
April 14, 2025
🥖 Palette Cleanser
Good news fam, we’re richer than last issue! But still poorer than the issue before that. ⚖️🤷♂️ Lucky we’re all AWS security purists and don’t have to live in meatspace with the rest of the capitalists.
Since many of us are playing with AI — or watching others play with AI (no innuendo intended) — it’s a good time to talk about the Model Context Protocol (MCP) and its application to AWS. MCP is an open protocol that standardizes how applications provide context to LLMs. It has the potential to make writing AWS security agents and complex workflows on top of LLMs really easy.
Both Amazon and the community have been quick to rally around it. AWS has released quite a number of MCP servers for things ranging from accessing AWS documentation to creating pretty AWS architecture diagrams. Paul Santus made an MCP server for interacting with those pesky service reference JSON files AWS now publishes, with IAM actions, condition keys, and more. But it’s not all good news — Invariant Labs has demonstrated attacks against some implementations and the folks at Wiz have also been doing attack demos.
Enjoy the issue. Hopefully, there will be no more references to the world economy in future editions.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
Gaining Long-Term AWS Access with CodeBuild and GitHub by Adan Alvarez
Adan, you sly dog. This post is another sneaky way of backdooring an AWS role in a perfectly legitimate-looking way. If your org uses CodeBuild, you’re very likely to skip over this in an investigation, because a trust relationship with codebuild.amazonaws.com is going to look totes fine. Instructions for doing the bad things and detecting them are within.
-
Handling Network Throttling with AWS EC2 at Pinterest by Jia Zhan & Sachin Holla
Sometimes an article is written for not-security but ends up having lots of security implications. This is one of those times. This is one of those times. During past incidents, the Pinterest engineering team discovered that peak traffic was blowing past the baseline bandwidth on their EC2 instances, causing unpredictable network latency from traffic throttling. They figured out a bunch of AWS bottlenecks and quirks, and made their infrastructure a lot more resilient. The same analysis and fixes could serve you well in the event of a denial-of-service attack, even if you're fronted by a protection service like AWS Shield.
-
dAWShund – framework to put a leash on naughty AWS permissions by Nikolas Mantas
There’s an existing tool called BloodHound, which uses graph theory to map unintended relationships within Active Directory, Entra ID (formerly Azure AD), and Microsoft Azure IaaS. Nikolas has written some code to squish AWS IAM constructs into BloodHound for analysis. He also provides queries to ask interesting questions of the graph, like ‘what users have a password enabled but have never used it’ or ‘what principals have any access to the RDS service’.
Bonusii:
🥗 AWS security blogs
- 📣 Announcing 223 new AWS Config rules in AWS Control Tower
- 📣 IAM Identity Center releases new SDK plugin to streamline token exchange with an external Identity Provider
- Unlock the Power of AWS Config: Centralized Compliance and Resource Management by Craig Edwards
- AWS Weekly Review: Amazon EKS, Amazon OpenSearch, Amazon API Gateway, and more (April 7, 2025) by Sébastien Stormacq
- Automate security compliance and remediation across organizations by Pablo Santamaria Zarate
- Automating regulatory compliance: A multi-agent solution using Amazon Bedrock and CrewAI by Balu Mathew
- Enhancing decision making for system changes with generative AI by Dave Horne
- Enhanced Network Security Control: Flow Management with AWS Network Firewall by Hardik Shah
- Automating AWS Private CA audit reports and certificate expiration alerts by Santosh Vallurupalli
- AWS completes the 2025 Cyber Essentials Plus certification by Tariro Dongo
- ML-KEM post-quantum TLS now supported in AWS KMS, ACM, and Secrets Manager by Alex Weibel
🍛 Reddit threads on r/aws
- Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
- AWS Keys Exposed via GitHub Actions?
- How To Test AWS WAF & WAF Rules Capabilities
- IAM Roles Anywhere certificate rotation
- Long lasting S3 presigned URL without IAM ID and Secret credentials
- Deploying enterprise AI application in customer’s private cloud
- Duplicate IAM from identity center
- Pagination token exception in operation 'GetFindings': filter parameters changed in the request
- Migrating away from AWS to non US-based provider
- EC2 Instance and SSH for GitHub Actions
- AWS account hacked and $2000+ bill generated
💸 Sponsor shoutout
Have you got a long list of AWS security issues you could fix but no idea how bad any of it really is?
Instead, start a free trial with Plerion. Focus on the 1% of risks that matter & achieve better security outcomes.
Simplify cloud security with Plerion.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- Amazon Verified Permissions
- Application Auto Scaling
- Amazon ElastiCache
- AWSMainframeModernization
- AWS Elemental MediaLive
- QBusiness
- Amazon QuickSight
- AWS Control Catalog
- AWS Glue
- AWS Ground Station
- AWS Transfer Family
- Amazon Bedrock Runtime
- Cost Optimization Hub
- AWS IoT FleetWise
- AWS Storage Gateway
- Tax Settings
- Amazon Bedrock Runtime
- Amazon Bedrock
- AWS CodeBuild
- AWS Elemental MediaLive
- Amazon Personalize
- AWS Transfer Family
🍹 IAM managed policy changes
- AmazonBraketFullAccess
- ROSAControlPlaneOperatorPolicy
- ROSAIngressOperatorPolicy
- ROSAInstallerPolicy
- ROSAKubeControllerPolicy
- ROSASRESupportPolicy
- SageMakerStudioProjectProvisioningRolePolicy
- AWSRefactoringToolkitFullAccess
- SageMakerStudioBedrockFlowServiceRolePolicy
- AWSConfigServiceRolePolicy
- AWS_ConfigRole
- AmazonDataZoneGlueManageAccessRolePolicy
- SageMakerStudioProjectUserRolePolicy
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
-
No new CVEs.
📺 AWS Security Bulletins
-
No bulletins this week.