December 15, 2025
🥖 Palette Cleanser
There is so much tragedy in the world; sometimes it feels like focusing on any single incident is itself an injustice. Long-time readers know I'm based in Sydney, so it feels important to acknowledge what happened at Bondi Beach yesterday. Violence directed at a community leaves wounds far beyond those immediately affected. I hope that, in moments like this, we choose care, solidarity, and looking after one another, and that our response (all of us) is to come together rather than pull apart.
It does put the limits of what we worry about day to day, in cybersecurity, in perspective, though. After last week's zero-day chaos, two additional vulnerabilities have been identified in the React Server Components (RSC) protocol. Luckily, neither of these new issues allows for remote code execution, but it yet again shows that not all bugs are shallow, given enough eyeballs. It takes some very specific, determined eyeballs focused in the right area at times. Regardless, all the usual suspects are taking full advantage.
Have feedback about AWS Security Digest? Tell us here. This issue is also available to share online.
📋 Chef's selections
-
Exploiting AWS IAM Eventual Consistency for Persistence by Eduard Agavriloae
This is super cool. A defender deletes a compromised IAM user’s access key, assumes the account is safe, and moves on, but within the next 3 to 4 seconds the attacker uses that same “deleted” key to call CreateAccessKey and mint a fresh set of credentials. Eduard walks through this exact race using real IAM APIs like DeleteAccessKey, ListAccessKeys, and CreateAccessKey, and then shows the same pattern applying to watching for deny-all policies, creating new roles, and other IAM changes before they actually take effect.
-
Hands On with AWS Bottlerocket: Evaluating the Security of Amazon's Hardened OS by Terry Franklin
AWS Bottlerocket is Amazon’s minimal, hardened Linux OS for running containers, and this article puts it side by side with a standard Ubuntu node using real container escape techniques. Terry demonstrates that the attacks still work at the container level, but repeatedly fail to turn into host compromise because of Bottlerocket’s design choices, like an immutable root filesystem, enforced SELinux, and kernel lockdown. It’s worth reading because it shows exactly where Bottlerocket draws the line between “container is compromised” and “the node is compromised,” using concrete attacks instead of assumptions.
-
Test S3 ABAC locally with iam-lens by David Kerber
AWS recently added attribute-based access control (ABAC) support to S3 buckets, but turning it on can change access in ways that are hard to reason about from policies alone. David shows how his open source iam-lens tool lets you locally simulate and diff access before and after ABAC is enabled, using a simple override flag to see exactly which principals gain or lose S3 permissions. It turns a risky, account-wide IAM change into something you can test, review, and understand before you touch a production bucket.
Bonusii: Abusing AWS Systems Manager as a Covert C2 Channel and AWS re:Invent 2025 Shows What "Shift Left" Can Mean for AI Security
🥗 AWS security blogs
- 📣 AWS Shield network security director now supports multi-account analysis
- 📣 Amazon WorkSpaces Secure Browser introduces Web Content Filtering
- 📣 Amazon Cognito identity pools now support private connectivity with AWS PrivateLink
- Troubleshoot AWS Tagging Compliance with AWS Resource Explorer by Nereida Woo
- Run Unreal Engine 5.6 with Proton on Amazon GameLift Streams Linux Runtime by Robin Barranda
- AWS Weekly Roundup: AWS re:Invent keynote recap, on-demand videos, and more (December 8, 2025) by Donnie Prakoso
- Reinventing cloud risk management with Trend Vision One™ by Faisal Pias
- Building zero trust generative AI applications in healthcare with AWS Nitro Enclaves by Nathan Pogue
- Designing for global scale: XM Cyber’s 22-Region AWS Cloud WAN implementation by Yazan Khalaf
- Accelerate your Information Security Manual (ISM) compliance with AWS Managed Services (AMS) by Jeremy Tennant
- Implementing HTTP Strict Transport Security (HSTS) across AWS services by Abhishek Avinash Agawane
- Meet digital sovereignty needs with AWS Dedicated Local Zones expanded services by Max Peterson
- Exploring the new AWS European Sovereign Cloud: Sovereign Reference Framework by Andreas Terwellen
- Embracing our broad responsibility for securing digital infrastructure in the European Union by Ashley Lam
- How to customize your response to layer 7 DDoS attacks using AWS WAF Anti-DDoS AMR by Achraf Souk
- IAM Policy Autopilot: An open-source tool that brings IAM policy expertise to builders and AI coding assistants by Diana Yin
- AWS launches AI-enhanced security innovations at re:Invent 2025 by Lise Feng
🍛 Reddit threads on r/aws
💸 Sponsor shoutout
Meet Pleri: your AI-powered cloud security teammate. She’s not a chatbot. Pleri proactively finds meaningful security work and fixes issues before they become problems.
Learn more about Pleri and see her in action.
🤖 Dessert
Dessert is made by robots, for those that enjoy the industrial content.
🧁 IAM permission changes
🍪 API changes
- AWS Billing and Cost Management Recommended Actions
- Amazon Connect Service
- AWS DataSync
- Amazon WorkSpaces Web
- AWS Lambda
- AWS Organizations
- Amazon QuickSight
- AWS Secrets Manager
- Amazon Simple Email Service
- Amazon Bedrock
- AWSBillingConductor
- odb
- Amazon OpenSearch Service
- Partner Central Selling API
- AWS Account
- Amazon Interactive Video Service RealTime
- Application Migration Service
- Amazon Route 53
- AWS Cost Explorer Service
- Amazon Elastic Compute Cloud
- AWS SSO Identity Store
- Partner Central Selling API
- Amazon Relational Database Service
- Redshift Serverless
🍹 IAM managed policy changes
- ConsoleViewOnlyAccessFromVercel
- ConsoleFullAccessFromVercel
- AccountManagementFromVercel
- AWSAccountSettingsManagementRole
- CloudWatchNetworkFlowMonitorTopologyServiceRolePolicy
- AmazonSageMakerNotebooksServiceRolePolicy
- SecurityAgentWebAppAPIPolicy
- AWSManagementConsoleBasicUserAccess
- AWSManagementConsoleAdministratorAccess
- SecurityAgentWebAppAPIPolicy
- AWSManagementConsoleBasicUserAccess
- AWSManagementConsoleAdministratorAccess
- AWSSupportServiceRolePolicy
- ReadOnlyAccess
- AWSServiceCatalogOrgsDataSyncServiceRolePolicy
- AWSIdentityCenterExternalManagementPolicy
☕ CloudFormation resource changes
-
No resource updates this week.
🎮 Amazon Linux vulnerabilities
- CVE-2025-9615
- CVE-2025-67726
- CVE-2025-67724
- CVE-2025-67725
- CVE-2025-14512
- CVE-2025-14523
- CVE-2025-66004
- CVE-2025-66628
- CVE-2022-50652
- CVE-2023-53828
- CVE-2023-53831
- CVE-2025-14330
- CVE-2024-38798
- CVE-2022-50646
- CVE-2023-53865
- CVE-2023-53784
- CVE-2025-14321
- CVE-2023-53858
- CVE-2025-14329
- CVE-2023-53779
- CVE-2025-40336
- CVE-2022-50640
- CVE-2023-53822
- CVE-2023-53785
- CVE-2022-50661
- CVE-2022-50675
- CVE-2023-53781
- CVE-2023-53818
- CVE-2023-53853
- CVE-2022-50676
- CVE-2022-50658
- CVE-2025-40330
- CVE-2023-53800
- CVE-2023-53793
- CVE-2022-50633
- CVE-2022-50674
- CVE-2023-53843
- CVE-2022-50647
- CVE-2023-53847
- CVE-2023-53813
- CVE-2023-53845
- CVE-2023-53850
- CVE-2023-53801
- CVE-2023-53832
- CVE-2023-53821
- CVE-2025-40335
- CVE-2023-53829
- CVE-2023-53783
- CVE-2023-53786
- CVE-2025-14326
- CVE-2022-50671
- CVE-2025-14325
- CVE-2022-50662
- CVE-2022-50678
- CVE-2023-53830
- CVE-2023-53841
- CVE-2022-50670
- CVE-2023-53824
- CVE-2022-50657
- CVE-2023-53778
- CVE-2023-53788
- CVE-2025-40340
- CVE-2025-40338
- CVE-2023-53791
- CVE-2023-53839
- CVE-2025-40328
- CVE-2022-50660
- CVE-2023-53823
- CVE-2023-53802
- CVE-2023-53855
- CVE-2025-14324
- CVE-2025-14087
- CVE-2022-50677
- CVE-2025-40339
- CVE-2025-14327
- CVE-2023-53844
- CVE-2023-53864
- CVE-2022-50663
- CVE-2023-53792
- CVE-2023-53807
- CVE-2022-50637
- CVE-2023-53806
- CVE-2022-50679
- CVE-2023-53833
- CVE-2023-53795
- CVE-2023-53825
- CVE-2022-50648
- CVE-2022-50672
- CVE-2025-14333
- CVE-2023-53860
- CVE-2025-40332
- CVE-2022-50634
- CVE-2023-53794
- CVE-2023-53862
- CVE-2025-40342
- CVE-2022-50638
- CVE-2025-40341
- CVE-2023-53826
- CVE-2023-53842
- CVE-2022-50666
- CVE-2023-53817
- CVE-2025-2296
- CVE-2025-40327
- CVE-2022-50665
- CVE-2022-50653
- CVE-2023-53787
- CVE-2022-50642
- CVE-2023-53856
- CVE-2025-14322
- CVE-2022-50655
- CVE-2022-50643
- CVE-2023-53819
- CVE-2023-53863
- CVE-2023-53866
- CVE-2023-53854
- CVE-2023-53846
- CVE-2025-14331
- CVE-2023-53840
- CVE-2022-50641
- CVE-2023-53809
- CVE-2023-53834
- CVE-2022-50667
- CVE-2023-53780
- CVE-2023-53814
- CVE-2022-50631
- CVE-2023-53811
- CVE-2023-53797
- CVE-2023-53852
- CVE-2022-50668
- CVE-2022-50664
- CVE-2022-50645
- CVE-2022-50649
- CVE-2022-50632
- CVE-2023-53790
- CVE-2025-40331
- CVE-2023-53820
- CVE-2023-53804
- CVE-2025-40343
- CVE-2025-40333
- CVE-2025-40344
- CVE-2025-40329
- CVE-2023-53848
- CVE-2022-50654
- CVE-2023-53815
- CVE-2025-40334
- CVE-2022-50659
- CVE-2023-53798
- CVE-2022-50644
- CVE-2023-53808
- CVE-2023-53851
- CVE-2023-53849
- CVE-2023-53799
- CVE-2022-50656
- CVE-2023-53859
- CVE-2022-50635
- CVE-2023-53810
- CVE-2022-50651
- CVE-2023-53789
- CVE-2023-53803
- CVE-2023-53816
- CVE-2022-50673
- CVE-2022-50650
- CVE-2023-53836
- CVE-2025-14323
- CVE-2023-53777
- CVE-2023-53857
- CVE-2023-53812
- CVE-2022-50669
- CVE-2022-50639
- CVE-2025-14332
- CVE-2023-53861
- CVE-2023-53827
- CVE-2025-14328
- CVE-2023-53838
- CVE-2025-40337
- CVE-2023-53837
- CVE-2022-50636
📺 AWS security bulletins
-
No bulletins this week.
🚬 Security documentation changes
- Route53 Documentation Update
- Route53 Documentation Update
- Route53 Documentation Update
- Route53 Documentation Update
- cdk Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- cli Documentation Update
- eks Documentation Update
- eks Documentation Update
- inspector Documentation Update
- inspector Documentation Update
- inspector Documentation Update
- ivs Documentation Update
- ivs Documentation Update
- kms Documentation Update
- kms Documentation Update
- m2 Documentation Update
- m2 Documentation Update
- pcs Documentation Update
- pcs Documentation Update
- securityhub Documentation Update
- securityhub Documentation Update
- securityhub Documentation Update
- securityhub Documentation Update
- singlesignon Documentation Update
- storagegateway Documentation Update
- storagegateway Documentation Update
- wellarchitected Documentation Update
- wellarchitected Documentation Update
- wellarchitected Documentation Update