CCC.IAM.C01: Restrict IAM User Credentials Creation
Control ID:CCC.IAM.C01
Title:Restrict IAM User Credentials Creation
Objective:Prevent non-administrative principals from creating new long-lived
credentials like access keys or generating temporary session tokens.
This blocks a common privilege escalation and persistence vector.
Control Family:
Identity and Access Management
Related Threats
ID | Title | Description | External Mappings | Capability Mappings | Control Mappings |
---|---|---|---|---|---|
CCC.IAM.TH03 | Overly-Permissive Identity Trust Policy | An IAM role or service principal's trust policy is configured to allow principals from untrusted or overly broad scopes, such as any identity in any account, to assume or impersonate it. This can allow an external or unauthorized identity to gain access to the cloud environment, completely bypassing internal identity controls. | 1 | 1 | 0 |
Related Capabilities
ID | Title | Description |
---|---|---|
CCC.IAM.F06 | IAM Roles / Service Principals | Ability to create, manage, list and delete IAM roles. IAM role is an identity for applications or services to access resources. |
CCC.IAM.F12 | Policy Conditions | Ability to use conditions to add additional restrictions to the permission being granted. Allow access control rules to apply only when certain conditions are met. |
CCC.IAM.F15 | Role Assumption / Delegation | Ability to temporarily assume another role or delegate access. Commonly used for user impersonation or temporary privilege elevation. |