Key terms and concepts for understanding AWS security, lateral movement, and privilege escalation.
A technique where an attacker with limited AWS IAM permissions exploits misconfigurations to gain higher-level access, often reaching administrative privileges.
The process of moving through an AWS environment by pivoting between principals, services, and accounts after gaining an initial foothold.
A technique where an attacker discovers and uses multiple sets of AWS credentials in sequence, each providing access to new resources or higher privileges.
The AWS mechanism (sts:AssumeRole) that allows one principal to temporarily take on the permissions of an IAM role, commonly exploited for lateral movement and privilege escalation.
The total scope of resources, data, and services an attacker can reach from a single compromised credential or entry point in an AWS environment.
The complete set of entry points, exposed services, and exploitable paths that could be used to gain unauthorized access to an AWS environment.