Skip to main content

Hero Card: Unused Services

One-Click Least Privilege. Zero Disruption.



© 2025 Sonrai Security. All rights reserved.

Overview

Unused services provide an easy way for attackers to create and modify resources, as well as an unintentional method of internal employees driving up costs by using services which have not been authorized by the business.


Examples

Example 1: When Outsiders Become Insiders

One day, an attacker socially engineered their way into an AWS organization.

With the role to which they had gained access, they discovered an unused service, Amazon RDS. Within it, they were able to launch a stagnant RDS instance that had not been updated for several months and lacked recent security patches. Exploiting the present vulnerabilities, the attacker was able to gain unauthorized access to the organization's database.

With this access, the attacker explored the company's cloud infrastructure and quickly located sensitive patient data stored in an unprotected database. The attacker began exfiltrating this data and attempted to cover their tracks by modifying logs and access permissions.


Disable Your Unused Services

Select the scope at which you want to take action and click the button to see the changes you are about to make:

When ready, click the button to review those changes within the Pending Changes page before you deploy them to your cloud: