Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources.

Tactics
TA0004 TA0005

Sub-technique of
T1548


See: MITRE ATT&CK