Administrative Role Misuse
Assigning administrative roles (Admin, PowerUser, Owner) to users or services that only need limited access to specific resources
Cloud Identity and Access Management (IAM) roles and policies configured with excessive permissions that violate the principle of least privilege. This includes roles with administrative access, wildcard permissions, or broad resource access that increases the attack surface and potential for privilege escalation across AWS, Azure, and Google Cloud Platform.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": "*"
}
]
}{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:PutObject"
],
"Resource": "arn:aws:s3:::my-app-bucket/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::my-app-bucket"
}
]
}The vulnerable policy grants wildcard permissions (s3:*) on all S3 resources (*), allowing unrestricted access to all S3 operations across all buckets. The secure policy follows the principle of least privilege by specifying only the exact actions needed (GetObject, PutObject, ListBucket) and restricting access to a specific bucket.
Assigning administrative roles (Admin, PowerUser, Owner) to users or services that only need limited access to specific resources
Sourcery automatically identifies cloud iam overprivileged roles and many other security issues in your codebase.