Audit posture
Operator credential exposure inventory
The goal is not to eliminate every AWS touchpoint. It is to isolate where credentials or privileged actions appear, whether a review gate exists, and which surfaces still ask humans to hold more power than the workflow truly needs.
Filters
Review by workflow and risk
Profiles, console sessions, CI OIDC, and handoff notes all count if they influence operator flow risk.
Any workflow that can observe or change Lambda alias state gets explicit tracking.
A manual path is not inherently wrong, but it raises fatigue and accidental privilege risk.
Export review bundle
Current filtered bundle preview
Exports include the filtered surface set, summary counts, risky actions, approval posture, and least-privilege findings so the review can travel without opening the page again.