Defend Against Attacks
Stop active cloud threats
Block data exfiltration, credential compromise, privilege escalation, and lateral movement — with preventive controls that work at the organizational plane.
Data Exfiltration via Machine Roles
Risk: Lambda functions, EC2 roles, or pipelines with excessive access to S3 or KMS can be exploited to exfiltrate sensitive data.
- ▸ Identify non-human identities with direct or indirect access to sensitive data stores
- ▸ Detect encryption gaps and flag roles with unscoped KMS decrypt permissions
- ▸ Recommend policy conditions (VPC, IP, PrincipalOrgID) and integrate with CloudTrail for actual usage
Lateral Movement Across Environments
Risk: Workloads with cross-account trust can be used to move laterally from dev to prod — or from a compromised environment to a production one.
- ▸ Map trust policies and surface cross-account role assumption paths
- ▸ Flag risky role assumptions with wildcard or overly broad principal conditions
- ▸ Enforce tighter trust policies with SCPs and PrincipalOrgID conditions
Privilege Escalation in Workloads
Risk: A compromised or misconfigured machine identity may assume admin roles or grant itself more permissions.
- ▸ Detect toxic combinations (iam:CreateRole + iam:AttachPolicy, PassRole + lambda:CreateFunction)
- ▸ Alert on assume-role permissions with wildcard principals
- ▸ Apply permission boundaries to all machine identities
Credential Exposure in CI/CD and Runtime
Risk: Hardcoded or long-lived credentials in pipelines or containers can be exploited by attackers who access logs, images, or source.
- ▸ Detect IAM users and static access keys still in use
- ▸ Recommend migration to IAM roles with short-lived tokens (IRSA, IMDS v2, OIDC)
- ▸ Monitor CloudTrail for key usage patterns and flag anomalies