A vulnerability that exists due to poor IAM policies in: Weak authentication Compromised credentials Misconfigured permissions