Overview
SEC Provisioner by Axon Tech Labs is a Docker-based tool that automates AWS IAM security infrastructure provisioning via CloudFormation. It bridges the gap between data science agility and enterprise security requirements - creating IAM groups, service roles, assumable roles, cross-account roles, and least-privilege policies from a single YAML configuration file. By shifting security left, teams can build compliant ML environments in minutes rather than weeks.
The Enterprise-12 tier is designed for organizations with strict security and compliance requirements. It includes 12 IAM groups, full service roles, assumable roles, cross-account roles, and 31 least-privilege policy templates across 9 AWS services including S3, ECR, SageMaker, Lambda, Bedrock, KMS, Trusted Advisor, and Pipeline.
Note: Medium-10 and Enterprise-12 tiers generate CloudFormation templates that exceed the 51,200-byte inline limit. An S3 bucket is required for template storage. Use the S3 Provisioner to create this bucket or create it manually.
Deploy across multiple AWS accounts, environments, and regions with consistent results. Every step - from configuration validation to deployment - produces auditable artifacts for compliance and team visibility.
Designed for DevOps engineers, MLOps engineers, security architects, and platform teams who need standardized, repeatable IAM infrastructure across ML projects, environments, and accounts. Enterprise tier adds cross-account roles for centralized access management across your AWS organization.
Key Capabilities:
- Enterprise-Grade Security: Automatically generate 12 IAM groups, full service roles, assumable roles, cross-account roles, and 31 least-privilege policy templates across 9 AWS services including KMS, Trusted Advisor, and Pipeline. No manual JSON policy writing required.
- Safe Deployment Pipeline: Move confidently from configuration to production with a multi-stage validation workflow. Validate YAML schemas, perform structural CloudFormation checks, and utilize isolated test-deploy namespaces to verify permissions before touching live environments.
- Pre-Deployment Visibility: Eliminate surprises by generating detailed Change Sets to preview exactly how security modifications will impact your environment. This allows security teams to audit infrastructure updates before they are executed.
- Continuous Compliance and Auditability: Maintain a transparent security posture by exporting IAM roles and groups into individual JSON files for external auditing. Use built-in drift detection to identify unauthorized manual changes and ensure your live stack remains aligned with your defined security baseline.
- Streamlined Lifecycle Orchestration: Manage the entire security stack through a single interface - from synthesizing CloudFormation templates to executing full resource tear-downs.
12 Actions:
- validate-config - Validate configuration YAML template before deployment
- export-iam-policy - Generate a least-privilege IAM policy document for provisioning IAM security infrastructure
- export-service-policies - Generate standalone JSON policy documents for each AWS service role
- export-roles - Extract IAM role definitions into individual JSON files for auditing
- export-groups - Export IAM group definitions as individual JSON files
- create-prov-template - Synthesize the configuration into a CloudFormation template
- validate-prov-template - Perform structural and semantic validation on the generated template
- show-changes - Generate a Change Set to preview security infrastructure modifications
- check-drift - Detect configuration drift on deployed CloudFormation stack resources
- test-deploy - Deploy to an isolated namespace to verify permissions and resource creation
- deploy - Provision or update the AWS security infrastructure stack
- delete-stack - Tear down the CloudFormation stack and remove all associated security resources
How It Works:
- Configure: Define your IAM security infrastructure in a simple YAML file
- Execute: Run the Docker container with your config mounted
- Review: Generate CloudFormation templates, IAM policies, and service role documents, then validate before deploying
- Deploy: Deploy to AWS via CloudFormation for immediate, reliable resource creation
Technical Requirements:
- Docker 20.10 or later
- AWS account with IAM, CloudFormation, and S3 permissions
- AWS credentials (access key or IAM role)
- 512 MB RAM minimum
- S3 bucket for CloudFormation template storage (templates exceed 51,200-byte inline limit)
Highlights
- Enterprise-Grade IAM Security - 12 IAM groups, full service roles, assumable roles, cross-account roles, and 31 policy templates across 9 AWS services including KMS, Trusted Advisor, and Pipeline. 12 actions cover the full lifecycle from policy generation to stack teardown.
- Audit-Ready Exports - Export IAM policies, service roles, and group definitions as individual JSON files for external security reviews. Built-in drift detection identifies unauthorized manual changes to your deployed infrastructure.
- Cross-Account Access Management - Enterprise tier creates cross-account roles for centralized access management across your AWS organization. Deploy consistent IAM infrastructure across accounts, environments, and regions from a single YAML configuration.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/month |
|---|---|---|
SEC Provisioner Enterprise-12 License | License for SEC Provisioner Enterprise-12 - 12 IAM groups, full roles, cross-account, 31 policies | $1,499.00 |
Vendor refund policy
30-day money-back guarantee for monthly subscriptions. Pro-rated refunds for annual subscriptions within first 30 days.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
SEC Provisioner Enterprise-12 Container Image
- Amazon ECS
- Amazon EKS
- Amazon ECS Anywhere
- Amazon EKS Anywhere
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Enhanced validation with AWS resource name length checks. Fixed missing ~/.aws credential mounts in documentation examples. Improved USER_GUIDE Docker command formatting across all provisioners. Bug fixes and stability improvements.
Additional details
Usage instructions
Quick start:
docker run --rm
-v ~/.aws:/home/secuser/.aws:ro
sec-provisioner:enterprise-12 --help
Full documentation: https://docs.axontechlabs.com/sec/USER_GUIDE.html Configuration guide: https://docs.axontechlabs.com/sec/CONFIGURATION.html
Resources
Vendor resources
Support
Vendor support
Email: support@axontechlabs.com Response Time: Within 24 hours (business days) Hours: Monday-Friday, 9 AM - 5 PM Pacific Time Includes: Technical questions, configuration assistance, troubleshooting Documentation:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
