
September 01, 2025
🥖 Palette Cleanser
Hello e-citizens of a-mazon,
It's been a minute since the internet was on fire, so the software supply chain attack crews decided it was time to intervene. The fine folks at Wiz reported that on August 26, multiple malicious versions of the widely used Nx build system package were published to the npm registry. They included post-installation malware for harvesting cryptocurrency wallets, GitHub and npm tokens, SSH keys, and more. Apparently, 90% of over a thousand leaked GitHub tokens are still valid.
On the bright side (not a fire pun), people got really excited about the new network access control policy conditions AWS released. The request origin keys—aws:VpceAccount, aws:VpceOrgPaths, and aws:VpceOrgID—make it much easier to define where requests can come from when accessing S3 buckets. Prior to this, some folks were forced to include long lists of VPC IDs in IAM policies, which seems like an... ambitious practice.
If you happen to like building AI stuff on AWS, you might enjoy my new newsletter, Bedrock Brief. Sign up and let me know what you think.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
AWS CDK and SaaS Provider Takeover by Ryan Gerstenkorn
You cheeky trickster, Ryan! He shows how CDK bootstrap roles, which by default trust their own account’s root principal and lack an "sts:ExternalId" check, can become a takeover risk in a SaaS environment. If a SaaS platform lets users supply arbitrary role ARNs during onboarding, an attacker can simply point it back at one of those internal CDK roles, and the assume-role call succeeds because it’s the same account. The result is the SaaS platform effectively onboarding its own account and exposing provider infrastructure to the attacker.
-
AWS Detection Engineering — Architecting Security Logging at Scale in AWS by Muh. Fani Akbar
The author recounts investigating a fintech breach where the AWS logging architecture let attackers operate for 127 days undetected, despite CloudTrail, VPC Flow Logs, and GuardDuty being in place. He reckons the problem wasn’t lack of logs but lack of architecture, and shows how to design for scale: prioritize high-value events (like AssumeRole or PutBucketPolicy), enrich logs with context via Kinesis + Lambda before storage, and tier retention across S3 Standard, IA, and Glacier to balance cost against investigative needs. The key lesson is to log for specific detection use cases, not volume, and continuously test pipelines so visibility never silently degrades.
-
Build a Real Time Threat Detector with IaC by Rich Mogull
This lab shows how to build a real-time EventBridge threat detector that fires on IAM CreateUser events and centralizes alerts through a SecurityAudit account’s SNS topic. Unlike the earlier log-focused Athena detector, this narrower approach relies on forwarding only the specific CloudTrail events of interest across accounts and regions with StackSets.
🥗 AWS security blogs
- 📣 AWS IAM launches new VPC endpoint condition keys for network perimeter controls
- 📣 Amazon Verified Permissions is available in four additional regions
- 📣 Amazon OpenSearch Serverless now supports Attribute Based Access Control
- 📣 AWS Network Firewall launches ReceivedBytes metric for stateless and stateful engines
- 📣 AWS Transform for .NET adds support for Azure repos and Artifacts feeds for NuGet packages
- Unlocking Secure Data Access with Dispersive Stealth Networking and AWS by John Walsh
- Implementing usage and security reporting for Amazon ECR by Herb Gomez
- Detect Amazon Bedrock misconfigurations with Datadog Cloud Security by Nina Chen
- Choosing the right AWS live streaming solution for your use case by Subin Hutton
- How Prime Video delivers AI-powered real-time insights for NASCAR fans by Aravind Kodandaramaiah
- Implementing fine-grained Amazon Route 53 access using AWS IAM condition keys (Part 1) by Daniel Yu
- Amazon disrupts watering hole campaign by Russia’s APT29 by CJ Moses
- Use scalable controls to help prevent access from unexpected networks by Sowjanya Rajavaram
🍛 Reddit threads on r/aws
- AWS Introducing aws:VpceAccount, aws:VpceOrgPaths, and aws:VpceOrgID Condition Keys for Network Controls
- AWS IAM launches new VPC endpoint condition keys for network perimeter controls
- Ratelimit using ElastiCache valkey serverless as L2 cache and in-memory as L1 cache
- Exposing AWS secret names and ARNs in repo?
💸 Sponsor shoutout

Meet Pleri: your AI-powered cloud security teammate. She’s not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- Amazon Elastic Compute Cloud
- AWS X
- Amazon Connect Service
- Amazon Elastic Compute Cloud
- AWS Glue
- Amazon HealthLake
- Amazon Omics
- Amazon Pinpoint SMS and Voice Service
- Amazon Relational Database Service
- AWS Systems Manager for SAP
- AWS Directory Service
- Amazon Elastic Kubernetes Service
- Amazon Neptune Graph
- Amazon SageMaker Service
- AWS ARC
- Amazon Elastic Compute Cloud
- Amazon Location Service Routes V2
- AWS B2B Data Interchange
- Amazon DataZone
- Amazon Elastic Compute Cloud
- AWS Elemental MediaConvert
- QBusiness
- Timestream InfluxDB
🍹 IAM managed policy changes
- AWSServiceRoleForAWSTransform
- AWSTransformApplicationDeploymentPolicy
- AmazonOpenSearchIngestionServiceRolePolicy
- SageMakerStudioProjectProvisioningRolePolicy
- SageMakerStudioProjectProvisioningRolePolicy
- SageMakerStudioUserIAMPermissiveExecutionPolicy
- SageMakerStudioUserIAMDefaultExecutionPolicy
- SageMakerStudioAdminIAMPermissiveExecutionPolicy
- SageMakerStudioAdminIAMDefaultExecutionPolicy
- AmazonEKSServiceRolePolicy
- AmazonEC2ImageReferencesAccessPolicy
- AmazonWorkSpacesThinClientFullAccess
- AWSSystemsManagerJustInTimeAccessServicePolicy
- AWSSystemsManagerJustInTimeAccessServicePolicy
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
📺 AWS security bulletins
-
No bulletins this week.
🚬 Security documentation changes
- acm Documentation Update
- acm Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- apprunner Documentation Update
- apprunner Documentation Update
- b2bi Documentation Update
- bedrock Documentation Update
- bedrock Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- codecatalyst Documentation Update
- cognito Documentation Update
- cognito Documentation Update
- cognito Documentation Update
- deadline-cloud Documentation Update
- deadline-cloud Documentation Update
- dms Documentation Update
- dms Documentation Update
- documentdb Documentation Update
- drs Documentation Update
- eks Documentation Update
- eks Documentation Update
- eks Documentation Update
- entityresolution Documentation Update
- entityresolution Documentation Update
- entityresolution Documentation Update
- firehose Documentation Update
- freertos Documentation Update
- freertos Documentation Update
- glue Documentation Update