Ensure that the Amazon IAM role used to establish a trusted relationship between your AWS cloud account and Trend Cloud One™ – Conformity (also known as a cross-account access role) includes an external ID. The external ID is a unique identifier that ensures no other customers can assume your Conformity IAM role, securing access to your account and addressing the confused deputy problem. This issue arises when an entity without sufficient permissions coerces a more privileged entity to perform an action on its behalf. By using an external ID, you add an extra layer of security to the role's temporary credentials, enabling Trend Cloud One™ to access your AWS account in a secure way.
Enhance the security of your Conformity IAM role by requiring an optional external ID (implemented through the "externalId" condition) to safeguard access to your AWS cloud environment and prevent cross-account confused deputy attacks. Using an "externalId" condition for cross-account access roles helps mitigate the confused deputy problem by ensuring that only the intended account, with the correct external ID, can assume the role. This prevents malicious actors from exploiting the role by attempting to assume it from a different account that might otherwise have permission.
Audit
To determine if the role used by Trend Cloud One™ – Conformity for onboarding (i.e., CloudConformity role) is using the "externalId" condition, perform the following operations:
Remediation / Resolution
To update the trust relationship policy defined for your **CloudConformity** IAM role in order to enable external ID support and prevent cross-account confused deputy, perform the following operations:
References
- AWS Documentation
- AWS Identity and Access Management (IAM) FAQs
- The confused deputy problem
- Access to AWS accounts owned by third parties
- IAM roles
- IAM tutorial: Delegate access across AWS accounts using IAM roles
- Access to AWS accounts owned by third parties
- AWS Command Line Interface (CLI) Documentation
- list-roles
- get-role
- update-assume-role-policy