Automated Provisioning
Create users across AD and AWS IAM with role-based policies. Simulates group assignment, credential generation, and encrypted storage.
- Role-based access control
- Automated credential management
- Encrypted S3 storage
Portfolio demonstration of enterprise IAM automation patterns: user provisioning, de-provisioning, and compliance monitoring workflows for Active Directory and AWS—with audit logging design for security investigations. Simulation mode for demos.
A portfolio showcase of identity lifecycle patterns—from onboarding through offboarding—designed for security-first enterprises.
Create users across AD and AWS IAM with role-based policies. Simulates group assignment, credential generation, and encrypted storage.
Demonstrates secure offboarding: disabling accounts, revoking access, and archiving data for compliance requirements.
Monitor dormant accounts, pending access certifications, and policy violations—the alerts real IAM teams rely on.
Complete audit trail design with long-term retention, aligned to enterprise forensic and compliance needs.
Bulk AD operations, group management, and dormant account checks demonstrated through production-ready scripts.
IAM, S3, SNS, and CloudTrail integration patterns with Python boto3 reference implementations.
End-to-end IAM automation flow from HR trigger to audit logging, integrating on-premises Active Directory with AWS cloud services.
Least-privilege IAM, KMS encryption, Secrets Manager for credential storage
Multi-AZ design, error handling with retry logic, graceful degradation
Serverless components, lifecycle policies, ~$2-5/month total cost
CloudTrail logging, CloudWatch monitoring, automated compliance
Walk through a simulated IAM workflow—validating input, assigning roles, provisioning accounts, and recording an audit trail in real time.
Combining scripting, cloud services, and directory services to model enterprise IAM automation.
Core automation scripts with boto3 for AWS SDK integration
Active Directory provisioning, group management, and bulk operations
IAM, S3, SNS, and CloudTrail for complete identity workflows
Enterprise directory and identity source integration patterns
Audit logging, retention, and compliance monitoring architecture
Interactive frontend with live simulation and real-time console