Protect 5 AWS Accounts for Free

Get cloud access under control, slash your permission attack surface, and automate least privilege all without slowing down DevOps.

What you can expect:
  • Automated 1-click least privilege in AWS
  • Quarantine all zombies, remove excessive permissions, and disable services/regions
  • Access to use the Cloud Permissions Firewall in 5 AWS accounts for free

Built for and powered by

Vector

Trusted by Cloud Security Operations Teams

Discover everything about what permissions and services your identities are using.

Take action to restrict sensitive permissions and apply default deny policy to new identities.

Grant pain-free access with automated request workflows integrated into ChatOps tools.

Achieve Least Privilege in 5 Days

Achieve Least Privilege in 5 Days

One-Click Least Privilege

With one click to deploy, you can protect unused permissions, services, identities, and regions to instantly reduce your attacks surface.

Our Cloud Permissions Firewall analyzes sensitive permission usage to determine what access is needed, and implements global restrictions for you accordingly. Policy changes are automatically managed. Least Privilege just got easier.

One-Click Least Privilege
Free-Trial-CPF-1

A Different Approach to Cloud Security

Visibility alone can’t fix security issues — so we made a tool that enables you to take action across your entire cloud. How?

Our least privilege solution focuses on restricting the 3,000 most critical permissions so you only have to deploy a single global policy. Your teams do less work, yet risk reduction is maximized.

Preetam Sirur

Chief Information Security Officer

“The challenge about deleting unused identities or enforcing least privilege is we know it’s the ‘right’ thing to do, but everyone’s afraid it’ll break something or interrupt our development cycles. We don’t have to worry anymore.”

Josh McLean

Chief Information Officer

“Our transition from tedious, weeks-long tasks to accomplishing Least Privilege outcomes in just a few days has been remarkable. This approach has saved us a tremendous amount of time while also guaranteeing the security of all critical permissions.”

Kenneth Milcetich

Director of Cyber and InfoSec

“Sonrai not only identified the over permissive actions granted to our identities, but also provides a least effective access policy based on the identities usage...All of this boils down to a significant increase in our cloud security posture.”

“Our transition from tedious, weeks-long tasks to accomplishing Least Privilege outcomes in just a few days has been remarkable. This approach has saved us a tremendous amount of time while also guaranteeing the security of all critical permissions.”

Josh McLean

Chief Information Officer

“The challenge about deleting unused identities or enforcing least privilege is we know it’s the ‘right’ thing to do, but everyone’s afraid it’ll break something or interrupt our development cycles. We don’t have to worry anymore.”

Preetam Sirur

Chief Information Security Officer

“Sonrai not only identified the over permissive actions granted to our identities, but also provides a least effective access policy based on the identities usage...All of this boils down to a significant increase in our cloud security posture.”

Kenneth Milcetich

Director of Cyber and InfoSec

Protect 5 AWS Accounts for Free

Sign-up for full product access at no cost. Implementation is quick and non-intrusive. No agents or workloads, just read-only permissions.

Remove Permissions with Confidence

Continuous intelligence on permission usage gives you the confidence to hit deploy and remove unused permissions and services, knowing development won’t be interrupted.

Unlike solutions that provide point-in-time insights, the Cloud Permissions Firewall monitoring is ‘always on’ and automatically updates policies for you. Scale your least privilege solution alongside your growing cloud.

project
Grant Access Seamlessly

Ease DevOps Friction

Let’s leave DevOps to build products and freely grant access, because you know your most sensitive permissions are protected from the top-down. Only unused permissions are restricted so nothing DevOps needs is taken.

If a blocked permissions is needed, an automated request is kicked off into integrated ChatOps (Slack, Teams, Email) and it’s all tracked for future audits.

The Cloud Permissions Firewall Pricing

Sign up for the “5 for Free” offer before it’s too late.

  • Compare plans

    Choose the plan that works best for your team!

  • Cost Per Account, Subscription, and Project
  • Billing Options
  • AWS Org CloudTrail Data Maximum

  • # of AWS Accounts You Can Protect

  • Restrict Sensitive Permissions
  • Disable Unused Services
  • Disable Unused Regions
  • Quarantine Unused Identities
  • Support
  • ChatOps Integration
  • Free for a limited time

    5 for Free

    Create Account

  • $0/Month
  • Free for Up to 1 Year
  • 100 GB/Month
  • Up to 5 Accounts




  • $125/Month
  • Annual Billing
  • Unlimited
  • Up to 100




  • Custom
  • Annual Billing
  • Unlimited
  • Unlimited




The pricing and offers shown in the table above are subject to change at Sonrai Security’s sole discretion.

Free for a limited time

Ready to Get Started?

Sign-up for full product access at no cost. Implementation is quick and non-intrusive. No agents or workloads, just read-only permissions.

See What’s Under The Hood Now.

Watch our CTO walkthrough the platform below.

Take the Next Step with Cloud Permissions Firewall

Sign-up for full product access at no cost. Implementation is quick and non-intrusive. No agents or workloads, just read-only permissions.

Got Questions? We have answers.

Can I really use the Cloud Permissions Firewall for free?
We offer a free 14 day trial for your entire cloud or the “5 for Free” offer, which allows you to onboard your entire org and deploy controls in 5 AWS accounts for one year. The Cloud Permissions Firewall requires onboarding at the org level to work correctly. Regardless of how many accounts you onboard within that organization, as long as you deploy controls in no more than five (5) accounts, you will not be charged during the 12-month period. See the terms and conditions for more details on limitations.
What’s included in the “5 for Free” offer?
You’ll have full access, with limitations as mentioned in our terms and conditions, to the Cloud Permissions Firewall for up to one year.
What level of permissions does the Cloud Permissions Firewall need for my cloud?
Sonrai’s Cloud Permissions Firewall requires access at the top level of your cloud in a read-only role. If you’re unable to give us this access, sign up and we’ll figure out an alternative sandbox environment for you to tinker with.
What clouds are supported?
The “5 for Free” offer is available for AWS only. Contact us for more information on signing up for beta access for GCP and Azure at info@sonraisecurity.com
Can I sign up without my business email?
The “5 for Free” offer is intended for business use only. Because we use the domain to validate and build your tenant, a business email is required to request your tenant.
What data do you store? Do you install agents in my cloud?
Sonrai doesn’t possess any of your data or install any agents in your cloud. We gather metadata from the role you provide.
If this is a firewall, does that mean it’s going to ingest my network traffic?
No. This isn’t a traditional firewall like you’re used to. We’ve taken the concept of a firewall and updated it for the new reality of permissions security in the cloud.
How does Sonrai handle its internal security?
Sonrai is a SOC2- Type-2 compliant organization with rigorous internal security controls, training, and monitoring. We live cloud security every day. Regulatory demands on Sonrai’s security standards are high, which is why many of the top 10 banks in the US and Canada as well as Fortune 100 customers use Sonrai to secure their cloud.