From b92573666fecc56f5e02a014e7571d3d1a20d890 Mon Sep 17 00:00:00 2001 From: gurkenhabicht Date: Thu, 8 Feb 2024 23:08:56 +0100 Subject: [PATCH] changed image presentation to html syntax --- Enumeration/AWS.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/Enumeration/AWS.md b/Enumeration/AWS.md index 22522dd..7cb100f 100644 --- a/Enumeration/AWS.md +++ b/Enumeration/AWS.md @@ -55,7 +55,8 @@ If the ACL is set to Permissions are granted directly through user accounts or indirectly through roles the user has joined. -![users and groups](./include/iam-intro-users-and-groups.diagram.png) + +Policy evaluation Gaining access to important roles like maintenance opens the door to higher permissions. An always unique AWS Account ID has a length of 12 digits. @@ -90,7 +91,7 @@ Policy evaluation can be found in the [AWS docs](https://docs.aws.amazon.com/IAM The following graph is taken from the documentation, it shows the evaluation logic inside an account -Policy evaluation +Policy evaluation Policies like `assume-role` and `switch-role` can lead to the gain of roles with higher permissions