July Recap: New AWS Services and Privileged Permissions
2025年7月AWS推出多项新服务及特权权限,包括Amazon Bedrock、Oracle Database@AWS、S3 Vectors和SageMaker等,新增功能涉及自动化、模型部署及网络管理,但也带来潜在的特权提升、横向移动及持续访问风险。这些变化要求持续监控和严格治理以应对云安全挑战。
2025-8-4 09:0:54
Author: securityboulevard.com(查看原文)
阅读量:13
收藏
As July 2025 winds down, we’re back with this month’s roundup of newly released AWS privileged permissions — and this time, several new services have made their debut, each arriving with permissions that could reshape your cloud security boundaries. This month introduces fresh capabilities in Amazon Bedrock, Oracle Database@AWS, S3 Vectors, and SageMaker, all of which bring powerful automation, model deployment, and networking features — and with them, new opportunities for privilege escalation, lateral movement, and persistent access. Whether it’s launching custom runtimes, manipulating gateway roles, or altering encryption key control, these new permissions underscore the need for continuous visibility and tight governance. Dive in to see what’s new — and how to stay ahead of the risk.
New Services with Privileged Permissions
Amazon WorkSpaces Instances
Service Type: Compute Services
Permission: workspaces-instances:AssociateVolume
Action: Grants permission to associate a workspace managed volume to a workspace managed instance in your account
Mitre Tactic: Privilege Escalation
Why it’s privileged: Attaches storage volumes to WorkSpaces instances, enabling access to additional or sensitive data.
Oracle Database@AWS
Service Type: Database Services
Permission: odb:CreateOdbNetwork
Action: Grants permission to create an ODB network
Mitre Tactic: Privilege Escalation
Why it’s privileged: Creates ODB networks with embedded S3 access policies, enabling privilege escalation through custom configurations.
Permission: odb:CreateOdbPeeringConnection
Action: Grants permission to create an ODB Peering Connection
Mitre Tactic: Lateral Movement
Why it’s privileged: Creates peering connections between ODB networks or VPCs, enabling lateral movement across environments.
Permission: odb:UpdateOdbNetwork
Action: Grants permission to update properties of a specified ODB network
Action: Grants permission to disassociate availability zones to a firewall
Mitre Tactic: Defense Evasion
Why it’s privileged: Disables Network Firewall in specific AZs, enabling defense evasion by removing protections in targeted regions.
Conclusion
As AWS introduces new services and expands capabilities across its ecosystem, the security implications of newly released permissions continue to grow. July’s updates — from deploying arbitrary runtime containers in Bedrock to reshaping access control in ODB networks and vector buckets — highlight how privileged permissions can silently redefine control boundaries, data access, and execution pathways in your cloud environment.
Sonrai Security’s Cloud Permissions Firewall delivers the visibility and control teams need to get ahead of these risks. With automated detection of high-risk permissions, enforcement of least privilege, and cloud-native Privileged Access Management tailored for AWS, we help organizations adapt as fast as AWS evolves. Because in the cloud, new permissions arrive every month — and staying secure means staying proactive.