AWS Pentest Methodology
Last updated
Was this helpful?
Last updated
Was this helpful?
Read or view permissions to all accounts in scope
Console + API Keys
Compromised developer IAM user/role
EC2 or Lambda roles
Leaked access keys
Whatever situation the client is most worried about
Use white-box access for automated tools that visualize resources and API usage in the account
Perform an automated configuration review across every account
Tools like ScoutSuite, Prowler, CloudFox, Pacu, or a CSPM your client is using
Programmatically identify attack paths
Research and check for publicly known misconfigs or issues
Read AWS documentation for API calls, best practices, and features
Note attack paths to try
Confirm/Disprove assumptions and theories dynamically
Write your findings
Bonus points for recommending architecture or guardrail changes instead of "wack-a-mole" fixes