| File | Description |
|---|---|
design-doc.html |
Interactive design document — open in any browser |
assets/screen-1-dashboard.png |
Wireframe: Risk Dashboard |
assets/screen-2-deep-dive.png |
Wireframe: Identity Deep Dive |
assets/screen-3-diff.png |
Wireframe: Remediation Diff Viewer |
Download design-doc.html and open it in any modern browser (Chrome, Firefox, Edge). No build step or dependencies required.
The document has five tabs:

Entry point for every session. Shows the Permissions Creep Index (PCI), orphaned account count, least-privilege adherence score, and a sortable identity table with usage bars. Includes an interactive remediation tradeoff slider showing projected PCI reduction.

Drill-down view for a single identity. Shows per-action usage frequency bars for the 90-day window, a visual access inheritance chain (SCP → Policy → Role → Principals), and a plain-English critical finding summary with three remediation options.

Side-by-side JSON diff of the current wildcard policy versus the auto-generated least-privilege replacement. Includes a confidence signal banner, resource-scoped action list, and three deployment paths: sandbox test, GitHub PR, or direct deploy.
Cloud environments grant permissions far faster than they revoke them. Identities accumulate mostly-unused access over time, creating an attack surface that grows invisibly. The core challenge is a gap analysis: identifying the delta between what IAM policies allow and what telemetry logs show is actually used.
This is harder than it sounds due to:
Rather than Figma static screens, this submission uses an interactive HTML prototype. This choice lets the wireframes include working navigation, real annotations, and live UI state — communicating design intent more precisely than screenshots alone.
Key original decisions: