Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

The Kubernetes Engine cluster is not configured with PodSecurityPolicy enabled, meaning there are no enforced restrictions on what pods can do or what resources they can access. This leaves the cluster open to running potentially risky or untrusted workloads without proper security controls.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

This configuration grants public or anonymous access to a BigQuery table by assigning ‘allUsers’ or ‘allAuthenticatedUsers’ as IAM members. This means anyone on the internet, or any Google-authenticated user, can access the table’s data.

Impact

If exploited, sensitive data stored in the BigQuery table could be exposed to unauthorized users, leading to data leaks, compliance violations, or misuse of your organization’s information. Attackers could read, query, or potentially modify your data without restriction.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

The configuration enables a public IP address for a Google Cloud SQL database instance, making the database accessible from the internet. This increases exposure to unauthorized access and potential attacks.

Impact

If exploited, attackers could attempt to connect to the database from anywhere, increasing the risk of data breaches, unauthorized data manipulation, or service disruption. Exposing databases to the public internet often leads to credential brute-forcing and is a common target for automated attacks.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

Granting folder-level IAM permissions to the default Compute Engine service account allows this account broad access across all resources in the folder. Default service accounts are not intended for wide access and may be used by multiple workloads.

Impact

If exploited, attackers or compromised workloads could leverage the default service account’s elevated permissions to access, modify, or delete resources across all projects in the folder, increasing the risk of privilege escalation and unauthorized access.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

This code assigns a folder-level IAM role to a Google Cloud default service account. Default service accounts have broad permissions and are not intended for granular access control.

Impact

If exploited, attackers or unauthorized users could abuse the over-privileged default service account to access or modify resources across all projects under the folder, increasing the risk of privilege escalation and data exposure.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

This code allows ‘allUsers’ or ‘allAuthenticatedUsers’ to access a Google Cloud Run service, making it publicly or anonymously accessible. Anyone on the internet could reach this service without proper authentication controls.

Impact

If exploited, unauthorized users—including malicious actors—could access, interact with, or abuse the Cloud Run service. This could lead to data leakage, service disruption, or unexpected costs from misuse, potentially compromising sensitive information and the integrity of your application.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

Granting organization-level IAM roles to default Compute Engine service accounts in GCP can unintentionally give broad permissions to these accounts. This practice increases the risk of privilege misuse if the default service account is compromised.

Impact

If an attacker gains access to a default service account with organization-level permissions, they could manipulate resources across the entire GCP organization, leading to data leaks, unauthorized changes, or disruption of critical services.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

Assigning the ‘roles/editor’ role at the organization level in GCP gives users broad permissions, including the ability to impersonate and manage all service accounts. This overly permissive access can expose sensitive cloud resources to misuse.

Impact

If exploited, attackers or unauthorized users could gain control over all service accounts, potentially allowing them to escalate privileges, access confidential data, and perform destructive actions across your entire GCP organization.

Improper Access Control

Property
Languagehcl
Severitylow
CWECWE-284: Improper Access Control
OWASPA05:2017 - Broken Access Control
Confidence LevelLow
Impact LevelLow
Likelihood LevelLow

Description

The AWS Transfer Server resource is configured with a public or unspecified endpoint type, allowing access from the internet. This exposes the server to unauthorized connections instead of restricting access to a specific VPC.

Impact

If exploited, anyone on the internet could attempt to connect to your Transfer Server, increasing the risk of unauthorized data access, credential theft, or misuse of your AWS resources. This exposure could lead to data breaches or compliance violations.

Improper Access Control

Property
Languagehcl
Severitymedium
CWECWE-284: Improper Access Control
OWASPA01:2021 - Broken Access Control
Confidence LevelLow
Impact LevelMedium
Likelihood LevelMedium

Description

This code configures a network ACL rule in AWS to allow incoming traffic from any public IP address. Allowing unrestricted public ingress exposes your resources to the entire internet, increasing the risk of unauthorized access.

Impact

If exploited, attackers could access or probe your AWS resources from anywhere on the internet, potentially leading to data breaches, service disruptions, or unauthorized use of your cloud infrastructure. This exposure makes your environment a target for automated attacks and malicious actors.