
September 29, 2025
🥖 Palette Cleanser
Have you ever played with one of those Russian Matryoshka dolls? You know, the ones where you open one only to find another, smaller one inside. If you haven't, I have good news for you: AWS Billing View just introduced support for multiple organizations, so you can play virtual Matryoshka dolls with your billing. It's not a security highlight (yet), but it is a fun way to start the week.
Last week was all about the Shai-Hulud npm supply chain attack. It was epic but didn't last long, not least because GitHub took swift and decisive action. And the GitHub team is not letting that crisis go to waste. This week they published a plan to strengthen publishing authentication controls that will annoy a bunch of people but ultimately make the internet safer. Making these kinds of usability trade-offs is necessary but rarely possible without a crisis. So I guess we should be grateful to the crews running amok on software supply chains recently. <3 <3 <3
Have a great week, everyone.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
Using RCP in OpenSearch: Odd fit or a glimpse of the future? by Hafsa Hafeez
As of September 1, 2025, Amazon OpenSearch Serverless is the first RCP-enabled AWS service that does not support direct cross-account access. The article shows how RCPs can still block calls like "aoss:GetAccountSettings," effectively treating the whole service as a resource in itself, and digs into quirks like wildcard data-access policies that can silently override those safeguards. It’s worth a full read if you design IAM or org-wide guardrails, because it highlights unexpected RCP behaviors you might miss when locking down critical services.
-
Adding Determinism and Safety to Uber IAM Policy Changes by Avinash Srivenkatesh, Zi Wen, Zakir Akram
Uber built a Policy Simulator to stop IAM policy mistakes from breaking production, after a real incident where a bad policy blocked all order edits on Uber Eats. It grabs recent access logs (via Envoy secure proxy, M3, Hive → Pinot) and replays every actor–action–resource on twin authorization engines to show exactly what a proposed policy would break or over-grant, kind of like CI tests for IAM. It’s probably over-engineering for most teams, but maybe you can adapt some of the ideas with CloudTrail, Access Analyzer, or Step Functions to test and harden policy changes before they go live.
-
IMDS Abused: Hunting Rare Behaviors to Uncover Exploits by Hila Ramati, Gili Tikochinski
I try to avoid sharing articles with obnoxious sales pitches. Luckily, most corporate blogs stick to a plug at the end, so it’s usually not an issue. I do have to make an exception this time because the work presented in this article is really cool (practical and easy to apply). Hila and Gili show how powerful simple threat hunting can be if you have the right data. They used their logs of requests binaries made to IMDS to find 0-day(ish) exploits by filtering for rarely seen requests to rarely used endpoints.
Bonus: Fantastic AWS Policies and Where to Find Them and The emerging use of malware invoking AI
🥗 AWS security blogs
- 📣 AWS WAF Targeted Bot Control, Fraud & DDoS Prevention Rule Group available in 3 more regions
- 📣 AWS Network Firewall enhances application layer traffic controls
- 📣 AWS IAM Identity Center organization instances now support customer-managed KMS keys for encryption at rest
- 📣 Amazon Redshift Serverless is now available in the AWS Asia Pacific (Taipei) region
- SailPoint Harbor Pilot: Simplified Identity Security with Agentic AI on AWS by Imaan Tariq
- CBC/Radio-Canada documents video authenticity with Content Credentials on AWS by Demian Hess
- Wiz for Government achieves FedRAMP High authorization, strengthening security for AWS customers by Varun Jasti
- MOSIP on AWS: Transforming digital identity for modern governments by Andrew Johnston
- How to develop an AWS Security Hub POC by Shahna Campbell
- Enabling AI adoption at scale through enterprise risk management framework – Part 2 by Milind Dabhole
- Enabling AI adoption at scale through enterprise risk management framework – Part 1 by Milind Dabhole
- Optimize security operations with AWS Security Incident Response by Kyle Shields
- Minimize risk through defense in depth: Building a comprehensive AWS control framework by Luis Pastor
- How to accelerate security finding reviews using automated business context validation in AWS Security Hub by Reetesh Surjani
🍛 Reddit threads on r/aws
- Are EC2 honeypots allowed under AWS policies? Looking for official docs
- Cognito User Pools: ALB vs API Gateway Integration - Which to Choose?
- Is there anyway to gate assuming an IAM role on an approval?
- Cognito - Allowing Access into AWS Environment?
- Need advice for my final year project at university!
- AWS Security - Support & Guidance needed
💸 Sponsor shoutout

Meet Pleri: your AI-powered cloud security teammate. She’s not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- Agents for Amazon Bedrock Runtime
- Data Automation for Amazon Bedrock
- AWS Billing
- AWS Cost Explorer Service
- Amazon Connect Service
- Amazon Redshift
- AWS Glue
- AWS Network Firewall
- Amazon DynamoDB Accelerator (DAX)
- AWS Clean Rooms Service
- Amazon Elastic Compute Cloud
- AWS EntityResolution
- Amazon Simple Systems Manager (SSM)
- AWS Single Sign
- Amazon Elastic Kubernetes Service
🍹 IAM managed policy changes
- AWSSystemsManagerJustInTimeAccessTokenPolicy
- SecurityLakeResourceManagementServiceRolePolicy
- AWSSystemsManagerJustInTimeAccessTokenPolicy
- AWSCloud9User
- AWSCloud9EnvironmentMember
- AWSCloud9Administrator
- AWSResourceExplorerServiceRolePolicy
- AIOpsAssistantPolicy
- BedrockAgentCoreFullAccess
- BedrockAgentCoreNetworkServiceRolePolicy
- BedrockAgentCoreFullAccess
☕ CloudFormation resource changes
🎮 Amazon Linux vulnerabilities
- CVE-2025-60019
- CVE-2025-10911
- CVE-2025-59830
- CVE-2025-60018
- CVE-2025-23271
- CVE-2025-23275
- CVE-2025-23255
- CVE-2025-23308
- CVE-2024-58241
- CVE-2025-39890
- CVE-2025-23338
- CVE-2025-23340
- CVE-2025-23248
- CVE-2025-23339
- CVE-2025-23272
- CVE-2025-23273
- CVE-2025-23274
- CVE-2025-8869
- CVE-2025-23346
- CVE-2025-39889
- CVE-2025-39873
- CVE-2025-39868
- CVE-2025-9900
- CVE-2025-39871
- CVE-2025-39872
- CVE-2025-39878
- CVE-2025-39883
- CVE-2025-39869
- CVE-2025-39874
- CVE-2025-39875
- CVE-2025-39877
- CVE-2025-39885
- CVE-2025-39881
- CVE-2025-39886
- CVE-2025-10823
- CVE-2025-39882
- CVE-2025-39867
- CVE-2025-39879
- CVE-2025-39887
- CVE-2025-39870
- CVE-2025-10824
- CVE-2025-39884
- CVE-2025-39880
- CVE-2025-39876
- CVE-2025-39888
- CVE-2025-59801
- CVE-2025-47910
- CVE-2025-59800
- CVE-2025-59798
- CVE-2025-59799
📺 AWS security bulletins
-
No bulletins this week.
🚬 Security documentation changes
- amazonq Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- controltower Documentation Update
- eks Documentation Update
- eks Documentation Update
- eks Documentation Update
- eks Documentation Update
- eks Documentation Update
- eks Documentation Update
- eks Documentation Update
- global-accelerator Documentation Update
- iot-sitewise Documentation Update
- kendra Documentation Update
- lambda Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- redshift Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update
- res Documentation Update