IAM policies, Kubernetes RBAC, repository exposure, and OIDC workflow identities are reviewed in separate tools. Identrail connects them into one trust path, then shows the proof, blast radius, and safest first fix.
Identrail trust graph
One connected machine identity pathIsolated alerts
Each control plane looks acceptable until the machine identity path crosses boundaries.
Evidence stitching
Read-only collection joins IAM, Kubernetes, repository, and OIDC proof into one chain.
Safe remediation
Owners get the affected workload, blast-radius context, and the first low-risk fix.
Trust operations layer
A premium control room for machine identity risk.
Identrail gives security and platform teams the same operating picture: live trust paths, policy evidence, blast-radius context, and a practical next step for each owner.
Exposure triage
Turn scattered identity signals into one owner-ready queue.
Evidence
- Trust policy allows broad workflow subject claims
- ClusterRoleBinding grants namespace-spanning workload access
- Reachable resource is tagged production and regulated
Operator playbook
- Confirm owner
- Review evidence bundle
- Prioritize first fix
Product tour
From connector setup to evidence-ready remediation.
Connect read-only sources, trace the path to sensitive resources, test the safest fix, and hand owners one evidence packet they can act on.
Connect read-only sources
Validate AWS IAM, Kubernetes, GitHub Actions, and OIDC claims without write permissions.
Trace reachable risk paths
Show the identity, workload, role, and resource in one chain with severity context.
Simulate the first safe fix
Preview trust-policy and RBAC edits before anything touches production.
Export the evidence packet
Package the source proof, owner note, policy diff, and residual risk for review.
Production workspace
Owner-ready risk path
Reachable path
GitHub workflow can reach billing data through AWS role trust.
Safe fix simulation
Restrict subject claim and namespace tags- sub = "*"+ sub = "repo:payments-api:prod"+ namespace = "payments-api"Evidence packet
Ready for owner review- Source proof
- Policy diff
- Affected workload
- Owner timeline
Operational Workflow
From read-only discovery to safe enforcement
Each stage produces a concrete artifact security and platform teams can review before taking action.
- 01 / Discover
Build the trust graph
Collect AWS IAM, Kubernetes, GitHub, and OIDC identity metadata in read-only mode.
Output: identity graph snapshot with source evidence links
- 02 / Prioritize
Rank reachable risk paths
Score findings by severity, privilege depth, and production blast-radius potential.
Output: ranked findings queue with owner-ready context
- 03 / Simulate
Preview hardening safely
Preview trust-policy changes and estimate affected workloads before enforcement.
Output: remediation plan with expected impact summary
- 04 / Operate
Roll out with controls
Deploy in stages with rollback options and track resolution outcomes.
Output: audit-ready remediation timeline and status history
Adoption Paths
Choose the deployment model that fits your operating constraints.
Open Source
Best for: self-hosted evaluation and internal control.
- Time to value
- Same day with Docker/Kubernetes setup
- Control level
- Full infrastructure and data ownership
- Support model
- Community and docs-led
Hosted SaaS
Best for: fastest onboarding and operational simplicity.
- Time to value
- Minutes to first trust-path scan
- Control level
- Managed platform with guided rollout
- Support model
- Product support and assisted onboarding
Recommended for teams that need the fastest first scan.
Enterprise
Best for: private tenancy, procurement, and compliance control.
- Time to value
- Planned onboarding with architecture review
- Control level
- Private deployment and regional controls
- Support model
- Enterprise SLA and named partner team
Comparison
Why teams choose Identrail over closed black-box workflows
Compare on explainability, rollout safety, and day-two operability.
| Category | Identrail | Typical closed alternatives |
|---|---|---|
| Trust-path explainability | Shows full identity chain with policy evidence and affected resources | Often returns abstract risk findings without chain-level context |
| Rollout safety | Read-only collection, simulation-first remediation, staged enforcement | Policy hardening usually relies on external tooling and manual checks |
| Open-core transparency | Public repository, documentation, and release history | Limited implementation visibility and slower verification by engineers |
| Developer and platform fit | Built for security + platform collaboration with inspectable outputs | Security-only workflows can be harder for platform teams to operationalize |
Ready to evaluate
Map your first production trust path in minutes
Start with a read-only scan, review evidence, then decide whether to self-host, use hosted SaaS, or move to enterprise deployment.