Comply with ISO 27001, GDPR, SOC 2 and more with Upsafe (Sponsor)
We don’t know you yet, but chances are that you prefer working on actual security rather than compliance paperwork or answers to security questionnaires 😬
Upsafe is opening its launch program to put compliance and questionnaires on autopilot. Just mention that you’re a reader of AWS Security Digest, a free trial will be available!
📢 MAMIP (Monitor AWS Managed IAM Policies)
Policies changed since last week:
- AWSAppRunnerReadOnlyAccess
- AWSApplicationMigrationFullAccess
- AWSBackupServiceRolePolicyForS3Backup
- AmazonRDSBetaServiceRolePolicy
- AmazonRDSPreviewServiceRolePolicy
- AmazonRDSServiceRolePolicy
- AmazonRedshiftQueryEditorV2FullAccess
- AmazonRedshiftQueryEditorV2NoSharing
- AmazonRedshiftQueryEditorV2ReadSharing
- etc...
Fix AWS IAM permissions quickly with k9 Security (Sponsor)
Need to help your Cloud teams find and fix AWS IAM permissions issues quickly?
Control access to AWS APIs and data with k9’s simple policy automation and actionable IAM audits. Built for Cloud teams doing continuous delivery.

AWS Terms and Conditions added a hugely important and much needed addition, §1.19 "We will not use Individualized Usage Data or Your Content to compete with your products and services." (added Jan 28)
aws.amazon.com/service-terms/
diffchecker.com/iXloQJqk

☁️ AWS Security Fundamentals
Self-paced course by @awscloud covering fundamental security concepts, including:
* Access control
* Data encryption
* And how network access to your AWS infrastructure can be secured
aws.amazon.com/training/digit…

Names are hard. Especially when you have as many services as Amazon. @QuinnyPig has been known to have opinions on this.
So when you have a good name, why only use it once? Here’s a list of names that Amazon has recycled for completely different services:

Happy ending: in fewer than three weeks, the CodeBuild service team rolled out a change to address this issue. I updated the linked blog with details.
I'm impressed. It was arguably a rather contrived "vulnerability", but they still did a good job of prioritising and fixing it.

Very short blog post (five paragraphs): AWS VPC data exfiltration via CodeBuild.
awsteele.com/blog/2022/02/0…

🛠️ New tool by @bridgecrewio: Whorf
A #Kubernetes Validating Admission Controller that uses Checkov as the core validator for Kubernetes manifests
Code: github.com/bridgecrewio/c…
Post by @_SteveGiguere_
bridgecrew.io/blog/whorf-the…


What is a technology that security people aren’t paying enough attention to that most security engineers will be forced to learn about in the next 5 years? For one reason or another.

We're partnering closely with Ukrainian IT organizations to disrupt attacks & help support Ukrainian people during this difficult time: aboutamazon.com/news/community…

AWS: "You should sign your container images"
Also AWS: "We don't support signing container images"
¯\_(ツ)_/¯ (feature request opened 3+ years ago)
aws.github.io/aws-eks-best-p…
github.com/aws/containers…

I’m getting LASIK tomorrow and I’m so fucking excited

The "nodes/proxy" permission in K8s is equivalent to cluster admin. Allows to directly hit the Kubelet, authenticated as a worker node itself, and bypass admission control + audit logs.
Now available in Stratus Red Team 1.6.0 to validate your detections! stratus-red-team.cloud/attack-techniq…


Todays blog is about the research I did with @smarticu5 on Kubernetes RBAC and node/proxy rights blog.aquasec.com/privilege-esca… with some ideas on how cluster operators can mitigate the risk if this is part of their threat model.
I understand I should be using Parameter Store or Secrets Manager to store my customers third-party API keys, but I haven't yet seen a good explanation why this is.
My DynamoDB tables are only able to be accessed by my Lambda API, and it uses Cognito JWT authentication to ensure …
I'm a total newbie in security and I'm wondering how can you protect yourself about loosing the control of your main cloud account.
I mean, an attacker is able to get your account credentials and remove your access to your account. Is it that even possible under normal circumstances?
How …
- 🖊️ This newsletter was forwarded to you? Subscribe here
- 📢 Promote your content with Sponsorship
- 💌 Want to suggest new content: contact me or reply to this email