Sunday,
December 15, 2024

🥖 Palette Cleanser

It's almost Christmas, New Year, or a few days off work, whichever you celebrate. While your mother is fighting with your uncle about your grandfather's opinion on your cousin's boyfriend from 10 years ago, remember to watch the 63 re:Invent security presentations - you'll learn a lot more from them than the family drama. Or is that just my family?!

Anywayyy, there was still a surprising amount of fantastic content published this week. Enjoy it. Next week's issue falls just before Christmas Day so instead of the regular content review, I'm preparing my favourite goodies from 2024. Email me your favourites to 2024@awssecuritydigest.com and I'll do a reader's selection too.

Enjoy your week, friends.

Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.

📋 Chef's selections

  • Tales from the cloud trenches: Unwanted visitor by Oren Margalit

    Oren describes some run-of-the-mill attacker activity that intends to abuse the Simple Email Service (SES) in victim accounts. There's a really elegant diagram I love that describes the activity beautifully. As always with Datadog posts there are indicators of compromise (IoCs) anyone can use, as well as descriptions of detection opportunities.

    If this article tickles you, Maayan Bentor published something similar on LLM hijacking this week.

  • Bedrock Slip: Sysdig TRT Discovers CloudTrail Logging Misstep by Alessandro Brucato

    Continuing the threat detection theme, this is a quick story about some gaps in Bedrock CloudTrail that were quickly resolved by AWS. It's instructive because almost every service goes through these pains as detection engineers attempt to find malicious activity. In 2016 I gave a presentation called Gremlins in Your Cloud Success where I noted that (at the time) AssumeRole was only logged in the source account, not the destination. The trial by fire is necessary so please continue to share these gaps with the AWS team.

  • AWS Native Scanning in ECR has a Gotcha by Brandon Sherman

    This blog post is super niche but it will probably save someone some pain. If you switch to using AWS Native scanning in ECR, any scans done with the previous Clair scanner will no longer be accessible. In some cases, you can revert the setting and see scan results again but YMMV.

Bonus: Another summary of re:Invent Announcements for Security Teams, this time by Scott Piper

🥗 AWS security blogs

🍛 Reddit threads on r/aws


🤖 Dessert

Dessert is made by robots, for those that enjoy the industrial content.

🧁 IAM permission changes

🍪 API changes

🍹 IAM managed policy changes

☕ CloudFormation resource changes

🎮 Amazon Linux vulnerabilities

📺 AWS Security Bulletins

YouTube Twitter LinkedIn