Credential & Identity Attacks
Target IAM roles, policies, or SSO flows to obtain or elevate privileges. Generate & Retrieve IAM Credential Report
Retrieve All Roles You Can Assume Review theRoleDetailList
section for roles where you have sts:AssumeRole
permissions.
Confused Deputy / Role Chaining
Look for trust policies that allow sts:AssumeRole
from an external account or cross-service trust. If you can assume a higher-privilege role in another account (Confused Deputy), you can pivot to that role.