Intelligence Section 05.A
AWS Platform Findings
Comprehensive exposure analysis of the Cloud Infrastructure Layer.
ID: 299839646071
222 Failed Findings
{[
{ label: 'Critical Exposure', value: '03', color: 'text-danger-red', bg: 'bg-danger-red/10' },
{ label: 'High Risk Gaps', value: '34', color: 'text-orange-500', bg: 'bg-orange-500/10' },
{ label: 'Tactical Medium', value: '185', color: 'text-accent-amber', bg: 'bg-accent-amber/10' },
{ label: 'Hardening Low', value: '57', color: 'text-action-blue', bg: 'bg-action-blue/10' }
].map(metric => (
))}
{metric.value}
{metric.label}
Severity Density
Service Vector Map
Critical Mission Gaps
{[
{ t: 'Root Account Access Key Active', d: 'The AWS root account has an active programmatic key. This bypasses all IAM policy safeguards and grants absolute, irrevocable control over the environment.', s: 'CRITICAL', c: 'text-danger-red', bg: 'bg-danger-red/10' },
{ t: 'Virtual MFA on Root Identity', d: 'Root is protected by Virtual MFA instead of Hardware FIDO2. This identity tier is vulnerable to SIM-swap and software interception attacks.', s: 'CRITICAL', c: 'text-danger-red', bg: 'bg-danger-red/10' },
{ t: 'JWT Secret in EC2 User Data', d: 'Hardcoded signing token found in instance bootstrap parameters. Accessible via IMDS metadata service internally.', s: 'CRITICAL', c: 'text-danger-red', bg: 'bg-danger-red/10' }
].map(row => (
))}
{row.s} MISSION RISK
{row.t}
{row.d}
Failed Check Registry
222 Operational Gaps Analyzed