
August 04, 2025
🥖 Palette Cleanser
Welcome back, party people,
Las Vegas is the place to be this week as Black Hat trainings have started, rolling into Black Hat briefings Wednesday and Thursday, followed immediately by Defcon. If you're lucky enough to be there, I highly recommend checking out the Defcon Cloud Village, which once again has some awesome AWS hacking talks. I'll round up all the AWS-related content from both cons once they're over.
The Notorious GCP just dropped its latest Cloud Threat Horizons Report. It shows groups like UNC2165 and UNC4393 deliberately wiping cloud-based backup routines and permissions before launching ransomware, forcing victims to pay unless they’ve built a “Cloud Isolated Recovery Environment” (think AWS Backup vaults in an unrelated account with one-way replication). It also digs into how decoy PDFs turn S3 or Drive into stealth malware CDNs, and how compromised build bots can poison browser extension supply chains. It's a really good read.
And if you want to ruin your day, here’s a nightmare fuel post about AWS allegedly deleting a decade-old account and all its data without warning.
Finally, a quick apology: Recent ASD issues have been missing AWS security announcements. Turns out AWS quietly removed category tags from the What's New blog feed, which broke my automation. No excuses - I’ll get it fixed.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
AWS AgentCore: The Overlooked Privilege Escalation Path in Bedrock’s AI Tooling by Nigel Sood
AWS AgentCore has this concept of code interpreters that let your agents safely execute generated code. You can create a custom code interpreter tool to run in an execution role, which gives the execution context access to session credentials. If you over-permission that role, things can go poorly—because apparently PassRole isn’t there to save you.
-
Aren't AWS Cloud Investigations the same as On-Prem? - Part 1 (AWS EC2) by Chester Le Bron
Chester argues that while AWS EC2 investigations share on-prem fundamentals, they diverge at “the crossover” where a compromised instance role and AWS APIs accelerate post-compromise actions, often leaving fewer host artifacts and shifting the center of gravity to CloudTrail (management vs. data events) and IAM analysis. He has a full investigation methodology breakdown at the end.
-
Building an AWS GuardDuty Alert Triage Agent by Dakota Riley
With all these AI security companies pitching agents as detection and response gods, it's worth trying for yourself. Dakota shows how an LLM-powered triage bot built with PydanticAI fetches GuardDuty and CloudTrail data through custom tool functions, formats its verdicts as structured JSON, and posts the results to Discord. In tests ranging from benign sample findings to a Stratus Red Team credential-theft scenario, the agent correctly labels alerts and surfaces key context.
🥗 AWS security blogs
- 📣 Amazon SES introduces tenant isolation with automated reputation policies
- 📣 Amazon S3 Access Points now support tags for Attribute-Based Access Control
- 📣 AWS Network Firewall is now available in the AWS Asia Pacific (Taipei) Region
- 📣 Amazon Cognito is now available in Asia Pacific (Thailand) and Mexico (Central) Regions
- 📣 AWS Control Tower is now available in AWS Asia Pacific (Taipei) Region
- 📣 AWS Direct Connect extends MACsec functionality to supported Partner Interconnects
- 📣 Amazon CloudWatch and Amazon OpenSearch Service launch pre-built dashboard for AWS Network Firewall
- Extend your Active Directory domain to AWS with AWS Managed Microsoft AD (Hybrid Edition) by Tekena Orugbani
- How to manage AI Bots with AWS WAF and enhance security by Kartik Bheemisetty
- Implementing Defense-in-Depth Security for AWS CodeBuild Pipelines by Daniel Begimher
- Secure file sharing solutions in AWS: A security and cost analysis guide: Part 2 by Swapnil Singh
- Secure file sharing solutions in AWS: A security and cost analysis guide, Part 1 by Swapnil Singh
- How to migrate your Amazon EC2 Oracle Transparent Data Encryption database encryption keystore to AWS CloudHSM by Bhushan Bhale
- How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings by Tim Kingdon
- Navigating your way into cloud security: Skills, roles, and career trajectories by Monika Vu Minh
🍛 Reddit threads on r/aws
💸 Sponsor shoutout

Meet Pleri: your AI-powered cloud security teammate. She’s not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- ARC
- Amazon Lightsail
- CloudWatch Observability Admin Service
- AWS Parallel Computing Service
- AWS SecurityHub
- Amazon Connect Customer Profiles
- Amazon Elastic Compute Cloud
- AWS EntityResolution
- AWS Glue
- Inspector2
- AWS IoT
- Amazon OpenSearch Service
- Amazon QuickSight
- AWS S3 Control
- Amazon Simple Email Service
- Amazon WorkSpaces Web
- Amazon CloudFront
- Amazon DocumentDB with MongoDB compatibility
- AWS Directory Service
- Amazon Elastic Compute Cloud
- AWS IoT Wireless
- AWS Batch
- AWS Clean Rooms Service
- AWSDeadlineCloud
- Amazon Location Service
- OpenSearch Service Serverless
- AWS Direct Connect
- AWS IoT SiteWise
- Amazon OpenSearch Ingestion
🍹 IAM managed policy changes
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
📺 AWS security bulletins
-
No bulletins this week.
🚬 Security documentation changes
- IAM Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- bedrock Documentation Update
- bedrock Documentation Update
- bedrock Documentation Update
- chatbot Documentation Update
- chatbot Documentation Update
- chatbot Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- connect Documentation Update
- connect Documentation Update
- connect Documentation Update
- eks Documentation Update
- eks Documentation Update
- iot-sitewise Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- workspaces Documentation Update