August Recap: New AWS Delicate Permissions and Providers

As AWS continues to evolve, new providers and permissions are ceaselessly launched to boost performance and safety. This weblog supplies a complete recap of latest delicate permissions and providers added in August 2024. Our intention in sharing that is to flag a very powerful releases to maintain your eye on and replace your permissions and entry management insurance policies accordingly.

AWS CodePipeline

Service Kind: Growth & DevOps Instruments

Permission: OverrideStageCondition

  • Motion: Grants permission to renew the pipeline execution by overriding a situation in a stage
  • Mitre Tactic: Execution
  • Why it’s delicate:  Customers can override a lambda perform’s operation situation inside a pipeline. This might be used to permit deployment pipelines to proceed after they would in any other case be stopped, like persevering with to deploy weak software program after failed safety scans.

Amazon Elastic Container Registry (ECR)

Service Kind: Containers and Orchestration

Permission: PutAccountSetting

  • Motion: Permits modification of settings for the ECR account
  • Mitre Tactic: Protection Invasion
  • Why it’s delicate: Customers can change tag mutability, automated picture scanning, how scans are carried out (e.g. on push or manually), and encryption settings.

New Providers

AWS Parallel Computing Providers

Service Kind: Compute Providers

Permission: CreateComputeNodeGroup

  • Motion: Grants permission to create compute node teams
  • Mitre Tactic: Execution
  • Why it’s delicate: Customers can use an API parameter in calls to this permission which override the launch template AMI. By specifying a customized (probably malicious) AMI, an attacker may get arbitrary malicious code operating inside the node pool that processes jobs. 

Permission: UpdateComputeNodeGroup

  • Motion: Grants permission to replace compute node group properties
  • Mitre Tactic: Execution
  • Why it’s delicate: Customers can use an API parameter in calls to this permission which override the launch template AMI. By specifying a customized (probably malicious) AMI, an attacker may get arbitrary malicious code operating inside the node pool that processes jobs.

New Areas

Asia Pacific (Malaysia)

  • API title: ap-southeast-5
  • Availability zones: 3

Conclusion

Should you’re an AWS consumer, your cloud is at all times altering. This implies a always evolving assault floor so that you can safe. As new permissions are launched for pre-existing providers, by default, your customers acquire entry to that permission. If it’s a delicate permission, this may be dangerous.  Entry to delicate permissions ought to be restricted to solely these human and machine identities that want them.

To cut back the danger ensuing from new providers, your groups ought to replace any SCPs and IAM insurance policies used to limit entry to providers your groups aren’t utilizing.

Should you’re focused on managing delicate permissions and securing AWS providers effectively, look into our Cloud Permissions Firewall.

Recent articles