1. Elastic Compute Cloud
    1. EC2 User Data Leakage
    2. Unauthorized Access To Open Ports
    3. Exposed Public EBS Snapshots
    4. RCE via SSM
    5. Exfiltrating Data via Amazon Provided DNS
  2. Lambda
    1. Lambda Alias Routing
    2. Maintaining Access via Lambda Backdoor
    3. Abusing Functions Execution Flows
    4. Injecting Malicious Runtime
    5. Exfiltrating Lambda Event Data
    6. Application Security Vulnerabilities
  3. Identity & Access Management (IAM)
    1. Misconfigured Trust Policy
    2. Pass Role
    3. Over Permissive Permission Policy
    4. Dangerous Policy Combination
    5. Cross Account Role
  4. API Gateway
    1. Denial of Service
    2. Poor Authorizer Function
    3. WAF Bypass
    4. Misconfigured Private API Gateway
    5. Lack of Authentication on Endpoints