Discover machine identities
Continuously inventory AWS roles, federated principals, and Kubernetes service accounts into one normalized identity catalog.
Machine identity security category
Discover machine identities, map trust paths, surface real escalation risk, and roll out authorization changes with explainable audit trails.
Identrail Console / prod-main
Findings queue
FND-1028
criticalWildcard trust into platform-admin
k8s:payments/api -> orders-runner -> platform-admin
FND-1037
highOwnerless role with active assumption
k8s:shared/maintenance-job -> security-audit
Remediation summary
Restrict `sts:AssumeRole` trust on `platform-admin` to `orders-worker` namespace and enforce service account owner tags.
Credibility
Open sourceAWS + Kubernetes focusedAPI-firstDeterministic findingsExplainable policy decisionsAudit-ready evidenceProduct Overview
Focused machine identity security for AWS and Kubernetes, with coverage scoped to high-impact workflows.
Continuously inventory AWS roles, federated principals, and Kubernetes service accounts into one normalized identity catalog.
Model who can assume what, where federation links exist, and how workload-to-role inheritance creates reachable privilege paths.
Prioritize admin-equivalent access, wildcard trust, ownerless identities, and escalation-prone paths with deterministic evidence.
Run history-aware scans for leaked credentials and insecure patterns while keeping raw secret values out of persistence.
Compare candidate and enforced policies before rollout, inspect decision traces, and catch denial or over-allow regressions early.
Ship findings, traces, and audit events into existing workflows with stable schemas built for security and compliance reviews.
Showcase 01
Identrail turns fragmented machine identity relationships into an operator-readable graph with path-level blast-radius context.
Showcase 02
The findings queue favors signal over volume and explains each decision so teams can triage and remediate with confidence.
Open findings queue
3 high signalWildcard trust
arn:aws:iam::prod:role/platform-admin
criticalOwnerless identity
k8s:shared/legacy-sync
highEscalation path
k8s:payments/api
highShowcase 03
Repository history scanning extends machine identity risk visibility without turning Identrail into a generic secrets product.
Repository scan job
Read-only modeRSC-812
criticalAWS access key pattern in commit history
commit: `e5a8711`
evidence: `sha256:9f8b4f9e... (redacted)`
RSC-827
highHardcoded kubeconfig token in shell script
commit: `84a13ce`
evidence: `sha256:1b3ce9bd... (redacted)`
Showcase 04
Run authorization simulations before enforcement and review explainable decision traces alongside the audit event stream.
Decision trace
principal.resolve
passresource.match
passpolicy.evaluate
denyguardrail.check
passRollout comparison
Enforced policy
allow`payments-api` -> `orders-runner` when namespace is `payments` or `jobs`.
Candidate policy
reviewAdds owner-tag guardrail and restricts assumption from shared namespace workloads.
Audit stream
append-only2026-04-11T01:42:03Z
passpolicy.operator@identrail -> simulation.run
2026-04-11T01:43:18Z
warningplatform.security -> candidate.compare
2026-04-11T01:44:55Z
passchange-approval-bot -> enforcement.defer
Why It Matters
Identrail is designed around where non-human identity incidents actually originate in AWS and Kubernetes environments.
Workload principals frequently keep grants far beyond operational intent.
Wildcard trust and open assumption paths make lateral movement practical.
Identity paths can bridge control planes and bypass team boundaries.
Dormant principals survive service turnover and become quiet attack paths.
Repository history can expose credentials and unsafe identity handling.
Built For Production
Designed for auditable operation, scoped access, and deterministic workflows across security and platform teams.
Security and operations controls
production postureDeployment paths
Docker
compose-based local and controlled environment rollout
Kubernetes
cluster-native deployment for worker and API services
Helm
versioned chart values for repeatable operations
Terraform
infrastructure-managed provisioning and drift review
Developer and Operator Workflow
Run local deployment, trigger scans, query findings, and execute repository scan jobs through the same API and CLI flow used in operations.
Developer and operator workflow
Local Deployment
bashcp deploy/docker/.env.example deploy/docker/.env
docker compose -f deploy/docker/docker-compose.yml \
--env-file deploy/docker/.env \
up -d --build
curl -sS http://localhost:8080/healthzEvaluate Identrail
Start with docs, inspect the codebase, and deploy into AWS and Kubernetes environments with deterministic evidence and policy-safe controls.