Encore analyzes your code to understand exactly what each service accesses. IAM policies are generated automatically with only the permissions needed.
Encore analyzes your code to understand exactly what each service accesses: which databases, which pub/sub topics, which secrets, which external APIs. It then generates IAM policies that grant exactly those permissions and nothing more.
When you deploy, Encore analyzes your code to build a permission graph. Each service gets its own IAM role with only the permissions it actually uses.
Encore parses your code to understand which resources each service uses.
IAM policies are generated with minimum required permissions.
When your code changes, permissions are updated on the next deploy.
Least-privilege access is emphasized in SOC 2, HIPAA, and other compliance frameworks. With Encore, you get it automatically without dedicated security engineering time.
Audit logs track all permission changes, and the permission model is fully transparent. You can inspect exactly what access each service has.
Learn about infrastructure config →