From 1075f0b4cef831e231f64671ce75d387998a9157 Mon Sep 17 00:00:00 2001 From: gurkenhabicht Date: Thu, 8 Feb 2024 23:07:17 +0100 Subject: [PATCH] typos --- Enumeration/AWS.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Enumeration/AWS.md b/Enumeration/AWS.md index 1a9b03e..22522dd 100644 --- a/Enumeration/AWS.md +++ b/Enumeration/AWS.md @@ -89,7 +89,8 @@ checked if the request is allowed. Policy evaluation can be found in the [AWS docs](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html). The following graph is taken from the documentation, it shows the evaluation logic inside an account -![policy evaluation](./include/PolicyEvaluationHorizontal111621.pnhttps://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-login.htmlg) + +Policy evaluation Policies like `assume-role` and `switch-role` can lead to the gain of roles with higher permissions