When moving to the Cloud, and especially AWS, common Identity Management functionality as found in on-premise tools have limited impact on securing your AWS environment, as many new types of access to a plethora of AWS resources for an overwhelming number of users need to be managed. Luckily, AWS provides a very detailed and granular model of roles and predefined policies to define who (or which entity) may be granted to access to which object. All done - right? Unfortunately, either through lack of insight to actual role entitlements or by large number of relations, control over the infrastructure is easily lost. The talk introduces a new way to quickly gain back overview and identify threats lingering deep inside this jungle and how to mitigate them quickly!