Skip to main content

CLI for discovering overprivileged AWS IAM roles

Project description


Overprivileged is a utility for discovering over privileged IAM roles in AWS.

Caution: This software is in version 0.0.1 and not currently tested


From PyPi:

$ pip install overprivileged


Overprivileged utilizes Cloudtrail logs stored in Cloudwatch to parse out exactly which IAM actions have been performed by an IAM role over a given number of days and returns a diff of which IAM actions have been used and which ones have not.


  1. Cloudtrail logging enabled
  2. Cloudtrail logs saved to Cloudwatch log group


Check Role Privileges

Example Usage:

op check-privileges \
    --role-name role-name \
    --log-group-name cloudtrail-log-group-name \
    --days 5

Example Output:

    "usedActions": [
    "unusedActions": [


op check-privileges --help
Usage: op check-privileges [OPTIONS]

  Checks what actions are used and unused by a role

  --role-name TEXT       The name of the role to check privileges for.
  --log-group-name TEXT  The name of the log group where the Cloudtrail logs
                         are stored.

  --days INTEGER RANGE   The number of days in the past that the current
                         privileges should be checked against.

  --region TEXT          The aws region where the log group is stored.
  --help                 Show this message and exit.

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

overprivileged-0.0.1.tar.gz (44.6 kB view hashes)

Uploaded Source

Built Distribution

overprivileged-0.0.1-py3-none-any.whl (46.8 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page