AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.
- New AWS whitepaper: Security Overview of Amazon EKS Auto Modeby Todd Neal on October 7, 2025 at 4:57 pm
Amazon Web Services (AWS) has released a new whitepaper: Security Overview of Amazon EKS Auto Mode, providing customers with an in-depth look at the architecture, built-in security features, and capabilities of Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode. The whitepaper covers the core security principles of Amazon EKS Auto Mode, highlighting its unique approach
- Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud wormby Chi Tran on October 2, 2025 at 4:43 pm
Building on top of open source packages can help accelerate development. By using common libraries and modules from npm, PyPI, Maven Central, NuGet, and others, teams can focus on writing code that is unique to their situation. These open source package registries host millions of packages that are integrated into thousands of programs daily. Unfortunately,
- Defending LLM applications against Unicode character smugglingby Russell Dranch on September 30, 2025 at 4:22 pm
When interacting with AI applications, even seemingly innocent elements—such as Unicode characters—can have significant implications for security and data integrity. At Amazon Web Services (AWS), we continuously evaluate and address emerging threats across aspects of AI systems. In this blog post, we explore Unicode tag blocks, a specific range of characters spanning from U+E0000 to
- Build secure network architectures for generative AI applications using AWS servicesby Joydipto Banerjee on September 29, 2025 at 7:11 pm
As generative AI becomes foundational across industries—powering everything from conversational agents to real-time media synthesis—it simultaneously creates new opportunities for bad actors to exploit. The complex architectures behind generative AI applications expose a large surface area including public-facing APIs, inference services, custom web applications, and integrations with cloud infrastructure. These systems are not immune to
- How to develop an AWS Security Hub POCby Shahna Campbell on September 26, 2025 at 4:22 pm
The enhanced AWS Security Hub (currently in public preview) prioritizes your critical security issues and helps you respond at scale to protect your environment. It detects critical issues by correlating and enriching signals into actionable insights, enabling streamlined response. You can use these capabilities to gain visibility across your cloud environment through centralized management in
- Enabling AI adoption at scale through enterprise risk management framework – Part 2by Milind Dabhole on September 25, 2025 at 6:21 pm
In Part 1 of this series, we explored the fundamental risks and governance considerations. In this part, we examine practical strategies for adapting your enterprise risk management framework (ERMF) to harness generative AI’s power while maintaining robust controls. This part covers: Adapting your ERMF for the cloud Adapting your ERMF for generative AI Sustainable Risk
- Enabling AI adoption at scale through enterprise risk management framework – Part 1by Milind Dabhole on September 25, 2025 at 6:20 pm
According to BCG research, 84% of executives view responsible AI as a top management responsibility, yet only 25% of them have programs that fully address it. Responsible AI can be achieved through effective governance, and with the rapid adoption of generative AI, this governance has become a business imperative, not just an IT concern. By
- Optimize security operations with AWS Security Incident Responseby Kyle Shields on September 23, 2025 at 10:09 pm
Security threats demand swift action, which is why AWS Security Incident Response delivers AWS-native protection that can immediately strengthen your security posture. This comprehensive solution combines automated triage and evaluation logic with your security perimeter metadata to identify critical issues, seamlessly bringing in human expertise when needed. When Security Incident Response is integrated with Amazon
- Minimize risk through defense in depth: Building a comprehensive AWS control frameworkby Luis Pastor on September 23, 2025 at 4:13 pm
Security and governance teams across all environments face a common challenge: translating abstract security and governance requirements into a concrete, integrated control framework. AWS services provide capabilities that organizations can use to implement controls across multiple layers of their architecture—from infrastructure provisioning to runtime monitoring. Many organizations deploy multi-account environments with AWS Control Tower, or
- How to accelerate security finding reviews using automated business context validation in AWS Security Hub CSPMby Reetesh Surjani on September 22, 2025 at 10:59 pm
October 1, 2025: This post was updated to reflect the new name of Security Hub, which is AWS Security Hub CSPM (Cloud Security Posture Management). Security teams must efficiently validate and document exceptions to AWS Security Hub (Cloud Security Posture Management, previously known as Security Hub) findings, while maintaining proper governance. Enterprise security teams need
- Unlock new possibilities: AWS Organizations service control policy now supports full IAM languageby Swara Gandhi on September 19, 2025 at 5:50 pm
Amazon Web Service (AWS) recently announced that AWS Organizations now offers full AWS Identity and Access Management (IAM) policy language support for service control policies (SCPs). With this feature, you can use conditions, individual resource Amazon Resource Names (ARNs), and the NotAction element with Allow statements. Additionally, you can now use wildcards at the beginning or middle of
- Summer 2025 SOC 1 report is now available with 183 services in scopeby Tushar Jain on September 19, 2025 at 4:28 pm
Amazon Web Services (AWS) is pleased to announce that the Summer 2025 System and Organization Controls (SOC) 1 report is now available. The report covers 183 services over the 12-month period from July 1, 2024 to June 30, 2025, giving customers a full year of assurance. The reports demonstrate our continuous commitment to adhering to the
- Authorizing access to data with RAG implementationsby Riggs Goodman III on September 18, 2025 at 11:27 pm
Organizations are increasingly using large language models (LLMs) to provide new types of customer interactions through generative AI-powered chatbots, virtual assistants, and intelligent search capabilities. To enhance these interactions, organizations are using Retrieval-Augmented Generation (RAG) to incorporate proprietary data, industry-specific knowledge, and internal documentation to provide more accurate, contextual responses. With RAG, LLMs use an
- Enhance TLS inspection with SNI session holding in AWS Network Firewallby Amit Gaur on September 17, 2025 at 9:03 pm
AWS Network Firewall is a managed firewall service that filters and controls network traffic in Amazon Virtual Private Cloud (Amazon VPC). Unlike traditional network controls such as security groups or network access control lists (NACLs), Network Firewall can inspect and make decisions based on information from higher layers of the OSI model, including the Transport
- How we built a flywheel to steadily improve security for Amazon RDSby Joshua Brindle on September 17, 2025 at 7:07 pm
I joined Amazon Web Services (AWS) as a principal security engineer 3 years ago and my first project was leading security for PL/Rust on Amazon Relational Database Service (Amazon RDS). This is an extension that lets you write custom functions for PostgreSQL in Rust, which are then compiled to native machine code. These functions can
- 2025 ISO and CSA STAR certificates now available with two additional servicesby Chinmaee Parulekar on September 17, 2025 at 3:21 pm
Amazon Web Services (AWS) successfully completed an onboarding audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. EY CertifyPoint auditors conducted the audit and reissued the certificates on August 13, 2025. The objective of the audit was to enable
- Automate OIDC client secret rotation with Application Load Balancerby Kani Murugan on September 17, 2025 at 3:55 am
Elastic Load Balancing simplifies authentication by offloading it to OpenID Connect (OIDC) compatible identity providers (IdPs). This lets builders focus on application logic while using robust identity management. OIDC client secrets are confidential credentials used in OAuth 2.0 and OIDC protocols for authenticating clients (applications). However, manual management of OIDC client secrets introduces security risks
- Multi-Region keys: A new approach to key replication in AWS Payment Cryptographyby Ruy Cavalcanti on September 16, 2025 at 7:44 pm
In our previous blog post (Part 1 of our key replication series), Automatically replicate your card payment keys across AWS Regions, we explored an event-driven, serverless architecture using AWS PrivateLink to securely replicate card payment keys across AWS Regions. That solution demonstrated how to build a custom replication framework for payment cryptography keys. Based on
- OSPAR 2025 report now available with 170 services in scope based on the newly enhanced OSPAR v2.0 guidelinesby Joseph Goh on September 16, 2025 at 3:16 pm
We’re pleased to announce the completion of our annual AWS Outsourced Service Provider’s Audit Report (OSPAR) audit cycle on August 7, 2025, based on the newly enhanced version 2.0 guidelines (OSPAR v2.0). AWS is the first global cloud service provider in Singapore to obtain the report using the new OSPAR v2.0 guidelines. The Association of
- Navigating Amazon GuardDuty protection plans and Extended Threat Detectionby Nisha Amthul on September 15, 2025 at 7:56 pm
Organizations are innovating and growing their cloud presence to deliver better customer experiences and drive business value. To support and protect this growth, organizations can use Amazon GuardDuty, a threat detection service that continuously monitors for malicious activity and unauthorized behavior across your AWS environment. GuardDuty uses artificial intelligence (AI), machine learning (ML), and anomaly