AWS ChangePassword
Allows an IAM user to change their own AWS Management Console login password.
The adversary is trying to manipulate, interrupt, or destroy your systems and data.
Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.
In cloud environments, impact techniques include deleting critical resources (databases, storage, compute instances), encrypting data for ransom, modifying DNS records, or disrupting services by changing security configurations. Adversaries may also terminate instances, delete backups, or exhaust service quotas to cause denial of service.
View Impact on MITRE ATT&CK →Allows an IAM user to change their own AWS Management Console login password.
Permanently deletes an IAM user's access key, revoking the associated programmatic access credentials.
Permanently deletes an S3 bucket; the bucket must be empty before deletion can succeed.
Permanently deletes an Aurora DB cluster and optionally its automated backups.
Permanently deletes an RDS database instance, with an option to take a final snapshot before deletion.
Permanently deletes an EFS file system and all its data; all mount targets must be deleted first.
Deletes an Aurora global database cluster that spans multiple AWS regions.
Removes an IAM user's console password, preventing them from signing in to the AWS Management Console.
Deletes a single object from an S3 bucket; with versioning enabled, a delete marker is created instead.
Deletes multiple S3 objects in a single batch request, more efficient than individual delete operations.
Permanently deletes an EBS snapshot; any AMIs based on it must be deregistered first.
Permanently deletes an IAM user; all attached policies, group memberships, and keys must be removed first.
Permanently deletes an EBS volume; the volume must be detached from any instance before deletion.
Disables a KMS encryption key, preventing any operations that depend on it until the key is re-enabled.
Deletes a service account, disrupting workloads and applications that depend on it for authentication.
Deletes a role assignment, removing access for legitimate users and disrupting operations.
Permanently deletes an Azure virtual machine.
Permanently deletes an Azure Event Hub entity within a namespace.
Permanently deletes an Azure Key Vault; without soft-delete, all secrets, keys, and certificates are unrecoverable.
Deletes a secret from an Azure Key Vault.
Permanently deletes a Log Analytics workspace and its stored data.
Removes a protected item from Azure Backup, stopping protection and deleting associated backup data.
Permanently deletes an Azure SQL Database.
Permanently deletes a blob container from an Azure Storage account.
Permanently deletes an Azure Storage account and all of its data.
Regenerates one of the two access keys for an Azure Storage account, invalidating the previous key.
Sets lifecycle configuration on an S3 bucket to automate object transitions or expiration over time.
Sets lifecycle rules on an S3 bucket to automatically transition objects to cheaper storage tiers or expire them.
Schedules a KMS customer managed key for deletion after a waiting period (7-30 days), after which encrypted data is unrecoverable.
Permanently deletes a secret and all of its versions from GCP Secret Manager.
Permanently destroys a specific version of a secret in GCP Secret Manager, making its data irrecoverable.
Permanently deletes a GCP Cloud Storage bucket; the bucket must be empty before deletion.
Deletes objects from Cloud Storage, used in data destruction or anti-forensics operations.
Permanently terminates one or more EC2 instances, releasing instance store data and associated resources.
Updates the console login password for an IAM user.