PromptBase
Upgrade
Close icon
General
Home
Marketplace
Create
Hire
Login
Chat
Sell
Explore

Prompt Details

Model
(claude-4-6-sonnet)
Token size
220
Example input
[ ]: SaaS Startup [ ]: Engineering
Example output
CASE 01 Junior Developer — SaaS / AWS SOC 2 Org type: SaaS Startup Department: Engineering Systems: AWS S3, GitHub, Jira Role: Junior Developer Compliance: SOC 2 Type II Policy Statement This policy governs access rights granted to Junior Developers within the Engineering department. In alignment with SOC 2 Type II requirements and the principle of least privilege, access is restricted to resources directly required for assigned development tasks. Junior Developers are explicitly prohibited from accessing production environments, customer PII, or performing infrastructure modifications without senior approval. All access is time-bound to active employment status and subject to quarterly recertification by the Engineering Manager and the IAM team. Permissions Matrix Resource Permission Justification AWS S3 — dev-bucket READ/WRITE Dev environment only AWS S3 — prod-bucket DENIED No production access GitHub — dev branches READ/WRITE Feature development GitHub — main/release READ ONLY No direct merge rights Jira — Engineering board READ/WRITE Task tracking Conditions & Restrictions MFA required via Okta TOTP on all systems Access limited to corporate network or approved VPN Working hours restriction: Mon–Fri, 07:00–22:00 local time No access to customer data or PII at any time Recertification Quarterly — Engineering Manager + IAM Team Escalation Path Senior Dev → Engineering Manager → CISO (72h SLA)
🌀 Claude

Iam Least Privilege Policy Generator

Add to Cart
Instant accessInstant access
Usage rightsCommercial use
Money-back guaranteeMoney‑back
By purchasing this prompt, you agree to our terms of service
CLAUDE-4-6-SONNET
Tested icon
Guide icon
4 examples icon
Free credits icon
Role-Based Access Control for Enterprise Save hours drafting access control policies. This prompt generates enterprise-ready Least Privilege policies with permissions matrices, compliance alignment, and recertification schedules — ready to present to your CISO.
...more
Added 1 week ago
Report
Browse Marketplace