AWS Support role created
Description
Dedicated IAM role for AWS Support access exists with AWSSupportAccess managed policy.
⚠️ Risk Impact
Without a Support role, engineers may use admin credentials to engage AWS Support — exceeding minimum-necessary access.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected AWS accounts. Violations are flagged as low-severity findings with remediation guidance.
🔧 Remediation
Create IAM role with AWSSupportAccess managed policy. Assign to support engineers who need it.
💀 Real-World Attack Scenario
Engineers used admin credentials to engage AWS Support for routine issues. Compromise of any of those credentials granted admin access where Support-only would have sufficed.
💰 Cost of Non-Compliance
Low-frequency control; supports least-privilege.
📋 Audit Questions
- 1.AWS Support role exists?
- 2.Who has access?
- 3.Is admin used for Support cases?
⚡ Common Pitfalls
- ⛔Admin used for Support cases (over-privilege)
- ⛔Support role granted broadly (under-restriction)
📈 Business Value
Support role demonstrates least-privilege maturity + reduces credential exposure.
⏱️ Effort Estimate
10 minutes setup
EchelonGraph audits role existence
🔗 Cross-Framework References
Automate CIS AWS 1.20 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →