
September 22, 2025
🥖 Palette Cleanser
Imagine, for a moment, a software ecosystem that has external libraries for trivial operations like "is-odd" and "is-even," and those libraries are used by thousands of projects. Now, further imagine that ecosystem catching on fire due to a worm that uses package distribution to steal credentials and replicate. After imagining the former, the latter doesn't feel like a stretch to me.
Anyway... that's exactly what happened this week with the malware campaign dubbed "Shai-Hulud," named after the Git branch it creates in code repos after stealing creds and making those repos public. Over 500 packages have been compromised as post-installation scripts run on systems that install the poisoned packages and then proceed to compromise even more. Isn't JavaScript/Node/NPM just the best? Pin your packages, rotate your creds, and stay safe online, friends.
In better news, AWS shipped some sweet updates to the CLI we all love. The "configure" command now supports temporary credentials. Previously, the prompter did not ask you for an "aws_session_token," but now it will if appropriate. There's also a new "configure mfa-login" command, which handles getting MFA-protected temporary credentials with an OTP-based authenticator for an IAM user. That's a lot less messing around to be secure for us nerds.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
Creating an OpenSearch Service cluster and configuring authentication and authorization by Arseny Zinchenko
The post shows how to spin up an Amazon OpenSearch Service cluster and then wrangle the messy layers of access: network, IAM, and OpenSearch’s own fine-grained access control. Of course, there are IAM gotchas, like if your IAM policy uses ".../domain/test/*," you can run searches, but cluster-level calls like "es:AddTags" will fail unless the resource is set to just ".../domain/test".
-
A Candid Perspective on the Cloud Threat Landscape: A Recap from fwd:cloudsec EU by Invictus
Apparently, AWS accounted for nearly a quarter of observed cloud incidents so far this year, with most cases starting from compromised accounts and supply-chain pivots. Long-lived IAM keys and weak monitoring are still the soft spots, and the write-up calls out the need to actually map AWS-specific TTPs - like those in the AWS Threat Technique Catalog - so defenders stop drowning in theory and start detecting what’s really happening in their logs. Oracle Cloud accounted for 2%, and it made me wonder if we're going to need an Oracle Security Digest once they buy TikTok?
-
Is GDLockerSec Really Targeting AWS? by KELA
If you've never had to deal with a minimal-info claim of a data breach, I'm willing to bet you are living your best life. GDLockerSec tried to boost its profile by claiming it had breached Amazon AWS and was sitting on a 9GB leak. KELA dug in and found the “AWS data” was nothing more than a public Kaggle training set stored in an S3 bucket, with no sign of compromise to AWS itself. Some fun OpSec fails inside.
Bonus: Beyond CVEs: The Exploitation of Everyday Misconfigurations
🥗 AWS security blogs
- 📣 AWS Organizations supports full IAM policy language for service control policies (SCPs)
- 📣 AWS Network Firewall enhances console, monitoring, and security features
- 📣 AWS Organizations now provides account state information for member accounts
- Summer 2025 SOC 1 report is now available with 183 services in scope by Tushar Jain
- Authorizing access to data with RAG implementations by Riggs Goodman III
- Enhance TLS inspection with SNI session holding in AWS Network Firewall by Amit Gaur
- How we built a flywheel to steadily improve security for Amazon RDS by Joshua Brindle
- 2025 ISO and CSA STAR certificates now available with two additional services by Chinmaee Parulekar
- Automate OIDC client secret rotation with Application Load Balancer by Kani Murugan
- Multi-Region keys: A new approach to key replication in AWS Payment Cryptography by Ruy Cavalcanti
- OSPAR 2025 report now available with 170 services in scope based on the newly enhanced OSPAR v2.0 guidelines by Joseph Goh
- Navigating Amazon GuardDuty protection plans and Extended Threat Detection by Nisha Amthul
🍛 Reddit threads on r/aws
💸 Sponsor shoutout

Meet Pleri: your AI-powered cloud security teammate. She’s not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- Amazon Bedrock Agent Core Control Plane Fronting Layer
- AWS Config
- Amazon Connect Service
- AWS License Manager User Subscriptions
- AWS Elemental MediaLive
- Amazon Chime SDK Messaging
- Amazon Elastic Compute Cloud
- Amazon Elastic Compute Cloud
- AWS Network Firewall
- AWS Parallel Computing Service
- AWS Budgets
- Amazon Interactive Video Service RealTime
- Amazon CloudWatch Logs
- Amazon OpenSearch Ingestion
- AWS Health Imaging
- CloudWatch Observability Admin Service
- AWS S3 Control
🍹 IAM managed policy changes
- AWSServiceRoleForAWSTransform
- AWSServiceRoleForAWSTransform
- AWSBillingConductorReadOnlyAccess
- AWSBillingConductorFullAccess
- SageMakerStudioProjectUserRolePolicy
- AWSBillingConductorReadOnlyAccess
- AWSBillingConductorFullAccess
- AWSSSOReadOnly
- AWSSSOMemberAccountAdministrator
- AWSSSOMasterAccountAdministrator
- AWSSSODirectoryReadOnly
- AWSSSODirectoryAdministrator
- AWSResourceExplorerServiceRolePolicy
- AWSObservabilityAdminLogsCentralizationServiceRolePolicy
- AWSResourceExplorerServiceRolePolicy
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
- CVE-2025-39852
- CVE-2025-39844
- CVE-2025-39842
- CVE-2025-39845
- CVE-2025-39848
- CVE-2025-39837
- CVE-2025-39849
- CVE-2025-39839
- CVE-2025-39847
- CVE-2025-39859
- CVE-2025-39856
- CVE-2025-39846
- CVE-2022-50412
- CVE-2023-53372
- CVE-2023-53391
- CVE-2023-53389
- CVE-2023-53447
- CVE-2022-50380
- CVE-2022-50419
- CVE-2022-50401
- CVE-2023-53393
- CVE-2023-53412
- CVE-2022-50410
- CVE-2023-53437
- CVE-2022-50400
- CVE-2023-53440
- CVE-2022-50399
- CVE-2023-53417
- CVE-2023-53379
- CVE-2023-53411
- CVE-2023-53397
- CVE-2023-53430
- CVE-2022-50393
- CVE-2025-8860
- CVE-2023-53394
- CVE-2022-50417
- CVE-2023-53395
- CVE-2023-53434
- CVE-2023-53400
- CVE-2022-50402
- CVE-2023-53369
- CVE-2023-53426
- CVE-2022-50394
- CVE-2022-50406
- CVE-2022-50391
- CVE-2023-53415
- CVE-2023-53407
- CVE-2023-53445
- CVE-2022-50385
- CVE-2022-50392
- CVE-2022-50389
- CVE-2023-53371
- CVE-2022-50388
- CVE-2023-53386
- CVE-2022-50387
- CVE-2022-50382
- CVE-2023-53387
- CVE-2022-50411
- CVE-2023-53410
- CVE-2022-50384
- CVE-2023-53396
- CVE-2023-53414
- CVE-2022-50377
- CVE-2023-53420
- CVE-2022-50407
- CVE-2023-53408
- CVE-2023-53409
- CVE-2023-53422
- CVE-2023-53419
- CVE-2023-53377
- CVE-2023-53421
- CVE-2023-53435
- CVE-2023-53402
- CVE-2023-53413
- CVE-2022-50416
- CVE-2022-50408
- CVE-2022-50404
- CVE-2022-50375
- CVE-2022-50376
- CVE-2022-50405
- CVE-2023-53427
- CVE-2022-50418
- CVE-2023-53380
- CVE-2023-53375
- CVE-2023-53376
- CVE-2022-50397
- CVE-2023-53436
- CVE-2023-53392
- CVE-2023-53384
- CVE-2023-53378
- CVE-2023-53416
- CVE-2023-53429
- CVE-2023-53444
- CVE-2022-50414
- CVE-2023-53418
- CVE-2023-53431
- CVE-2022-50390
- CVE-2023-53406
- CVE-2022-50379
- CVE-2022-50409
- CVE-2022-50403
- CVE-2023-53446
- CVE-2023-53403
- CVE-2022-50395
- CVE-2023-53442
- CVE-2023-53381
- CVE-2023-53425
- CVE-2023-53438
- CVE-2023-53423
- CVE-2023-53399
- CVE-2022-50381
- CVE-2023-53390
- CVE-2023-53382
- CVE-2023-53441
- CVE-2023-53373
- CVE-2022-50383
- CVE-2023-53401
- CVE-2023-53433
- CVE-2023-53428
- CVE-2023-53404
- CVE-2022-50378
- CVE-2023-53398
- CVE-2022-50396
- CVE-2022-50398
- CVE-2023-53424
- CVE-2023-53374
- CVE-2023-53439
- CVE-2022-50386
- CVE-2023-53385
- CVE-2023-53370
- CVE-2023-53383
- CVE-2022-50415
- CVE-2023-53432
- CVE-2023-53405
- CVE-2023-53443
- CVE-2023-53388
- CVE-2022-50413
- CVE-2022-50358
- CVE-2023-53344
- CVE-2023-53336
- CVE-2023-53350
- CVE-2023-53366
- CVE-2023-53341
- CVE-2023-53365
- CVE-2022-50356
- CVE-2023-53354
- CVE-2022-50370
- CVE-2023-53337
- CVE-2023-53360
- CVE-2022-50363
- CVE-2023-53340
- CVE-2023-53346
- CVE-2025-58767
- CVE-2022-50374
- CVE-2023-53339
- CVE-2023-53345
- CVE-2023-53353
- CVE-2023-53357
- CVE-2023-53368
- CVE-2022-50367
- CVE-2023-53342
- CVE-2022-50353
- CVE-2022-50365
- CVE-2023-53351
- CVE-2023-53361
- CVE-2023-53364
- CVE-2022-50355
- CVE-2022-50357
- CVE-2022-50360
- CVE-2022-50361
- CVE-2022-50366
- CVE-2023-53335
- CVE-2022-50373
- CVE-2023-53347
- CVE-2023-53356
- CVE-2022-50369
- CVE-2022-50372
- CVE-2022-50364
- CVE-2022-50354
- CVE-2023-53343
- CVE-2023-53348
- CVE-2022-50362
- CVE-2023-53362
- CVE-2022-50371
- CVE-2023-53359
- CVE-2022-50359
- CVE-2023-53363
- CVE-2022-50368
- CVE-2023-53338
- CVE-2023-53349
- CVE-2023-53367
- CVE-2023-53355
- CVE-2023-53358
- CVE-2023-53352
- CVE-2023-53299
- CVE-2023-53315
- CVE-2022-50348
- CVE-2025-39821
- CVE-2023-53296
- CVE-2023-53277
- CVE-2025-39807
- CVE-2025-39819
- CVE-2023-53320
- CVE-2023-53327
- CVE-2023-53305
- CVE-2025-39822
- CVE-2023-53306
- CVE-2023-53310
- CVE-2022-50341
- CVE-2025-39809
- CVE-2025-10528
- CVE-2023-53332
- CVE-2022-50346
- CVE-2022-50347
- CVE-2023-53291
- CVE-2023-53282
- CVE-2025-10536
- CVE-2025-10530
- CVE-2023-53301
- CVE-2023-53279
- CVE-2023-53308
- CVE-2025-39812
- CVE-2025-39814
- CVE-2023-53281
- CVE-2025-39817
- CVE-2023-53328
- CVE-2023-53334
- CVE-2023-53275
- CVE-2023-53285
- CVE-2025-10535
- CVE-2025-39827
- CVE-2023-53307
- CVE-2023-53273
- CVE-2023-53294
- CVE-2022-50340
- CVE-2025-39836
- CVE-2023-53300
- CVE-2023-53318
- CVE-2025-39810
- CVE-2025-10537
- CVE-2025-10534
- CVE-2022-50350
- CVE-2025-10529
- CVE-2025-39833
- CVE-2023-53311
- CVE-2023-53265
- CVE-2022-50339
- CVE-2023-53316
- CVE-2025-39813
- CVE-2023-53323
- CVE-2023-53266
- CVE-2023-53267
- CVE-2023-53329
- CVE-2023-53284
- CVE-2025-39829
- CVE-2025-39834
- CVE-2023-53302
- CVE-2023-53325
- CVE-2025-10531
- CVE-2025-39825
- CVE-2023-53298
- CVE-2025-10527
- CVE-2023-53314
- CVE-2025-39811
- CVE-2023-53271
- CVE-2025-39830
- CVE-2025-39828
- CVE-2022-50345
- CVE-2023-53272
- CVE-2023-53286
- CVE-2023-53276
- CVE-2025-10533
- CVE-2025-39815
- CVE-2022-50349
- CVE-2025-39805
- CVE-2025-39818
- CVE-2023-53268
- CVE-2023-53278
- CVE-2022-50351
- CVE-2025-39820
- CVE-2025-39832
- CVE-2025-39806
- CVE-2025-10532
- CVE-2023-53303
- CVE-2022-50342
- CVE-2023-53288
- CVE-2025-39823
- CVE-2022-50352
- CVE-2023-53269
- CVE-2023-53290
- CVE-2025-39808
- CVE-2022-50343
- CVE-2023-53319
- CVE-2023-53322
- CVE-2023-53317
- CVE-2023-53264
- CVE-2023-53326
- CVE-2023-53333
- CVE-2023-53309
- CVE-2025-39831
- CVE-2023-53293
- CVE-2023-53287
- CVE-2023-53331
- CVE-2023-53263
- CVE-2023-53313
- CVE-2023-53292
- CVE-2023-53295
- CVE-2023-53312
- CVE-2023-53274
- CVE-2023-53270
- CVE-2025-39816
- CVE-2025-39824
- CVE-2023-53321
- CVE-2023-53297
- CVE-2022-50344
- CVE-2023-53304
- CVE-2023-53289
- CVE-2023-53324
- CVE-2023-53330
- CVE-2023-53280
- CVE-2025-39826
- CVE-2025-39835
- CVE-2025-39801
- CVE-2023-53152
- CVE-2022-50308
- CVE-2022-50265
- CVE-2022-50247
- CVE-2023-53150
- CVE-2023-53147
- CVE-2022-50331
- CVE-2023-53190
- CVE-2022-50298
- CVE-2022-50332
- CVE-2023-53163
- CVE-2023-53213
- CVE-2023-53194
- CVE-2023-53248
- CVE-2023-53188
- CVE-2022-50235
- CVE-2023-53173
- CVE-2023-53226
- CVE-2022-50300
- CVE-2022-50269
- CVE-2022-50267
- CVE-2023-53196
- CVE-2022-50287
- CVE-2022-50323
- CVE-2022-50261
- CVE-2022-50281
- CVE-2022-50259
- CVE-2023-53224
- CVE-2023-53222
- CVE-2022-50320
- CVE-2022-50285
- CVE-2022-50260
- CVE-2023-53255
- CVE-2022-50309
- CVE-2022-50303
- CVE-2023-53216
- CVE-2023-53201
- CVE-2022-50328
- CVE-2023-53205
- CVE-2022-50278
- CVE-2023-53221
- CVE-2023-53241
- CVE-2022-50289
- CVE-2022-50234
- CVE-2022-50284
- CVE-2023-53210
- CVE-2022-50333
- CVE-2025-39800
- CVE-2022-50258
- CVE-2023-53254
- CVE-2022-50327
- CVE-2022-50243
- CVE-2023-53181
- CVE-2022-50313
- CVE-2022-50324
- CVE-2023-53193
- CVE-2023-53169
- CVE-2023-53197
- CVE-2023-53231
- CVE-2022-50317
- CVE-2022-50322
- CVE-2022-50321
- CVE-2022-50280
- CVE-2022-50319
- CVE-2025-39803
- CVE-2023-53175
- CVE-2022-50263
- CVE-2022-50262
- CVE-2023-53185
- CVE-2022-50295
- CVE-2022-50338
- CVE-2023-53172
- CVE-2022-50266
- CVE-2022-50335
- CVE-2023-53242
- CVE-2022-50293
- CVE-2022-50270
- CVE-2022-50276
- CVE-2023-53258
- CVE-2022-50314
- CVE-2023-53177
- CVE-2023-53153
- CVE-2023-53183
- CVE-2022-50271
- CVE-2022-50283
- CVE-2023-53259
- CVE-2023-53178
- CVE-2023-53208
- CVE-2023-53247
- CVE-2022-50264
- CVE-2022-50302
- CVE-2023-53223
- CVE-2023-53203
- CVE-2023-53186
- CVE-2022-50275
- CVE-2022-50292
- CVE-2023-53229
- CVE-2022-50245
- CVE-2022-50316
- CVE-2022-50252
- CVE-2022-50240
- CVE-2022-50282
- CVE-2022-50236
- CVE-2022-50254
- CVE-2023-53245
- CVE-2023-53199
- CVE-2022-50337
- CVE-2022-50272
- CVE-2022-50257
- CVE-2023-53166
- CVE-2023-53246
- CVE-2022-50241
- CVE-2023-53192
- CVE-2023-53257
- CVE-2022-50242
- CVE-2022-50250
- CVE-2023-53209
- CVE-2023-53244
- CVE-2023-53202
- CVE-2023-53234
- CVE-2022-50255
- CVE-2022-50268
- CVE-2022-50249
- CVE-2022-50304
- CVE-2023-53198
- CVE-2023-53148
- CVE-2023-53179
- CVE-2022-50307
- CVE-2022-50299
- CVE-2022-50301
- CVE-2023-53149
- CVE-2022-50311
- CVE-2023-53200
- CVE-2023-53236
- CVE-2022-50296
- CVE-2023-53228
- CVE-2023-53235
- CVE-2023-53217
- CVE-2022-50253
- CVE-2023-53170
- CVE-2022-50286
- CVE-2022-50256
- CVE-2022-50305
- CVE-2023-53206
- CVE-2023-53207
- CVE-2022-50336
- CVE-2022-50318
- CVE-2023-53168
- CVE-2023-53176
- CVE-2023-53238
- CVE-2023-53220
- CVE-2023-53237
- CVE-2023-53262
- CVE-2023-53184
- CVE-2023-53204
- CVE-2022-50288
- CVE-2022-50310
- CVE-2022-50244
- CVE-2022-50279
- CVE-2023-53232
- CVE-2022-50325
- CVE-2023-53214
- CVE-2023-53251
- CVE-2022-50329
- CVE-2023-53211
- CVE-2023-53167
- CVE-2022-50306
- CVE-2023-53164
- CVE-2022-50315
- CVE-2023-53233
- CVE-2023-53250
- CVE-2023-53261
- CVE-2023-53189
- CVE-2023-53171
- CVE-2023-53165
- CVE-2022-50277
- CVE-2022-50294
- CVE-2022-50291
- CVE-2022-50246
- CVE-2023-53195
- CVE-2023-53230
- CVE-2022-50334
- CVE-2023-53174
- CVE-2023-53180
- CVE-2023-53187
- CVE-2023-53218
- CVE-2022-50274
- CVE-2023-53225
- CVE-2022-50297
- CVE-2023-53249
- CVE-2023-53243
- CVE-2023-53215
- CVE-2023-53260
- CVE-2023-53239
- CVE-2022-50251
- CVE-2023-53256
- CVE-2023-53252
- CVE-2025-59375
- CVE-2023-53253
- CVE-2022-50326
- CVE-2023-53191
- CVE-2022-50312
- CVE-2022-50248
- CVE-2023-53182
- CVE-2023-53240
- CVE-2022-50330
- CVE-2022-50273
- CVE-2023-53219
- CVE-2023-53151
- CVE-2025-39804
- CVE-2022-50239
- CVE-2025-39802
📺 AWS security bulletins
-
No bulletins this week.
🚬 Security documentation changes
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- amazonq Documentation Update
- apigateway Documentation Update
- apprunner Documentation Update
- apprunner Documentation Update
- cli Documentation Update
- cli Documentation Update
- cloudhsm Documentation Update
- cloudhsm Documentation Update
- connect Documentation Update
- corretto Documentation Update
- deadline-cloud Documentation Update
- efs Documentation Update
- emr Documentation Update