Open core · Apache 2.0

Trace every machine identity.
Close the dangerous paths safely.

Identrail follows how AWS roles, Kubernetes service accounts, GitHub OIDC and trust policies can reach your data — and shows the smallest, safest fix for the people who own each step of the path.

Read-only by default
No write scopes
Self-hosted or hosted
Your choice
Time to first finding
Under 10 min
Illustrative
production · workspace / aws-iam
GitHub Actions OIDCidentity
sts:AssumeRole → billing-prodprivilege
payments-api service accountworkload
billing.ledger (read · write)resource
JWT claimsverified
IAM trust policyattached
Last seen2 min ago
What Identrail does

Discover. Detect. Remediate.
One platform, no hand-offs.

The same trust graph that surfaces a finding is the surface a platform engineer uses to fix it. No exporting CSVs to a different tool to actually do the work.
01 · Discover

Every identity, every path, in one graph.

Connect read-only to AWS, Kubernetes, GitHub Actions and your OIDC providers. Identrail builds a single trust graph that links every machine identity to every resource it can reach — including the hops in between.

02 · Detect

Severity tied to actual blast radius.

Findings are scored on the data they can reach, not on signature counts. A trust path to your billing database is not the same as a path to a feature flag — and Identrail tells you which is which.

03 · Remediate

Simulate the smallest safe fix first.

Every recommendation is run through a policy simulator before you see it. Identrail shows the smallest IAM or RBAC change that closes the path without breaking the workloads that legitimately depended on it.

From the field

The risk patterns Identrail turns into evidence.

Until we have customer stories to tell, here are the public risk patterns Identrail was built to make concrete inside your own environment.
Signal 01

Machine identities keep multiplying faster than review capacity

Cloud roles, workload identities, CI tokens and service accounts now sit across every delivery path. Identrail focuses on what those identities can actually reach.

CyberArk Identity Security Threat Landscape 2024
Signal 03

Cloud exposure often starts as an identity configuration problem

Overbroad trust policies, stale roles and permissive claims are hard to reason about in isolation. Identrail resolves them as reachable paths.

Verizon DBIR 2024
Built in the open

Public source, public releases, inspectable controls.

The platform is Apache 2.0 on GitHub: connectors, graph engine, policy simulator and deployment assets. Buyers can inspect the control plane instead of trusting a black box.

GitHub stars
Forks
License
Apache 2.0
Merge checks
DCO + CI
Why we built this
Most identity tools tell you a service account is risky. Almost none tell you what it can actually reach, or how to take that reach away without breaking production. That gap is where breaches happen. That gap is what Identrail closes.
Oluwatobi Mustapha
Founder & CEO · Cloud IAM Security Engineer · Non-Human Identity · OSS Contributor
Why teams choose Identrail

What changes when the trust graph is open.

The closed alternatives in this category trade transparency for a steeper enterprise price. We made the opposite trade.
CapabilityIdentrailTypical closed alternative
Trust-path explainabilityFull chain: identity → privilege → workload → resource, with evidence.Risk score on a finding; chain is not surfaced.
Rollout safetyRead-only ingest; simulated remediation; staged enforcement built in.Hardening is a write op handed to a separate tool, with no simulator.
Open-core architectureApache 2.0. Full source on GitHub. Self-host the same binary we run.Closed source. Black-box detection logic. Audit-by-vendor-promise.
Who owns the fixIdentrail names the resource owner and routes the playbook to them.Findings dropped into a security queue with no automatic owner mapping.
Cost shapeFree self-host. Hosted plan starts at $19/user/mo. No enterprise floor for SAML.Sales-led pricing. SSO and core controls behind enterprise tier.
Get started

Map your first production trust path in under ten minutes.

Connect read-only, see the paths that reach your sensitive data, simulate the smallest fix. No write access, no agent, no obligation.