Reference implementations and automation patterns for cloud security engineering and governance.
Prunes AWS IAM policies by analyzing CloudTrail logs to identify and remove unused permissions. Helps implement least privilege access by comparing granted actions against actual API usage.