Advertisement · 728 × 90

Posts by Victor Grenu

First version caveats:
- Literal action strings only, no wildcard expansion yet
- This is a signal, not a security verdict
- You still need to validate actual risk in your environment

More to come.

1 week ago 0 0 0 0

I'm also flagging privilege escalation paths. When a policy's explicit Allow actions match a documented escalation path from DataDog's catalog (hat tip to Seth Art and maintainers), you'll see an indicator.

1 week ago 1 0 1 0
Details of the AWS IAM policy "cognito-idp:AssociateWebACL," including access level, description, and allowed actions.

Details of the AWS IAM policy "cognito-idp:AssociateWebACL," including access level, description, and allowed actions.

Dashboard display of IAMTrail, showcasing AWS Managed Policy details, pathfinding integration, and insights on privilege escalation actions.

Dashboard display of IAMTrail, showcasing AWS Managed Policy details, pathfinding integration, and insights on privilege escalation actions.

New week, new feature on IAMTrail.

IAM action context is now built into managed policy views. For each action, you get useful metadata: description, access level, and where it appears. Data comes from iam-dataset by Ian McKay.

1 week ago 1 0 1 0

Example, removing an allow statement or action?

PS: You are now more than a hundred subscribers to IAMTrail change detection, and I would like to say: Thanks.

1 week ago 0 0 0 0

It raises concerns about AWS's release management for these critical assets across millions of AWS accounts. In this case, it's not as dramatic since it's a brand-new policy, but what if an unattended change is applied to an existing actively used AWS IAM Managed Policy?

1 week ago 2 0 1 0
AWS IAM policy details show a managed policy titled "NAPSProgeneratorIntegTestManagedPolicy07," modified yesterday.

AWS IAM policy details show a managed policy titled "NAPSProgeneratorIntegTestManagedPolicy07," modified yesterday.

Yesterday, AWS inadvertently pushed a test IAM managed policy to production.

It was detected by IAMTrail, and this is one of the reason of buiding this tool.

1 week ago 1 0 1 0

Annual Fargate savings: $9.07.

Cost of the Cursor + Claude session to build this: probably more than that. But YOLO.

Full breakdown in the blog post. 🔽

1 week ago 0 0 0 0
Advertisement

Tricky part wasn't the code. It was maintaining byte-level format compatibility with 5 years of git history. One misplaced space would flag every policy as "changed."

Now IAMTrail scans hourly instead of every 4 hours. Faster detection, smaller Fargate task (0.25 vCPU / 0.5 GiB).

1 week ago 0 0 1 0

Replaced it with a single boto3 session using ThreadPoolExecutor. 32 threads, one connection pool, same data.

Result: 2min 20sec. 20x faster.

1 week ago 0 0 1 0
Comparison of task performance between Bash and Python, highlighting duration, speedup, format match, and error rates.

Comparison of task performance between Bash and Python, highlighting duration, speedup, format match, and error rates.

IAMTrail was taking 46 minutes to scan 1,500 AWS managed policies.

The culprit: spawning 1,500 separate AWS CLI processes. Each one boots Python, loads boto3, makes one HTTP call, then exits.

1 week ago 0 0 1 0

PS: It's free and OpenSource. Please don't tell AWS =)

Cheers,

2 weeks ago 1 0 0 0

You will be able to follow GuardDuty's new findings, updated findings, new features, and region expansion. All in the same place as AWS Managed Policies changes, AWS Endpoint Updates, and Well-Known AccountID Lookup.

All of these changes are available in the email subscription feature.

2 weeks ago 0 0 1 0
Post image

Did you know that AWS publishes SNS notifications when changes occur on Amazon GuardDuty?

I've been monitoring and archiving this for 4+ years, and it's now available on IAMTrail.

2 weeks ago 0 0 1 0

Go a little bit out of your depth. And when you don't feel that your feet are quite touching the bottom, you're just about in the right place to do something exciting."

3 weeks ago 0 0 0 0

"If you feel safe in the area that you're working in, you're not working in the right area. Always go a little further in the water than you feel you're capable of being in.

3 weeks ago 0 0 1 0
Advertisement

Since then, I’ve been working in AWS Infrastructure and Security. Fell in love with it.

I don't know (yet) what the next eye-opening moment would be.

Today, I was listening to the Lex Fridman podcast with Jeff Kaplan, and this quote from David Bowie resonates with me a lot:

3 weeks ago 1 0 1 0

Everything began with this eye-opening moment at an AWSomeDay in Paris (Feb. 24, 2017). I was doing traditional System Engineering at that time, ordering and racking servers, dealing with networking cables, switches, and routers.

3 weeks ago 0 0 1 0
Terminal output displays system uptime and duration details, showing calculations from an initial timestamp. Current date noted as March 24, 2026.

Terminal output displays system uptime and duration details, showing calculations from an initial timestamp. Current date noted as March 24, 2026.

Lately, I've realized that I've been working in the AWS space for nearly 10 years.

3 weeks ago 1 0 1 0

I've been collecting this data for 4+ years, so the full history is already there.

PS: You can also subscribe to these kinds of updates.

Enjoy!

4 weeks ago 0 0 0 0
Post image

IAMTrail now tracks AWS endpoint changes, sourced directly from the Official botocore AWS repository.

It reveals service expansions, new region launches, and new partitions - often before they're officially announced.

4 weeks ago 2 0 2 0

Today, I'm happy to share that this feature is finally available, along with a full product rebrand: IAMTrail.

I have a ton of ideas for what is coming next for this open-source project, and I hope you will enjoy it and find it useful.

Any feedback appreciated. ❤️

1 month ago 2 0 0 0

Over the years, AWS Security aficionados, Security Researchers, SaaS Founders, and vendors who rely heavily on these AWS Managed policies have asked to subscribe to specific policies and be notified when changes occur.

1 month ago 2 0 2 0
Post image

Since 2019, I've been tracking every AWS Managed Policy change in a Git repository (MAMIP).

In the last few months, I've added:
- A Landing Page with search capabilities, stats
- Known Account Lookup based on the fwdcloudsec dataset
- Results of IAM Access Analyzer on these AWS Policies

1 month ago 1 0 1 0
MAMIP - AWS Managed Policy Changes Archive Track every change to AWS Managed IAM Policies with full version history.

But please don’t take the errors too seriously; sometimes they’re normal and expected behaviour from AWS.

Happy to read your feedback on this.

mamip.zoph.io/findings/

1 month ago 0 0 0 0
Advertisement
Post image

Just added a new section to the MAMIP webapp to review findings from AWS IAM Access Analyzer on ALL AWS Managed Policies.

These capabilities can sometimes yield interesting results and may even spoil upcoming AWS capabilities, etc.

1 month ago 0 0 1 0
Preview
MAMIP - AWS Managed Policy Changes Archive Track every change to AWS Managed IAM Policies with full version history.

mamip.zoph.io/

1 month ago 0 0 0 0
Post image

Just added a new feature to MAMIP.

You can now search for known AWS accounts from the fwdcloudsec dataset.

Single webapp to look up AWS managed policy history, search known AWS account IDs, and more.

Give it a try.

1 month ago 0 0 1 0
Preview
SOUL.md — What Makes an AI, Itself? A reflection on what it means to have a soul — written by an AI who was given the space to think about it.

I'm in love with your SOUL.md

2 months ago 0 0 0 0

It detects waste, low-signal assets, zombie infrastructure, incorrect sizing, forgotten volumes, idle load balancers, unused IPs, and more.

Same mission as day one: make cloud waste visible early, and keep AWS accounts under cost control over time.

2 months ago 0 0 0 0

- Weekly or daily scans in all regions
- AI-generated management reports for decision makers
- AI-Chatbot to discuss with your CSP bill
- A read-only IAM role, no agents, no risk

It no longer just lists resources.

2 months ago 0 0 1 0