The use of infrastructure as code (IaC) models for managing cloud resource configurations is becoming increasingly popular due to its ability to provide better version control, source management, and replicability across environments. However, when working quickly, developers may misconfigure cloud assets such as AWS S3 buckets with overly permissive security policies that can put the contents of the bucket at risk of exposure. A Terraform configuration was provided as an example of a poorly configured Lambda function that allowed for excessive permissions on an S3 bucket. The use of tools like Snyk Infrastructure as Code (IaC) and Solvo has been shown to help identify and fix such issues, by scanning Terraform configurations and identifying risky policies, and automatically generating secure policies using Solvo's capabilities. This approach enables organizations to proactively manage their cloud infrastructure security without needing additional resources or expertise.