
The script worked. The CISO needed something else. iam-audit v2: interactive dashboard, root account detection and Docker.
From raw CSVs to a visual dashboard anyone can run with a single Docker command — and how each feature came from a real need. The hook The first script worked. It iterated through 20+ AWS accounts, assumed roles with minimum privilege, and produced two CSVs with everything you needed to know about Access Keys and remediation events. Technically correct. Complete. Useful. But when the time came to share the results with the team, I realized something uncomfortable: a CSV is an answer for someone who knows how to ask the right questions. For everyone else, it's noise. The engineer opens the CSV and sees data. The CISO opens the CSV and sees rows. It's the same file — but it's not the same experience. That led me to a question that changed the direction of the project: what if findings could be viewed, filtered, and understood without opening a single spreadsheet? The context When you work in security in enterprise environments, you quickly learn that technical findings have two distinct
Continue reading on Dev.to Python
Opens in a new tab
