Skip to main content

CCC.IAM.C04: Restrict Wildcard Usage in IAM Policies

Control ID:CCC.IAM.C04
Title:Restrict Wildcard Usage in IAM Policies
Objective:Limit the use of wildcard permissions in IAM policies to prevent overly broad access from being granted by default.
Control Family:
Identity and Access Management

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.IAM.TH01Valid Cloud Credentials AbuseValid identity credentials such as access keys, tokens or passwords are misused or compromised. Examples include public exposure, token theft, unprotected metadata service of a compromised compute instance or brute-force attacks. The use of these credentials can provide unauthorized access to the cloud environment, potentially bypassing other security controls and enabling lateral movement across cloud resources.
1
1
0
CCC.IAM.TH02Overly-Permissive IAM PolicyAn access control policy attached to an identity or a resource is configured with excessive permissions, violating the principle of least privilege. This can enable unauthorized data access, privilege escalation, or other unintended actions by principals whose credentials might be compromised or who are acting erroneously.
1
1
0

Related Capabilities

IDTitleDescription
CCC.IAM.F02IAM UsersAbility to create, manage, list and delete IAM users. IAM user represents a single person or application.
CCC.IAM.F03Long-Term CredentialsAbility to create, manage, list and delete long-term credentials such as access keys and service account keys.
CCC.IAM.F04Password ManagementAbility to create, change and delete IAM user passwords.
CCC.IAM.F07Managed IdentitiesIdentity assigned to cloud resources (e.g., VMs, Functions) which are managed by the cloud vendor.
CCC.IAM.F08Federated Identity - SAMLSupport for user authentication outside the cloud service provider using SAML. Authenticated federated identities can assume IAM roles.
CCC.IAM.F09Federated Identity - OIDCSupport for user authentication outside the cloud service provider using OIDC. Authenticated federated identities can assume IAM roles.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AC-6
0
-
NIST_800_53
AC-2
0
-
NIST_800_53
AC-3
0
-
NIST_800_53
AC-6
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.IAM.C04.TR01When an IAM policy is created or updated, it MUST NOT contain allow statements with wildcard permissions, unless the statement is restricted by a condition.
tlp-green
tlp-amber
tlp-red