AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.
- Fall 2025 PCI DSS compliance package available nowby Tushar Jain on January 13, 2026 at 1:06 am
Amazon Web Services (AWS) is pleased to announce that two additional AWS services and one additional AWS Region have been added to the scope of our Payment Card Industry Data Security Standard (PCI DSS) certification: Newly added services: AWS Security Incident Response AWS Transform Newly added AWS Region: Asia Pacific (Taipei) This certification allows customers
- AWS named Leader in the 2025 ISG report for Sovereign Cloud Infrastructure Services (EU)by Brittany Bunch on January 9, 2026 at 4:11 pm
For the third year in a row, Amazon Web Services (AWS) is named as a Leader in the Information Services Group (ISG) Provider LensTM Quadrant report for Sovereign Cloud Infrastructure Services (EU), published on January 9, 2026. ISG is a leading global technology research, analyst, and advisory firm that serves as a trusted business partner
- Real-time malware defense: Leveraging AWS Network Firewall active threat defenseby Rahi Patel on January 8, 2026 at 4:01 pm
Cyber threats are evolving faster than traditional security defense can respond; workloads with potential security issues are discovered by threat actors within 90 seconds, with exploitation attempts beginning within 3 minutes. Threat actors are quickly evolving their attack methodologies, resulting in new malware variants, exploit techniques, and evasion tactics. They also rotate their infrastructure—IP addresses,
- Security Hub CSPM automation rule migration to Security Hubby Joe Wagner on December 17, 2025 at 9:06 pm
A new version of AWS Security Hub is now generally available with new capabilities to aggregate, correlate, and contextualize your security alerts across Amazon Web Services (AWS) accounts. The prior version is now known as AWS Security Hub CSPM and will continue to be available as a unique service focused on cloud security posture management
- GuardDuty Extended Threat Detection uncovers cryptomining campaign on Amazon EC2 and Amazon ECSby Kyle Koeller on December 16, 2025 at 10:12 pm
Amazon GuardDuty and our automated security monitoring systems identified an ongoing cryptocurrency (crypto) mining campaign beginning on November 2, 2025. The operation uses compromised AWS Identity and Access Management (IAM) credentials to target Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Compute Cloud (Amazon EC2). GuardDuty Extended Threat Detection was able to correlate signals
- What AWS Security learned from responding to recent npm supply chain threat campaignsby Nikki Pahliney on December 15, 2025 at 9:12 pm
AWS incident response operates around the clock to protect our customers, the AWS Cloud, and the AWS global infrastructure. Through that work, we learn from a variety of issues and spot unique trends. Over the past few months, high-profile software supply chain threat campaigns involving third party software repositories have highlighted the importance of protecting
- Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructureby CJ Moses on December 15, 2025 at 7:20 pm
As we conclude 2025, Amazon Threat Intelligence is sharing insights about a years-long Russian state-sponsored campaign that represents a significant evolution in critical infrastructure targeting: a tactical pivot where what appear to be misconfigured customer network edge devices became the primary initial access vector, while vulnerability exploitation activity declined. This tactical adaptation enables the same
- Implementing HTTP Strict Transport Security (HSTS) across AWS servicesby Abhishek Avinash Agawane on December 12, 2025 at 9:53 pm
Modern web applications built on Amazon Web Services (AWS) often span multiple services to deliver scalable, performant solutions. However, customers encounter challenges when implementing a cohesive HTTP Strict Transport Security (HSTS) strategy across these distributed architectures. Customers face fragmented security implementation challenges because different AWS services require distinct approaches to HSTS configuration, leading to inconsistent
- Meet digital sovereignty needs with AWS Dedicated Local Zones expanded servicesby Max Peterson on December 12, 2025 at 5:05 pm
At Amazon Web Services (AWS), we continue to invest in and deliver digital sovereignty solutions to help customers meet their most sensitive workload requirements. To address the regulatory and digital sovereignty needs of public sector and regulated industry customers, we launched AWS Dedicated Local Zones in 2023, with the Government Technology Agency of Singapore (GovTech
- Exploring the new AWS European Sovereign Cloud: Sovereign Reference Frameworkby Andreas Terwellen on December 11, 2025 at 9:59 pm
At Amazon Web Services, we’re committed to deeply understanding the evolving needs of both our customers and regulators, and rapidly adapting and innovating to meet them. The upcoming AWS European Sovereign Cloud will be a new independent cloud for Europe, designed to give public sector organizations and customers in highly regulated industries further choice to
- Embracing our broad responsibility for securing digital infrastructure in the European Unionby Ashley Lam on December 11, 2025 at 12:53 am
August 31, 2023: The date this blog post was first published. Over the past few decades, digital technologies have brought tremendous benefits to our societies, governments, businesses, and everyday lives. The increasing reliance on digital technologies comes with a broad responsibility for society, companies, and governments to ensure that security remains robust and uncompromising, regardless
- How to customize your response to layer 7 DDoS attacks using AWS WAF Anti-DDoS AMRby Achraf Souk on December 10, 2025 at 4:41 am
Over the first half of this year, AWS WAF introduced new application-layer protections to address the growing trend of short-lived, high-throughput Layer 7 (L7) distributed denial of service (DDoS) attacks. These protections are provided through the AWS WAF Anti-DDoS AWS Managed Rules (Anti-DDoS AMR) rule group. While the default configuration is effective for most workloads,
- IAM Policy Autopilot: An open-source tool that brings IAM policy expertise to builders and AI coding assistantsby Diana Yin on December 8, 2025 at 11:23 pm
Today, we’re excited to announce IAM Policy Autopilot, an open-source static analysis tool that helps your AI coding assistants quickly create baseline AWS Identity and Access Management (IAM) policies that you can review and refine as your application evolves. IAM Policy Autopilot is available as a command-line tool and Model Context Protocol (MCP) server, and
- AWS launches AI-enhanced security innovations at re:Invent 2025by Lise Feng on December 8, 2025 at 6:41 pm
At re:Invent 2025, AWS unveiled its latest AI- and automation-enabled innovations to strengthen cloud security for customers to grow their business. Organizations are likely to increase security spending from $213 billion in 2025 to $377 billion by 2028 as they adopt generative AI. This 77% increase highlights the importance organizations place on securing their AI
- China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)by CJ Moses on December 5, 2025 at 12:18 am
December 29, 2025: The blog post was updated to add options for AWS Network Firewall. December 12, 2025: The blog post was updated to clarify when customers need to update their ReactJS version. Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active exploitation attempts by
- AWS Private Certificate Authority now supports partitioned CRLsby Kartik Bhatnagar on November 26, 2025 at 8:58 pm
Public Key Infrastructure (PKI) is essential for securing and establishing trust in digital communications. As you scale your digital operations, you’ll issue and revoke certificates. Revoking certificates is useful especially when employees leave, migrate to a new certificate authority hierarchy, meet compliance, and respond to security incidents. Use the Certificate Revocation List (CRL) or Online
- How to use the Secrets Store CSI Driver provider Amazon EKS add-on with Secrets Managerby Angad Misra on November 26, 2025 at 6:54 pm
In this post, we introduce the AWS provider for the Secrets Store CSI Driver, a new AWS Secrets Manager add-on for Amazon Elastic Kubernetes Service (Amazon EKS) that you can use to fetch secrets from Secrets Manager and parameters from AWS Systems Manager Parameter Store and mount them as files in Kubernetes pods. The add-on
- AWS Secrets Manager launches Managed External Secrets for Third-Party Credentialsby Rohit Panjala on November 25, 2025 at 11:02 pm
Although AWS Secrets Manager excels at managing the lifecycle of Amazon Web Services (AWS) secrets, managing credentials from third-party software providers presents unique challenges for organizations as they scale usage of their cloud applications. Organizations using multiple third-party services frequently develop different security approaches for each provider’s credentials because there hasn’t been a standardized way
- Introducing guidelines for network scanningby Stephen Goodman on November 25, 2025 at 6:11 pm
Amazon Web Services (AWS) is introducing guidelines for network scanning of customer workloads. By following these guidelines, conforming scanners will collect more accurate data, minimize abuse reports, and help improve the security of the internet for everyone. Network scanning is a practice in modern IT environments that can be used for either legitimate security needs
- Practical steps to minimize key exposure using AWS Security Servicesby Jennifer Paz on November 21, 2025 at 9:07 pm
Exposed long-term credentials continue to be the top entry point used by threat actors in security incidents observed by the AWS Customer Incident Response Team (CIRT). The exposure and subsequent use of long-term credentials or access keys by threat actors poses security risks in cloud environments. Additionally, poor key rotation practices, sharing of access keys























