
Overview
In modern AWS environments, event-driven architectures are essential for building decoupled and scalable applications. Amazon EventBridge serves as the central nervous system for these designs, routing events between services, applications, and even different AWS accounts. This cross-account capability is powerful for creating centralized logging hubs or integrating with third-party SaaS solutions.
However, this flexibility introduces a significant security and financial risk if not governed properly. A misconfigured EventBridge event bus can become an open door, allowing any AWS account on the internet to inject malicious or unwanted events into your environment. This bypasses traditional network security, creating a critical blind spot.
Securing the resource-based policies on your event buses is a foundational task for cloud governance. Without proper controls, you risk event injection attacks, operational disruption, and significant cost overruns. This article provides a FinOps-focused guide to understanding and mitigating the risks associated with permissive cross-account EventBridge access.
Why It Matters for FinOps
An improperly secured event bus is not just a security vulnerability; it’s a major financial liability. From a FinOps perspective, the impact of uncontrolled cross-account access is severe. Attackers can trigger a “Denial of Wallet” attack by flooding an open event bus with a high volume of events. This not only incurs costs for event ingestion but also triggers downstream compute resources like AWS Lambda or Fargate, leading to massive, unexpected spikes in your cloud bill.
Beyond direct costs, this misconfiguration introduces significant operational drag. A flood of malicious events can overwhelm legitimate traffic, causing service degradation or complete outages for critical business workflows. This leads to broken processes, poor customer experiences, and emergency engineering interventions.
Furthermore, failing to enforce least-privilege access on event buses is a major compliance violation for frameworks like PCI-DSS, SOC 2, and HIPAA. It demonstrates a lack of control over your system’s boundaries, putting sensitive data at risk and potentially leading to audit failures and regulatory fines.
What Counts as “Idle” in This Article
While EventBridge itself is a serverless offering, the concept of waste applies to its configuration. In this article, a misconfigured or “wasteful” policy is one that is overly permissive, creating unnecessary risk and potential cost. The primary signal of this misconfiguration is a weak resource-based policy attached to an event bus.
Specifically, we identify an insecure configuration by looking for policies that grant the events:PutEvents permission to:
- A wildcard principal (
"Principal": "*"), which allows any AWS account to send events. - AWS account IDs that are not explicitly recognized or part of an approved “trusted account” list.
These configurations represent an ungoverned entry point into your cloud environment, exposing your architecture to external threats and financial waste.
Common Scenarios
Understanding when and why cross-account access is used helps separate legitimate design patterns from dangerous misconfigurations.
Scenario 1
A developer, working on a tight deadline, needs to connect a service in a development account to an event bus in a staging account. To simplify testing, they apply a policy with a wildcard principal, intending to replace it later. This temporary fix is forgotten and promoted to production, leaving a critical workflow exposed to the entire internet.
Scenario 2
A mature organization operates a central security account to aggregate logs and alerts from dozens of member accounts within its AWS Organization. The event bus in the security account is configured with a resource policy that explicitly lists the account IDs of every member account, or more efficiently, uses a condition key to grant access to any account within the organization. This is a valid, secure, and common governance pattern.
Scenario 3
A company integrates a third-party monitoring tool that sends alerts back into their AWS environment via an EventBridge API destination. The event bus policy must grant PutEvents permission to the SaaS vendor’s specific AWS account ID. While a legitimate use case, this requires careful management, as the security of that entry point now depends on the vendor’s security posture.
Risks and Trade-offs
The primary challenge in remediation is avoiding disruption to production services. Many legitimate workflows, including centralized logging and third-party integrations, rely on cross-account EventBridge access. Aggressively locking down all event bus policies without a proper audit could break critical operational processes.
The “don’t break prod” principle is paramount. Before implementing restrictive policies, teams must perform a thorough audit to identify all existing event sources. This involves analyzing CloudTrail logs to see which accounts are actively sending events and validating that each source is known and authorized. Simply revoking access based on a policy scan alone risks creating an outage. This careful balance ensures that security is enhanced without sacrificing operational stability.
Recommended Guardrails
Establishing proactive controls is key to preventing insecure EventBridge configurations from ever reaching production.
- Policy Standards: Implement a clear policy that forbids the use of wildcard principals in event bus resource policies. Mandate that all cross-account access must be granted only to specific, approved AWS account IDs.
- Organizational Controls: When enabling access for internal accounts, use the
aws:PrincipalOrgIDcondition key to ensure that only accounts within your AWS Organization can send events. - Ownership and Approval: Assign clear ownership for each event bus. Any request to add a new external AWS account to a policy should go through a formal approval process involving both the application owner and the security team.
- Automated Monitoring: Use tools like AWS Config to continuously monitor event bus policies. Configure automated alerts to notify the security or FinOps team immediately when a non-compliant policy is detected.
Provider Notes
AWS
Amazon EventBridge relies on resource-based policies to manage cross-account permissions. These JSON policy documents are attached directly to an event bus and define which principals (users, roles, or AWS accounts) are allowed to perform specific actions.
The most critical action to govern is events:PutEvents, as it allows an entity to send events to the bus. For secure, organization-wide sharing, policies should leverage the aws:PrincipalOrgID global condition key. This allows you to grant access to any account within your AWS Organization without needing to list each account ID individually, simplifying management and improving security.
Binadox Operational Playbook
Binadox Insight: Think of your event buses as a “serverless perimeter.” Because they operate on the AWS control plane, they bypass traditional network defenses like VPC security groups and network ACLs. Securing this perimeter requires a focus on IAM resource policies, not network rules.
Binadox Checklist:
- Inventory all custom and default event buses across every AWS region in use.
- Audit the resource-based policy of each event bus, specifically searching for wildcard principals.
- Develop and maintain a definitive list of “trusted” AWS account IDs, including internal accounts and approved third-party vendors.
- Systematically replace overly permissive policies with least-privilege rules that reference the trusted account list or your AWS Organization ID.
- Implement continuous monitoring to detect and alert on any future policy changes that deviate from your established guardrails.
Binadox KPIs to Track:
- Number of event buses with public (wildcard) access policies.
- Percentage of event buses compliant with the corporate trusted account standard.
- Mean Time to Remediate (MTTR) for non-compliant event bus policies.
- Number of unexpected cost incidents traced back to event injection.
Binadox Common Pitfalls:
- Forgetting to audit the default event bus, which exists in every AWS region and can also have resource policies attached.
- Remediating policies too aggressively without first auditing event sources, causing outages in legitimate workflows.
- Failing to add authorized third-party SaaS vendor accounts to the trusted list, leading to broken integrations.
- Treating remediation as a one-time project and failing to monitor for configuration drift, allowing insecure policies to reappear over time.
Conclusion
Securing Amazon EventBridge cross-account access is a non-negotiable aspect of modern cloud governance. It sits at the intersection of security, operations, and FinOps, where a single misconfiguration can lead to data breaches, service interruptions, and significant financial waste.
By adopting a proactive approach—auditing existing policies, establishing clear guardrails, and implementing continuous monitoring—organizations can harness the power of event-driven architectures safely. Start by gaining visibility into your current configurations to understand your risk exposure, then enforce policies that ensure your event buses remain a secure and efficient backbone for your cloud applications.