
October 13, 2025
🥖 Palette Cleanser
Compliance teams rejoice! This week's Ruby Central drama / insider incident is something we can all bring up forever and ever when someone asks why root credentials are bad and why root MFA is important. The Ruby Central root creds were, "stored in a shared enterprise password manager in a shared vault to which only three individuals had access," and one of them appears to have been a naughty boy after being terminated. The actor changed the password and then messed around a little until their access was shut off. The incident timeline is unusually detailed and full of fun times you can quote in PowerPoint decks.
This year's Defcon Cloud Village videos were published this week, and there's lots of AWS goodness among them:
- Weaponizing SSM: Practical Exploits and Hardening Techniques for AWS - Rodrigo Montoro
- Cognito, Ergo Some Extra Permissions - Leo Tsaousis
- Weaponizing SageMaker AI: Real-World Offense in Machine Learning Platforms - Shani Peled
- Building the Cross-Cloud Kill Chain: A DE's Playbook for AWS, Azure & GCP Detections - Gowthamaraj
- whoAMI: Discovering and exploiting a large-scale AMI name confusion attack - Seth Art
- Auths Gone Wild: When 'Authenticated' Means Anyone - Danielle Aminov & Yaara Shriki
- Transforming Identity Protection: Innovating with AI and Attack Paths - Filipi Pires
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
How One Project Made AWS Policy Changes Visible to Everyone by Victor Grenu
Victor, who also happens to be the OG founder of AWS Security Digest, has been running the MAMIP (Monitor AWS Managed IAM Policies) unofficial archive for over 5 years now. He recently put a new coat of paint on all that tooling with a new website, complete with dashboard and search. It's crazy to see just how much managed policies change, given how reliant all of us are on them.
-
Crimson Collective: A New Threat Group Observed Operating in the Cloud by Jakub Zvarik
A new crew calling themselves Crimson Collective has been ripping through AWS environments using leaked long-term access keys they find with TruffleHog. Once in, they create new IAM users, slap AdministratorAccess on them, and go to town mapping EC2, RDS, S3, and more before pulling data out. Their go-to move seems to be exporting RDS snapshots to S3 and exfiltrating the loot, followed by a nice little extortion note.
-
State of Cloud Security Report October 2025 Update by Datadog
The 2025 update to Datadog's cloud security report shows solid progress in some areas, but much still does not spark joy. Data perimeters are catching on (about 40% adoption), but most are still applied piecemeal at the resource level instead of org-wide. IMDSv2 enforcement climbed to 49% of EC2s and jumps to 95%+ when "IMDSv2-by-default" is enabled, but fewer than 3% of orgs actually use it. Long-lived creds remain a mess (59% of IAM users have keys older than a year), and 12.2% of third-party roles are still dangerously over-privileged.
Bonus: The Secure Way to Integrate Cloudsec Tools using External IDs
🥗 AWS security blogs
- AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest by Sébastien Stormacq
- How to Enhance Asset Visibility with Infoblox and AWS by Rajendra Kulkarni
- Recording mobile video to Amazon S3 using Amazon Kinesis Video Streams by Ali Maga
- How to configure and verify ACM certificates with trust stores by Chris Morris
- Should I use managed login or create a custom UI in Amazon Cognito? by Joshua Du Lac
- New AWS whitepaper: Security Overview of Amazon EKS Auto Mode by Todd Neal
🍛 Reddit threads on r/aws
💸 Sponsor shoutout

Meet Pleri: your AI-powered cloud security teammate. She’s not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- Amazon Bedrock Agent Core Control Plane Fronting Layer
- Amazon Bedrock AgentCore Data Plane Fronting Layer
- Amazon CloudFront
- AWS Glue
- AWS Lambda
- odb
- Amazon QuickSight
- Amazon Bedrock Agent Core Control Plane Fronting Layer
- AWS License Manager User Subscriptions
- AWS Outposts
- Service Quotas
- AWS Backup
- Amazon Bedrock Agent Core Control Plane Fronting Layer
- Amazon Bedrock AgentCore Data Plane Fronting Layer
- AWS Glue
- AWS MediaConnect
- Amazon MemoryDB
- AWS Resource Explorer
🍹 IAM managed policy changes
☕ CloudFormation resource changes
-
No resource updates this week.
🎮 Amazon Linux vulnerabilities
- CVE-2025-11002
- CVE-2025-11001
- CVE-2025-39962
- CVE-2025-30189
- CVE-2025-11561
- CVE-2025-39958
- CVE-2025-39960
- CVE-2025-39955
- CVE-2025-39957
- CVE-2025-39961
- CVE-2025-39954
- CVE-2025-39956
- CVE-2023-53685
- CVE-2023-53679
- CVE-2023-53686
- CVE-2022-50549
- CVE-2023-53666
- CVE-2022-50516
- CVE-2023-53639
- CVE-2022-50554
- CVE-2023-53657
- CVE-2023-53678
- CVE-2023-53651
- CVE-2023-53623
- CVE-2023-53649
- CVE-2022-50527
- CVE-2023-53630
- CVE-2022-50518
- CVE-2023-53684
- CVE-2022-50535
- CVE-2023-53629
- CVE-2023-53627
- CVE-2023-53619
- CVE-2025-8291
- CVE-2022-50509
- CVE-2023-53650
- CVE-2023-53661
- CVE-2023-53636
- CVE-2023-53672
- CVE-2023-53617
- CVE-2023-53635
- CVE-2022-50531
- CVE-2022-50545
- CVE-2023-53632
- CVE-2023-53671
- CVE-2023-53648
- CVE-2022-50540
- CVE-2022-50548
- CVE-2022-50536
- CVE-2023-53681
- CVE-2022-50541
- CVE-2022-50551
- CVE-2022-50524
- CVE-2023-53631
- CVE-2023-53653
- CVE-2023-53674
- CVE-2023-53675
- CVE-2023-53647
- CVE-2022-50519
- CVE-2023-53640
- CVE-2023-53628
- CVE-2022-50534
- CVE-2022-50546
- CVE-2023-53644
- CVE-2023-53646
- CVE-2022-50538
- CVE-2023-53624
- CVE-2023-53659
- CVE-2025-11412
- CVE-2023-53682
- CVE-2022-50520
- CVE-2023-53642
- CVE-2022-50552
- CVE-2023-53673
- CVE-2023-53687
- CVE-2023-53637
- CVE-2023-53668
- CVE-2023-53680
- CVE-2022-50526
- CVE-2022-50537
- CVE-2023-53626
- CVE-2023-53656
- CVE-2025-11414
- CVE-2023-53663
- CVE-2022-50515
- CVE-2025-11413
- CVE-2023-53662
- CVE-2023-53654
- CVE-2022-50539
- CVE-2022-50517
- CVE-2022-50511
- CVE-2023-53633
- CVE-2023-53670
- CVE-2023-53664
- CVE-2023-53634
- CVE-2025-61771
- CVE-2022-50513
- CVE-2023-53676
- CVE-2023-53683
- CVE-2022-50553
- CVE-2022-50532
- CVE-2023-53645
- CVE-2023-53620
- CVE-2023-53643
- CVE-2023-53652
- CVE-2022-50555
- CVE-2022-50523
- CVE-2022-50521
- CVE-2023-53658
- CVE-2023-53618
- CVE-2025-61770
- CVE-2022-50510
- CVE-2022-50533
- CVE-2022-50547
- CVE-2023-53641
- CVE-2023-53625
- CVE-2023-53677
- CVE-2023-53638
- CVE-2023-53660
- CVE-2023-53655
- CVE-2025-61772
- CVE-2023-53621
- CVE-2022-50529
- CVE-2022-50542
- CVE-2022-50514
- CVE-2022-50528
- CVE-2023-53622
- CVE-2022-50550
- CVE-2022-50543
- CVE-2023-53667
- CVE-2023-53669
- CVE-2022-50544
- CVE-2022-50530
- CVE-2022-50512
- CVE-2022-50525
- CVE-2023-53665
- CVE-2025-61985
- CVE-2025-61984
📺 AWS security bulletins
🚬 Security documentation changes
- apigateway Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- eks Documentation Update
- frauddetector Documentation Update
- frauddetector Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update
- greengrass Documentation Update