• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Amazon Web Services Vulnerability

You are here: Home / Security News / Amazon Web Services Vulnerability

Amazon Web Services (AWS) is a popular cloud service used in many companies around the world. Having business processes and operations shifted to the cloud has proven beneficial to organisations, as it cuts costs involved in the infrastructure setup of a business.

AWS provides businesses with a variety of services using API (Application Programing Interface), with internal and external applications based on its service setup. This seems to be a great asset for businesses, however the default setup by AWS has some vulnerabilities that could escalate to bigger risks or threats in the future.

APIs Compromised

The Palo Alto network discovered this vulnerability, and have advised that it could allow threat actors and hackers to obtain account rosters and internal structures of organizations, and assist hackers to plan an attack in order to obtain the AWS ID, which can give them access to the entire system.

The services which provide this vulnerability are the following:

  • Amazon Simple Storage Service (S3)
  • Amazon Key Management Service (KMS)
  • Amazon Simple Queue Service (SQS)

Using the Amazon ID account, hackers can find out if an employee account has access to certain resources, and from there they could work their way up to an Amazon account that could potentially provide root access.

Given enough time, the threat actors or hackers can also launch a brute force attack. This can occur because the access error messages are logged into the attackers account, which will make it harder to be aware of failed attempts to access certain resources by the organization.

API Protection

Mitigation is possible, but it stands within the responsibilities of the organization, as there must be a strong Identity and Access management policy and framework. Another mitigation action that businesses could apply is cooperation with the vendor (Amazon), by ensuring their services are updated and configured according to certain secure plans. Both parties have a responsibility to secure their infrastructure.

For more information on securing your system and best cyber-management and cybersecurity planning, contact us.

Author: Saeed Baayoun, Agilient Consultant

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane