Skip to main content

IAM User Has Risky Permissions

Overview

Risky permissions are individual IAM permissions that are rated with a higher security risk due to their potential for abuse, or combinations of permissions (even across different IAM policies) that could lead to abuse or privilege escalation.

Some examples include:

  • A role or user with full administrative permissions (ALL actions on ALL resources)
  • A role or user with the combination of the "PassRole" permission, which allows them to assign a role to a resource like a Lambda function or EC2 instance, and the ability to create and run an instance/function. If the user can assign any role, they could create and run a resource with higher permissions than they have, then use that resource to execute commands they shouldn't.
  • The permission to CreateAccessKey on other users, which would allow the current user to create (and then use) an Access Key for a user with more permissions than the current user.

We are constantly updating the list of risky permissions. Some of these combinations have legitimate uses, but all are potential sources for internal users or external attackers to escalate privileges.

Vendor

AWS

Cloud Service

IAM

Input

{"whitelistedGroups":{"label":"Whitelisted Groups","helpText":"Names of IAM user groups to exclude from risky permission evaluations.","value":[],"type":"string[]"}}

Severity

4

Item Types

AWS::IAM::User