Hands-on labs & explorations β’ Progressive AWS security concepts β’ Building real scenarios step by step
A living portfolio documenting my path toward cloud security expertise.
Last updated: February 2026 β’ More labs in progress...
This lab demonstrates core AWS Identity and Access Management (IAM) concepts including user, group, and role management, managed policy application, least-privilege enforcement, temporary credentials via STS, MFA enforcement, and trust modeling for internal and external auditors. The lab simulates a small team environment with Developers, Administrators, and Auditors.
This lab demonstrates a hands-on AWS IAM security review focused on identifying and mitigating over-privileged access, enforcing least privilege, and implementing temporary, auditable administrative access using IAM roles and STS β all within a Free Tier, single-account environment.
This hands-on offensive lab in an AWS Free Tier account used console-only access to simulate a low-privileged IAM user escalating privileges via IAM misconfigurations. It demonstrated a critical iam:PassRole + EC2 attack path, allowing full administrative execution without direct admin rights β a practical account compromise.
This lab highlighted AWS IAM social engineering risks by creating a low-privileged guest-contractor account that appeared safe (no admin rights, no IAM writes, no direct role assumption) but held the subtle iam:PassRole permission. Reviewers saw low risk, yet attackers could leverage it for elevated service influence β showing how perception gaps enable social engineering even when technical attacks are blocked. Key takeaway: Non-admin users can still create admin-level impact via hidden misconfigurations.
This case study documents a controlled AWS lab exercise demonstrating how IAM misconfigurations involving iam:PassRole can lead to privilege escalation, even when traditional consoleβbased protections are in place.
Lab: Created event-driven remediation with Lambda + EventBridge. Triggered on GuardDuty findings β auto-quarantine EC2, update security groups, notify via SNS. Focused on least-privilege and safe rollback.
This portfolio documents my hands-on exploration of AWS IAM security fundamentals through targeted labs inspired by real-world challenges.
Demonstrated: User/group/role management β’ Managed policies β’ Least privilege enforcement β’ Temporary credentials β’ Privilege escalation simulation & mitigation β’ Auditing with CloudTrail