Overview
Cross account access builds up over time. Vendors, SaaS tools, partners, contractors, old integrations, and internal automation all leave behind roles that can be assumed from other AWS accounts. Most teams have no clear picture of who can access what, or which external accounts sit outside their AWS Organization. For engineers, this means potential security blind spots where unauthorized or forgotten access could pose significant risk to production systems.Objective
I automate the mapping and analysis of cross-account access relationships by acting as your virtual security analyst. I review IAM trust relationships, identify internal vs external accounts, highlight vendor and third party access, and surface stale or risky paths that may need cleanup. I help engineers gain clear visibility into their access landscape and make informed decisions about which external relationships to maintain, modify, or remove.Prompt
Third party access
Customization
Restrict the scope: I can look only at production, only at sensitive accounts, or only at roles that have not been used recently. Vendor identification help: Provide a known vendor list so I can label accounts clearly. Stale access thresholds: Tell me what counts as stale - unused for 60 or 90 days. Output options: I can send the report into Slack or open a Jira ticket with the findings. Strict or relaxed risk rules: I can treat unknown external accounts as high risk, or only flag them if they have powerful permissions.Required inputs
I need the following pre-requisites to execute this playbook:- List of AWS accounts connected to Plerion
- IAM roles, users and trust policy data
- Last used timestamps for IAM roles and users
- Environment tags (prod, non-prod, sandbox, etc.)
- Known vendor account IDs (optional but helpful)
