📣 Sponsor
ProwlerPro is the most comprehensive tool for cloud security. ProwlerPro is trusted by orgs of all sizes, and used everyday so teams can be confident in their cloud security framework.
Sign up for free today to gain visibility and context so your org can identify, prioritize and remediate risks.
🐿 In a nutshell
This week, numerous AWS IAM Managed Policies have been updated, with a total of 27 changes. Take a look at the weekly differences below.
Chris Farris performed a new experiment by deliberately exposing an AWS Access Key to observe the outcome. The results may astonish you.
The Datadog team has published another outstanding paper, detailing a method to circumvent CloudTrail when using AWS Service Catalog. The researchers at Datadog are genuinely committed, and their findings are thoroughly documented and shared.
The AWS API Change section is now operating as intended, featuring current changes and functional URLs.
📢 MAMIP (Monitor AWS Managed IAM Policies)
Policies changed since last week:
- AWSApplicationMigrationFullAccess
- AWSCleanRoomsFullAccessNoQuerying
- AWSConfigServiceRolePolicy
- AWSDataSyncDiscoveryServiceRolePolicy
- AWSElasticBeanstalkManagedUpdatesCustomerRolePolicy
- AWSManagedServices_ContactsServiceRolePolicy
- AWSThinkboxAWSPortalAdminPolicy
- AWS_ConfigRole
- AdministratorAccess-AWSElasticBeanstalk
[...]
📊 Poll of the week
Hey folks, just a heads up that we're hitting pause on our poll section for a bit, but don't worry, it'll be back in a future edition of the newsletter!
Past week's poll:
Q: An AWS customer is deploying a web application that is composed of a front-end running on Amazon EC2 and of confidential data that is stored on Amazon S3. The customer security policy that all access operations to this sensitive data must be authenticated and authorized by a centralized access management system that is operated by a separate security team. In addition, the web application team that owns and administers the EC2 web front-end instances is prohibited from having any ability to access the data that circumvents this centralized access management system.
Answer: B (6/19 votes)
💸 unusd.cloud
Turn off your unusd AWS instances and save money on your bill. It's like turning off lights to save on your electricity bill, but with CPU cycles instead of wattage.
Our app scans all regions of your AWS accounts to identify assets that you might have left active by mistake and then sends you a digest report with actionable cost-optimizations.
Try it for free at: unusd.cloud







🛡️ Mitigating SSRF in 2023
💯 overview of the challenges in preventing SSRF, and the pros/cons of a number of approaches:
* Allowlisting or blocklisting
* Secure by default libraries
* SSRF jail
* Network controls
* Request proxy
By @IncludeSecurity
blog.includesecurity.com/2023/03/mitiga…



🤖 Offensive AI Compilation
Great list of useful resources on attacking AI models and using AI for offensive purposes:
🕵️♂️ Pentesting
🦠 Malware
🗺️ OSINT
📧 Phishing
👨🎤 Generative AI
+ more
github.com/jiep/offensive…



I dream of a day when all AWS API calls that customers can make are documented and that the AWS console uses the same APIs that customers use. I further dream of AWS using a standard interface internally such that all CloudTrail events are documented and logged uniformly.

New cloud security research! We found a method to bypass CloudTrail logging for both read AND write API actions in AWS Service Catalog! In addition, we also reported an issue with a lack of CloudTrail logging in AWS Control Tower. securitylabs.datadoghq.com/articles/bypas…



Anyone who looks at the progress in AI and imagines it will usher in a utopia ignores both the very recent history of capitalism and the much older history.

The factory owners wanted machines so simple a child could use them - because they were picking over England's orphanages and recruiting small children through trickery to a ten-year indenture in the factories. 7/



We just released at @1ns0mn1h4ck the largest available dataset of malicious PyPI packages. Check out our talk "Finding Malicious PyPI Packages in the Wild"!
github.com/DataDog/malici…
dtdg.co/guarddog-insom…




Passwordless is the theme of the week? After finding @theburningmonk's post yesterday, I saw AWS released their own version github.com/aws-samples/am…



Another undocumented API by a cloud provider results in a cloudvuln. 😭 This follows on an AWS vuln from earlier this week from undocumented APIs: twitter.com/Frichette_n/st…
And this thread has some more:
twitter.com/0xdabbad00/sta…

I'm really excited that we can finally publicly disclose this issue that we found back in July of last year.
TL;DR - The Azure Reader RBAC role could abuse a Function App API to get access to the Function App keys for Linux based Function App containers - netspi.com/blog/technical…



do it, bitch.

On April 1st, we will begin winding down our legacy verified program and removing legacy verified checkmarks. To keep your blue checkmark on Twitter, individuals can sign up for Twitter Blue here: twitter.com/i/twitter_blue…
Organizations can sign up for twitter.com/i/en/verifiedo…… twitter.com/i/web/status/1…



I'm shocked, shocked I tell you, that OpenAI would try to deflect responsibility for something wrong with their product that could cause harm



Did you know in IAM policies condition keys can be used as policy variables as the value❓This helps you compare dynamic values. With this you can ensure that credentials for instances are only used from the instances to which they were issued. Blog ➡️tinyurl.com/msrph364


Just like it sounds, TLS 1.3 is now available on ALB.
https://aws.amazon.com/about-aws/whats-new/2023/03/application-load-balancer-tls-1-3/
- 🖊️ Don't miss out on the latest industry insights - stay ahead of the game by subscribing
- 📢 Gain visibility for your brand by sponsoring our content
- 💌 If you have any suggestions for future topics, let us know