Get the FREE Ultimate OpenClaw Setup Guide →

access-review

npx machina-cli add skill BagelHole/DevOps-Security-Agent-Skills/access-review --openclaw
Files (1)
SKILL.md
1.6 KB

Access Review

Implement periodic access review processes.

Review Process

access_review_workflow:
  1_extract:
    - Pull access data from systems
    - Generate access report
    
  2_review:
    - Manager certification
    - Risk-based prioritization
    - Decision documentation
    
  3_action:
    - Revoke unnecessary access
    - Update exceptions
    - Document decisions
    
  4_report:
    - Compliance metrics
    - Remediation tracking

AWS IAM Review

# Generate credential report
aws iam generate-credential-report
aws iam get-credential-report --output text --query Content | base64 -d

# Find inactive users
aws iam list-users | jq -r '.Users[] | select(.PasswordLastUsed < "2024-01-01") | .UserName'

# List unused access keys
aws iam get-access-key-last-used --access-key-id AKIAXXXXXXXX

Automation

def generate_access_report():
    users = get_all_users()
    report = []
    
    for user in users:
        report.append({
            'user': user.email,
            'roles': user.roles,
            'last_login': user.last_login,
            'manager': user.manager,
            'review_status': 'pending'
        })
    
    return report

Best Practices

  • Quarterly reviews minimum
  • Risk-based frequency
  • Manager attestation
  • Automated revocation
  • Audit trail maintenance

Source

git clone https://github.com/BagelHole/DevOps-Security-Agent-Skills/blob/main/compliance/governance/access-review/SKILL.mdView on GitHub

Overview

Access Review implements a repeatable governance process to certify user permissions, revoke unnecessary access, and maintain an auditable trail. It separates the workflow into extraction, review, action, and reporting to support ongoing access compliance.

How This Skill Works

The skill orchestrates a four-step workflow: 1) extract—pull access data from systems and generate an access report; 2) review—manager certification with risk-based prioritization and documented decisions; 3) action—revoke unnecessary access and update exceptions; 4) report—capture compliance metrics and remediation progress. Automation, exemplified by a Python function that builds a user-focused report, underpins consistent, repeatable execution.

When to Use It

  • When establishing or improving access governance and recertification programs
  • During regular compliance audits or certification cycles
  • After onboarding, promotions, or role changes to revalidate access
  • As part of regulatory or policy-driven review cadences
  • To identify and revoke inactive or unused credentials

Quick Start

  1. Step 1: Pull access data from systems and generate an initial access report (users, roles, last login, manager, review status).
  2. Step 2: Run manager certification and risk-based prioritization to approve or revoke access.
  3. Step 3: Revoke unnecessary access, update exceptions, and log decisions for audit and remediation tracking.

Best Practices

  • Quarterly reviews minimum
  • Risk-based frequency aligned to data sensitivity
  • Manager attestation as part of the review
  • Automated revocation of unnecessary access
  • Maintain an audit trail of decisions and remediation actions

Example Use Cases

  • Enterprise IAM governance spanning cloud and on-prem resources with quarterly attestations
  • SOC 2 / ISO 27001 compliance program requiring formal recertification and remediation tracking
  • Finance and HR app access reviewed on a quarterly cycle with risk-based prioritization
  • Automated offboarding and access revocation triggered by role changes or terminations
  • Audit-ready dashboards that surface remediation status and certification outcomes

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers