🕵️♂️Permissions Abuse
Abusable AWS IAM permissions that can lead to compromise or privilege escalation
iam:CreateAccessKey
With access to these permissions, an attacker can create a set of IAM Access Keys, enabling them to maintain persistent access to a user.
iam:CreatePolicyVersion and iam:SetDefaultPolicyVersion
With access to these permissions, an attacker can create and enable a new IAM permissions policy, escalating their privileges.
iam:SetExistingDefaultPolicyVersion
With access to this permission, an attacker can attach a different version of an IAM policy, potentially escalating privileges or gaining access to other resources.
iam:AttachUserPolicy
With access to this permission, an attacker can attach a new policy to an IAM user, potentially escalating privileges or gaining access to other resources.
iam:UpdateAssumeRolePolicy
With access to this permission, an attacker can modify an IAM Role's Trust Policy, enabling themselves or another identity (user, role, service) the ability to assume the role, potentially escalating privileges or gaining access to other resources.
Last updated