Skip to main content

CCC.IAM.TH02: Overly-Permissive IAM Policy

Threat ID:CCC.IAM.TH02
Title:Overly-Permissive IAM Policy
Description:

An access control policy attached to an identity or a resource is configured with excessive permissions, violating the principle of least privilege. This can enable unauthorized data access, privilege escalation, or other unintended actions by principals whose credentials might be compromised or who are acting erroneously.

Related Capabilities

IDTitleDescription
CCC.IAM.CP02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.CP05IAM GroupsAbility to create, manage, list and delete IAM groups. IAM group is a collection of users, roles or other groups.
CCC.IAM.CP06IAM Roles / Service PrincipalsAbility to create, manage, list and delete IAM roles. IAM role is an identity for applications or services to access resources.
CCC.IAM.CP07Managed IdentitiesIdentity assigned to cloud resources (e.g., VMs, Functions) which are managed by the cloud vendor.
CCC.IAM.CP10Custom RolesAbility to create, manage, list and delete custom roles. Custom roles are user-defined roles that defines what actions are allowed.
CCC.IAM.CP12Policy ConditionsAbility to use conditions to add additional restrictions to the permission being granted. Allow access control rules to apply only when certain conditions are met.

External Mappings

Reference IDEntry IDStrengthRemarks
MITRE-ATT&CK
T1078.004
0
Valid Accounts: Cloud Accounts

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.IAM.CN03Restrict Role Assumption / DelegationLimit which principals can assume a role or impersonate a service identity to only those required. This prevents unintended cross-account or public access by securing the "who can act as this identity" boundary. Identity and Access Management
1
5
2
CCC.IAM.CN04Restrict Wildcard Usage in IAM PoliciesLimit the use of wildcard permissions in IAM policies to prevent overly broad access from being granted by default. Identity and Access Management
2
4
1
CCC.IAM.CN11Enable Continuous IAM Access and Usage AnalysisEnable and configure the cloud provider's native access and usage analysis services to continuously monitor for external access paths and internal unused access. Logging and Monitoring
3
5
1