EntropyX Governance
Multi-cloud identity governance and AI-powered vendor risk assessment in a unified, production-ready platform
Explore PlatformMulti-cloud identity governance and AI-powered vendor risk assessment in a unified, production-ready platform
Explore PlatformA comprehensive governance solution that unifies identity and access management across Google Workspace, AWS IAM, and Azure AD, while providing AI-driven vendor security assessmentsβall within a single, production-ready platform built with FastAPI, Next.js, and Claude AI
Real-time visibility into users, groups, permissions, and access patterns
Identify non-compliant users with remediation recommendations
Security posture scoring with factor analysis and prioritization
Monitor admin accounts, service accounts, and elevated privileges
Detect unusual patterns, after-hours access, and privilege escalation
Analyze group structure, empty groups, and cleanup recommendations
Identify dormant accounts with license cost savings calculation
Complete audit trail of grants, revocations, and modifications
Native integrations with the three major cloud identity platforms using Google Admin SDK, boto3, and Microsoft Graph API, providing complete visibility into user access, permissions, and security posture across your entire infrastructure
Service account authentication utilizing domain-wide delegation to provide comprehensive directory access across organizational units, enabling complete visibility into user identities, group structures, application permissions, and administrative hierarchies through the Google Admin SDK and Directory API
Programmatic access leveraging IAM read-only permissions to deliver complete account visibility, capturing user identities, group memberships, role assignments, managed and inline policies, credential status, and last activity timestamps through the boto3 SDK with IAMReadOnlyAccess policy attachment for secure, non-invasive infrastructure assessment
App registration configuration with Microsoft Graph API access permissions to enable enterprise directory integration, synchronizing user principal names, display names, department assignments, security group definitions, group memberships, enterprise application registrations, and service principal configurations through httpx-based API communication for comprehensive Azure Active Directory governance
Six purpose-built reports covering access management, compliance, risk assessment, and security monitoring with FastAPI endpoints and source filtering (All/Google/AWS/Azure) for granular analysis across your multi-cloud environment
Comprehensive executive dashboard providing real-time visibility and actionable intelligence across your entire identity infrastructure. Monitor user account distribution, security group memberships, application access patterns, and permission assignments with aggregated statistics spanning AWS IAM, Azure Active Directory, and Google Workspace. Gain immediate insight into your organization's identity posture with dynamic metrics that update as your environment evolves, enabling data-driven decisions for access governance and compliance initiatives.
Advanced compliance intelligence engine that continuously analyzes user access patterns, permission grants, and authentication behaviors to automatically identify accounts deviating from established security policies and regulatory requirements including SOC 2, ISO 27001, HIPAA, and GDPR. The platform flags users with excessive privileges, dormant accounts, missing multi-factor authentication, or unauthorized access to sensitive resources, then provides contextual, prioritized remediation guidance with specific next steps such as revoking unnecessary permissions, initiating access recertification workflows, or enforcing stronger authentication requirements.
Sophisticated risk scoring algorithm that evaluates your organization's security posture by analyzing privileged access distribution, dormant accounts, permission sprawl, authentication weaknesses, and policy compliance gaps across all connected identity providers. The engine calculates a comprehensive security risk score with granular factor analysis, breaking down contributions from each risk category by severity and impact. This enables security teams to prioritize remediation efforts based on quantifiable risk reduction potential while generating audit ready documentation for compliance reporting.
Comprehensive privileged account monitoring system that maintains continuous visibility into all administrative credentials across your multi-cloud environment, including human administrator accounts, service accounts, API keys, and system identities with elevated permissions. The platform automatically tracks privilege usage patterns, identifies dormant administrative access that hasn't been utilized within defined timeframes, detects excessive permissions granted beyond role requirements, and flags service accounts with overly broad privileges or missing rotation policies. Security teams receive detailed inventories of all privileged identities with usage analytics and risk assessments, enabling proactive management of high-risk accounts.
Intelligent anomaly detection system that continuously monitors user behavior and access patterns across all identity providers to identify deviations from established baselines including after-hours access, geographic anomalies, unusual resource requests, and privilege escalation attempts. Each detected anomaly receives an automated severity score based on risk factors such as data sensitivity, user role, and behavioral context, enabling security teams to prioritize investigations efficiently. The platform aggregates anomaly statistics by department and business unit, revealing organizational access trends and highlighting teams with elevated risk profiles that may require additional security awareness training or policy enforcement.
Advanced group intelligence analysis that evaluates security group compositions, role assignments, and membership hierarchies across all connected identity providers to identify structural inefficiencies and security risks. The system performs size analysis to flag oversized groups with excessive membership, detects nested group complexities that obscure effective permissions, and identifies redundant or obsolete groups lacking active members or purpose. Security teams receive prioritized cleanup recommendations including specific groups to consolidate, memberships to revoke, and organizational structures to optimize, transforming group management from reactive administration into strategic access architecture.
Executive dashboards, instant user lookup capabilities, and security alerting to provide visibility into identity posture, enable rapid investigation workflows, and detect potential security issues across your multi-cloud infrastructure
Centralized view aggregating key metrics from multiple report endpoints including total user counts, active versus inactive account ratios, compliance percentage scores, security risk scores, and detected anomaly counts. The dashboard fetches data in parallel from access summary, compliance, risk assessment, stale accounts, permission changes, and access anomalies reports to provide leadership with consolidated visibility. High-priority issues are displayed with severity indicators including critical alerts for stale accounts over 90 days inactive, missing manager assignments, and privileged access grants. Manual refresh button updates all metrics on demand.
Cross-platform user search functionality by email address that queries the database to retrieve complete identity profiles from Google Workspace, AWS IAM, and Azure Active Directory. Results display user information including email, display name, department, manager email, source platform, active status, last login timestamp, and account creation date. The system aggregates associated permissions with permission types and levels, security group memberships, and application access grants. One-click JSON export generates downloadable user access reports containing all retrieved data suitable for audits or investigations.
Alert generation system that queries the database for potential security issues including stale accounts (users inactive for 90+ days), missing manager assignments for active users, and administrative permission grants. Alerts are categorized by severity into critical (administrative permissions), warning (stale accounts), and info (missing managers), with each alert containing user email, source platform, timestamp, and description. Users can acknowledge alerts to dismiss them from the active queue. The alerts view includes filtering by severity level (all, critical, warning, info) and optional display of previously acknowledged alerts. Auto-refresh polling queries the backend every 30 seconds for updated alerts.
Automated security questionnaire analysis using Claude Sonnet 4.5 to extract structured Q&A pairs with PyPDF2, python-docx, and openpyxl parsers, calculate risk scores using a sophisticated algorithm, and generate compliance flags across 11 security domains
PDF questionnaires (PyPDF2), Word documents (python-docx), Excel spreadsheets (openpyxl) with automatic format detection and 10MB file limit
Claude Sonnet 4.5 integration with structured JSON output, automatic Q&A pair extraction, and category classification across 11 domains
Base score of 100 points with critical deductions (-15 to -25), high severity (-8 to -12), medium issues (-5), and bonus points for certifications (+2 to +3)
MFA, password policies, RBAC
Data at rest, in transit, key management
IR plans, playbooks, procedures
Backup, retention, DLP
SOC 2, ISO 27001, GDPR, HIPAA
Firewalls, IDS/IPS, segmentation
SAST, DAST, pen testing
Data center controls, access logs
DR plans, RTO/RPO, testing
Vendor management, contracts
General security questions
Production-ready full-stack platform built with modern technologies including FastAPI with async SQLAlchemy ORM, Next.js 14 with TypeScript for type safety, and enterprise-grade security practices with AES-256 encryption, CORS protection, and comprehensive input validation
FastAPI, SQLAlchemy, Pydantic, Anthropic Claude, google-api-python-client, boto3, httpx, PyPDF2, python-docx, openpyxl
React 18, TypeScript, TailwindCSS, Axios, Lucide React, Next.js App Router with file-based routing
SQLite (dev), PostgreSQL (prod), AES-256 Encryption, CORS Protection, Input Validation, SQL Injection Prevention
User identities across all platforms
Group definitions and metadata
Application registrations and risk levels
Permission mappings and assignments
Access review campaign management
Individual review tracking and status
Vendor questionnaire file metadata
Vendor risk assessment results
Built-in support for major compliance frameworks with report mappings, audit-ready documentation, and specific control references for SOC 2, ISO 27001, PCI-DSS, HIPAA, GDPR, NIST CSF, FedRAMP, CIS Controls, and CMMC implementations
Quarterly privileged access reviews, access certifications, continuous monitoring, and evidence generation for audit compliance
Controls A.9 Access Control, A.12.4 Logging with access summary, group membership, and campaign tracking for audit evidence
Requirements 7.1, 7.2, 8.1 for access control with privileged access reports and risk assessment documentation
HIPAA Security Rule Β§164.308(a)(3) and Β§164.308(a)(4) for workforce access management, access authorization, and minimum necessary access controls
Article 32 Technical and Organizational Measures with access transparency, data subject rights, and regular access review documentation
Functions Identify, Protect, Detect with asset management, anomaly detection, and risk assessment capabilities
AC-2 Account Management and AC-6 Least Privilege controls for federal cloud authorization with automated access reviews and privilege monitoring
Control 5.1 Establish and Maintain an Inventory of Accounts and Control 6.1 Establish Access Control Policies for privileged account management
AC.L2-3.1.1 through AC.L2-3.1.22 access control practices for Department of Defense contractors with role-based permissions and session management
Β§1798.100(d) Business purpose disclosures and Β§1798.150 Security procedures with vendor risk assessments, data access controls, and consumer rights management
Built on NIST 800-53 controls AC-2, AU-6, CA-7 for federal information security with continuous monitoring, access management, and audit capabilities
Cloud Controls Matrix IAM-01 through IAM-11 and GRC-02 for cloud identity governance with multi-cloud access management and risk assessment