Skip to main content

Hero Card: IAM Users and Roles with Excessive Privilege

One-Click Least Privilege. Zero Disruption.



© 2026 Sonrai Security. All rights reserved.

Overview

IAM Users and Roles with Excessive Privilege hero card icon

When Identity and Access Management (IAM) users and roles are assigned permissions which ultimately don't get put to use, those permissions can provide an attacker with an easy way to gain intelligence, perform data exfiltration, impersonate users, and more.


Excess privilege can also lead to scenarios where users are unintentionally allowed to complete actions that are not expected, like creating/deleting resources, which can drive up operational costs and cause outages.

[AI GENERATED] Cloud Permissions Firewall hero card showing IAM users and roles with excessive privilege, with metrics on identities that have privileged permissions they do not use[AI GENERATED] Cloud Permissions Firewall hero card showing IAM users and roles with excessive privilege, with metrics on identities that have privileged permissions they do not use

Examples

Example 1: When Outsiders Become Insiders

One day, an attacker managed to gain access to a junior engineer's account through a successful phishing attempt. The engineer's account had been granted excessive privileges due to lax IAM policies. Although the engineer's primary role involved developing software and managing deployment scripts, their account had permissions far beyond what was necessary for their job.

With the engineer's compromised credentials, the attacker explored the company's AWS environment. The broad permissions allowed the attacker to access sensitive databases, alter application configurations, and modify access controls. The attacker used these elevated privileges to create backdoors and install malware on several virtual machines.

The attacker then exfiltrated large volumes of proprietary data and customer information, covering their tracks by modifying logs and disabling monitoring alerts.


Protect Your Identities

Deny privileged permissions access for identities which have been afforded it, but don't use it!

Select the scope at which you want to take action and click the button to see the changes you are about to make:

[AI GENERATED] Cloud Permissions Firewall Services page showing the scope selector and Preview Changes button for the IAM Users and Roles with Excessive Privilege hero card[AI GENERATED] Cloud Permissions Firewall Services page showing the scope selector and Preview Changes button for the IAM Users and Roles with Excessive Privilege hero card [AI GENERATED] Cloud Permissions Firewall preview of changes showing which identities will have excessive privileged permissions removed before deploying least privilege protections[AI GENERATED] Cloud Permissions Firewall preview of changes showing which identities will have excessive privileged permissions removed before deploying least privilege protections

When ready, click the button to review those changes within the Pending Changes page before you deploy them to your cloud:

[AI GENERATED] Cloud Permissions Firewall Pending Changes page showing the staged identity protections for review before deploying to the cloud[AI GENERATED] Cloud Permissions Firewall Pending Changes page showing the staged identity protections for review before deploying to the cloud

Unprotect at Scope

If you encounter a situation where you need to unprotect all services at scope, you can leverage the Services page menu:

[AI GENERATED] Cloud Permissions Firewall Services page menu showing the Unprotect at Scope option to remove all service protections for a selected scope[AI GENERATED] Cloud Permissions Firewall Services page menu showing the Unprotect at Scope option to remove all service protections for a selected scope

By using this menu option, a CloudFormation template is generated that will remove all of the service protections you have put into place with the Cloud Permissions Firewall, re-enable all services that were disabled using the Cloud Permissions Firewall, and discard any pending changes.

[AI GENERATED] Cloud Permissions Firewall confirmation dialog for Unprotect at Scope, explaining that the CloudFormation template will remove all service protections and discard pending changes[AI GENERATED] Cloud Permissions Firewall confirmation dialog for Unprotect at Scope, explaining that the CloudFormation template will remove all service protections and discard pending changes