Skip to main content

AWS policy allows passing any role

ID:aws_iam_policy_broad_pass_role
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0007:T1526

Description

AlphaSOC detected an AWS IAM policy that grants the iam:PassRole permission for all resources. This configuration enables users to pass any IAM role to AWS services, including EC2 instances. Such broad permissions can be exploited by threat actors to escalate privileges, access unauthorized resources, or manipulate AWS services with elevated roles.

Impact

Threat actors can leverage an overly permissive iam:PassRole policy to assume any role in the AWS environment, including administrative roles. This could result in unauthorized access to sensitive data, manipulation of AWS resources, and potential breaches of compliance requirements.

Severity

SeverityCondition
Medium
AWS policy allows passing any role

Investigation and Remediation

Review the IAM policy and identify the users or roles to which it's attached. Determine if the broad iam:PassRole permission is necessary for their functions. If not, modify the policy to restrict iam:PassRole to specific roles required for legitimate operations. After making changes, test the policy to ensure the restrictions are properly enforced.