AWS Misconfigurations
IAM Deep Dive
Checks Performed
- Inactive IAM Users
- Principals with Infrastructure Modification Capabilities
- Permission for All Resources
- Permissions Leading to Data Exfiltration
- Policies with NotAction in the Statements
- Principals with Inline Policies
- Privilege Escalation
- Roles Assumable by Compute Services
- Suspicious Access to Data Services
- Users with Administrator Access