Skip to content

Security Test: AWS Config Exposure

Description

Default Severity:

This vulnerability occurs when AWS configuration files are accidentally exposed, potentially revealing secrets like access keys and other sensitive details about your AWS setup. If an attacker sees these files, they might gain free rein over your cloud resources, leading to data breaches or unauthorized actions. Often, this happens because file permissions or directory settings aren't set up correctly, which developers sometimes overlook in the rush to get features working. The risk is high because it can open the door to serious security failures if not addressed promptly.

Configuration

Identifier: information_disclosure/aws_config_exposure

Examples

All configuration available:

checks:
  information_disclosure/aws_config_exposure:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API8:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 2.2.2
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.12.6
NIST SP800-53
FedRAMP CM-2
CWE 200
CVSS Vector AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N