Cloudanix Joins AWS ISV Accelerate Program
Back to Changelog
new release October 15, 2024

Secure Access with JIT, Dependency Graphs, Rightsizing, Tracking Non-Human Identities and More

We know security teams are busy and are always looking for faster ways to manage security while planning for scale. Cloudanix focused on making it easier to elevate your security posture with visualization graphs for open source and transitive dependencies, maintaining compliance for human and non human identities and their accesses, advanced insights for achieving principles of least privilege, JIT for Azure and more.

Secure Your Azure Access Effortlessly with Cloudanix IAM Just In Time

Why should Azure users be left out. With this release, Cloudanix IAM Just In Time (JIT) is available for all the major cloud providers AWS, GCP and Azure. Integrate IAM JIT with your Entra ID for a streamlined experience to elevate and revoke privileges for cloud users. With many levers to control the privileges being requested like:

  • Manage JIT eligibility for roles
  • Auto approve if roles are limited in permissions
  • Define maximum duration of JIT access and more

Software Screenshot

Azure Access security effortlessly with IAM Just In Time

Dependency Graphs

Stay on top of your open-source dependencies and transitive dependencies with Cloudanix. Gain a comprehensive understanding of your open-source software ecosystem with our enhanced Dependency Graphs. With a clear, graphical representation of packages and their nested dependencies, identifying vulnerabilities, and outdated libraries has become easier and more intuitive. Also, visualize vulnerabilities at a repository level in detail.

Software Screenshot

understanding of open-source software ecosystem with enhanced Dependency Graphs Software Screenshot

understanding of open-source software ecosystem with enhanced Dependency Graphs

Track Non-Human Identities and Their Access in Detail

This new feature allows you to identify and monitor Non-Human & Human Access along with Third Party, Cross-Account and Internal Access to your cloud resources. With these insights, get a complete picture of all types of accesses and every access point, making it easier to secure your cloud environments and maintain compliance. Software Screenshot

Non-Human Identities and their access in detail

Software Screenshot

Non-Human Identities and their access in detail

Achieve Principles of Least Privilege with Advanced IAM Insights

Leverage our advanced IAM Insights, powered by Non-Human Intelligence and Right Sizing capabilities, to identify and eliminate unnecessary permissions. Gain actionable recommendations to enforce the principle of least privilege and strengthen your security posture.

Software Screenshot

Non-Human Identities and their access in detail

Prioritize Critical Findings with Impactful Resource Identification

Save time and focus on what matters most with our enhanced misconfiguration findings. Easily identify the most impactful resources, streamlining your remediation efforts and ensuring optimal security. Software Screenshot

enhanced misconfiguration findings


Cloudanix Resources

Resources over Internet


TODO:// is not an option for Cloud Security

Ready to see your graph?

Connect a cloud account in under 30 minutes. See every finding rooted in identity, asset, and blast radius โ€” with a fix path attached.

Book a Demo

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Apr 14, 2026

Top 15 Cloud Misconfigurations in 2026 - How to Fix Them?

Most cloud breaches today are not the result of sophisticated zero-day exploits. They are the result of misconfiguration

Read More

Monday, Apr 13, 2026

Top 18 Challenges of Cloud Security in 2026

The rapid adoption of cloud computing has brought unprecedented agility and scalability, making it a cornerstone of mode

Read More

Tuesday, Feb 10, 2026

The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity

Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app

Read More