Skip to main content
AWS reference

AWS reference

Critical services, gotchas, and where logs live

25 / 25
AWSIAMIdentity

Identity and Access Management — users, roles, policies, federated identity

Wildcard policies (*:*) are catastrophic. AssumeRole + sts:AssumeRoleWithWebIdentity = federated trust path.

AWSSTSIdentity

Security Token Service — temporary credentials via AssumeRole

Session tokens are bearer credentials. Look for unusual sts:GetCallerIdentity in CloudTrail.

AWSOrganizationsIdentity

Multi-account management, SCPs (Service Control Policies)

SCPs apply to root user too. Cross-account trust paths are key for privesc.

AWSIAM Identity CenterIdentity

Formerly AWS SSO — workforce identity federation

Permission sets bound to OUs/accounts. Common federation entry from Okta/Entra/Google.

AWSEC2Compute

Elastic Compute Cloud — virtual machines

Instance metadata (IMDSv1/v2) — SSRF can steal role creds. Always require IMDSv2.

AWSLambdaCompute

Serverless functions

Execution role inherits permissions. Dependency confusion + role escalation = supply chain.

AWSECS / FargateCompute

Container orchestration (managed and serverless)

Task role + execution role distinct. Task IMDS available unless explicitly blocked.

AWSEKSCompute

Managed Kubernetes

IRSA maps K8s service accounts to IAM roles. RBAC misconfig + node IMDS = cluster-wide compromise.

AWSS3Storage

Simple Storage Service — object storage

Block Public Access at account + bucket level. ACLs + bucket policy + IAM = three overlapping control planes.

AWSEBSStorage

Elastic Block Store — block volumes for EC2

Snapshots can be made public. CreateSnapshot + ModifySnapshotAttribute is a classic exfil chain.

AWSEFSStorage

Elastic File System — managed NFS

Mount target SGs control access. Often forgotten in network reviews.

AWSRDSDatabase

Relational Database Service

CreateDBSnapshot → ShareDBSnapshot to attacker account = data exfil. Public RDS instances frequent.

AWSDynamoDBDatabase

Managed NoSQL key-value / document store

IAM-based access. Streams + EventBridge = audit but expensive.

AWSSecrets ManagerSecrets

Encrypted secret storage with rotation

GetSecretValue events surface in CloudTrail. Cross-account sharing via resource policy.

AWSParameter StoreSecrets

Systems Manager Parameter Store — config + SecureString

Cheaper than Secrets Manager. SecureString uses KMS. GetParameter is logged.

AWSKMSSecrets

Key Management Service — symmetric/asymmetric keys

Key policies and grants. CMK with overly broad principal = decrypt-anywhere.

AWSCloudTrailLogging

API audit log

Management events on by default. Data events (S3 GetObject, Lambda Invoke) opt-in. Multi-region and Org Trail recommended.

AWSCloudWatch LogsLogging

Log aggregation and metrics

Subscription filters → Lambda/Kinesis. Retention default infinite if not set.

AWSGuardDutyDetection

Threat detection — VPC flow + DNS + CloudTrail anomalies

Findings into Security Hub. Severity 7+ usually merits page.

AWSConfigDetection

Resource compliance and configuration history

AWS-managed rules + custom Lambda rules. Conformance packs map to CIS/NIST.

AWSInspectorDetection

EC2/ECR/Lambda vulnerability scanning

Inspector v2 covers OS + application packages. CVE-based.

AWSDetectiveDetection

Investigation graph for GuardDuty findings

Visualizes IAM session activity and inter-resource interactions.

AWSVPCNetwork

Virtual Private Cloud — networking primitives

Flow logs at VPC, subnet, or ENI level. Default VPCs in every account at creation.

AWSRoute 53Network

DNS service

Resolver query logs feed CloudWatch. Subdomain takeover via dangling records is classic.

AWSAPI GatewayNetwork

REST/HTTP/WebSocket API frontend

Resource policies, IAM auth, Cognito, Lambda authorizers. Often misconfigured to allow * principal.