Sponsor
New Year, same AWS IAM headache? 😣
What if you could find and fix your critical IAM issues in less than 30 days?
What if it was also free and easy for your whole team to use?
k9 Security’s Starter Plan is available at no cost for ASD subscribers all month!
In a nutshell
Today marks a significant occasion for ASD with the release of the 100th issue of the newsletter.
The newsletter started as a personal collection of AWS security news but has now grown to have over 1500 subscribers following updates on a weekly basis. Additionally, the newsletter has secured recurring sponsorships from partners.
We are incredibly grateful for the support and readership of the newsletter so far. If you have enjoyed reading the newsletter, please consider spreading the word to others who may also be interested.
Your support helps us to continue bringing you the latest updates on AWS security.
📢 MAMIP (Monitor AWS Managed IAM Policies)
Policies changed since last week:
- AWSConfigServiceRolePolicy
- AWSElasticDisasterRecoveryStagingAccountPolicy_v2
- AWSOutpostsAuthorizeServerPolicy
- AWSSSMForSAPServiceLinkedRolePolicy
- AWS_ConfigRole
- AmazonECS_FullAccess
- CloudwatchApplicationInsightsServiceLinkedRolePolicy
- ResourceGroupsServiceRolePolicy
- ViewOnlyAccess






*screaming in cloud security* tomforb.es/i-scanned-ever…



S3 at rest encryption by default and soon it'll be non-trivial to make an S3 bucket public because Public Block access will be applied by default in April. We also got multiple MFAs for the root and the root email no longer tied to the underpants account. Thank you AWS folks!

The AWS News Blog #AWSNews
aws.amazon.com/blogs/aws/amaz…
By: Sébastien Stormacq



If S3 is going to encrypt all objects by default, what are we going to argue about now? (Welcome move, one less dimension for customers to misconfigure)
aws.amazon.com/blogs/aws/amaz…



☁️ Cloud penetration testing: Not your typical internal penetration test
@sethsec walks through how doing an internal (assume breach) cloud pen test is different than a typical pen test, with examples of increasingly useful things to look for
sethsec.blogspot.com/2022/12/cloud-…



How about another real world attacker critique thread? @ExpelSecurity just published a great piece on an intrusion they took care of (Great work team). A thread. 🧵 expel.com/blog/incident-…



another year and still no fucking idea how to use mastodon



Devs: make it your new years resolution to serve OPTIONS at the edge. Your users in Australia and India will thank you.
(It's very painful to use a modern SPA webapp and have dozens of round-trips each take an extra 250ms just for the preflights)
aws.amazon.com/blogs/networki…



It's a small thing but the SEC opting not to refer to Elon Musk, even obliquely, as a founder of Tesla is hilarious (from @matt_levine's always excellent Money Stuff)




😈 Attacker persistence in #Kubernetes using the TokenRequest API
The TokenRequest API can be used to create long-lived and hard-to-detect privileged access
@raesene on how attackers can abuse it & how to detect misuse by monitoring k8s audit logs
securitylabs.datadoghq.com/articles/kuber…



AWS Lambda function URLs + CloudFront is a pretty great combination. I've got a custom domain, TLS-enabled, WAF-protected, nearly-infinitely-scalable endpoint for like... $0.05/month.


Removed 3.33.49.240/30
Removed 52.46.189.36/30
Removed 52.46.189.40/30
Removed 52.46.191.108/30
Removed 3.33.49.136/29
Removed 3.33.49.192/29
Removed 3.33.49.132/30
Removed 3.33.49.144/30
Removed 3.33.49.164/30
Removed 3.33.49.180/30
- 🖊️ This digest was forwarded to you? Subscribe here
- 📢 Promote your content with sponsorship
- 💌 Want to suggest new content: contact me or reply to this email