The IAM Privilege Catalog
Risks
Account destruction
(
CRITICAL
)
Account takeover
(
CRITICAL
)
Cryptographic destruction
(
CRITICAL
)
Cryptographic exfiltration
(
CRITICAL
)
Data destruction
(
CRITICAL
)
Data encryption
(
CRITICAL
)
Data escalation
(
CRITICAL
)
Data exfiltration
(
CRITICAL
)
Domain takeover
(
CRITICAL
)
Policy destruction
(
CRITICAL
)
Privilege escalation
(
CRITICAL
)
Code exfiltration
(
HIGH
)
Data manipulation
(
HIGH
)
Defacement
(
HIGH
)
Denial-of-service
(
HIGH
)
Infrastructure destruction
(
HIGH
)
Network destruction
(
HIGH
)
Artifact destruction
(
MEDIUM
)
Code discovery
(
MEDIUM
)
Logs exfiltration
(
MEDIUM
)
Metadata destruction
(
MEDIUM
)
Metadata exfiltration
(
MEDIUM
)
Resource hijacking
(
MEDIUM
)
Spend
(
MEDIUM
)
Account persistence
(
BOOST
)
Automated data collection
(
BOOST
)
Lateral movement
(
BOOST
)
Network movement
(
BOOST
)
Defense destruction
(
EVASION
)
Denial-of-access
(
EVASION
)
Logs destruction
(
EVASION
)
Account discovery
(
LOW
)
Data discovery
(
LOW
)
Financial discovery
(
LOW
)
Infrastructure consumption
(
LOW
)
Infrastructure discovery
(
LOW
)
Logs discovery
(
LOW
)
Metadata discovery
(
LOW
)
Network discovery
(
LOW
)
Policy discovery
(
LOW
)
© 2023–present
P0 Security
and contributors to the
IAM Privilege Catalog