The IAM role can be assumed by any service or principal Affecting IAM service in AWS


Severity

0.0
high
0
10
Severity Framework
Snyk CCSS
Rule category
IAM/ Accounts Allocation

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
CIS-Controls
  • Snyk IDSNYK-CC-00303
  • creditSnyk Research Team

Description

Anyone will be allowed to assume the role, and perform actions granted in attached policies.

How to fix?

Set Principal in Properties.AssumeRolePolicyDocument attribute to specific service or account, e.g. Service: ec2.amazonaws.com.

CloudFormation

    Terraform