risks / Privilege escalation
Description
Allows an attacker to either access an account with more sensitive privileges (e.g. an admin-specific account), or add these privileges to an account under the attacker's control.
Risk: CRITICAL
Exploited in isolation, this risk has the potential to disrupt central organizational operations, destroy trust, or create significant liability. Alternatively, this risk gives attackers access to broadly provisioned identities that enable the above impacts (such as root privilege escalation risks).
Mitigations
- Avoid use of admin or root accounts
- Securely store admin and root account credentials
- Scan for insecurely stored account credentials
- Use ephemeral entitlement grants for sensitive operations
- Apply permission boundaries to identity entitlements
Links
- https://attack.mitre.org/techniques/T1078/
- https://attack.mitre.org/techniques/T1098/
- https://attack.mitre.org/techniques/T1552/
Affected Privileges
An attacker may be able to exploit this risk if they gain any of the following privileges:
Amazon Web Services
Google Cloud Platform
© 2023–present P0 Security and contributors to the IAM Privilege Catalog