Skip to main content

AWS policy modified to allow any principal to assume an IAM role

ID:aws_iam_policy_role_public
Data type:AWS CloudTrail
Severity:
High
MITRE ATT&CK:TA0001:T1078.004

Description

AlphaSOC detected a modification to an AWS policy, made using either the CreateRole or UpdateAssumeRolePolicy actions, that allows any principal ("Principal": "*") to assume an AWS IAM role. Such changes may indicate privilege escalation attempts or efforts to establish persistence by an adversary.

Impact

This change may indicate misconfiguration or an active attack where adversaries, having gained initial access, modify security settings to escalate privileges. This could potentially lead to unauthorized access to sensitive resources, data breaches, service disruptions, and further compromise of AWS infrastructure.

Severity

SeverityCondition
High
AWS policy modified to allow any principal to assume an IAM role

Investigation and Remediation

Review AWS CloudTrail logs to identify the user or entity responsible, investigate AWS IAM role and policy changes, and verify whether modifications were authorized. If unauthorized, revert the AWS IAM policy to its previous state, rotate potentially compromised credentials, and perform a thorough security assessment to identify and address any additional security risks.