Q: 12
A security engineer is conducting a review of cloud security controls within an AWS environment
protected by CrowdStrike Falcon. During the evaluation, the engineer identifies that an attacker could
gain elevated permissions through misconfigured IAM policies. Which of the following is the most likely
misconfiguration leading to this high-risk practice?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.