Aws Policy Misconfigured
Description
Detects misconfigured AWS IAM policies that may grant excessive or insecure permissions. This detector analyzes policy statements within IAM policies to identify overly permissive configurations that could allow unintended access to AWS resources.
Detection Strategy
• Scans all IAM policies in the AWS account
• Examines each policy's default version and its statements
• Alerts if policy statements contain overly permissive configurations like Action:"*" or Resource:"*"
• Reports issues when policy statements grant broad administrative privileges or sensitive service access
• Identifies policies that don't follow the principle of least privilege
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.