A vulnerability that exists due to poor IAM policies in:

  • Weak authentication
  • Compromised credentials
  • Misconfigured permissions