Confused Deputy Attack in IAM, Resource, and AssumeRole Policies
ACM.31: Considering how an attacker could abuse role templates
Published in
10 min readAug 16, 2022
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
⚙️ Part of my series on Automating Cybersecurity Metrics. The Code.
🔒 Related Stories: AWS Security | Application Security | IAM
💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List