Skip to main content

CCC.IAM.TH03: Overly-Permissive Identity Trust Policy

Threat ID:CCC.IAM.TH03
Title:Overly-Permissive Identity Trust Policy
Description:

An IAM role or service principal's trust policy is configured to allow principals from untrusted or overly broad scopes, such as any identity in any account, to assume or impersonate it. This can allow an external or unauthorized identity to gain access to the cloud environment, completely bypassing internal identity controls.

Related Capabilities

IDTitleDescription
CCC.IAM.F06IAM Roles / Service PrincipalsAbility to create, manage, list and delete IAM roles. IAM role is an identity for applications or services to access resources.
CCC.IAM.F12Policy ConditionsAbility to use conditions to add additional restrictions to the permission being granted. Allow access control rules to apply only when certain conditions are met.
CCC.IAM.F15Role Assumption / DelegationAbility to temporarily assume another role or delegate access. Commonly used for user impersonation or temporary privilege elevation.

External Mappings

Reference IDEntry IDStrengthRemarks
MITRE-ATT&CK
T1078.004
0
Valid Accounts: Cloud Accounts

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.IAM.C01Restrict IAM User Credentials CreationPrevent non-administrative principals from creating new long-lived credentials like access keys or generating temporary session tokens. This blocks a common privilege escalation and persistence vector. Identity and Access Management
1
5
2