[Last Week in AWS] Issue #464: S3 Turns 20 and SimpleDB Is Still Alive
Last Week in AWS

Saturday, March 21, 2026

Good Morning!

RSA has once again come to San Francisco, so if you need someone to sell you a firewall, head to Moscone. I'll be around the periphery; if you're nearby, hit reply and say hello. I'm game to grab a coffee / beer / etc with you all.

If you (well, not you, but probably the saddest looking person on your finance team) are tracking commitments in spreadsheets and hoping your discount strategy still makes sense, you're not alone. Most teams are cobbling together strategies/tools that weren't designed for the scale and complexity of modern cloud environments. That's why we're building Skyway over at Duckbill—to take you away from all that. Now the exclusive sponsor of Last Week in AWS, and also the company I co-founded. Cloud contract issues? Get in touch.

Things I Found on the Internet

Sometimes I wonder if I've been too harsh on Microsoft's (motto: "we will toss our toys out of the pram if you cal us 'Microslop' one more time") security over the years. Then I read things like this. Government cyber reviewers literally called Microsoft's cloud offering "a pile of shit," then approved it anyway because too many agencies were already using it. The ProPublica investigation behind this Ars Technica piece reads like a horror movie where everyone sees the monster but nobody locks the door. I mean... am I the crazy one?


A $58K surprise bill because of a bug in Bedrock's Mantle API layer is the stuff of nightmares. What makes Damiano's writeup special is he didn't just panic - he dug into the billing data, proved the bug, and got it resolved. A masterclass in being your own cloud advocate.


Fantastical shipping an MCP connector for Claude feels like the natural evolution of calendar apps nobody asked for but everyone will immediately want. Ask Claude to find a 90-minute slot next week, and it just does it. No app switching, no context loss. Calendar-as-conversation is surprisingly compelling, and I'm already integrating this into my horrible Billie the Platypus EA.


Someone built a distributed file store by stitching together AWS CloudShell's free 1GB persistent storage across every region, complete with UDP hole-punching, erasure coding, and encryption. It's gloriously unhinged infrastructure engineering. Will AWS shut this down? Probably, presuming they didn't lay off the folks who'd do that. Should you use it in production? Absolutely not. Is it brilliant? Yes. Very much yes.


Mark Atwood's argument in this piece on Amazon's slow retail decay is simple and brutal: Amazon's search returns what someone paid to show you, not what you asked for. The real threat isn't "some scrappy startup," it's boring companies like Grainger whose business model requires honest search results you didn't sell out for a dollar. Genuinely sharp thinking, and makes me proud to say "I knew Mark before his Amazon days." Fun fact: he ran community for a little company called Eucalyptus at the same time as I did a deployment for a giant company. I miss that era...


Doctorow's "shitty technology adoption curve" is one of those frameworks that, once you see it, you can't unsee it. Surveillance tech gets tested on prisoners and warehouse workers before it reaches your desk. This piece on Amazon's two-tier workforce connects the dots between warehouse bossware today and what's coming for the coders tomorrow.


I'm genuinely delighted that someone built Kagi Translate with LinkedIn speak as a target language. Paste in normal human English, get back "Thrilled to announce" garbage. It's the Rosetta Stone for people who've always wondered how authentic thoughts become performative slop. Pairs well with a stiff drink.


AWS AgentCore's code interpreter had a sandbox escape vulnerability that BeyondTrust found and responsibly disclosed before GA launch. The writeup on pwning AWS AgentCore's code interpreter walks through the full attack chain, and it's a good reminder that "AI agent infrastructure" still has the same old boring security problems underneath. The timeline entry that "AWS awarded the security researcher with a $100 gift card to the AWS Gear Shop" is a good reminder that should you discover a useful exploit on an AWS service, selling it to a bad actor is going to be exponentially more lucrative.


Turns out mandating AI coding tools while cutting 16,000 engineers produces exactly the outcome you'd expect. This report from Heise details how AI-generated code changes took down Amazon's shopping platform for six hours and nuked an AWS production environment. The mandatory review meetings that followed are peak "we could have just done this first."


Two "Correcting the Financial Times" blog posts in three weeks is a faster release cadence than most AWS services manage. I wrote about what Amazon's defensive PR posture reveals about their AI anxiety, and honestly, the reaction to the outages is way more interesting than the outages themselves.


Look, it's always weird to share an interview with yourself, but this IT Ops Query episode covers ground I think matters: AWS's security stumbles with CodeBuild, the talent exodus, and why them shutting up about AI is actually a good sign. TechTarget's Beth Pariseau asked solid questions.


I wrote this piece for The Register about AWS ending PostgreSQL 13 support on RDS, which forces you to upgrade to PostgreSQL 14, which breaks AWS Glue. Follow AWS's own security guidance and AWS's own ETL service stops working. Never attribute to malice what can be explained by one very large org chart.

What AWS Has For Us This Time

Amazon Corretto 26 is now generally available - "Making Final Mean Final" is my favorite Java feature name since "Optional isn't optional." Corretto 26 ships HTTP/3 support and faster startup times, which is great because your Lambda cold starts needed all the help they could get. Supported through October 2026, so mark your calendar for the next upgrade treadmill.


Amazon SimpleDB now supports exporting domain data to Amazon S3 - SimpleDB is still alive?! This is less "exciting new feature" and more "here's a body bag to help you move the corpse to S3." They're literally building you a prettier exit door. The export tool is free, which is the least AWS can do for the seven people still running SimpleDB in production.


AWS CDK Mixins is now generally available - CDK finally gets mixins, solving the eternal "L1 vs L2" construct dilemma that's haunted infrastructure teams like a DevOps ghost. The `.with()` syntax is elegant, which makes me suspicious. Compliance teams can now enforce policies without rebuilding everything, meaning they'll find exciting new ways to block your Friday deploys instead.


AWS Lambda Managed Instances now supports Rust - Lambda Managed Instances is already "what if Lambda was just EC2 with extra steps," and now it supports Rust. So you can write memory-safe code on a service whose identity crisis is anything but safe. At least the Rust evangelists finally have a reason to mention Rust in your next architecture meeting. Again. Not that they apparently needed one.


Amazon CloudWatch Logs now supports log ingestion using HTTP-based protocol - Four endpoints, four different JSON flavors, and API keys that expire on schedules ranging from "next Tuesday" to "hopefully before the audit." CloudWatch finally accepting logs over plain HTTP feels like AWS admitting the SDK isn't always the answer, which is the kind of personal growth I can respect. Only four regions at launch, naturally.


AWS Lambda now supports Availability Zone metadata - Serverless was supposed to mean "stop thinking about infrastructure," and now Lambda lets you know which Availability Zone you're in. Because nothing says "I don't manage servers" like writing AZ-aware routing logic to dodge cross-AZ data transfer charges.


Expanding the BOX Program to Business Consulting and Advisory Partners - "Business Outcomes Xcelerator" - because apparently AWS ran out of normal words and had to swap a letter to make the acronym work. It's invite-only consulting partner funding dressed up in enough buzzwords to make a McKinsey deck blush. Bain and BCG are launch partners, so at least someone's billing hourly here.


Twenty years of Amazon S3 and building what’s next - Happy 20th birthday to the service that quietly became the backbone of the internet and the largest line item on your AWS bill. S3's prices dropped 85% since launch, which sounds impressive until you realize your storage volume grew 10,000%. Congrats, you're spending more than ever.


Synchronizing a Backup on-premises Db2 Server with Amazon RDS for Db2 - Nothing screams "we trust the cloud" quite like a 3,000-word guide on keeping an emergency on-prem Db2 server synchronized with RDS, just in case. It's the database equivalent of wearing a parachute to a trampoline park. At least someone's still running Db2, which is its own kind of bravery.


AWS and NVIDIA deepen strategic collaboration to accelerate AI from pilot to production - Over a million NVIDIA GPUs headed to AWS. That's a lot of silicon to power AI workloads that companies swear are going to production any day now. "Deepened strategic collaboration" is corporate for "we're spending ungodly amounts of money and need a press release to justify it to shareholders."


Migrate from Amazon Nova 1 to Amazon Nova 2 on Amazon Bedrock - Upgrading from Nova 1 Pro or Premier? AWS recommends migrating to... Nova 2 Lite. That's right, the "downgrade" is actually an upgrade that's 7x cheaper and 5x faster. Nothing inspires confidence in your original model selection like being told the budget option now beats it.


Essential security controls to prevent unauthorized account removal in AWS Organizations - Nothing sings "shared responsibility model" quite like publishing a blog post explaining how attackers can yank compromised accounts right out of your Organization, nuking all your governance controls. The fix? SCPs you should've had from day one, a "Transition OU," and the quiet prayer that your break-glass procedures actually work.


Demystifying Amazon VPC peering charges - Ah, "transparency;" in this case a blog post explaining how to find charges that were previously hidden inside a different line item. They didn't lower the price, they just moved the shell. Your finance team now gets to play detective with Cost Explorer instead of, you know, getting a straightforward bill.


AWS and Others Invest $12.5M to Defend the Open Source Ecosystem from AI Threats - Twelve and a half million dollars split across five of the wealthiest tech companies on Earth to fix a problem their own AI models created. That's roughly what each of them spends on catering in a quarter. Still, open source maintainers drowning in AI-generated bug slop need the help, so I'll save the snark. Mostly.


Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls - Catching ransomware gangs exploiting zero-days 36 days before public disclosure is impressive threat intel work. Of course, the real punchline is that the attackers got caught because they misconfigured their own infrastructure server. Turns out nobody patches properly - not even the criminals.


20 years of Amazon S3: A storage professional’s journey to AWS Hero - Twenty years of S3, and this hero's journey started by looking at S3 pricing in 2010 and immediately noping back to tape drives. Honestly, that's the most relatable AWS origin story I've ever read. We all came back eventually. Stockholm syndrome is a hell of a retention policy.


CVE-2026-4270 - AWS API MCP File Access Restriction Bypass - Christ, four CVEs this week? The wheels are coming off the AWS security apparatus it seems. Letting AI assistants manage your AWS infrastructure while "maintaining proper security controls" hits different when those controls have a path traversal bypass exposing arbitrary local files. No workarounds either, just "please upgrade." If you're running the MCP Server between 0.2.14 and 1.3.9, today's a great day to stop doing that.


CVE-2026-4269 - Improper S3 ownership verification in Bedrock AgentCore Starter Toolkit - A remote code execution bug in a toolkit that wasn't checking S3 bucket ownership. Version v0.1.13 of a product that hasn't hit v1.0 yet. Nothing inspires confidence in your AI agent infrastructure like "we forgot to verify who owned the bucket we were pulling code from." But remember, AWS isn't so desperately behind in AI that they're tripping over themselves to ship, overriding security diligence in the process.


Arbitrary code execution via crafted project files in Kiro IDE - An "agentic" IDE that executes arbitrary code when you open a project directory is honestly just working as advertised. The suggested workaround of "don't open untrusted projects" is chef's kiss for a tool designed to autonomously write code.


CVE-2026-4428: Issues with AWS-LC - CRL Distribution Point Scope Check Logic Error - A logic error in AWS's own crypto library meant revoked certificates could waltz right past revocation checks. Affected versions span nearly 50 releases. The workaround is basically "don't use the feature that checks if certificates are revoked," which is like fixing a smoke detector by removing the batteries. Patch immediately.

... and that’s what happened Last Week in AWS. If you’ve enjoyed reading this, tell everyone you know to subscribe at lastweekinaws.com.

As always, if you’ve seen a blog post, a tool, or anything else AWS related that you think the rest of the community should hear about, send them my way. You can either hit reply or join the #lwia-publications channel on the LWIA Slack team.

You have questions? We have coffee! Drop by my employer’s weekly FinOps office hours, every Thursday at 10:00a PT. Often fun, always free. Register here.

Corey Quinn

I'm Corey Quinn

I help companies improve their horrifying AWS bills by making them smaller and less horrifying. I also host two podcasts—check them out at lastweekinaws.com.

Last Week in AWS

Refer people to Last Week in AWS

Share Last Week in AWS with your friends, colleagues, neighbors, and sworn enemies! Trick them into subscribing! Earn a variety of rewards when they sign up! Here’s your personal referral link:
https://ref.lastweekinaws.com/b0w3xd

You currently have 0 referrals.

Get Some Swag

Get Some Swag

That’s right folks, we’ve got awesome swag. All of our swag features everyone’s favorite mascot, Billie The Platypus. Get yours here.