
March 31, 2025
š„ Palette Cleanser
Dear digester,
I bring glorious news from the mothership: the AWS re:Inforce security conference is returning to Philadelphia, Pennsylvania, from June 16ā18. Tickets went on sale this week, and apparently, you can get $500 off by using the code āSECURITY500ā at registration. This year, there are over 250 technical sessions, hands-on labs, and interactive workshops. If anyone has connections in high places, Iād love to cover the event.
As is now routine, the clouds caught fire again this weekāfirst, due to a beautiful set of Kubernetes plugin vulnerabilities that resulted in remote code execution on ~40% of clusters, discovered by the Wiz research team. And then again, thanks to a trivial authorization bypass in Next.js found by Rachid Allam.
Finally, as an ASD subscriber, you seem to enjoy security digestsāthis one for the AWS vibes and questionable attempts at humor. If you're looking for broader security content, you might want to check out the Datadog Security Digest. If you do subscribe, let me know what you think of it.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
š Chef's selections
-
The Cat Flap - How to really Purrsist in AWS Accounts by Michael Gschwender
This blog post is trivialāitās about adding an account ID to the AWSControlTowerExecution roleās trust policy. And yet, it may still be the best blog post ever written. Hereās an excerpt to give you a taste of its flavor: "Trying to hide sh*t is lame, the best is to make sh*t, that looks like other sh*t and then have an organization allowlist it, because your fake sh*t is nearly indistinguishable from the real sh*t."
-
YES3 Scanner: An Open Source Tool to Scan S3 Buckets for Access Misconfigurations and Ransomware Prevention by Jason Kao
Jason has an unhealthy obsession with encryption. Jason also likes S3. In this post, he combines both passions to release Yet Another S3 Scanner. YES3 is an open-source tool that scans for 10+ settings on S3 buckets and AWS accounts to identify risks to S3 infrastructure. If a commercial cloud security platform like Plerion isnāt your cup of tea, this scanner can give you a list of issues to prioritize fixing.
-
Living-off-the-land Dynamic DNS for Route 53 by Dhruv Ahuja
The premise is simple: create a script with minimal dependencies that uses Route 53 to update a DNS record with the userās current external IP. I confessāthis isnāt a puristās security article. You have to kind of squint to see the security-ness of it, but since Dhruv applies a hacker concept (living off the land) and a defender concept (least privilege), Iām including it and accepting your wrath.
š„ AWS security blogs
- š£ AWS Identity and Access Management now supports dual-stack (IPv4 and IPv6) environments
- š£ Amazon ElastiCache now supports AWS PrivateLink in AWS Asia Pacific (Jakarta) and Asia Pacific (Hyderabad)Ā Regions
- š£ AWS Network Firewall adds pass action rule alerts and JA4 filtering
- š£ AWS Network Firewall is now available in the Asia Pacific (Thailand) and Mexico (Central) Regions
- š£ AWS Amplify Hosting announces Web Application Firewall Protection in general availability
- Secure your applications using Check Pointās AI powered WAF-as-a-Service by Dhanil Parwani
- Firewall support for AWS Amplify hosted sites by SƩbastien Stormacq
- AWS re:Invent 2024 recap for government agencies by Hanish Garg
- AWS continues to support government cloud security and shape FedRAMPās evolution toward automated compliance by Hazem Eldakdoky
- Enhancing cloud security in AI/ML: The little pickle story by Nur Gucu
- Winter 2024 SOC 1 report is now available with 183 services in scope by Paul Hong
- Effectively implementing resource control policies in a multi-account environment by Tatyana Yatskevich
- Use AWS service reference information to automate policy management workflows by Ramesh Rajan
š Reddit threads on r/aws
šø Sponsor shoutout
Plerion is building an AI cloud security engineer that works like another member of your team.
Want to be a design partner? Let's do it together!
š¤ Dessert
Dessert is made by robots, for those that enjoy the industrial content.
š§ IAM permission changes
šŖ API changes
- Amazon API Gateway
- AmazonApiGatewayV2
- Amazon Bedrock Runtime
- AWS CodeBuild
- Payment Cryptography Control Plane
- Amazon QuickSight
- Amazon SageMaker Service
- AWS Batch
- AWS Billing and Cost Management Pricing Calculator
- Agents for Amazon Bedrock Runtime
- AWS CloudFormation
- Amazon DataZone
- Amazon Elastic Kubernetes Service
- Amazon GameLift
- Amazon SageMaker Service
- AWS SSO OIDC
- AWS ARC
- AWS Direct Connect
- AWS Elemental MediaConvert
- AWS MediaTailor
- Amazon Polly
- AWS WAFV2
- Agents for Amazon Bedrock
- Amazon Elastic Kubernetes Service
- AWS Marketplace Entitlement Service
- AWSMarketplace Metering
- Amazon SageMaker Service
- Amazon Simple Systems Manager (SSM)
š¹ IAM managed policy changes
- AmazonECSComputeServiceRolePolicy
- AmazonEventBridgeApiDestinationsServiceRolePolicy
- AmazonInspector2ServiceRolePolicy
- AmazonEMRFullAccessPolicy_v2
- AmazonOpenSearchServiceRolePolicy
- AWSBackupFullAccess
- AWSBackupOperatorAccess
- AWSBackupServiceRolePolicyForBackup
- AWSBackupServiceRolePolicyForRestores
- SageMakerStudioDomainExecutionRolePolicy
- AWSApplicationAutoscalingElastiCacheRGPolicy
- SecurityAudit
- AmazonRDSCustomServiceRolePolicy
- AmazonRDSCustomPreviewServiceRolePolicy
- AWSBackupSearchOperatorAccess
- AWSResourceExplorerServiceRolePolicy
- AWSArtifactReportsReadOnlyAccess
- AmazonECSComputeServiceRolePolicy
- AmazonInspector2ServiceRolePolicy
ā CloudFormation resource changes
š® Amazon Linux vulnerabilities
-
No new CVEs.