Graph-powered access intelligence for IAM, Active Directory and file server permissions. Explain who has access, why it exists and what changes before you remove it.
-
Updated
Mar 22, 2026 - Python
Graph-powered access intelligence for IAM, Active Directory and file server permissions. Explain who has access, why it exists and what changes before you remove it.
Enterprise Multi-Cloud Identity Governance Engine — automated access review with risk scoring, audit reports and SIEM integration (Azure, AWS, Google)
Demonstrates an Identity & Access Management (IAM) governance workflow including access review procedures, evidence collection, findings, remediation tracking, and password policy hardening using a Windows lab environment.
IAM governance project demonstrating access reviews, RBAC simulation, privileged access analysis, and identity governance workflows using Microsoft Entra ID.
AI-powered IAM access reviewer — connects to Okta, pulls user and access data, sends it to Claude for security analysis, and generates a risk report. Pairs with okta-chaos-generator.
React + TypeScript control-plane for access posture, policy exceptions, remediation tracking, and executive identity governance visibility.
PHP API for entitlement requests, approval routing, access review visibility, and audit-friendly identity governance workflows.
Enterprise IAM access review pipeline — detects orphaned accounts, privileged access without review, dormant accounts and missing certifications across 150 users, 20 applications and 400 role assignments.
Read-only IAM access review with synthetic report outputs for SOC 2/NIST evidence.
Hands-on exercises for Azure identity services
TypeScript platform for identity governance, privileged access review, audit visibility, and remediation-aware IAM workflows.
Simple GRC project showing an access review with findings, exceptions, and remediation steps.
React + TypeScript workbench for joiner-mover-leaver workflows, certification pressure, orphaned-account cleanup, and identity lifecycle visibility.
Python integration for syncing CyberArk privileged-account metadata into access-review queues, stale-access findings, and approval-ready evidence payloads.
Map access paths with a self-hosted graph tool for clear answers on who has access, why, and what breaks if you remove it
Manage identity and access with RBAC, ABAC, OAuth2/OIDC, approval flows, and audit logs for secure enterprise control
Add a description, image, and links to the access-review topic page so that developers can more easily learn about it.
To associate your repository with the access-review topic, visit your repo's landing page and select "manage topics."