IAM Role Risk Review Template

Overview

This template demonstrates a typical IAM role risk assessment conducted by Ghost SecOps. The assessment identifies excessive permissions, unused roles, and potential security risks in AWS IAM configurations.

Risk Scoring Methodology

  • Critical (9-10): Direct path to privilege escalation or data breach
  • High (7-8): Excessive permissions with potential for misuse
  • Medium (4-6): Elevated permissions with limited scope
  • Low (1-3): Minimal risk, follows least privilege

Sample IAM Role Assessment

Production Environment

Role NameBefore Risk ScoreAfter Risk ScoreRisk ReductionKey Findings
prod-admin9.53.068%Removed unnecessary S3 and KMS permissions
prod-deploy8.02.075%Restricted to specific ECS clusters
prod-monitor4.01.075%Limited to read-only CloudWatch access
prod-db-admin7.52.567%Restricted to specific RDS instances
prod-lambda-exec6.01.575%Limited to specific Lambda functions

Staging Environment

Role NameBefore Risk ScoreAfter Risk ScoreRisk ReductionKey Findings
stage-admin8.54.053%Removed production access
stage-deploy7.02.071%Restricted to staging resources
stage-monitor4.01.075%Limited to staging metrics
stage-db-admin6.52.069%Restricted to staging databases
stage-lambda-exec5.01.570%Limited to staging functions

Remediation Summary

Critical Findings

  1. Excessive Admin Permissions

    • Removed unnecessary administrative access
    • Implemented role-based access control
    • Added permission boundaries
  2. Cross-Environment Access

    • Eliminated production access from staging roles
    • Implemented environment isolation
    • Added resource tagging requirements

High Findings

  1. Unused Permissions

    • Removed unused service permissions
    • Implemented permission usage monitoring
    • Added automated permission cleanup
  2. Broad Resource Access

    • Restricted to specific resource ARNs
    • Implemented resource-level permissions
    • Added access logging

Risk Reduction Metrics

  • Overall Risk Score: Reduced by 65%
  • Critical Roles: Reduced by 68%
  • High Risk Roles: Reduced by 71%
  • Medium Risk Roles: Reduced by 75%
  • Low Risk Roles: Maintained at acceptable level

Implementation Timeline

  1. Week 1: Initial assessment and role mapping
  2. Week 2: Permission analysis and risk scoring
  3. Week 3: Remediation planning and testing
  4. Week 4: Implementation and validation