AWS Security

AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.

  • How to use the Secrets Store CSI Driver provider Amazon EKS add-on with Secrets Manager
    by Angad Misra on November 26, 2025 at 6:54 pm

    In this post, we introduce the AWS provider for the Secrets Store CSI Driver, a new AWS Secrets Manager add-on for Amazon Elastic Kubernetes Service (Amazon EKS) that you can use to fetch secrets from Secrets Manager and parameters from AWS Systems Manager Parameter Store and mount them as files in Kubernetes pods. The add-on

  • AWS Secrets Manager launches Managed External Secrets for Third-Party Credentials
    by Rohit Panjala on November 25, 2025 at 11:02 pm

    Although AWS Secrets Manager excels at managing the lifecycle of Amazon Web Services (AWS) secrets, managing credentials from third-party software providers presents unique challenges for organizations as they scale usage of their cloud applications. Organizations using multiple third-party services frequently develop different security approaches for each provider’s credentials because there hasn’t been a standardized way

  • Introducing guidelines for network scanning
    by Stephen Goodman on November 25, 2025 at 6:11 pm

    Amazon Web Services (AWS) is introducing guidelines for network scanning of customer workloads. By following these guidelines, conforming scanners will collect more accurate data, minimize abuse reports, and help improve the security of the internet for everyone. Network scanning is a practice in modern IT environments that can be used for either legitimate security needs

  • Practical steps to minimize key exposure using AWS Security Services
    by Jennifer Paz on November 21, 2025 at 9:07 pm

    Exposed long-term credentials continue to be the top entry point used by threat actors in security incidents observed by the AWS Customer Incident Response Team (CIRT). The exposure and subsequent use of long-term credentials or access keys by threat actors poses security risks in cloud environments. Additionally, poor key rotation practices, sharing of access keys

  • Accelerate investigations with AWS Security Incident Response AI-powered capabilities
    by Daniel Begimher on November 21, 2025 at 6:47 pm

    If you’ve ever spent hours manually digging through AWS CloudTrail logs, checking AWS Identity and Access Management (IAM) permissions, and piecing together the timeline of a security event, you understand the time investment required for incident investigation. Today, we’re excited to announce the addition of AI-powered investigation capabilities to AWS Security Incident Response that automate

  • The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems
    by Aaron Brown on November 21, 2025 at 3:01 pm

    As generative AI became mainstream, Amazon Web Services (AWS) launched the Generative AI Security Scoping Matrix to help organizations understand and address the unique security challenges of foundation model (FM)-based applications. This framework has been adopted not only by AWS customers across the globe, but also widely referenced by organizations such as OWASP, CoSAI, and

  • Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
    by Kevin Donohue on November 20, 2025 at 10:55 pm

    We’re pleased to announce the availability of the latest sample security baseline from Landing Zone Accelerator on AWS (LZA)—the Universal Configuration. Developed from years of field experience with highly regulated customers including governments across the world, and in consultation with AWS Partners and industry experts, the Universal Configuration was built to help you implement security

  • Transfer data across AWS partitions with IAM Roles Anywhere
    by Jenn Reed on November 20, 2025 at 7:41 pm

    Transfer across AWS Cloud partitions. Different identity planes. Long-lived IAM user credentials. As an enterprise customer, you might need to bring together security, operational, and compliance data from multiple AWS partitions. Creating a holistic view of these types of data is critical to support operations and applications but understanding how to accomplish this while maintaining

  • How to update CRLs without public access using AWS Private CA
    by Rochak Karki on November 20, 2025 at 5:05 pm

    Certificates and the hierarchy of trust they create are the backbone of a secure infrastructure. AWS Private Certificate Authority is a highly available certificate authority (CA) that you can use to create private CA hierarchies, secure your applications and devices with private certificates, and manage certificate lifecycles. A certificate revocation list (CRL) is a file

  • Simplified developer access to AWS with ‘aws login’
    by Shreya Jain on November 19, 2025 at 10:59 pm

    Getting credentials for local development with AWS is now simpler and more secure. A new AWS Command Line Interface (AWS CLI) command, aws login, lets you start building immediately after signing up for AWS without creating and managing long-term access keys. You use the same sign-in method you already use for the AWS Management Console.

  • AWS designated as a critical third-party provider under EU’s DORA regulation
    by Andrew Vennekotter on November 19, 2025 at 10:42 pm

    Amazon Web Services has been designated as a critical third-party provider (CTPP) by the European Supervisory Authorities (ESAs) under the European Union’s Digital Operational Resilience Act (DORA). This designation is a key milestone in the EU’s implementation of DORA, which took effect in January 2025 and aims to strengthen the operational resilience of the EU

  • Simplify cloud security with managed rules from AWS Marketplace for AWS Network Firewall
    by Dhanil Parwani on November 19, 2025 at 8:06 pm

    AWS Network Firewall now supports managed rules curated by AWS Partners—giving you pre-built threat intelligence and security controls that reduce the need to create and maintain your own rule sets. This new capability helps organizations strengthen their network security posture with continuously updated AWS partner managed protection. What are managed rules from AWS Marketplace for

  • New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
    by CJ Moses on November 19, 2025 at 6:18 pm

    The new threat landscape The line between cyber warfare and traditional kinetic operations is rapidly blurring. Recent investigations by Amazon threat intelligence teams have uncovered a new trend that they’re calling cyber-enabled kinetic targeting in which nation-state threat actors systematically use cyber operations to enable and enhance physical operations. Traditional cybersecurity frameworks often treat digital

  • Analyze AWS Network Firewall logs using Amazon OpenSearch dashboard
    by Hoorang Broujerdi on November 18, 2025 at 10:19 pm

    Amazon CloudWatch and Amazon OpenSearch Service have launched a new dashboard that simplifies the analysis of AWS Network Firewall logs. Previously, in our blog post How to analyze AWS Network Firewall logs using Amazon OpenSearch Service we demonstrated the required services and steps to create an OpenSearch dashboard. The new dashboard removes these extra steps

  • How to automate Session Manager preferences across your organization
    by Nima Fotouhi on November 18, 2025 at 5:23 pm

    AWS Systems Manager Session Manager is a fully managed service that provides secure, interactive, one-click access to your Amazon Elastic Compute Cloud (Amazon EC2) instances, edge devices, and virtual machines (VMs) through a browser-based shell or AWS Command Line Interface (AWS CLI), without requiring open inbound ports, bastion hosts, or SSH keys. Session Manager helps

  • Post-quantum (ML-DSA) code signing with AWS Private CA and AWS KMS
    by Panos Kampanakis on November 17, 2025 at 7:40 pm

    Following our recent announcement of ML-DSA support in AWS Key Management Service (AWS KMS), we just introduced post-quantum ML-DSA signature support in AWS Private Certificate Authority (AWS Private CA). Customers can use AWS Private CA to create and manage their own private public key infrastructure (PKI) hierarchies. Through this integration, you can establish and use

  • AWS re:Invent 2025: Your guide to security sessions across four transformative themes
    by Rahul Sahni on November 14, 2025 at 7:27 pm

    AWS re:Invent 2025, the premier cloud computing conference hosted by Amazon Web Services (AWS), returns to Las Vegas, Nevada, December 1–5, 2025. At AWS, security is our top priority, and re:Invent 2025 reflects this commitment with our most comprehensive security track to date. With more than 80 security aligned sessions spanning breakouts, workshops, chalk talks,

  • Amazon Inspector detects over 150,000 malicious packages linked to token farming campaign
    by Chi Tran on November 14, 2025 at 12:15 am

    Amazon Inspector security researchers have identified and reported over 150,000 packages linked to a coordinated tea.xyz token farming campaign in the npm registry. This is one of the largest package flooding incidents in open source registry history, and represents a defining moment in supply chain security, far surpassing the initial 15,000 packages reported by Sonatype

  • Amazon Elastic Kubernetes Service gets independent affirmation of its zero operator access design
    by Manuel Mazarredo on November 12, 2025 at 6:31 pm

    Today, we’re excited to announce the independent affirmation of our Amazon Elastic Kubernetes Service (Amazon EKS) zero operator access posture. Because security is our top priority at Amazon Web Services (AWS), we designed an operational architecture to meet the data privacy posture our regulated and most stringent customers want in a managed Kubernetes service, giving

  • Amazon discovers APT exploiting Cisco and Citrix zero-days
    by CJ Moses on November 12, 2025 at 2:01 pm

    The Amazon threat intelligence teams have identified an advanced threat actor exploiting previously undisclosed zero-day vulnerabilities in Cisco Identity Service Engine (ISE) and Citrix systems. The campaign used custom malware and demonstrated access to multiple undisclosed vulnerabilities. This discovery highlights the trend of threat actors focusing on critical identity and network access control infrastructure—the systems

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.