@[email protected] retweetledi

Just to be clear here, this means that for a time @awscloud support was able to read all of your S3 data. There is no mitigation; this role is mandatory.
If you had CloudTrail data events enabled, you can audit. If you didn’t, it may be time to declare a security incident.

Scott Piper@0xdabbad00
AWSSupportServiceRolePolicy just got s3:GetObject. 😱 That role is supposed to only have metadata visibility. @AWSSecurityInfo you need to roll that back.
English
