As AWS continues to evolve, new providers and permissions are ceaselessly launched to boost performance and safety. This weblog supplies a complete recap of latest delicate permissions and providers added in August 2024. Our intention in sharing that is to flag a very powerful releases to maintain your eye on and replace your permissions and entry management insurance policies accordingly.
AWS CodePipeline
Service Kind: Growth & DevOps Instruments
Permission: OverrideStageCondition
- Motion: Grants permission to renew the pipeline execution by overriding a situation in a stage
- Mitre Tactic: Execution
- Why it’s delicate: Customers can override a lambda perform’s operation situation inside a pipeline. This might be used to permit deployment pipelines to proceed after they would in any other case be stopped, like persevering with to deploy weak software program after failed safety scans.
Amazon Elastic Container Registry (ECR)
Service Kind: Containers and Orchestration
Permission: PutAccountSetting
- Motion: Permits modification of settings for the ECR account
- Mitre Tactic: Protection Invasion
- Why it’s delicate: Customers can change tag mutability, automated picture scanning, how scans are carried out (e.g. on push or manually), and encryption settings.
New Providers
AWS Parallel Computing Providers
Service Kind: Compute Providers
Permission: CreateComputeNodeGroup
- Motion: Grants permission to create compute node teams
- Mitre Tactic: Execution
- Why it’s delicate: Customers can use an API parameter in calls to this permission which override the launch template AMI. By specifying a customized (probably malicious) AMI, an attacker may get arbitrary malicious code operating inside the node pool that processes jobs.Â
Permission: UpdateComputeNodeGroup
- Motion: Grants permission to replace compute node group properties
- Mitre Tactic: Execution
- Why it’s delicate: Customers can use an API parameter in calls to this permission which override the launch template AMI. By specifying a customized (probably malicious) AMI, an attacker may get arbitrary malicious code operating inside the node pool that processes jobs.
New Areas
Asia Pacific (Malaysia)
- API title: ap-southeast-5
- Availability zones: 3
Conclusion
Should you’re an AWS consumer, your cloud is at all times altering. This implies a always evolving assault floor so that you can safe. As new permissions are launched for pre-existing providers, by default, your customers acquire entry to that permission. If it’s a delicate permission, this may be dangerous. Entry to delicate permissions ought to be restricted to solely these human and machine identities that want them.
To cut back the danger ensuing from new providers, your groups ought to replace any SCPs and IAM insurance policies used to limit entry to providers your groups aren’t utilizing.
Should you’re focused on managing delicate permissions and securing AWS providers effectively, look into our Cloud Permissions Firewall.