November 17, 2025
๐ฅ Palette Cleanser
Alo alo alo,
The most clicked part of this newsletter is the chef's selections. Most of the time, the articles I share are security research, and if they aren't research, they are unique lessons and experiences. Since most regular humans can't justify the time it takes to write unique, interesting stuff, often it comes from vendors (one of whom I work for). This week Rami McCarthy (also works for a vendor) published The Sins of Security Vendor Research, and I'd like to recruit all of you to read it and keep vendors honest about their "research".
"Sin 2: False Novelty" is the most important to me. I try to be the steward of existing research and reference what lineage I know. But if I ever miss anything, please do let me know. Maybe we could even make trips down memory lane its own section in the future. What do you think?
Stay safe out there, and donโt cross the streams.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
๐ Chef's selections
-
How I Overlooked the Problem and Shot Myself in the Foot by Dmytro Sirant
Dmytro has been doing some migrations from IAM users to SSO. As part of that, heโs been upgrading Terraform files that manage KMS, and he hit some snags. The story is worth reading so you can plan your migration too, but the thing that caught my eye... when he lost access to his KMS key, "The AWS team just granted the required permissions to the key as an additional rule without dropping the existing ones."
-
Things you wish you didn't need to know about AWS service-linked roles by Daniel Grzelak
Your AWS accounts have these special IAM principals called service-linked roles. They aren't yours. You can't edit them. You can only delete them under certain conditions. And they give AWS services access to do lots of stuff with some not-so-tightly scoped policies. They can also be abused by attackers to figure out what services you use. Lots of juicy details in this one.
-
The log rings donโt lie: historical enumeration in plain sight by Bleon Proko
Bleon pulls together a bunch of well-known but rarely discussed techniques showing how much attackers can learn just by reading your AWS logs. CloudTrail alone leaks identity info, resource names, request parameters, and even permission states through patterns like "errorCode=AccessDenied". With nothing more than "cloudtrail:LookupEvents", someone can map out identities, resources, and privilege changes across time. A great reminder that log read access in AWS is far more sensitive than most orgs treat it.
Bonus: Farewell ingress-nginx: How Repeated Security Breaches Led to Its Downfall
๐ฅ AWS security blogs
- ๐ฃ AWS Network Firewall is now available in the AWS New Zealand (Auckland) region
- ๐ฃ Announcing communication preferences for Security Incident Response
- New AWS Organizations Skill Builder courses to level up your multi-account strategy by Nivedita Tripathi
- Inside the federated authentication system of Amazon Game Studios by Olivia Liddell
- Wicked Saints Studios integrates TikTok within World Reborn using AWS by Matthew Nimmo
- A guide to building AI agents in GxP environments by Pierre de Malliard
- Notre Dame sets new standard for higher education with enterprise AWS security implementation by Brian DeKemper
- Securely accessing external accounts with AWS IAM Identity Center by Kai Xu
- Achieving Robust SAP Landscape Segregation with Amazon VPC Lattice by Nandish Gangur Moganna
- AWS re:Invent 2025: Your guide to security sessions across four transformative themes by Rahul Sahni
- Amazon Inspector detects over 150,000 malicious packages linked to token farming campaign by Chi Tran
- Amazon Elastic Kubernetes Service gets independent affirmation of its zero operator access design by Manuel Mazarredo
- Amazon discovers APT exploiting Cisco and Citrix zero-days by CJ Moses
- 2025 H1 IRAP report is now available on AWS Artifact for Australian customers by Patrick Chang
๐ Reddit threads on r/aws
๐ธ Sponsor shoutout
Meet Pleri: your AI-powered cloud security teammate. Sheโs not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
๐ค Dessert
Dessert is made by robots, for those that enjoy the industrial content.
๐ง IAM permission changes
๐ช API changes
- Amazon DataZone
- Amazon Elastic Compute Cloud
- AWS CloudFormation
- AWS Control Catalog
- Amazon Elastic Compute Cloud
- Elastic Load Balancing
- AWS IoT Wireless
- AWS Elemental MediaConvert
- Amazon SageMaker Service
- Amazon WorkSpaces Web
- Amazon Prometheus Service
- Amazon Connect Service
- AWS Database Migration Service
- Amazon Elastic Compute Cloud
- Elastic Load Balancing
- Amazon Redshift
- Amazon S3 Tables
- Amazon SageMaker Service
- Data Automation for Amazon Bedrock
- Amazon Elastic Compute Cloud
- AWS Health Imaging
- RTBFabric
- Security Incident Response
- AWS Certificate Manager Private Certificate Authority
- Amazon AppStream
- AWS Backup
- Braket
- Amazon Aurora DSQL
- Amazon Elastic Compute Cloud
- Amazon GuardDuty
- AWS Identity and Access Management
- AWS Invoicing
- Managed Streaming for Kafka
- AWS Security Token Service
- Amazon Verified Permissions
- AWS WAFV2
๐น IAM managed policy changes
- AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity
- AWSEC2SqlHaServiceRolePolicy
- AWSEC2SqlHaInstancePolicy
- AmazonECSInfrastructureRoleforExpressGatewayServices
- AWS_ConfigRole
- AWSConfigServiceRolePolicy
- AutoScalingServiceRolePolicy
- AdministratorAccess-AWSElasticBeanstalk
- SageMakerStudioProjectProvisioningRolePolicy
- AWSFaultInjectionSimulatorECSAccess
- AWSFaultInjectionSimulatorEC2Access
- SageMakerStudioUserIAMConsolePolicy
- KafkaServiceRolePolicy
- AWSApplicationMigrationNetworkMigrationMultiAccount
- NetworkSecurityDirectorServiceLinkedRolePolicy
- AmazonInspector2ServiceRolePolicy
- AWSBackupServiceRolePolicyForRestores
- AWSBackupServiceRolePolicyForBackup
- AWSBackupServiceLinkedRolePolicyForBackup
- AWSBackupOperatorAccess
- AWSBackupFullAccess
- AIOpsOperatorAccess
โ CloudFormation resource changes
๐ฎ Amazon Linux vulnerabilities
- CVE-2025-11538
- CVE-2025-12818
- CVE-2025-12817
- CVE-2025-40197
- CVE-2025-40153
- CVE-2025-40147
- CVE-2025-40122
- CVE-2025-59089
- CVE-2025-40125
- CVE-2025-40126
- CVE-2025-40198
- CVE-2025-40164
- CVE-2025-40193
- CVE-2025-40130
- CVE-2025-40137
- CVE-2025-40115
- CVE-2025-64500
- CVE-2025-40204
- CVE-2025-40203
- CVE-2025-40194
- CVE-2025-40157
- CVE-2025-40123
- CVE-2025-40154
- CVE-2025-40186
- CVE-2025-40158
- CVE-2025-59088
- CVE-2024-47866
- CVE-2025-40163
- CVE-2025-40195
- CVE-2025-40118
- CVE-2025-40165
- CVE-2025-40192
- CVE-2025-40129
- CVE-2025-40206
- CVE-2025-40150
- CVE-2025-40135
- CVE-2025-40185
- CVE-2025-40208
- CVE-2025-40152
- CVE-2025-40116
- CVE-2025-40167
- CVE-2025-40172
- CVE-2025-40187
- CVE-2025-40146
- CVE-2025-40207
- CVE-2025-40191
- CVE-2025-40189
- CVE-2025-40199
- CVE-2025-40174
- CVE-2025-40138
- CVE-2025-40170
- CVE-2025-40171
- CVE-2025-40139
- CVE-2025-40124
- CVE-2025-40202
- CVE-2025-40132
- CVE-2025-40159
- CVE-2025-40196
- CVE-2025-40151
- CVE-2025-40113
- CVE-2025-40143
- CVE-2025-40201
- CVE-2025-40131
- CVE-2025-40169
- CVE-2025-40176
- CVE-2025-40180
- CVE-2025-40155
- CVE-2025-40142
- CVE-2025-40117
- CVE-2025-40184
- CVE-2025-40156
- CVE-2025-40183
- CVE-2025-40182
- CVE-2025-40200
- CVE-2025-64503
- CVE-2025-57812
- CVE-2025-40179
- CVE-2025-40188
- CVE-2025-40205
- CVE-2025-40133
- CVE-2025-40173
- CVE-2025-40119
- CVE-2025-40190
- CVE-2025-40141
- CVE-2025-13024
- CVE-2025-13016
- CVE-2025-13022
- CVE-2025-13015
- CVE-2025-13023
- CVE-2025-13025
- CVE-2025-13017
- CVE-2025-13012
- CVE-2025-12748
- CVE-2025-13014
- CVE-2025-13018
- CVE-2025-13020
- CVE-2025-13021
- CVE-2025-13019
- CVE-2025-13027
- CVE-2025-13013
- CVE-2025-13026
๐บ AWS security bulletins
๐ฌ Security documentation changes
- AmazonECS Documentation Update
- aws-backup Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- connect Documentation Update
- eks Documentation Update
- elasticloadbalancing Documentation Update
- elasticloadbalancing Documentation Update
- imagebuilder Documentation Update
- inspector Documentation Update
- inspector Documentation Update
- inspector Documentation Update
- lambda Documentation Update
- managedservices Documentation Update
- managedservices Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- payment-cryptography Documentation Update
- redshift Documentation Update
- redshift Documentation Update
- securityhub Documentation Update
- securityhub Documentation Update
- securityhub Documentation Update
- securityhub Documentation Update
- workspaces Documentation Update
- AmazonECS Documentation Update
- AmazonECS Documentation Update
- Route53 Documentation Update
- bedrock Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update