
February 17, 2025
🥖 Palette Cleanser
Welcome to a round of hide-and-seek (with AWS) - except this time, the stakes are a little higher than your average childhood game. Forgotten buckets, hidden AWS resources, and ransomware lurking in the shadows… if AWS had a horror genre, this issue would be it.
Think your cloud is squeaky clean? Turns out, what you don’t see can absolutely hurt you. Whether it’s an abandoned S3 bucket waiting to be hijacked, a rogue resource you forgot about, or ransomware locking up your data for a price.
This week’s menu is all about finding and securing the things you forgot existed before the bad guys do. Buckle up, and let’s go ghost-hunting.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
Find Hidden AWS Resources with Effective Wordlists by Daniel Grzelak
We’re probably all missing our usual chef, Daniel - so what better way to pay homage to him while he’s off sipping mulled wine somewhere in Europe than by featuring his own work?
Daniel takes us on a ride into how attackers (and defenders) use wordlists to uncover hidden AWS resources. If you’ve ever assumed your cloud setup was invisible, this might make you rethink that. Just because you can’t see it doesn’t mean someone else won’t find it.
-
The Complete Guide to Cloud-Native Ransomware Protection in Amazon S3 and KMS by Jason Kao
Jason is back for round two….probably because he knows that if you don’t fix your security holes the first time, attackers will happily revisit them for you. This time, he’s tackling ransomware in AWS, breaking down how bad actors can turn your own encryption against you and what you can do to stop them.
If your S3 and KMS security strategy is just "hope for the best", his article will make you rethink your life choices. Because nothing ruins a good day like finding out your backups have been backed up by criminals.
-
Abandoned AWS Cloud Storage: A Major Cyberattack Vector by Jai Vijayan
You know that feeling when you leave food in the fridge a little too long, and it turns into a science experiment? Well, abandoned AWS storage is kinda like that - except instead of weird mold, you get attackers re-registering your old buckets and using them for malware, phishing, or worse.
This read is a wake-up call for anyone who’s ever spun up an S3 bucket and forgotten about it (so…pretty much all of us?!). If you think out of sight means out of mind, attackers would love to prove you wrong.
🥗 AWS security blogs
- 📣 Amazon Inspector enhances the security engine for container images scanning
- 📣 AWS Secrets and Configuration Provider now integrates with Pod Identity for Amazon EKS
- Enabling AI leadership in the age of government efficiency by Dave Levy
- Unlock the power of fine-grained access control with Amazon Verified Permissions by Kiran Dongara
- Establishing a robust cloud platform and operational model through the CCoE by Andy Rivers
- Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO by Tyler Replogle
- How to restrict Amazon S3 bucket access to a specific IAM role by Chris Craig
- Introducing the AWS Trust Center by Chris Betz
- The importance of encryption and how AWS can help by Ken Beer
- Implementing least privilege access for Amazon Bedrock by Jonathan Jenkyn
- Announcing ASCP integration with Pod Identity: Enhanced security for secrets management in Amazon EKS by Rodrigo Bersa
🍛 Reddit threads on r/aws
- whoAMI: A cloud image name confusion attack | Datadog Security Labs
- Amazon Redshift enhances security by changing default behavior in 2025: Publicly Accessible, Encryption by default, and secure connections by default
- IAM User Login Flow – Possible Username Enumeration (CVE-2025-0693)
- AWS Trust Center: New Centralized Security Information
- Amazon AWS "whoAMI" Attack Exploits AMI Name Confusion to Take Over Cloud Instances
- What is the best method or product in AWS get get a list of all my data across all services.
- How reliant is AWS for preserving data within the intended region?
💸 Sponsor shoutout
Have you got a long list of AWS security issues you could fix but no idea how bad any of it really is?
Instead, start a free trial with Plerion. Focus on the 1% of risks that matter & achieve better security outcomes.
Simplify cloud security with Plerion.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- AWS CodeBuild
- Amazon Connect Service
- AWS Database Migration Service
- Amazon Simple Storage Service
- AWS WAFV2
- Access Analyzer
- Amazon SageMaker Service
- AWS Storage Gateway
- Agents for Amazon Bedrock Runtime
- Agents for Amazon Bedrock
- Amazon FSx
- AWS Elemental MediaLive
- OpenSearch Service Serverless
- Amazon Polly
- AWS Certificate Manager Private Certificate Authority
- AWS AppSync
- Amazon Elastic Compute Cloud
- AWS Database Migration Service
🍹 IAM managed policy changes
- SageMakerStudioBedrockEvaluationJobServiceRolePolicy
- SageMakerStudioBedrockFlowServiceRolePolicy
- SageMakerStudioBedrockPromptUserRolePolicy
- SageMakerStudioBedrockAgentServiceRolePolicy
- SageMakerStudioBedrockChatAgentUserRolePolicy
- SageMakerStudioProjectRoleMachineLearningPolicy
- AWSElementalMediaConnectFullAccess
- AWSElementalMediaConnectReadOnlyAccess
- SageMakerStudioProjectRoleMachineLearningPolicy
- AWSFaultInjectionSimulatorEC2Access
- SystemAdministrator
- FMSServiceRolePolicy
- AWSSSOServiceRolePolicy
- AmazonDocDBConsoleFullAccess
- AmazonDocDBElasticFullAccess
- AWSApplicationMigrationEC2Access
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
- CVE-2025-1272
- CVE-2025-21701
- CVE-2025-21700
- CVE-2025-21694
- CVE-2025-21695
- CVE-2024-31068
- CVE-2025-21697
- CVE-2024-39355
- CVE-2024-57951
- CVE-2025-21696
- CVE-2025-1244
- CVE-2025-21699
- CVE-2024-29214
- CVE-2023-34440
- CVE-2024-57952
- CVE-2025-23359
- CVE-2024-36293
- CVE-2024-37020
- CVE-2024-31157
- CVE-2024-28127
- CVE-2024-39279
- CVE-2024-28047
- CVE-2025-21698
- CVE-2024-24582
- CVE-2023-43758
- CVE-2024-12797
- CVE-2025-1153
- CVE-2025-21692
- CVE-2025-25186
- CVE-2025-21690
- CVE-2024-12243
- CVE-2024-54658
- CVE-2025-21687
- CVE-2025-1149
- CVE-2025-1148
- CVE-2025-21686
- CVE-2024-57950
- CVE-2025-1151
- CVE-2025-21693
- CVE-2025-21688
- CVE-2025-21689
- CVE-2025-21691
📺 AWS Security Bulletins
-
No bulletins this week.