AWS IAM Security
Discover roles, policies, trust relationships, and cross-account assumptions in one explainable graph.
- Map role assumption chains and transitive trust paths
- Detect wildcard trust and overprivileged action sets
- Prioritize exposure by reachable resource sensitivity