This SaaS startup has a strong foundational AWS setup — EBS encryption is on, GuardDuty is active, and CloudTrail is logging globally. However, 3 years of rapid growth have created significant IAM sprawl. The most critical findings are 12 access keys older than 400 days (one belonging to a former contractor) and a Lambda function with a hardcoded STRIPE_SECRET_KEY visible in environment variables. These two findings alone represent an existential billing and data-breach risk. Remediation of the critical items is estimated at 4 engineering hours.
payment-processor-prod Has Hardcoded Secret in Env VarsSTRIPE_SECRET_KEY=sk_live_xxx... is visible in plaintext via the AWS Lambda console and CloudFormation exports. Anyone with read access to your AWS account can read your live Stripe key.acme-user-uploads-prod Has Public ACL Enabledsg-0a1b2c3d Allows SSH from 0.0.0.0/0