Enterprise CIEM solution analyzing cloud entitlements across GCP and AWS with Zero Trust scoring and least-privilege recommendations
|
According to industry research:
Traditional IAM tools cannot:
|
Cloud Infrastructure Entitlement Management (CIEM) enables:
CIEM is foundational for Zero Trust architecture. |
ZeroTrust IAM Analyzer provides enterprise-grade CIEM capabilities across GCP and AWS:
| Capability | Technology | Outcome |
|---|---|---|
| Identity Discovery | GCP IAM + AWS IAM | Complete identity inventory |
| Entitlement Analysis | Custom analyzers | Map effective permissions |
| Risk Scoring | ML-based scoring | 0-100 risk quantification |
| External Access Detection | AWS IAM Access Analyzer | Find public/cross-account exposure |
| Policy Validation | CIS Benchmark checks | Compliance scoring |
| Least Privilege | Permission gap analysis | Remediation recommendations |
Security Dashboard Real-time CIEM metrics |
Identity Explorer Cross-cloud identity view |
Risk Analysis Entitlement risk scoring
# Clone repository
git clone https://github.com/MikeDominic92/ZeroTrust-IAM-Analyzer.git
cd ZeroTrust-IAM-Analyzer
# Backend setup
cd backend
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
pip install -r requirements-dev.txt
cp .env.example .env
# Frontend setup (new terminal)
cd frontend
npm install# Start Backend
cd backend
uvicorn app.main:app --reload --port 8000
# Start Frontend (new terminal)
cd frontend
npm run dev
from app.src.integrations import AWSAccessAnalyzer, FindingProcessor, PolicyValidator
# Initialize AWS Access Analyzer connector
analyzer = AWSAccessAnalyzer(region="us-east-1", profile_name="prod")
# List active findings
findings = analyzer.list_findings(status=FindingStatus.ACTIVE, max_results=50)
# Process and normalize findings
processor = FindingProcessor()
normalized = processor.process_findings_batch(findings)
stats = processor.get_summary_statistics(normalized)
print(f"Critical findings: {stats['by_severity']['CRITICAL']}")
print(f"Public access issues: {stats['by_exposure']['PUBLIC_INTERNET']}")
# Validate IAM policy
validator = PolicyValidator()
result = validator.validate_policy(policy_document, policy_name="AdminPolicy")
for issue in result.issues:
print(f"{issue.severity}: {issue.title}")
print(f"Risk Score: {issue.risk_score}/100")
print(f"Recommendation: {issue.recommendation}")
Mike Dominic
This project demonstrates key competencies for senior IAM engineering roles:
Multi-Cloud Zero Trust IAM Analysis Platform
|


