This report contains the security assessment results from Cloudsplaining, which maps out the IAM risk landscape in a report, identifies where resource ARN constraints are not used, and identifies other risks in IAM policies like Privilege Escalation[1], Resource Exposure[2], Infrastructure Modification[3], and Data Exfiltration[4]. Remediating these issues, where necessary, will help to limit the blast radius in the case of compromised AWS credentials.

Risk Summary

{% if t["policies_with_privilege_escalation"] > 0 %} {% endif %} {% if t["policies_with_permissions_management"] > 0 %} {% endif %} {% if t["policies_with_data_leak_potential"] > 0 %} {% endif %}
Risk Instances Impact [0]
Privilege Escalation [1] {{ t["policies_with_privilege_escalation"] }} Critical
Resource Exposure [2] {{ t["policies_with_permissions_management"] }} High
Infrastructure Modification [3] {{ t["results"]|length }} High
Data Exfiltration [4] {{ t["policies_with_data_leak_potential"] }} Medium