// artifact family

cloud iam / cspm forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. aws cloudtrail iam anomaly forensic analyzerdrop cloudtrail iam event export · parse user/role + action bursts + deny patterns · runs locally
  2. gcp audit log iam privilege forensic analyzerdrop gcp audit log iam export · parse binding changes + service account keys · runs locally
  3. azure activity log rbac forensic analyzerdrop azure activity log rbac export · parse role assignment + pim activation · runs locally
  4. aws iam access analyzer finding forensic analyzerdrop access analyzer finding export · parse resource + finding type + status timeline · runs locally
  5. wiz cspm misconfiguration forensic analyzerdrop wiz cspm issue export · parse severity + resource + remediation status · runs locally
  6. lacework cloud security event forensic analyzerdrop lacework alert export · parse policy + entity + anomaly score · runs locally
  7. orca cloud security alert forensic analyzerdrop orca alert export · parse asset + risk factor + attack path hints · runs locally
  8. prisma cloud alert forensic analyzerdrop prisma cloud alert export · parse policy + resource + compliance standard · runs locally
  9. scout suite aws assessment forensic analyzerdrop scout suite html/json assessment export · parse flagged services + rules · runs locally
  10. cloud iam excessive permission correlatordrop 2+ iam/cspm exports · correlate over-privileged principals graph · runs locally
ready