AWS Launches Improvements for Key Quarantine Policy
Blog post from Sysdig
AWS has recently expanded its AWSCompromisedKeyQuarantine policies to counteract the misuse of compromised access keys by adding approximately 29 new restricted actions, including those related to AWS Bedrock, Amplify, CodeBuild, Sagemaker, and ECS services. This enhancement is part of AWS's ongoing efforts to mitigate threats such as LLMjacking, AMBERSQUID, and ECS-based cryptomining, where attackers exploit compromised credentials to conduct unauthorized activities. The policy changes aim to prevent the abuse of lesser-known AWS services, which can be less visible and therefore more appealing to attackers. However, these protections apply only to keys that AWS suspects are compromised, underscoring the importance of vigilant credential management and monitoring for organizations to safeguard against potential abuses.