Access Analyzer logo

Access Analyzer

Access Analyzer

UpOpen Sourcecloudby Amazon Web Services62· JavaScript· MIT

AWS IAM Access Analyzer API analyzes IAM resource policies for over-privileged access or external access — proactively surfaces security risks.

Visit site ↗Source ↗Health checked 9h ago
Use it when

Formal-methods-based policy analysis (Zelkova engine)

Watch for

Detects policy issues only — does not prevent policy modifications

First check

POST /access/analyzer/analyzers to create an analyzer (one per region). Findings are auto-aggregated from IAM/S3/SQS and other resources.

Auth
CORS
No
HTTPS
Yes
Signup
?
Latency
863 ms
Protocol
REST
Pricing
Stars
62

Uptime · 30-day window

Probes: 1Uptime: 100%Avg latency: 863ms

GitHub activity

62JavaScriptMIT17 open issuesLast commit 110d ago
01

About this API

Access Analyzer is AWS's security enhancement on top of IAM. Traditional IAM checks are "post-incident audit" — investigate policies after something happens, but misconfigured policies can exist for a long time unnoticed. Access Analyzer is "proactive scanning" — using formal methods (Zelkova engine, mathematically proving policy equivalence) to analyze every policy, surfacing anomalies like "this S3 bucket allows anyone access", "this IAM role has *.* permissions". Also generates precise least-privilege policy recommendations based on CloudTrail history — e.g. a role configured with s3:* but actually only using s3:GetObject and s3:PutObject gets narrowed-down recommendations. Essential tool for AWS security governance.

02

What you can build

  • 1Scan S3 buckets for unintended public access
  • 2Audit IAM role actual usage vs. configured permissions
  • 3Identify cross-account access grants
  • 4Generate least-privilege policy recommendations
03

Strengths & limitations

Strengths

  • Formal-methods-based policy analysis (Zelkova engine)
  • Proactively surfaces risks (no manual review needed)
  • Recommends least-privilege based on CloudTrail actual call history

Limitations

  • Detects policy issues only — does not prevent policy modifications
  • Limited support for some non-standard services
04

Example request

Generic template — replace <endpoint> with the real path from the docs.
curl https://github.com/mermade/aws2openapi/<endpoint>
05

Getting started

POST /access/analyzer/analyzers to create an analyzer (one per region). Findings are auto-aggregated from IAM/S3/SQS and other resources.

06

FAQ

Is it free?+

Account-level analyzer is free. Organization-level (across AWS Organizations) and unused access detection are paid.

07

Technical details

CORS: NoHTTPS: YesSignup: ?Open source: Yes
Auth type
unknown
Pricing
unknown
Protocols
REST
SDKs
python, javascript, go, java, csharp
Response time
863 ms
Last health check
5/12/2026, 7:36:33 AM
08

Tags

09

More from Amazon Web Services