Listing Thumbnail

    SEC Provisioner Enterprise-12 - Automated AWS IAM Infrastructure

     Info
    Deployed on AWS
    Automated AWS IAM security provisioning via CloudFormation. 12 IAM groups, full service roles, assumable roles, cross-account roles, 31 policy templates across 9 AWS services. Docker-based.

    Overview

    SEC Provisioner by Axon Tech Labs is a Docker-based tool that automates AWS IAM security infrastructure provisioning via CloudFormation. It bridges the gap between data science agility and enterprise security requirements - creating IAM groups, service roles, assumable roles, cross-account roles, and least-privilege policies from a single YAML configuration file. By shifting security left, teams can build compliant ML environments in minutes rather than weeks.

    The Enterprise-12 tier is designed for organizations with strict security and compliance requirements. It includes 12 IAM groups, full service roles, assumable roles, cross-account roles, and 31 least-privilege policy templates across 9 AWS services including S3, ECR, SageMaker, Lambda, Bedrock, KMS, Trusted Advisor, and Pipeline.

    Note: Medium-10 and Enterprise-12 tiers generate CloudFormation templates that exceed the 51,200-byte inline limit. An S3 bucket is required for template storage. Use the S3 Provisioner to create this bucket or create it manually.

    Deploy across multiple AWS accounts, environments, and regions with consistent results. Every step - from configuration validation to deployment - produces auditable artifacts for compliance and team visibility.

    Designed for DevOps engineers, MLOps engineers, security architects, and platform teams who need standardized, repeatable IAM infrastructure across ML projects, environments, and accounts. Enterprise tier adds cross-account roles for centralized access management across your AWS organization.

    Key Capabilities:

    • Enterprise-Grade Security: Automatically generate 12 IAM groups, full service roles, assumable roles, cross-account roles, and 31 least-privilege policy templates across 9 AWS services including KMS, Trusted Advisor, and Pipeline. No manual JSON policy writing required.
    • Safe Deployment Pipeline: Move confidently from configuration to production with a multi-stage validation workflow. Validate YAML schemas, perform structural CloudFormation checks, and utilize isolated test-deploy namespaces to verify permissions before touching live environments.
    • Pre-Deployment Visibility: Eliminate surprises by generating detailed Change Sets to preview exactly how security modifications will impact your environment. This allows security teams to audit infrastructure updates before they are executed.
    • Continuous Compliance and Auditability: Maintain a transparent security posture by exporting IAM roles and groups into individual JSON files for external auditing. Use built-in drift detection to identify unauthorized manual changes and ensure your live stack remains aligned with your defined security baseline.
    • Streamlined Lifecycle Orchestration: Manage the entire security stack through a single interface - from synthesizing CloudFormation templates to executing full resource tear-downs.

    12 Actions:

    1. validate-config - Validate configuration YAML template before deployment
    2. export-iam-policy - Generate a least-privilege IAM policy document for provisioning IAM security infrastructure
    3. export-service-policies - Generate standalone JSON policy documents for each AWS service role
    4. export-roles - Extract IAM role definitions into individual JSON files for auditing
    5. export-groups - Export IAM group definitions as individual JSON files
    6. create-prov-template - Synthesize the configuration into a CloudFormation template
    7. validate-prov-template - Perform structural and semantic validation on the generated template
    8. show-changes - Generate a Change Set to preview security infrastructure modifications
    9. check-drift - Detect configuration drift on deployed CloudFormation stack resources
    10. test-deploy - Deploy to an isolated namespace to verify permissions and resource creation
    11. deploy - Provision or update the AWS security infrastructure stack
    12. delete-stack - Tear down the CloudFormation stack and remove all associated security resources

    How It Works:

    1. Configure: Define your IAM security infrastructure in a simple YAML file
    2. Execute: Run the Docker container with your config mounted
    3. Review: Generate CloudFormation templates, IAM policies, and service role documents, then validate before deploying
    4. Deploy: Deploy to AWS via CloudFormation for immediate, reliable resource creation

    Technical Requirements:

    • Docker 20.10 or later
    • AWS account with IAM, CloudFormation, and S3 permissions
    • AWS credentials (access key or IAM role)
    • 512 MB RAM minimum
    • S3 bucket for CloudFormation template storage (templates exceed 51,200-byte inline limit)

    Highlights

    • Enterprise-Grade IAM Security - 12 IAM groups, full service roles, assumable roles, cross-account roles, and 31 policy templates across 9 AWS services including KMS, Trusted Advisor, and Pipeline. 12 actions cover the full lifecycle from policy generation to stack teardown.
    • Audit-Ready Exports - Export IAM policies, service roles, and group definitions as individual JSON files for external security reviews. Built-in drift detection identifies unauthorized manual changes to your deployed infrastructure.
    • Cross-Account Access Management - Enterprise tier creates cross-account roles for centralized access management across your AWS organization. Deploy consistent IAM infrastructure across accounts, environments, and regions from a single YAML configuration.

    Details

    Delivery method

    Supported services

    Delivery option
    SEC Provisioner Enterprise-12 Container Image

    Latest version

    Operating system
    Linux

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    SEC Provisioner Enterprise-12 - Automated AWS IAM Infrastructure

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (1)

     Info
    Dimension
    Description
    Cost/month
    SEC Provisioner Enterprise-12 License
    License for SEC Provisioner Enterprise-12 - 12 IAM groups, full roles, cross-account, 31 policies
    $1,499.00

    Vendor refund policy

    30-day money-back guarantee for monthly subscriptions. Pro-rated refunds for annual subscriptions within first 30 days.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    SEC Provisioner Enterprise-12 Container Image

    Supported services: Learn more 
    • Amazon ECS
    • Amazon EKS
    • Amazon ECS Anywhere
    • Amazon EKS Anywhere
    Container image

    Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.

    Version release notes

    Enhanced validation with AWS resource name length checks. Fixed missing ~/.aws credential mounts in documentation examples. Improved USER_GUIDE Docker command formatting across all provisioners. Bug fixes and stability improvements.

    Additional details

    Usage instructions

    Quick start: docker run --rm
    -v ~/.aws:/home/secuser/.aws:ro
    sec-provisioner:enterprise-12 --help

    Full documentation: https://docs.axontechlabs.com/sec/USER_GUIDE.html  Configuration guide: https://docs.axontechlabs.com/sec/CONFIGURATION.html 

    Support

    Vendor support

    Email: support@axontechlabs.com  Response Time: Within 24 hours (business days) Hours: Monday-Friday, 9 AM - 5 PM Pacific Time Includes: Technical questions, configuration assistance, troubleshooting Documentation:

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.