IAM Role can be assumed by anyone in the account Affecting IAM service in AWS


high

    Is your enviroment affected by this misconfiguration?

    In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

    Test your applications
      Frameworks
      CIS-Controls CIS-AWS-Foundations CSA-CCM
    • Snyk ID SNYK-CC-TF-118
    • credit Snyk Research Team

    Description

    Any principal in the account will be able to use the permissions granted by the attached policies

    How to fix?

    Set Principal attribute to specific principal, e.g. arn:aws:iam::1234:role/role-name