Skip to main content

AWS policy suggests read-only access but allows write actions

ID:aws_policy_accidental_write
Data type:AWS CloudTrail
Severity:
Medium
MITRE ATT&CK:TA0001:T1078

Description

AlphaSOC detected an AWS IAM policy that suggests read-only access but allows write actions. The policy contains a statement with "Effect": "Allow" that includes write permissions, even though the Statement ID (SID) implies read-only access. This creates a false sense of security, as the SID does not enforce restrictions; only an explicit "Effect": "Deny" in the policy ensures proper access control.

Impact

This misconfiguration can lead to unintended privileged access, allowing users or roles to perform actions beyond their intended permissions. Threat actors could exploit this to modify, create, or delete AWS resources, potentially leading to data breaches, service disruptions, or unauthorized access to sensitive information. It undermines the principle of least privilege and weakens the overall security posture of the AWS environment.

Severity

SeverityCondition
Medium
AWS policy suggests read-only access but allows write actions

Investigation and Remediation

Review the identified AWS policy to ensure its permissions align with the intended access controls. Analyze the policy’s Allow statements and ensure that no unintended write actions are included. If it grants excessive permissions, update the configuration by explicitly setting "Effect": "Deny" where necessary. After making changes, test the policy to ensure the restrictions are properly enforced. To prevent future misconfigurations, regularly audit and review AWS policies.