
Conventional wisdom: review what permissions a role has. What teams miss: who can *pass* that role to a service.
In AWS, `iam:PassRole` + `lambda:CreateFunction` = privilege escalation. An attacker with those two permissions can spin up a Lambda function with an admin role they'd never be allowed to assume directly — no stolen credentials, just a misconfigured IAM policy.
cloudsecurityalliance.org/research/publi… #IAM
English