Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. IAM
  3. Policy Sentry

Policy Sentry

MITPython0.16.0

Automatically generate least-privilege IAM policies for AWS based on resource ARNs and access levels.

Visit WebsiteGitHubGitHub
2.1k stars152 forks0 contributors

What is Policy Sentry?

Policy Sentry is an IAM least-privilege policy generator for AWS that automates the creation of secure IAM policies. It solves the problem of manually writing complex, scoped-down policies by allowing users to specify resource ARNs and access levels, then generating the appropriate JSON policies automatically. This tool helps enforce security best practices by limiting permissions to only what is necessary.

Target Audience

Infrastructure as Code developers, cloud security engineers, and DevOps teams working with AWS who need to create and manage IAM policies with least-privilege principles efficiently.

Value Proposition

Developers choose Policy Sentry because it drastically reduces the time and expertise required to write secure IAM policies, from hours to seconds. Its unique selling point is the ability to generate policies based on resource constraints and access levels, abstracting AWS IAM complexity while ensuring compliance with least-privilege security models.

Overview

IAM Least Privilege Policy Generator

Use Cases

Best For

  • Automating the creation of least-privilege IAM policies for AWS services
  • Generating IAM policies for Terraform or CloudFormation deployments
  • Querying AWS IAM actions and resources for security auditing
  • Reducing over-permissive policies in existing AWS environments
  • Integrating IAM policy generation into CI/CD pipelines
  • Learning and experimenting with AWS IAM permissions and access levels

Not Ideal For

  • Organizations requiring multi-cloud IAM policy generation for Azure or Google Cloud
  • Teams that prefer graphical user interfaces or AWS Console wizards over command-line tools
  • Users needing automated compliance auditing of existing IAM policies rather than generation

Pros & Cons

Pros

Automated Least-Privilege Generation

Drastically reduces policy creation time from hours to seconds by mapping resource ARNs to AWS actions based on CRUD access levels, as demonstrated in the tutorial with SSM and SecretsManager examples.

Dual Interface Flexibility

Offers both a CLI for quick policy generation and a Python library for programmatic integration, enabling seamless use in scripts or CI/CD pipelines.

Rich IAM Database Querying

Includes a comprehensive, queryable database of AWS actions, resources, and condition keys for exploration and validation, shown in the cheat sheet with commands like 'policy_sentry query action-table'.

Multi-Format Output Support

Generates policies in JSON format compatible with AWS IAM, Terraform, and other IaC tools, simplifying deployment across different environments.

Cons

Manual Template Overhead

Requires creating and maintaining YAML templates for policy generation, which can be cumbersome and error-prone for users unfamiliar with the format or handling complex policies.

AWS-Only Limitation

Exclusively supports AWS IAM, making it ineffective for hybrid or multi-cloud environments where policies for other providers like Azure or GCP are needed.

Database Update Dependency

Relies on a local SQLite database that must be manually updated via 'initialize --fetch' to include new AWS services, risking stale data if not maintained regularly.

Frequently Asked Questions

Quick Stats

Stars2,144
Forks152
Contributors0
Open Issues3
Last commit10 days ago
CreatedSince 2019

Tags

#aws-security#hacktoberfest#salesforce#security-automation#cloudsecurity#security#infrastructure-as-code#devsecops#aws-iam#iam#access-control#cloud#aws#cloud-security

Built With

S
SQLite
Y
YAML
P
Python
D
Docker

Links & Resources

Website

Included in

IAM2.2k
Auto-fetched 1 day ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub