As March 2026 comes to a close, the newest AWS permissions reflect expansion across three distinct domains: customer engagement, AI-driven DevOps automation, and core database infrastructure. The volume is modest, but the risk profile is not.
The central theme for March is “Silent Degradation.” Each of these permissions shares a common characteristic: the damage they enable is operational rather than immediately visible. Alerts stop firing. Pipelines run toward the wrong objectives. Data replicates continuously into attacker-controlled tables. None of these actions announce themselves. Security teams relying on reactive detection will miss them. The only effective control is restricting who holds these permissions in the first place.
Existing Services with New Privileged Permissions
Amazon Connect
Service Type: Customer Engagement
Permission: connect:DeleteNotification
- Action: Grants permission to delete a notification in an Amazon Connect Instance
- Mitre Tactic: Defense Evasion
- Why it’s privileged: Silently removes contact center alert configurations without triggering errors or log entries. Queue anomalies, off-hours activity, and threshold breaches stop firing. Detection is degraded with no visible indication of tampering.
AWS DevOps Agent Service
Service Type: Artificial Intelligence & Machine Learning
Permission: aidevops:UpdateGoal
- Action: Grants permission to update a goal
- Mitre Tactic: Defense Evasion
- Why it’s privileged: Modifies the objectives governing automated DevOps agent behavior. This can disrupt preventative actions being taken by the agent to secure the cloud.
Amazon DynamoDB
Service Type: Database Service
Permission: dynamodb:AssociateTableReplica
- Action: Grants permission to create multi account global table replica
- Mitre Tactic: Exfiltration
- Why it’s privileged: Converts an existing table into a replica, forcing continuous data sync from a source table. An attacker can redirect sensitive data flows into a table they control. Existing data is overwritten with no new infrastructure required.
New Services with Privileged Permissions
AWS Elemental Interference
Service Type: Content Delivery and Management
No privileged permissions
Conclusion
The March updates reinforce a pattern that security teams cannot afford to ignore. Privileged permissions are not concentrated in a handful of high-profile services. They are spreading into automation pipelines, contact center infrastructure, and database replication layers, each carrying the ability to degrade detection, redirect data, or quietly alter operational behavior.
Sonrai Security’s Cloud Permissions Firewall tracks these permissions as they are released, maps them to the MITRE ATT&CK framework, and flags them before they become a breach. When the most dangerous actions in your environment are the ones that leave no immediate trace, least privilege is not a best practice, it is the only viable control.

*** This is a Security Bloggers Network syndicated blog from Sonrai | Enterprise Cloud Security Platform authored by Karen Levy. Read the original post at: https://sonraisecurity.com/blog/march-recap-new-aws-privileged-permissions-and-services-2026/