<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://codewave.asia/blogs/author/ankit-mehta/feed" rel="self" type="application/rss+xml"/><title>codewave.asia - Blog by Ankit Mehta</title><description>codewave.asia - Blog by Ankit Mehta</description><link>https://codewave.asia/blogs/author/ankit-mehta</link><lastBuildDate>Mon, 02 Mar 2026 03:03:49 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[AWS re:Invent 2025]]></title><link>https://codewave.asia/blogs/post/aws-re-invent-2025</link><description><![CDATA[<img align="left" hspace="5" src="https://codewave.asia/blog-images/68d2300a85fdccd882928947_AWS re_Invent Dec 1-5 2025.webp"/>Discover all AWS re:Invent 2025 announcements: Amazon Bedrock AgentCore, Lambda Managed Instances, AWS-Google Cloud partnership, and groundbreaking AI innovations.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-LAF9MHqRLGb4VzuYmr7-w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Dobz-aJwS1KDwIgM4rZSWw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gj0g8ucJTyy6GmdlsLhtJQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dTtLaOF0TrCwwXqNUWjGQg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>All Major Announcements</span></span></h2></div>
<div data-element-id="elm_DxkQQpdMOqQHBgS02I94fQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_DxkQQpdMOqQHBgS02I94fQ"] .zpimage-container figure img { width: 1280px !important ; height: 720px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/blog-images/68d2300a85fdccd882928947_AWS%20re_Invent%20Dec%201-5%202025.webp" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm__HC-yQv8Q9ybyfjt0rZVmQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">AWS re:Invent 2025 has arrived, and it's shaping up to be one of the most transformative cloud conferences in Amazon Web Services history. Running from December 1-5 at various venues across the Las Vegas Strip, including the Venetian and Caesars Forum, this year's conference brings together tens of thousands of developers, cloud architects, business leaders, and tech enthusiasts from around the globe.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The theme dominating this year's event is unmistakably <b>Agentic AI</b> – autonomous AI systems that can reason, make decisions, and take action independently. With over 2,300 specialized learning sessions, five major keynotes, and groundbreaking product announcements, AWS is making a bold statement about the future of cloud computing and artificial intelligence.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">This comprehensive guide covers all the major announcements and innovations unveiled at re:Invent 2025, organized by category to help you understand how these developments can transform your business.</p></div><p></p></div>
</div><div data-element-id="elm_m1ecSh0nQB0AUuszTzQ4YA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(20, 15, 59);font-family:Rubik, sans-serif;font-size:40px;font-weight:600;">Agentic AI: The Revolution is Here</span></p><section><p>The central theme of re:Invent 2025 is Agentic AI, representing a fundamental shift from AI that merely responds to prompts to AI that can autonomously plan, execute, and complete complex multi-step tasks. AWS CEO Matt Garman emphasized during his keynote that this technology could unlock billions in productivity gains across industries ranging from healthcare to finance.</p><p><br/></p><h3>Amazon Bedrock AgentCore</h3><p>Amazon Bedrock AgentCore has emerged as the cornerstone of AWS's agentic AI strategy. This comprehensive platform includes seven core services designed to help enterprises deploy and operate secure AI agents at scale:</p><ul><li><strong>AgentCore Runtime:</strong> Managed compute environment for running AI agents with consumption-based pricing</li><li><strong>AgentCore Gateway:</strong> Integration layer that transforms existing APIs, Lambda functions, and services into agent-compatible tools</li><li><strong>AgentCore Browser:</strong> Enables AI agents to interact with web interfaces programmatically</li><li><strong>AgentCore Code Interpreter:</strong> Allows agents to write and execute code for complex problem-solving</li><li><strong>AgentCore Memory:</strong> Short-term and long-term memory management for context-aware interactions</li><li><strong>AgentCore Observability:</strong> Real-time monitoring and debugging with OpenTelemetry compatibility</li><li><strong>Model Context Protocol (MCP) Support:</strong> Integration with services like Amazon EKS for context-aware Kubernetes workflows and secure agent-to-agent communication</li></ul><h3><br/></h3><h3>AWS Transform with Agentic AI</h3><p>AWS Transform has received significant agentic AI enhancements that help companies modernize any code and application, including custom programming languages specific to their organization. Key capabilities include:</p><ul><li>Full-stack Windows modernization across .NET apps, SQL Server, UI frameworks, and deployment layers</li><li>Up to 70% reduction in maintenance and licensing costs</li><li>Air Canada has already used the service to modernize thousands of Lambda functions in just days, achieving an 80% reduction in time and cost</li></ul><h3><br/></h3><h3>Amazon Connect Agentic Self-Service</h3><p>Amazon Connect, AWS's cloud contact center service that recently crossed $1 billion in annual revenue, is receiving a major agentic AI upgrade. The new capabilities enable AI agents to understand, reason, and act across both voice and messaging channels.</p><p>Using advanced speech models, these agents can now speak with natural pacing and tone, collaborating with human agents rather than replacing them. The system listens to calls in real-time and actively helps human representatives by preparing documents or suggesting next steps.</p><div><p><strong>Real-world impact:</strong> Lyft has achieved an 87% reduction in average resolution time for customer and driver support requests, with more than half resolved in less than three minutes.</p></div>
</section><section><h2><br/></h2><h2>AI Models and Services</h2><h3><br/></h3><h3>Amazon Bedrock Enhancements</h3><p>Amazon Bedrock continues to evolve as AWS's premier managed service for building and scaling generative AI applications. Key announcements include:</p><ul><li><strong>New Service Tiers:</strong> Priority, Standard, and Flex tiers allow organizations to optimize AI workload costs by matching performance requirements with pricing</li><li><strong>Marengo 3.0 on Bedrock:</strong> TwelveLabs' video foundation model that understands full scenes, turning previously unusable video archives into searchable, structured insight. AWS is the first cloud provider to offer this model</li><li><strong>Amazon Nova Multimodal Embeddings:</strong> Industry's first embedding model supporting text, documents, images, video, and audio through a single unified model</li><li><strong>Claude Sonnet 4.5:</strong> Anthropic's latest model with advanced coding capabilities and agentic AI features now available in Bedrock</li><li><strong>Amazon Nova Web Grounding:</strong> Built-in tool for Nova models that automatically retrieves and grounds responses with web content</li></ul><h3><br/></h3><h3>Amazon SageMaker AI Updates</h3><p>Amazon SageMaker AI continues to receive significant enhancements:</p><ul><li>One-click onboarding with notebooks featuring built-in AI agents in Amazon SageMaker Unified Studio</li><li>New business metadata features in Amazon SageMaker Catalog to improve discoverability</li><li>Deepgram integration for streaming speech-to-text, text-to-speech, and voice agent capabilities with sub-second latency</li><li>Simplified developer access with 'aws login' command</li></ul><h3><br/></h3><h3>Amazon CloudWatch AI Observability</h3><p>Amazon CloudWatch now offers comprehensive observability for generative AI applications and agents, providing built-in insights into latency, token usage, and errors across your AI stack. This capability works seamlessly with Amazon Bedrock AgentCore and is compatible with open-source agentic frameworks like LangChain, LangGraph, and CrewAI.</p></section><section><h2><br/></h2><h2>Compute and Infrastructure</h2><h3><br/></h3><h3>Custom Silicon: Trainium and Project Rainier</h3><p>AWS continues to invest heavily in custom AI silicon. Trainium2 is now fully subscribed and has become a multi-billion dollar business growing 150% quarter-over-quarter. Key developments include:</p><ul><li><strong>Project Rainier:</strong> One of the world's largest AI compute clusters, now operational with nearly half a million Trainium2 chips, with plans to scale to over one million chips by end of 2025</li><li><strong>Trainium3 Preview:</strong> Next-generation AI chip expected in late 2025, featuring 40% better performance and energy efficiency, built on a cutting-edge 3nm process</li><li><strong>Trn2 UltraServers:</strong> Capable of scaling up to 83.2 peak petaflops, designed for training AI models with over a trillion parameters</li><li><strong>Anthropic Partnership:</strong> Deep collaboration with Anthropic, which has chosen AWS as its primary cloud provider for training its Claude models</li></ul><h3><br/></h3><h3>AWS Lambda Managed Instances</h3><p>A significant serverless innovation, AWS Lambda Managed Instances allows customers to run Lambda functions on EC2 compute while maintaining serverless simplicity. This enables access to specialized hardware and cost optimizations through EC2 pricing models, with AWS handling all infrastructure management.</p><h3><br/></h3><h3>Amazon EKS Capabilities</h3><p>New Amazon EKS capabilities for workload orchestration and cloud resource management streamline Kubernetes development with fully managed platform capabilities. Key features include:</p><ul><li>New Provisioned Control Plane for enhanced performance</li><li>Fully managed MCP servers (preview)</li><li>Enhanced AI-powered troubleshooting in the console</li><li>Support for ultra-scale clusters of up to 100,000 nodes</li></ul><h3><br/></h3><h3>New EC2 Instance Types</h3><p>AWS announced the EC2 P6-B300 instances for accelerating large-scale AI applications, along with new instance types featuring Intel Xeon Scalable (Granite Rapids), AMD EPYC (Turin), and AWS Graviton processors.</p></section><section><h2><br/></h2><h2>Networking and Multicloud</h2><h3><br/></h3><h3>AWS Interconnect - Multicloud with Google Cloud</h3><p>In a groundbreaking move, AWS and Google Cloud have jointly engineered a multicloud networking solution that enables customers to establish private, high-bandwidth connectivity between the two cloud providers. This represents a significant evolution in cloud competition and collaboration.</p><p>Key features of AWS Interconnect - multicloud:</p><ul><li>Fully managed, cloud-to-cloud experience provisioned quickly through the AWS Management Console or API</li><li>Pre-built capacity pools allowing organizations to create connections and adjust bandwidth as needed</li><li>Built-in resiliency and streamlined support</li><li>Open API package published on GitHub for other service providers to adopt</li></ul><h3><br/></h3><h3>Amazon Route 53 Global Resolver</h3><p>Now in preview, Amazon Route 53 Global Resolver provides secure anycast DNS resolution, simplifying hybrid DNS management with a unified service that resolves public and private domains globally while reducing operational overhead and maintaining consistent security controls.</p></section><section><h2><br/></h2><h2>Security and Developer Tools</h2><h3><br/></h3><h3>IAM Policy Autopilot</h3><p>AWS has released IAM Policy Autopilot, a new open-source MCP server that analyzes code to generate valid IAM policies. This tool provides AI coding assistants with up-to-date AWS service knowledge and reliable permission recommendations, significantly speeding up AWS development.</p><h3><br/></h3><h3>AWS Clean Rooms Privacy Enhancement</h3><p>AWS Clean Rooms now supports privacy-enhancing synthetic dataset generation for ML model training. Organizations can train ML models on sensitive collaborative data by generating synthetic datasets that preserve statistical patterns while protecting individual privacy through configurable noise levels and protection against re-identification.</p><h3><br/></h3><h3>Kiro: Generally Available</h3><p>Kiro, the first AI coding tool built around spec-driven development, is now generally available. Since its preview release, over 250,000 developers have embraced the tool. The GA launch introduces:</p><ul><li>Property-based testing for spec correctness</li><li>New checkpointing capabilities</li><li>Kiro CLI bringing agents to your terminal</li><li>Enhanced agentic workflows for structured development</li></ul></section><section><h2><br/></h2><h2>Strategic Partnerships</h2><h3><br/></h3><h3>Visa Intelligent Commerce</h3><p>Visa and AWS announced a major collaboration to enable AI agents to securely complete multi-step transactions, from shopping to price tracking to payments. The companies will publish open blueprints on the Amazon Bedrock AgentCore repository for retail shopping, travel booking, and payment reconciliation.</p><p>Partners reviewing blueprint designs include Expedia Group, Intuit, lastminute.com, and Eurostars Hotel Company. The collaboration envisions use cases like instructing an AI agent to &quot;Buy me basketball game tickets if the price drops below $150.&quot;</p><h3><br/></h3><h3>BlackRock Aladdin on AWS</h3><p>BlackRock confirmed that Aladdin, its industry-recognized investment management technology platform, will run on AWS infrastructure for US enterprise clients starting in the second half of 2026. This gives financial institutions greater flexibility in deploying risk modeling, analytics, and investment decision-making tools.</p><h3><br/></h3><h3>Other Key Partnerships</h3><ul><li><strong>Nissan:</strong> Deploying its Nissan Scalable Open Software Platform on AWS, achieving 75% faster testing with over 5,000 developers collaborating globally</li><li><strong>Deepgram:</strong> Integrating enterprise speech AI into SageMaker, Amazon Connect, and Amazon Lex</li><li><strong>Trane Technologies:</strong> Using AI to achieve nearly 15% energy reductions at Amazon Grocery fulfillment sites</li><li><strong>S&amp;P Global:</strong> Using MCP integrations to enable clients to query complex financial data using AI agents</li><li><strong>CrowdStrike:</strong> Enhanced Falcon Next-Gen SIEM tool offered via AWS Marketplace with simplified deployment</li><li><strong>OpenAI:</strong> Multi-year strategic partnership with a $38 billion, 7-year commitment to run and scale workloads on AWS</li></ul></section><section><h2><br/></h2><h2>Infrastructure Investments</h2><p>AWS is making massive infrastructure investments to support AI workloads:</p><ul><li><strong>$15 Billion Indiana Investment:</strong> Building new data center campuses in Northern Indiana to advance AI innovation</li><li><strong>$50 Billion Government Infrastructure:</strong> Expanding AI and supercomputing infrastructure for US government agencies, providing access to Amazon SageMaker AI, Amazon Bedrock, and Amazon Nova</li><li><strong>Fastnet Transatlantic Cable:</strong> Dedicated high-capacity cable connecting the US and Ireland</li><li><strong>Power Expansion:</strong> Added over 3.8 gigawatts of power in the past 12 months, with plans to double capacity by 2027</li><li><strong>Custom Liquid Cooling:</strong> Designed a completely custom liquid cooling system in just 11 months to support denser, more powerful AI chips</li></ul></section><section><h2><br/></h2><h2>Customer Success Stories</h2><p>Real-world deployments demonstrate the transformative potential of AWS's new capabilities:</p><ul><li><strong>Lyft:</strong> 87% reduction in support resolution time using Claude-powered intent agents</li><li><strong>Zepz:</strong> 30% contact deflection while processing $16 billion in transactions</li><li><strong>TUI Group:</strong> Migrated 10,000 agents across 12 European markets, cutting operating costs by 10%</li><li><strong>UC San Diego Health:</strong> Integrated Epic EHR for self-service patient authentication</li><li><strong>Air Canada:</strong> Modernized thousands of Lambda functions in days with 80% time and cost reduction</li></ul></section><section><h2><br/></h2><h2>Additional Announcements</h2><h3><br/></h3><h3>AWS Partner Central in Console</h3><p>AWS Partner Central is now available directly in the AWS Management Console, allowing partners to manage solutions, opportunities, and marketplace listings in one unified interface with enterprise-grade security.</p><h3><br/></h3><h3>Amazon Quick Suite</h3><p>Amazon Quick Suite is a new agentic AI application designed to cut through fragmented information, siloed applications, and repetitive tasks. S&amp;P Global clients can now query complex financial and energy data using AI agents embedded inside Quick Suite.</p><h3><br/></h3><h3>AWS Marketplace Updates</h3><p>AWS Marketplace is adding AI-powered search and flexible pricing models to help customers piece together AI solutions from multiple vendors, making it easier to build comprehensive AI stacks.</p><h3><br/></h3><h3>Agentic AI Competency Program</h3><p>AWS has launched a new &quot;Agentic AI&quot; competency program for partners, designed to recognize firms building autonomous systems rather than simple chatbots.</p></section><section><h2><br/></h2><h2>Key Takeaways for 2025 and Beyond</h2><ul><li><strong>Agentic AI is Production-Ready:</strong> Companies are already deploying AI agents that reason, decide, and act autonomously, with measurable ROI across industries</li><li><strong>Custom Silicon is Strategic:</strong> Trainium is becoming central to AWS's AI strategy, with Trainium3 promising even better price-performance ratios</li><li><strong>Multicloud is Embraced:</strong> The AWS-Google Cloud partnership signals that interoperability is becoming a competitive advantage, not a weakness</li><li><strong>Enterprise AI is Mainstream:</strong> With companies like BlackRock, Visa, and Nissan making major commitments, enterprise AI adoption is accelerating</li><li><strong>Developer Experience Matters:</strong> Tools like Kiro, IAM Policy Autopilot, and enhanced observability show AWS's commitment to making AI development accessible</li></ul></section><footer></footer></div>
</div><div data-element-id="elm_DSrSf38YFNdd_Wc6tYdF2Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><br/></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 02 Dec 2025 10:29:36 +0700</pubDate></item><item><title><![CDATA[The Silent Majority of Risk: Why Non-Human Identity Governance is Your Organization's Biggest Security Blind Spot]]></title><link>https://codewave.asia/blogs/post/the-silent-majority-of-risk-why-non-human-identity-governance-is-your-organization-s-biggest-securit</link><description><![CDATA[<img align="left" hspace="5" src="https://codewave.asia/blog-images/WhatsApp Image 2568-11-27 at 19.35.53.jpeg"/>Non-Human Identity governance isn't optional anymore. With 70% of breaches involving machine identities, and compliance frameworks catching up to this reality, organizations that ignore NHI security do so at their peril.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_wwVHWMupSZ6NIed-fyagUw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5R_QQxShRK6OaYwOWCzOYw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LIjHNW35QXu62bA4oFUj_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_8GhlcClFFLgO8wAU0g9-DQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_8GhlcClFFLgO8wAU0g9-DQ"] .zpimage-container figure img { width: 1210px !important ; height: 639px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/blog-images/WhatsApp%20Image%202568-11-27%20at%2019.35.53.jpeg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_AB4TPb_cSMusVQQvkw1QjA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><h1 style="text-align:left;"><span style="color:rgb(76, 76, 76);font-family:Muli, sans-serif;font-size:16px;font-weight:400;">We've all heard the phrase: &quot;Identity is the new perimeter.&quot;</span></h1><p style="text-align:left;">But here's the uncomfortable truth most security teams are missing — the perimeter isn't being breached by compromised employee credentials or phishing attacks. It's being breached by the identities you don't even know exist: <strong>Non-Human Identities (NHIs)</strong>. ( APIs. Service accounts. Machine credentials. Bot tokens. IoT device certificates. Container orchestration keys. )</p><p style="text-align:left;"><br/></p><p style="text-align:left;">These digital identities power every modern enterprise. They enable automation, orchestration, and the seamless integration that businesses depend on. But they've also become the fastest-growing attack vector in cybersecurity — and most organizations have zero governance over them.</p><p style="text-align:left;"><strong><br/></strong></p><p style="text-align:left;"><strong>The numbers are staggering: 70% of security breaches now involve Non-Human Identities.</strong></p><p style="text-align:left;"><strong><br/></strong></p><hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">What Are Non-Human Identities?</h2><p style="text-align:left;">Non-Human Identities (NHIs) are digital credentials that allow machines, applications, and automated processes to authenticate and communicate with each other. Unlike human users who log in with usernames and passwords, NHIs operate silently in the background, enabling critical business functions.</p><p style="text-align:left;">Common types of NHIs include:</p><ul><li style="text-align:left;"><strong>API Keys:</strong> Credentials that allow applications to access external services</li><li style="text-align:left;"><strong>Service Accounts:</strong> Automated accounts used by applications to perform tasks</li><li style="text-align:left;"><strong>Machine Certificates:</strong> Digital certificates for server-to-server authentication</li><li style="text-align:left;"><strong>Bot Credentials:</strong> Authentication tokens for automated processes and RPA</li><li style="text-align:left;"><strong>IoT Device Tokens:</strong> Credentials embedded in connected devices</li><li style="text-align:left;"><strong>Container Secrets:</strong> Authentication data used in Kubernetes and Docker environments</li><li style="text-align:left;"><strong>CI/CD Pipeline Tokens:</strong> Credentials used in automated deployment processes</li></ul><div style="text-align:left;"><br/></div>
<hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">The Scale of the Problem</h2><p style="text-align:left;">Here's what makes NHI security so challenging:</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">1. NHIs Outnumber Human Users 10:1</h3><p style="text-align:left;">In a typical enterprise environment, Non-Human Identities outnumber human users by a factor of ten or more. A company with 1,000 employees might have 10,000+ machine identities operating across their infrastructure.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Traditional Identity and Access Management (IAM) solutions were never designed to handle this scale.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">2. NHIs Have Elevated Privileges</h3><p style="text-align:left;">Unlike human users who typically have role-based access, many service accounts and API keys are provisioned with broad, standing privileges. A single compromised service account often has more access than any individual employee — making it the perfect target for attackers seeking lateral movement.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">3. NHIs Are Rarely Rotated or Monitored</h3><p style="text-align:left;">Human passwords have rotation policies. Human access is reviewed periodically. But NHIs? They're often created once and forgotten.</p><p style="text-align:left;">Our research shows the average NHI credential age exceeds 3 years without rotation. Some organizations have service accounts that haven't been updated in over a decade.</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">4. NHIs Are Increasingly Targeted by Attackers</h3><p style="text-align:left;">Sophisticated threat actors have recognized this vulnerability. Recent attack patterns show a deliberate shift toward targeting machine identities for:</p><ul><li style="text-align:left;"><strong>Persistence:</strong> NHIs provide long-term access without triggering user-based security alerts</li><li style="text-align:left;"><strong>Privilege Escalation:</strong> Service accounts often have admin-level access</li><li style="text-align:left;"><strong>Lateral Movement:</strong> Machine-to-machine trust relationships create pathways across the network</li><li style="text-align:left;"><strong>Data Exfiltration:</strong> API keys can provide direct access to sensitive data stores</li></ul><div style="text-align:left;"><br/></div>
<hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">Real-World Impact: The Cost of NHI Compromise</h2><p style="text-align:left;">The consequences of NHI security failures are severe and increasingly common.</p><p style="text-align:left;"><strong><br/></strong></p><p style="text-align:left;"><strong>Case Study: The Moneyview Breach (October 2025)</strong></p><p style="text-align:left;">On October 27, 2025, Dubai-based attackers exploited compromised API keys to extract approximately $5.8 million USD from Moneyview — a leading Indian fintech platform — in just three hours.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The attack vector? A single Non-Human Identity with access to critical financial systems. No phishing required. No social engineering. Just one ungoverned machine credential.</p><p style="text-align:left;">This isn't an isolated incident. Major breaches at companies across healthcare, finance, and technology sectors have traced back to compromised service accounts and API keys.</p><hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">The Compliance Dimension</h2><p style="text-align:left;">NHI governance isn't just a security concern — it's increasingly a compliance requirement.</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">ISO 27001</h3><p style="text-align:left;">The updated ISO 27001 framework now explicitly addresses machine identity management as part of access control requirements. Organizations pursuing or maintaining certification must demonstrate governance over all identity types.</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">SOC 2</h3><p style="text-align:left;">SOC 2 Type II audits are beginning to include questions about service account lifecycle management, API key rotation policies, and machine identity inventory.</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">Industry-Specific Regulations</h3><p style="text-align:left;">Financial services (PCI-DSS), healthcare (HIPAA), and government contractors (FedRAMP) all have evolving requirements around identity governance that extend to Non-Human Identities.</p><p style="text-align:left;"><strong><br/></strong></p><p style="text-align:left;"><strong>The compliance gap is real:</strong> Organizations that fail to govern NHIs are increasingly finding themselves flagged during audits.</p><hr style="text-align:left;"/><br/><h2 style="text-align:left;">The Three Phases of an NHI Breach</h2><div><br/></div>
<p style="text-align:left;">Understanding how attackers exploit Non-Human Identities is crucial for defense. Most NHI breaches follow a predictable pattern:</p><h3 style="text-align:left;">Phase 1: Discovery</h3><p style="text-align:left;">Attackers scan for exposed credentials through:</p><ul><li style="text-align:left;">Public code repositories (GitHub, GitLab, Bitbucket)</li><li style="text-align:left;">Misconfigured cloud storage (S3 buckets, Azure blobs)</li><li style="text-align:left;">Leaked configuration files</li><li style="text-align:left;">Dark web credential markets</li><li style="text-align:left;">Social engineering of DevOps teams</li></ul><div style="text-align:left;"><br/></div>
<h3 style="text-align:left;">Phase 2: Exploitation</h3><p style="text-align:left;">Once credentials are obtained, attackers:</p><ul><li style="text-align:left;">Test API keys for valid access</li><li style="text-align:left;">Map the scope of service account permissions</li><li style="text-align:left;">Identify high-value targets accessible through the credential</li><li style="text-align:left;">Establish persistence mechanisms</li></ul><div style="text-align:left;"><br/></div>
<h3 style="text-align:left;">Phase 3: Lateral Movement and Exfiltration</h3><p style="text-align:left;">With a foothold established, attackers:</p><ul><li style="text-align:left;">Leverage machine-to-machine trust relationships</li><li style="text-align:left;">Pivot to additional systems using the compromised identity's access</li><li style="text-align:left;">Extract sensitive data</li><li style="text-align:left;">Deploy ransomware or establish long-term presence</li></ul><div style="text-align:left;"><br/></div>
<hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">Building an NHI Governance Framework</h2><p style="text-align:left;">Addressing NHI security requires a comprehensive governance approach. Here's the framework we recommend:</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">1. Discovery and Inventory</h3><p style="text-align:left;">You can't secure what you don't know exists. The first step is comprehensive discovery:</p><ul><li style="text-align:left;">Scan all repositories for embedded credentials</li><li style="text-align:left;">Inventory service accounts across cloud and on-premise systems</li><li style="text-align:left;">Map API integrations and their associated keys</li><li style="text-align:left;">Identify IoT devices and their authentication mechanisms</li><li style="text-align:left;">Catalog CI/CD pipeline credentials</li></ul><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">2. Classification and Risk Assessment</h3><p style="text-align:left;">Not all NHIs carry equal risk. Classify based on:</p><ul><li style="text-align:left;"><strong>Access level:</strong> What systems and data can this identity access?</li><li style="text-align:left;"><strong>Business criticality:</strong> What processes depend on this identity?</li><li style="text-align:left;"><strong>Exposure risk:</strong> Is this credential at risk of exposure?</li><li style="text-align:left;"><strong>Compliance impact:</strong> Does this identity touch regulated data?</li></ul><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">3. Policy Implementation</h3><p style="text-align:left;">Establish clear policies for NHI lifecycle management:</p><ul><li style="text-align:left;"><strong>Provisioning:</strong> Least-privilege access by default</li><li style="text-align:left;"><strong>Rotation:</strong> Automated credential rotation schedules</li><li style="text-align:left;"><strong>Monitoring:</strong> Real-time alerting on anomalous NHI behavior</li><li style="text-align:left;"><strong>Deprovisioning:</strong> Clear processes for retiring unused credentials</li></ul><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">4. Continuous Monitoring and Audit</h3><p style="text-align:left;">NHI governance isn't a one-time project:</p><ul><li style="text-align:left;">Implement continuous monitoring for credential misuse</li><li style="text-align:left;">Regular access reviews for service accounts</li><li style="text-align:left;">Automated alerting for policy violations</li><li style="text-align:left;">Periodic audits against compliance frameworks</li></ul><br/><hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">Why Traditional IAM Falls Short</h2><div><br/></div>
<p style="text-align:left;">If your organization has invested in Identity and Access Management solutions, you might wonder why NHI security requires special attention.</p><p style="text-align:left;">The reality is that traditional IAM was designed for human users:</p><ul><li style="text-align:left;"><strong>Authentication flows</strong> assume interactive login</li><li style="text-align:left;"><strong>Access reviews</strong> are built around human managers</li><li style="text-align:left;"><strong>Lifecycle management</strong> follows HR processes (onboarding, role changes, offboarding)</li><li style="text-align:left;"><strong>Risk scoring</strong> is based on human behavior patterns</li></ul><p style="text-align:left;">NHIs don't fit these models. They don't have managers. They don't change roles. They don't exhibit &quot;normal&quot; behavior patterns. They need purpose-built governance.</p><p style="text-align:left;"><br/></p><hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">Taking Action: Your Next Steps</h2><p style="text-align:left;">Addressing NHI security can seem overwhelming, but progress is possible with a structured approach:</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">Immediate Actions (This Week)</h3><ol><li style="text-align:left;"><strong>Audit your public repositories</strong> for exposed credentials</li><li style="text-align:left;"><strong>Inventory service accounts</strong> with admin-level privileges</li><li style="text-align:left;"><strong>Identify API keys</strong> that haven't been rotated in 12+ months</li></ol><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">Short-Term Initiatives (This Quarter)</h3><ol><li style="text-align:left;"><strong>Implement secrets management</strong> for new projects</li><li style="text-align:left;"><strong>Establish rotation policies</strong> for critical credentials</li><li style="text-align:left;"><strong>Deploy monitoring</strong> for service account activity</li></ol><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">Strategic Program (This Year)</h3><ol><li style="text-align:left;"><strong>Build comprehensive NHI inventory</strong> across all systems</li><li style="text-align:left;"><strong>Implement governance framework</strong> with clear policies</li><li style="text-align:left;"><strong>Integrate NHI security</strong> into compliance programs</li></ol><br/><hr style="text-align:left;"/><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">Learn More: Join Our Free Webinar</h2><p style="text-align:left;">Want to dive deeper into Non-Human Identity governance?</p><p style="text-align:left;"><strong>Codewave</strong> and <strong>StackGuard</strong> are hosting a free educational webinar:</p><h3 style="text-align:left;"><br/></h3><h3 style="text-align:left;">The Silent Majority of Risk: Mastering Non-Human Identity Governance</h3><p></p><div style="text-align:left;"><strong>Date:</strong> 10 December 2025 (Wednesday) </div><strong><div style="text-align:left;"><strong>Time:</strong><span style="font-weight:400;"> 2:00 PM ICT | 3:00 PM SGT</span></div></strong><div style="text-align:left;"><strong>Duration:</strong> 45 minutes (35-minute deep-dive + Live Q&amp;A) </div><strong><div style="text-align:left;"><strong>Cost:</strong><span style="font-weight:400;"> FREE</span></div></strong><p></p><p style="text-align:left;"><strong><br/></strong></p><p style="text-align:left;"><strong>What You'll Learn:</strong></p><ul><li style="text-align:left;">The NHI threat landscape with real-world data</li><li style="text-align:left;">Compliance implications for ISO27001, SOC2, and industry frameworks</li><li style="text-align:left;">The three phases of an NHI breach and how to defend against each</li><li style="text-align:left;">A practical governance framework you can implement immediately</li></ul><p style="text-align:left;"><strong><br/></strong></p><p style="text-align:left;"><strong>Featured Speakers:</strong></p><ul><li style="text-align:left;"><strong>Kapil Jain</strong>, CEO — StackGuard</li><li style="text-align:left;"><strong>Ankit Mehta</strong>, CEO — Codewave</li></ul><p style="text-align:left;"><strong>🎁 Bonus:</strong> Attendees get a chance to win an Amazon Gift Card!</p></div>
<p></p></div></div><div data-element-id="elm_7so4x-L4QkyyN0Ar9PYovg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-full-width " href="https://meet.zoho.com/hugi-rvh-irf" target="_blank"><span class="zpbutton-content">Register Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 30 Nov 2025 07:48:45 +0700</pubDate></item><item><title><![CDATA[AWS CodeCommit Rises from the Dead: What This Tells Us About Customer Voice in Cloud]]></title><link>https://codewave.asia/blogs/post/aws-codecommit-rises-from-the-dead-what-this-tells-us-about-customer-voice-in-cloud</link><description><![CDATA[<img align="left" hspace="5" src="https://codewave.asia/blog-images/code-commit.png"/>AWS just reversed course on CodeCommit after deprecating it in July 2024. Why? Turns out deep AWS integration matters more than feature count for enterprise teams. Here's what this resurrection tells us about cloud strategy.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_WPY4qJLZQOCmd9q9GHUbXA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_reuDhPGSTkKkCyU5XGyCkg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_3r11U85-S1G1_tA0w6tm5g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_1EnILMhkSCOIq5s3fl04QA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;"><span style="color:rgb(76, 76, 76);font-family:Muli, sans-serif;font-size:16px;font-weight:400;">When AWS quietly deprecated CodeCommit in July 2024, I'll admit - I wasn't surprised. The writing had been on the wall. GitHub and GitLab had already won the developer mindshare battle, and AWS seemed to be cleaning house under new CEO Matt Garman. CodeCommit was slow, feature-poor, and frankly, felt like an afterthought in AWS's sprawling service catalog.</span></p><p style="text-align:left;"><br/></p><p style="text-align:left;">What I didn't expect was this: AWS just brought it back.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Yesterday, AWS announced CodeCommit's return to full general availability. Not just maintaining it for existing customers, but actively investing in it with Git LFS support coming in Q1 2026 and regional expansions planned. This is remarkable, and it says something important about where cloud computing is heading.</p><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">Why This Matters</h2><p style="text-align:left;">Here's what AWS learned that we've been telling our clients for years: <strong>integration depth matters more than feature richness when you're operating at scale</strong>.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">CodeCommit never had the slickest UI or the most advanced collaboration features. What it had was something far more valuable for enterprise teams - seamless IAM integration, VPC endpoint support, CloudTrail logging, and native connectivity with CodePipeline and CodeBuild. For teams in regulated industries or those running complex AWS-native architectures, that integration isn't just convenient. It's often the difference between a compliant system and a compliance headache.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">When we work with clients on cloud migration and DevOps implementations, we see this pattern constantly. The &quot;best&quot; tool on paper often loses to the one that fits naturally into your existing infrastructure. CodeCommit wasn't competing with GitHub on developer experience. It was solving a different problem - giving AWS-centric teams a repository solution that spoke the same security and governance language as the rest of their stack.</p><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">The Broader Signal</h2><p style="text-align:left;">This reversal tells us something bigger about the current state of cloud services. AWS listened to their customers and reversed course. In an industry where deprecation announcements usually mean &quot;start planning your exit,&quot; this is almost unprecedented.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The feedback AWS received was clear: customers in regulated industries couldn't easily replicate CodeCommit's tight AWS integration with third-party providers. When you're dealing with strict compliance requirements, having your source control behind the same IAM policies and VPC configurations as your compute infrastructure isn't a nice-to-have. It's fundamental architecture.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">This is exactly the kind of consideration that should drive your DevOps and DevSecOps strategy. At Codewave, we constantly evaluate whether a service's ecosystem fit outweighs its standalone capabilities. Sometimes the answer is yes - use the integrated AWS service. Sometimes it's no - the specialized third-party tool is worth the integration overhead. But you can't make that call without understanding both your compliance requirements and your operational complexity.</p><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">What We're Watching</h2><p style="text-align:left;">AWS promised Git LFS support - their most requested feature. That's huge for teams managing design assets, ML models, or any workflow involving large binaries. The regional expansion to eu-south-2 and ca-west-1 also signals they're serious about making this globally viable.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">But here's what I'm really watching: whether AWS can move fast enough. The deprecation announcement caused real damage. Teams spent time and resources planning migrations. Some completed them. Trust was broken. AWS acknowledged this and apologized, which is commendable. But rebuilding that trust means consistent investment and clear communication going forward.</p><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">For Our Clients</h2><p style="text-align:left;">If you're currently using CodeCommit - this is good news. The uncertainty is over, and there's now a roadmap.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If you migrated away - don't feel pressured to migrate back. GitHub, GitLab, and Bitbucket are excellent platforms. The right choice depends on your specific architecture, team preferences, and compliance requirements.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">If you're evaluating options - CodeCommit is back on the table, especially if you're heavily invested in AWS services and need that deep integration. But have the conversation about whether that integration is truly valuable for your use case or just convenient.</p><h2 style="text-align:left;"><br/></h2><h2 style="text-align:left;">The Real Lesson</h2><p style="text-align:left;">The CodeCommit story isn't really about Git repositories. It's about listening to customers and understanding that in enterprise cloud infrastructure, integration patterns matter as much as features. It's about AWS recognizing that even &quot;small&quot; services can be critical to specific customer segments.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">For those of us building and migrating cloud architectures, it's a reminder to look beyond surface-level feature comparisons. The best solution is the one that fits your broader ecosystem, compliance requirements, and operational model - not the one with the most GitHub stars.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">AWS brought CodeCommit back because customers made it clear they needed an AWS-native repository solution. That's customer feedback working exactly as it should. Now let's see if AWS can turn this resurrection into something worth keeping alive.</p><hr style="text-align:left;"/><p style="text-align:left;"><em>Thoughts on AWS's reversal? Have questions about whether CodeCommit makes sense for your architecture? Let's discuss in the comments or reach out directly - we're always happy to talk through cloud strategy decisions.</em></p></div><p></p></div>
</div><div data-element-id="elm_zBoRlgNvShGXRnBU9g1drw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact" target="_blank"><span class="zpbutton-content">Let's Connect</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 24 Nov 2025 16:11:07 +0700</pubDate></item></channel></rss>