📣 Sponsor
Are overly-permissive access policies keeping you up at night?
Turn risky permissions into streamlined just-in-time (JIT) access.
Keep your developers happy and your security team confident with Sym!
🐿 In a nutshell
AWS launched a new feature for users to receive daily updates on releases and updates to AWS via a simple mechanism. By subscribing to the SNS topic using the email protocol, users will receive daily emails with a summary of updates, and a JSON representation of the daily feature updates, including information about changes and additions to managed policies, AWS regions, services, EC2 instance types, VPC endpoints, service quotas, FIPS endpoints, Amazon ElastiCache, AWS Config managed rules, and more.
The content provided in the Daily Feature Updates will grow as new features are added.
Christophe Tafani-Dereeper also shared his findings on VPC Endpoints on GitHub this week, and AWS published many AWS Managed Policies leading to new features for existing services, particularly in GuardDuty.
📢 MAMIP (Monitor AWS Managed IAM Policies)
Policies changed since last week:
- AWSAccountActivityAccess
- AWSBillingReadOnlyAccess
- AWSDMSFleetAdvisorServiceRolePolicy
- AmazonEC2ContainerServiceEventsRole
- AmazonEC2ContainerServiceforEC2Role
- AmazonEMRContainersServiceRolePolicy
- CustomerProfilesServiceLinkedRolePolicy
- ViewOnlyAccess
📊 Poll of the week
Q: A third-party auditor is being brought in to review security processes and configurations for all of a company's AWS accounts. Currently, the company does not use any on-premise identity provider. Instead, they rely on IAM accounts in each of their AWS accounts. The auditor needs read-only access to all AWS resources for each AWS account. Given the requirements, what is the best security method for architecting access for the security auditor?
Past week's poll:
Q: YTo enable end-to-end HTTPS connections from the user‘s browser to the origin via CloudFront, which of the following option is valid?
Answer: C (8/23 votes)
🙏 Support
If you enjoyed reading our AWS Security Digest newsletter, please help us spread the word by becoming a sponsor for our next edition.
Don't forget to share this newsletter with your colleagues and friends, and follow us on Twitter to stay up-to-date with our latest updates.








Well this is rather exciting! I’m an AWS Hero now 🎉

The #AWS Heroes inspire, uplift, and motivate the global #AWScommunity. 👩💻☁️👨💻
Today, we’re excited to announce and recognize the newest Heroes in 2023! #CloudComputing 👏 go.aws/3FdjVpw




If you have shell access on an EC2 and want to extract creds, instead of remembering how to get them from the 169.254.169.254 path, recent versions of the AWS CLI allow you to use `aws configure export-credentials --format env`.



🗺️ DevSecOps Roadmap
A collection and roadmap for learning #DevSecOps, covering resources and tools for every step of the development process
By @hahwul
github.com/hahwul/DevSecO…




🚨Security Career Resource Thread 🚨
1️⃣ 2️⃣ resources to break into the field or take your career to the next level 👇
#infosec #cybersecurity #security



Well well well, if it isn't Mr. Privatize The Gains here to socialize the losses

Where is Powell? Where is Yellen? Stop this crisis NOW. Announce that all depositors will be safe. Place SVB with a Top 4 bank. Do this before Monday open or there will be contagion and the crisis will spread.



The reason to point out VC hypocrisy asking for a bailout is not to say they shouldn't get it—it's to say that the next time they argue against regulation that would keep this from happening (but prevent them from lining their pockets), they shouldn't succeed



awsiamguide.com v1.0 is out! Even though it's self published, it definitely wasn't a solo effort... 😅
Thanks to all these great people who helped me:



👓 Here's a detailed look at implementing Region & Service allowlisting in AWS: ramimac.me/aws-allowlisti…
Check out the post for a complete walkthrough of the careful roll out of this sort of control, and ways I shot myself in the🦶



😍 This "How to" is introducing a new capability on AWS! This appears to be roughly the equivalent of the benefits of enforcing IMDSv2, but possibly less of the usability pain of the access denieds.

The AWS Security, Identity & Compliance Blog #AWSSecurity
aws.amazon.com/blogs/security…
By: Liam Wadman and Josh Levinson*



I’m happy to share that I’m starting a new position as Director of Engineering Experience @oxbotica
Very excited to be joining an innovative, growing organisation with an exciting mission 🚀


I am work as AWS data engineer and presently use cloud formation for most of our deployments. Recently one of my friends mentioned about Terraform and told me that it's better of if learn Terraform as it's multi cloud. I am planning to continue to work on AWS for atleast …
- 🖊️ Don't miss out on the latest industry insights - stay ahead of the game by subscribing
- 📢 Gain visibility for your brand by sponsoring our content
- 💌 If you have any suggestions for future topics, let us know