![](https://normalyze.ai/wp-content/uploads/2023/03/arrows-right-red.svg) |
Achieve least privilege access to data stores with ease
|
By analyzing IAM roles, permissions, database grants etc for user and machine identities Normalyze can quickly identify who has what type of access to a given datastore. Further, by analyzing access logs, Normalyze can conclude who is and who isn’t making use of the permissions they have. The result is the ability to quickly determine a large portion of user and machine identities that have permissions to access your sensitive data but don’t really need it. By removing those accesses, teams can achieve least privilege access to data and reduce potential attack surface by huge margins.