W whocan P preview program R roadmap PRAG-01 PRIVATE BETA · PRAG-02 IN DESIGN
pragmable / products

Two products. One discipline.

We build software that reads the cloud's authorization surface at the source. Our current portfolio: one product in private beta with first pilot operators, one in early design partnership.

// on this page
whocan — prag-01, private beta
preview program — prag-02, 2026
roadmap — next 18 months
pricing & deployment
PRAG-01 / PRIVATE BETA · early pilots
The authorization answer engine for AWS. Evaluates the full six-layer decision chain — SCPs, RCPs, identity, boundaries, resource, conditions — and exposes it through RQL, a query language written for this problem.
whocan-cli · prod-us-east-1
04:24 UTC
$ whocan query // "who can read every secret?"
  who-can(action: "secretsmanager:GetSecretValue",
        resource: secrets)
7 principals evaluated · 3 accounts · 312ms
  ● role/ecs-frontend-task via identity + no-deny · ALL SECRETS · unscoped
  ● role/ops-oncall (break-glass, approved)
  ● user/alice (MFA-gated, quarterly-reviewed)
§ I · SOURCE INGEST

Ingested from cloud provider updates.

We track each cloud's authoritative source — service models, action catalogs, IAM releases — and re-evaluate the same day they ship. Not benchmarks. Not community wikis. New actions surface before attackers can use them, not weeks after.

§ II · FULL CHAIN

All six decision layers, weighted together.

SCPs, RCPs, identity, permission boundaries, resource policies, and 50+ condition keys — evaluated the way AWS itself computes access.

§ III · RQL

A query language written for this problem.

Not YAML, not dashboards. A small, focused language that reads like who-can(action, resource) and returns reality.

§ IV · VIRTUAL ROLES

Counterfactual analysis, not just current state.

"What would happen if this role was compromised?" Simulated principals walk the chain and surface blast radius before the attacker exists.

§ V · CONTINUOUS

Changes, not scans. Diffs, not snapshots.

Continuous re-evaluation: when a policy edits, a role is added, or AWS ships a new action — the answer updates. No "quarterly review."

§ VI · DEPLOY

SaaS, customer-managed, or on-prem.

Hosting follows the workload — EU or US residency, self-hosted in your own VPC, or fully on-prem and air-gapped. SecNumCloud-ready packaging for institutions that can't put IAM data in any cloud.

launch whocan.cloud → read the docs → private beta · pilot inquiries on request
PRAG-02 / IN DEVELOPMENT · 2026

A second authorization product.
In closed preview.

Same discipline, orthogonal surface. We're working with a small group of design partners through 2026. Public disclosure planned for Q4. If you operate a regulated cloud environment and want to shape what we build next — join the preview list.

// request preview access

Join the design-partner list.

Tell us, in one paragraph, the regulated cloud environment you operate and the authorization problem you'd want to shape with us. We read every email.

We review requests weekly · written intros preferred
§ ROADMAP — INTENT, NOT COMMITMENTS

Where we're heading.

● NEAR · NEXT 6 MONTHS

Whocan beta — depth on AWS

  • Full six-layer chain coverage
  • Condition-key surface expansion
  • RQL stabilization
  • SSO with OIDC connectors
● MID · 6–12 MONTHS

Multi-cloud & PRAG-02

  • GCP IAM full-chain evaluation
  • Azure RBAC + ABAC ingest
  • RQL cross-cloud queries
  • PRAG-02 closed preview opens
○ FAR · 12–18 MONTHS

Sovereign & on-prem

  • Air-gapped deployment
  • SecNumCloud-ready packaging
  • HDS-compatible hosting
  • PRAG-02 public disclosure
○ EXPLORATORY

Research → product

  • Agent behavioral profiles
  • Kubernetes authorization graph
  • Supply-chain IAM analysis
  • Formal verification for policy

Deployment & commercial.

Pragmable sells to regulated operators through direct contract. No self-serve enterprise. Pilots start with a 30-day scoped engagement; pricing is flat by account-count, not per-seat.

// COMMUNITY
Community

Single account, capped history, no SLA. For learning RQL and small environments.

request access →
// TEAM
Professional

Multi-account, longer history, email support. For security teams running real environments.

request pricing →
// REGULATED
Enterprise

Unlimited accounts, self-hosted or on-prem, DPA, audit paperwork.

request pricing →