This project is part of my broader cloud-security-lab, a hands-on security lab where I intentionally design realistic AWS misconfigurations, simulate real attacker behavior, and then build production-style detection pipelines to identify and validate those threats.
The focus of this repository is the Wildcard IAM Permissions challenge, where an overly permissive IAM user (*:*) is abused to perform privilege escalation by attaching the AWS-managed AdministratorAccess policy.
Rather than building a one-off alert, the goal of this project is to implement a reusable AWS control-plane threat detection engine using:

While this implementation demonstrates IAM privilege escalation detection, the same detection engine is intentionally generic and extensible, and can be reused across other security scenarios in the lab with minimal changes.
Within cloud-security-lab, I focus on three common and realistic cloud security challenges that frequently appear in real-world incidents:
:*)AttachUserPolicy, PutUserPolicy, or PassRoleAccess keys that are never rotated
Silent credential abuse over time
Overly permissive or misconfigured role trust policies
Unauthorized role assumption and lateral movement
This repository implements one challenge end-to-end, deeply and correctly, while demonstrating how the same detection engine applies to all three.