Jan Recap: New AWS Privileged Permissions and Services
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读这篇文章,了解主要内容。
这篇文章是关于AWS在2026年1月新增的权限变化,特别是集中在网络、流量控制和协作服务方面。提到了AWS Network Firewall、Route 53 Global Resolver、EC2网络控制以及跨账户数据协作等服务的新权限。这些权限允许重新路由流量、削弱过滤、扩大网络覆盖范围以及暴露共享数据。
文章还指出,这些权限强化了云安全的一个关键现实:特权不仅存在于身份策略中,还存在于路由决策和配置层中。安全团队需要保持警惕,因为这些非显式的特权正在通过原本用于保护系统的控制措施重新定义云攻击面。
接下来,我需要将这些信息浓缩到100字以内。要抓住主要点:时间(2026年1月)、新增权限的影响(扩大特权)、涉及的服务(网络防火墙、Route 53、EC2等)、特权的位置(路由和配置层)、以及对安全团队的要求(保持警惕)。
可能的结构是:时间+新增权限+影响+涉及的服务+特权位置+安全建议。这样就能在有限的字数内传达核心信息。
最后,检查一下是否符合用户的要求:中文总结,不使用特定开头,控制在100字以内。确保语言简洁明了。
</think>
2026年1月,AWS新增多项权限,集中在网络防火墙、Route 53解析器、EC2网络控制及跨账户协作服务中。这些权限允许重新路由流量、削弱过滤机制、扩大网络覆盖范围并暴露共享数据。特权不再局限于身份策略,而是深入到路由决策与配置层中。安全团队需警惕这些变化对云攻击面的影响,并持续监控潜在风险。
2026-2-3 08:40:17
Author: securityboulevard.com(查看原文)
阅读量:4
收藏
As January 2026 comes to a close, Sonrai’s latest review of newly released AWS permissions highlights a sharp expansion of privilege concentrated in networking, traffic control, and collaboration services. This month’s updates focus heavily on AWS Network Firewall, Route 53 Global Resolver, EC2 networking controls, and cross-account data collaboration, introducing new ways to reroute traffic, weaken filtering, expand network reach, and expose shared data.
Taken together, these permissions reinforce a critical cloud security reality: privilege increasingly lives in routing decisions and configuration layers, not just identity policies. From bypassing DNS and proxy-based protections to expanding access across VPCs and external accounts, each change subtly reshapes trust boundaries and increases the blast radius of misuse. Security teams must stay vigilant, as these non-obvious privileges continue to redefine the cloud attack surface through the very controls meant to secure it.
Action: Grants permission to update a change request in a collaboration
Mitre Tactic: Exfiltration
Why it’s privileged: Allows approving or modifying change requests that expand what external AWS accounts can do within a collaboration, potentially granting access to additional data through analysis templates.
AWS Network Firewall
Service Type: Security Services
Permission: network-firewall:UpdateProxyRule
Action: Grants permission to update an existing proxy rule on a proxy rule group
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows modification of proxy rules designed to block malicious or unauthorized traffic, potentially permitting traffic that would otherwise be filtered.
Action: Grants permission to attach proxy rule groups to a proxy configuration
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows attaching rule groups with broad allow rules early in a proxy configuration, potentially permitting malicious traffic to bypass filtering.
Action: Grants permission to modify rule group priorities on a proxy configuration
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows reordering rule groups so broad allow rules are evaluated first, enabling traffic to bypass filtering and permitting otherwise blocked connections.
Permission: network-firewall:CreateProxyRules
Action: Grants permission to add proxy rules to a proxy rule group
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows inserting explicit allow or deny rules ahead of existing filters, potentially preempting protections and permitting unauthorized traffic.
Action: Grants permission to update proxy rule priorities within a proxy rule group
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows reordering proxy rules so broad allow rules are evaluated first, enabling traffic to bypass existing filtering controls.
Permission: network-firewall:DeleteProxyRules
Action: Grants permission to remove proxy rules from a proxy rule group
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows removal of proxy rules designed to filter malicious or unauthorized traffic, weakening network security controls.
Permission: network-firewall:UpdateProxy
Action: Grants permission to modify a proxy
Mitre Tactic: Impact
Why it’s privileged: Allows removing or altering proxy listeners, causing network traffic to fail and preventing clients from establishing connections.
Amazon EC2
Service Type: Compute Services
Permission: ec2:ModifyVpcEncryptionControl
Action: Grants permission to modify an existing VPC Encryption Control
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows weakening or disabling enforcement of VPC traffic encryption by switching controls to monitor mode, reducing protection of network traffic and potentially disrupting encryption guarantees.
Permission: ec2:ModifyIpamPrefixListResolver
Action: Grants permission to modify an IPAM prefix list resolver
Mitre Tactic: Lateral Movement
Why it’s privileged: Allows expanding the CIDR ranges resolved by a prefix list, potentially broadening network access to sensitive resources protected by security group rules.
Permission: ec2:DeleteVpcEncryptionControl
Action: Grants permission to delete a VPC Encryption Control
Mitre Tactic: Defense Evasion
Why it’s privileged: Removes controls that enforce VPC traffic encryption, eliminating safeguards that protect network traffic confidentiality.
Action: Grants permission to create an IPAM prefix list resolver target that links a resolver to a managed prefix list
Mitre Tactic: Lateral Movement
Why it’s privileged: Allows forcing a prefix list to sync with an empty or permissive resolver, effectively wiping enforced network restrictions and expanding communication between resources or VPCs.
AWS CloudWatch Logs
Service Type: Observability and Monitoring
Permission: logs:CreateImportTask
Action: Grants permission to start an asynchronous process to import data from a CloudTrail Lake event data store into a managed log group in CloudWatch
Mitre Tactic: Collection
Why it’s privileged: Allows importing CloudTrail data into CloudWatch using a passed role, enabling collection of log data that the caller may not otherwise have direct access to.
Amazon API Gateway
Service Type: Compute Services
Permission: apigateway:UpdatePortal
Action: Grants permission to update a portal
Mitre Tactic: Persistence
Why it’s privileged: Allows disabling authorization controls on the portal, exposing internal API documentation to the public and enabling persistent unauthorized access.
Action: Grants permission to put a portal product sharing policy
Mitre Tactic: Persistence
Why it’s privileged: Allows making an API Gateway portal accessible from another AWS account, enabling persistent external access to potentially internal API documentation.
Amazon Connect
Service Type: Customer Engagement
Permission: connect:DisassociateEmailAddressAlias
Action: Grants permission to disassociate an alias from an email address resource in an Amazon Connect instance
Mitre Tactic: Impact
Why it’s privileged: Allows removal of email address aliases used for routing or identification, disrupting email-based contact handling and potentially impacting business communications or workflows.
Permission: connect:AssociateEmailAddressAlias
Action: Grants permission to associate an alias with an email address resource in an Amazon Connect instance
Mitre Tactic: Exfiltration
Why it’s privileged: Allows routing or duplicating email communications through additional aliases, potentially enabling interception or unauthorized exposure of sensitive customer messages.
Amazon CloudFront
Service Type: Networking and Content Delivery
Permission: cloudfront:DeleteResourcePolicy
Action: Grants permission to delete a resource’s policy document
Mitre Tactic: Impact
Why it’s privileged: Allows removal of resource-based access controls for CloudFront resources, causing severe disruption to content delivery and access enforcement.
Permission: cloudfront:PutResourcePolicy
Action: Grants permission to update or create a resource’s policy document
Mitre Tactic: Persistence
Why it’s privileged: Allows adding or modifying resource-based policies to grant or maintain access to CloudFront resources, enabling persistent control over content delivery access.
Amazon Bedrock
Service Type: Artificial Intelligence & Machine Learning
Action: Grants permission to delete account-level enforced guardrail configuration
Mitre Tactic: Impact
Why it’s privileged: Allows removal of enforced guardrails across the account, eliminating safety and policy controls and potentially disrupting or exposing downstream AI workloads.
Action: Grants permission to put an attachment routing policy label
Mitre Tactic: Lateral Movement
Why it’s privileged: Allows associating routing policies that enable broader prefix propagation, granting compromised attachments access to network segments or prefixes that were previously unreachable.
Why it’s privileged: Allows removal of labels that enforce strict routing policies, potentially eliminating network segmentation controls and enabling movement between previously isolated environments.
AWS Launch Wizard
Service Type: Infrastructure Management
Permission: launchwizard:UpdateDeployment
Action: Grants permission to update a deployment
Mitre Tactic: Credential Access
Why it’s privileged: Allows modifying deployment parameters to change credentials for underlying application databases, enabling unauthorized credential access or takeover.
Action: Grants permission to create an access source
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows remapping CIDR ranges between DNS views with different firewall policies, enabling DNS queries from the CIDR range to bypass stricter filtering rules.
Action: Grants permission to import firewall domains from an S3 bucket
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows tampering with domain lists used by firewall rules, potentially permitting DNS traffic that would otherwise be filtered or blocked.
Action: Grants permission to update an access source
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows remapping CIDR ranges between DNS views with different firewall policies, enabling DNS queries to bypass stricter filtering rules.
Permission: route53globalresolver:UpdateDNSView
Action: Grants permission to update a dns view
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows disabling or weakening security settings such as DNSSEC validation, enabling tampering with DNS responses and bypassing DNS integrity protections.
Action: Grants permission to update firewall domains
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows modification of domain lists used by DNS firewall rules, potentially permitting DNS traffic that would otherwise be blocked or filtered.
Action: Grants permission to update a firewall rule
Mitre Tactic: Defense Evasion
Why it’s privileged: Allows changing deny rules into allow rules, permitting DNS traffic that would otherwise be filtered or blocked.
AWS MCP Server
Service Type: Artificial Intelligence and Machine Learning
Permission: aws-mcp:CallReadWriteTool
Action: Grants permission to call AWS read and write APIs in MCP service
Mitre Tactic: Impact
Why it’s privileged: Allows invoking AWS APIs via the MCP server, enabling unintended or malicious execution of AWS actions if the tool is triggered without explicit user intent.
AWS PricingPlanManager Service
Service Type: Subscription Management
No privileged permissions
AWS Compute Optimizer
Service Type: Compute Services
No privileged permissions
Amazon Nova Act
Service Type: Artificial Intelligence & Machine Learning
No privileged permissions
AWS ECS MCP Server
Service Type: Artificial Intelligence & Machine Learning
No privileged permissions
Conclusion
As AWS continues to evolve its networking, traffic management, and collaboration services, new privileged permissions are increasingly defining how data flows, access is enforced, and environments are segmented in the cloud. This month’s additions demonstrate how changes to routing policies, firewall rules, encryption controls, and shared resources can quietly expand privilege, weaken isolation, or expose sensitive systems without modifying traditional administrator roles. Even small configuration changes can have an outsized impact on network trust boundaries and lateral movement risk.
Sonrai Security’s Cloud Permissions Firewall helps organizations stay ahead of these shifts by continuously identifying emerging privileged permissions, mapping them to MITRE ATT&CK tactics, and enforcing least privilege across cloud control planes. In a cloud environment where network and configuration-level privileges continue to expand each month, maintaining continuous visibility and proactive control is critical to preventing overlooked permissions from becoming attack paths.