Lateral movement

Privileged Instance Profile – Assume Role

Risk Level

Hazardous (3)



IAM Instance Profiles are used to attach IAM Roles to EC2 Instances in order to grant them permissions to different AWS APIs. The instance profile {AwsIamInstanceProfile}, which is connected to {AwsIamInstanceProfile.Ec2Instances|count} instances, was found to have a role with permissive permissions that allows the user the ability to assume any role, temporarily granting them any privileges given to that role. By allowing an entity to assume any role on the account, an attacker may choose to assume a highly privileged role, which may lead to full account takeover.
  • Recommended Mitigation

    Review the instance profile's policy and consider removing any of the following actions: sts:AssumeRole