About a year ago, during a review of our cloud infrastructure, my colleague Martin Birtel from our InfoSec department, discovered that a specific AWS managed policy can give hackers super powers.

The finding was related to the role SecretsManagerReadWrite which was attached to a Lambda responsible for credential management.

This is a great cocktail for an account takeover as you’ll see below.

The SecretsManagerReadWrite managed policy includes surprising CloudFormation permissions:

{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "BasePermissions",
"Effect" : "Allow",
"Action" : [...

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help