Trying to understand AWS access?
You're not alone. It's messy, inconsistent, and critical.
Dozens of policy types
A maze of org structure
Constant change
No single source of truth
but you still have to know:
Who can access this S3 bucket?
What will happen if we deploy this SCP?
Who has iam:PassRole on *?
Who can delete our production database?
Can this role become an admin?
Who has access from outside our org?
It's not you, it's harder than it should be.
Get answers to real AWS access questions today
Collect IAM, org, and resource policies from across all accounts. Ridiculously configurable and built to scale to any size.
Google Maps for IAM. Analyze effective access, simulate requests, and get detailed analysis of every single permission.
npm install -g @cloud-copilot/iam-collect
iam-collect init
iam-collect download
iam-lens who-can \
--actions s3:GetObject \
--resource arn:aws:s3:::our-company-data/financials.xlsx
iam-lens who-can --resource arn:aws:rds:us-west-2:111222333444:cluster:ProductionCluster
iam-lens simulate \
--principal arn:aws:iam::111122223333:role/ProdDeployRole \
--action lambda:UpdateFunctionCode \
--resource arn:aws:lambda:ap-south-1:111122223333:function:CustomerSignup \
--verbose
iam-lens principal-can \
--principal arn:aws:iam::111122223333:user/DevOpsElevated
In use at scale by teams with thousands of accounts and hundreds of thousands of principals.
You can use them today →Next up: tools that help you prevent problems—not just find them
Model the impact of SCPs before they are deployed
Detect privilege escalation risks
Monitor access to sensitive resources
Analyze Terraform plan impact before deployment
Diff IAM policies across time or environments
Trace failed requests to the exact cause
Inventory externally shared resources and roles
Map trust across organizations
We're working with teams who care about access and want to get ahead of the risk
who want to catch the gaps before the wrong person does
who want to deploy changes without breaking prod
who need fast, reliable answers to: "Who has access to what?"
We're building with early users. Want in?