Graph-powered access intelligence for IAM, Active Directory and file server permissions. Explain who has access, why it exists and what changes before you remove it.
-
Updated
Mar 22, 2026 - Python
Graph-powered access intelligence for IAM, Active Directory and file server permissions. Explain who has access, why it exists and what changes before you remove it.
Demonstrates an Identity & Access Management (IAM) governance workflow including access review procedures, evidence collection, findings, remediation tracking, and password policy hardening using a Windows lab environment.
Read-only IAM access review with synthetic report outputs for SOC 2/NIST evidence.
Enterprise IAM access review pipeline — detects orphaned accounts, privileged access without review, dormant accounts and missing certifications across 150 users, 20 applications and 400 role assignments.
Hands-on exercises for Azure identity services
Add a description, image, and links to the access-review topic page so that developers can more easily learn about it.
To associate your repository with the access-review topic, visit your repo's landing page and select "manage topics."