Security Test: AWS Config Exposure¶
Description¶
Default Severity:
This vulnerability occurs when AWS configuration files are accidentally exposed, potentially revealing secrets like access keys and other sensitive details about your AWS setup. If an attacker sees these files, they might gain free rein over your cloud resources, leading to data breaches or unauthorized actions. Often, this happens because file permissions or directory settings aren't set up correctly, which developers sometimes overlook in the rush to get features working. The risk is high because it can open the door to serious security failures if not addressed promptly.
Configuration¶
Identifier:
information_disclosure/aws_config_exposure
Examples¶
All configuration available:
Compliance and Standards¶
Standard | Value |
---|---|
OWASP API Top 10 | API8:2023 |
OWASP LLM Top 10 | LLM06:2023 |
PCI DSS | 2.2.2 |
GDPR | Article-32 |
SOC2 | CC6 |
PSD2 | Article-95 |
ISO 27001 | A.12.6 |
NIST | SP800-53 |
FedRAMP | CM-2 |
CWE | 200 |
CVSS Vector | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |