Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Add some info on using the default configuration of the AWS CDK to compromise an account. The privesc section explains how to abuse the default configuration to assume roles with predictable names to deploy arbitrary CFN templates, as well as an example of how to compromise an account by editing an IAC config. The persistence section (new page) describes how the default bootstrap stack can be modified to enable an attacker to maintain access.
I put it in the
cloudformationsection, since it uses that behind the scenes, however if it should be in it's own section I have no issues moving it.