With an over-permissive IAM role assigned to a function, an attacker may leverage an application layer vulnerability in your function to perform lateral movement into other resources in your AWS account. You need to make sure you craft your policies with the least privilege approach in mind.
Jit will check that your IAM roles are configured with the least privilege approach in mind.
Security tool initiated by this item
Supply chain attack
Updated 3 months ago