Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

AWS Launches Improvements for Key Quarantine Policy

Blog post from Sysdig

Post Details
Company
Date Published
Author
Michael Clark
Word Count
578
Language
English
Hacker News Points
-
Summary

AWS has recently expanded its AWSCompromisedKeyQuarantine policies to counteract the misuse of compromised access keys by adding approximately 29 new restricted actions, including those related to AWS Bedrock, Amplify, CodeBuild, Sagemaker, and ECS services. This enhancement is part of AWS's ongoing efforts to mitigate threats such as LLMjacking, AMBERSQUID, and ECS-based cryptomining, where attackers exploit compromised credentials to conduct unauthorized activities. The policy changes aim to prevent the abuse of lesser-known AWS services, which can be less visible and therefore more appealing to attackers. However, these protections apply only to keys that AWS suspects are compromised, underscoring the importance of vigilant credential management and monitoring for organizations to safeguard against potential abuses.