Intelligence Section 05.A

AWS Platform Findings

Comprehensive exposure analysis of the Cloud Infrastructure Layer.

ID: 299839646071 222 Failed Findings
{[ { label: 'Critical Exposure', value: '03', color: 'text-danger-red', bg: 'bg-danger-red/10' }, { label: 'High Risk Gaps', value: '34', color: 'text-orange-500', bg: 'bg-orange-500/10' }, { label: 'Tactical Medium', value: '185', color: 'text-accent-amber', bg: 'bg-accent-amber/10' }, { label: 'Hardening Low', value: '57', color: 'text-action-blue', bg: 'bg-action-blue/10' } ].map(metric => (
{metric.value}
{metric.label}
))}

Severity Density

Service Vector Map

Critical Mission Gaps

{[ { t: 'Root Account Access Key Active', d: 'The AWS root account has an active programmatic key. This bypasses all IAM policy safeguards and grants absolute, irrevocable control over the environment.', s: 'CRITICAL', c: 'text-danger-red', bg: 'bg-danger-red/10' }, { t: 'Virtual MFA on Root Identity', d: 'Root is protected by Virtual MFA instead of Hardware FIDO2. This identity tier is vulnerable to SIM-swap and software interception attacks.', s: 'CRITICAL', c: 'text-danger-red', bg: 'bg-danger-red/10' }, { t: 'JWT Secret in EC2 User Data', d: 'Hardcoded signing token found in instance bootstrap parameters. Accessible via IMDS metadata service internally.', s: 'CRITICAL', c: 'text-danger-red', bg: 'bg-danger-red/10' } ].map(row => (
{row.s} MISSION RISK

{row.t}

{row.d}

))}

Failed Check Registry

222 Operational Gaps Analyzed

{[ { c: 'iam_root_hardware_mfa_enabled', s: 'IAM', v: 'CRITICAL', cl: 'text-danger-red' }, { c: 's3_account_level_public_access_blocks', s: 'S3', v: 'HIGH', cl: 'text-orange-500' }, { c: 'iam_role_cross_service_confused_deputy', s: 'IAM', v: 'HIGH', cl: 'text-orange-500' }, { c: 'vpc_flow_logs_enabled', s: 'VPC', v: 'MEDIUM', cl: 'text-accent-amber' }, { c: 'securityhub_enabled', s: 'SecurityHub', v: 'MEDIUM', cl: 'text-accent-amber' } ].map(row => ( ))}
Check Artifact Service Unit Exposure Synchronization
{row.c} {row.s} {row.v} Feb 4, 2026