This report contains the security assessment results from Cloudsplaining, which maps out the IAM risk landscape in a report, identifies where resource ARN constraints are not used, and identifies other risks in IAM policies like Privilege Escalation, Resource Exposure, Infrastructure Modification, and Data Exfiltration. Remediating these issues, where necessary, will help to limit the blast radius in the case of compromised AWS credentials.



Risk Summary

{% if t["policies_with_privilege_escalation"] > 0 %} {% endif %} {% if t["policies_with_permissions_management"] > 0 %} {% endif %} {% if t["policies_with_data_leak_potential"] > 0 %} {% endif %}
Risk Instances
Impact
Privilege Escalation
{{ t["policies_with_privilege_escalation"] }} Critical
Resource Exposure
{{ t["policies_with_permissions_management"] }} High
Infrastructure Modification
{{ t["results"]|length }} High
Data Exfiltration
{{ t["policies_with_data_leak_potential"] }} Medium