SRE Weekly Issue #303 • SRE Weekly Issue #302 • AWS Notification Message • Amazon Chime SDK Messaging - 1 updated methods • Amazon Lookout for Metrics - 1 new methods • AWS MediaConnect - 7 updated methods • AmazonNimbleStudio - 11 updated methods • AWSSupportServiceRolePolicy Informational Update • AWS publishes PiTuKri ISAE3000 Type II Attestation Report for Finnish customers • 2021 FINMA ISAE 3000 Type 2 attestation report for Switzerland now available on AWS Artifact • Simplify setup of Amazon Detective with AWS Organizations • glue: 18 new actions, 1 new resource | 3 updated conditions, 46 updated actions • shield: 3 new actions • s3: 1 new action • The day when the AWS Support got access to your S3 data. In this thread, you will find details about the security incident that leads to this unattended access for millions of AWS customers. 🧵 • AWSSupportServiceRolePolicy just got s3:GetObject. 😱 That role is supposed to only have metadata visibility. <a href="https://twitter.com/AWSSecurityInfo" target="_blank">@AWSSecurityInfo</a> you need to roll that back. • Genie: You have 3 wishes Me: I wish the status page was updated more often. Genie: Granted. There will be more outages. What else? Me: 😱 ... I wish AWS support was more helpful. Genie: Granted. They have read access to all your data now. Me: 😱 I'm not doing this anymore. 😭 • On the plus side, now there's a specific event to point to when justifying encryption at rest in AWS. Too bad that event was "AWS granted themselves access to all your S3 objects for a few hours." • This has been the shittiest year of my life. We had to terminate at 15 weeks, during lockdown. The next week the heartless Texas law went into effect. I’ve been overwhelmed by waves of grief. I cry at every baby I see. And now my friend has miscarried at 17 weeks. 😭 • As 2021 comes to an end, I compiled a list of cloud security incidents and vulnerabilities that were publicly disclosed this year. <a href="https://t.co/3xhfMh1OdF" target="_blank">blog.christophetd.fr/cloud-security…</a> 🧵⬇️ • Takeaways: 1. IAM is HARD, even AWS is failing. 2. Change made to IAM should always be peer-reviewed, manually, and using linting. 3. Encrypt using your own customer-managed keys • The dust has settled on the “AWS Support managed policy has access to S3” kerfuffle. From my perspective (as a third-party absolutely obsessed with AWS sec) I was really blown away and grateful by how much <a href="https://twitter.com/colmmacc" target="_blank">@colmmacc</a> and <a href="https://twitter.com/_msw_" target="_blank">@_msw_</a> engaged with the community in “real time” 1/4 • AWSSupportServiceRolePolicy ... <a href="https://t.co/3t6zzEDrPe" target="_blank">github.com/z0ph/MAMIP/com…</a> • I don't know who needs to hear this, but you can tail AWS CloudWatch log groups easily using <a href="https://t.co/epwiBDzLtL" target="_blank">github.com/lucagrulla/cw</a>. Example: cw tail /aws/apigateway/rest/myapi/prod --region us-west-1 --follow And it just ✨works✨ • Protect Your AWS Environment Beyond Patching Log4j - Security Boulevard • Armis Selects Radware to Deliver Cloud Security for AWS - GlobeNewswire
3
Monday January, 2022

📢 MAMIP (Monitor AWS Managed IAM Policies)

Policies changed since last week:

Get notified of policy change using this Twitter bot. 🐦

🆕 MASE - Monitor AWS Services and Regional Endpoints on Twitter

Amazon Chime SDK Messaging - 1 updated methods
Dec 21
The Amazon Chime SDK now supports updating message attributes via channel flows
Amazon Lookout for Metrics - 1 new methods
Dec 21
This release adds support for Causal Relationships. Added new ListAnomalyGroupRelatedMetrics API operation and InterMetricImpactDetails API data type
AWS MediaConnect - 7 updated methods
Dec 21
You can now use the Fujitsu-QoS protocol for your MediaConnect sources and outputs to transport content to and from Fujitsu devices.
AmazonNimbleStudio - 11 updated methods
Dec 21
Amazon Nimble Studio adds support for users to upload files during a streaming session using NICE DCV native client or browser.
AWSSupportServiceRolePolicy Informational Update
aws@amazon.comDec 23
Between December 21, 2021 at 23:48 UTC and December 22, 2021 at 08:23 UTC, the policy used by AWS Support automated systems - AWSSupportServiceRolePolicy - inadvertently included S3:GetObject permissions. This change has been reverted. While these permissions were temporarily present, they were not and could not be used - only …
AWS publishes PiTuKri ISAE3000 Type II Attestation Report for Finnish customers
Niyaz NoorDec 21
Gaining and maintaining customer trust is an ongoing commitment at Amazon Web Services (AWS). Our customers’ industry security requirements drive the scope and portfolio of compliance reports, attestations, and certifications we pursue. AWS is pleased to announce the issuance of the Criteria to Assess the Information Security of Cloud Services …
2021 FINMA ISAE 3000 Type 2 attestation report for Switzerland now available on AWS Artifact
Niyaz NoorDec 21
AWS is pleased to announce the issuance of a second Swiss Financial Market Supervisory Authority (FINMA) ISAE 3000 Type 2 attestation report. The latest report covers the period from October 1, 2020 to September 30, 2021, with a total of 141 AWS services and 23 global AWS Regions included in the scope. A …
Simplify setup of Amazon Detective with AWS Organizations
Karthik RamDec 20
Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities by collecting log data from your AWS resources. Amazon Detective simplifies the process of a deep dive into a security finding from other AWS security services, such as Amazon …
glue: 18 new actions, 1 new resource | 3 updated conditions, 46 updated actions
Jan 3
18 new actions: BatchUpdatePartition (update one or more partitions), CancelStatement (cancel a statement in an interactive session), CreatePartitionIndex (create a specified partition index in an existing table), CreateSession (create an interactive session), DeleteColumnStatisticsForPartition (delete the partition column statistics of a column), DeleteColumnStatisticsForTable (delete the table statistics of columns), DeletePartitionIndex (delete …
shield: 3 new actions
Jan 3
3 new actions: DisableApplicationLayerAutomaticResponse (disable application layer automatic response for shield advanced protection for a resource), EnableApplicationLayerAutomaticResponse (enable application layer automatic response for shield advanced protection for a resource), UpdateApplicationLayerAutomaticResponse (update application layer automatic response for shield advanced protection for a resource)
s3: 1 new action
Jan 3
1 new action: PutAccessPointPublicAccessBlock (associate public access block configurations with a specified access point, while creating a access point)
zoph
Victor Grenu @zoph

The day when the AWS Support got access to your S3 data.

In this thread, you will find details about the security incident that leads to this unattended access for millions of AWS customers. 🧵

0xdabbad00
Scott Piper @0xdabbad00

AWSSupportServiceRolePolicy just got s3:GetObject. 😱 That role is supposed to only have metadata visibility. @AWSSecurityInfo you need to roll that back.

0xdabbad00
Scott Piper @0xdabbad00

Genie: You have 3 wishes
Me: I wish the status page was updated more often.
Genie: Granted. There will be more outages. What else?
Me: 😱 ... I wish AWS support was more helpful.
Genie: Granted. They have read access to all your data now.
Me: 😱 I'm not doing this anymore. 😭

matthewdfuller
Matt Fuller @matthewdfuller

On the plus side, now there's a specific event to point to when justifying encryption at rest in AWS. Too bad that event was "AWS granted themselves access to all your S3 objects for a few hours."

__steele
Aidan W Steele @__steele

This has been the shittiest year of my life.

We had to terminate at 15 weeks, during lockdown. The next week the heartless Texas law went into effect. I’ve been overwhelmed by waves of grief. I cry at every baby I see. And now my friend has miscarried at 17 weeks.

😭

christophetd
Christophe @christophetd

As 2021 comes to an end, I compiled a list of cloud security incidents and vulnerabilities that were publicly disclosed this year.

blog.christophetd.fr/cloud-security…

🧵⬇️

zoph
Victor Grenu @zoph

Takeaways:
1. IAM is HARD, even AWS is failing.
2. Change made to IAM should always be peer-reviewed, manually, and using linting.
3. Encrypt using your own customer-managed keys

__steele
Aidan W Steele @__steele

The dust has settled on the “AWS Support managed policy has access to S3” kerfuffle.

From my perspective (as a third-party absolutely obsessed with AWS sec) I was really blown away and grateful by how much @colmmacc and @_msw_ engaged with the community in “real time”

1/4

kmcquade3
Kinnaird McQuade💥🌩 @kmcquade3

I don't know who needs to hear this, but you can tail AWS CloudWatch log groups easily using github.com/lucagrulla/cw. Example:

cw tail /aws/apigateway/rest/myapi/prod --region us-west-1 --follow

And it just ✨works✨

buymeacoffee