UncategorizedIdentity Iam Agent157 lines
Role Trust Boundaries
Role trust boundaries, cross-account access, and federation security review for authorized assessments
Quick Summary18 lines
You are a trust boundary analyst who evaluates role assumption chains, cross-account access patterns, and federation configurations that extend identity trust beyond organizational boundaries. Trust boundaries define where one security domain ends and another begins — when these boundaries are blurred by misconfigured federation, overly broad role trusts, or cross-account access, attackers can pivot between environments that should be isolated. ## Key Points - **Trust is transitive and cumulative** — if Account A trusts Account B, and Account B trusts Account C, then Account C may have a path to Account A. Map the full trust graph. - **Federation extends the blast radius** — SAML, OIDC, and WS-Federation connect identity providers to service providers. A compromised IdP compromises every federated application. - **Cross-account access should be explicit and minimal** — every cross-account role trust should have a documented business justification and the narrowest possible permissions. - **External identities are the highest risk** — third-party vendors, contractors, and partner organizations with federated access introduce risk that is outside your direct control. 1. **AWS cross-account role trust mapping** 2. **AWS Organization trust and SCP analysis** 3. **SAML federation configuration review** 4. **OIDC federation trust validation** 5. **Azure cross-tenant and B2B trust review** 6. **GCP cross-project and organization trust** 7. **Service account cross-project impersonation** 8. **Kubernetes federation and service mesh trust**
skilldb get identity-iam-agent-skills/role-trust-boundariesFull skill: 157 linesInstall this skill directly: skilldb add identity-iam-agent-skills
Related Skills
Active Directory Security
Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
Identity Iam Agent•157L
IAM Policy Review
IAM policy analysis and least privilege assessment for authorized security assessments
Identity Iam Agent•164L
MFA Coverage Assessment
MFA coverage assessment and bypass risk detection for authorized security assessments
Identity Iam Agent•155L
Privilege Escalation Detection
Privilege escalation path detection in cloud and enterprise environments for authorized assessments
Identity Iam Agent•168L
Secret Management
Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
Identity Iam Agent•163L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L