AWS policy allows passing any role
Description
AlphaSOC detected an AWS IAM policy that grants the iam:PassRole
permission
for all resources. This configuration enables users to pass any IAM role to AWS
services, including EC2 instances. Such broad permissions can be exploited by
threat actors to escalate privileges, access unauthorized resources, or
manipulate AWS services with elevated roles.
Impact
Threat actors can leverage an overly permissive iam:PassRole
policy to assume
any role in the AWS environment, including administrative roles. This could
result in unauthorized access to sensitive data, manipulation of AWS resources,
and potential breaches of compliance requirements.
Severity
Severity | Condition |
---|---|
Medium | AWS policy allows passing any role |
Investigation and Remediation
Review the IAM policy and identify the users or roles to which it's attached.
Determine if the broad iam:PassRole
permission is necessary for their
functions. If not, modify the policy to restrict iam:PassRole
to specific
roles required for legitimate operations. After making changes, test the policy
to ensure the restrictions are properly enforced.