GCP add-iam-policy-binding
Adds an IAM policy binding to a GCP resource, granting a member (user, group, or service account) a specified role.
Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine.
View on MITRE ATT&CK →Adds an IAM policy binding to a GCP resource, granting a member (user, group, or service account) a specified role.
Adds an IAM role to an EC2 instance profile, enabling EC2 instances to assume that role and access AWS services.
Removes the permissions boundary from an IAM role, potentially expanding the role's maximum effective permissions.
Deletes an inline policy embedded directly in an IAM role.
Removes the permissions boundary from an IAM user, potentially expanding their maximum effective permissions.
Deletes an inline policy embedded directly in an IAM user.
Detaches a managed IAM policy from a role, removing those permissions from the role's effective policy.
Detaches a managed IAM policy from an IAM user, removing those permissions from the user.
Replaces the complete IAM policy for a GCP resource, controlling access for all principals.
Records a token exchange where a service account implicitly delegates its authority to another identity.
Records use of the actAs permission, where one identity impersonates and acts on behalf of a GCP service account.
Assigns a user-assigned managed identity to an Azure resource, enabling it to authenticate to other Azure services.
Allows a principal to pass an IAM role to an AWS service, granting the service permission to assume that role on their behalf.
Replaces the IAM instance profile associated with a running EC2 instance with a different one.
Updates the trust policy of an IAM role, changing which principals are permitted to assume it.