Image missing.
Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)

complexpass

created: July 24, 2025, 6:07 a.m. | updated: July 24, 2025, 2:38 p.m.

Attackers can list users, roles, policies, and access keys through IAM (iam:List*, iam:Get*), gaining invaluable insights into your AWS environment. They can download objects from S3 buckets (s3:GetObject), retrieve secrets from AWS Secrets Manager (secretsmanager:GetSecretValue), and access sensitive configurations in Lambda functions. Why doesn’t AWS offer a mechanism that allows customers to automatically disable exposed access keys as soon as they’re detected? It’s an essential read for any organization looking to secure its systems against the escalating risks of exposed secrets. PDF Report Shattering the Rotation Illusion: How Quickly Leaked AWS Keys are Exploited Download Now ->

1 week, 4 days ago: Hacker News: Front Page