Project Overview


Cloud Security Lab Context (Why This Exists)

Within cloud-security-lab, I focus on three common and realistic cloud security challenges that frequently appear in real-world incidents:

1. Excessive IAM Permissions (Implemented Here)

2. Long-Lived Access Keys (Lab Scenario)

3. IAM Role Trust Abuse (Lab Scenario)

This repository implements one challenge end-to-end, deeply and correctly, while demonstrating how the same detection engine applies to all three.


Threat Scenario — Wildcard IAM Permissions