Skip to main content

AWS policy suggests denial but allows actions

ID:aws_policy_accidental_allow
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0001:T1078

Description

AlphaSOC detected an AWS policy that suggests denial but allows actions. The policy includes a statement with "Effect": "Allow" but contains denial-related keywords in the AWS Statement ID (SID), such as deny, denied, block, restrict, and prevent. This creates a false sense of security, as the SID does not enforce restrictions; only an explicit "Effect": "Deny" in the policy ensures proper access control.

Impact

This misconfiguration can grant excessive permissions, potentially leading to unauthorized access to sensitive data or resources. Threat actors may exploit this policy to read or modify data, manipulate resources, or escalate privileges within the AWS environment. This vulnerability could result in data breaches, resource misuse, or provide a foothold for further attacks.

Severity

SeverityCondition
Medium
AWS policy suggests denial but allows actions

Investigation and Remediation

Review the identified AWS policy to ensure its permissions align with the intended access controls. If it grants excessive permissions, update the configuration by explicitly setting "Effect": "Deny" where necessary. After making changes, test the policy to ensure the restrictions are properly enforced. To prevent future misconfigurations, regularly audit and review AWS policies.