Aws Open Passrole
Description
Detects dangerous IAM policies that allow unrestricted PassRole permissions (iam:PassRole) on all AWS resources. This misconfiguration could enable privilege escalation by allowing users to pass any IAM role to AWS services, potentially granting unauthorized access to sensitive resources.
Detection Strategy
• Examines IAM policies for statements that include iam:PassRole permissions
• Alerts when an IAM policy statement contains 'Effect: Allow' with iam:PassRole action
• Triggers when the resource scope is set to '*' (all resources) rather than being restricted to specific role ARNs
• Evaluates each policy statement individually, checking the combination of Effect, Action, and Resource fields
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.