“Well, when an internal Amazon administrator for AWS is responsible for the Capital One breach, there SHOULD be a concern.”
Worse. It was an Ex-Amazon AWS admin who breached an AWS customer’s security. Indicates very poor Systems architecture, management and security practices. Disabling all Admin accounts and resetting externally accessible administrative accounts is a 0-day activity when someone leaves a contract.
Even if C1’s data was downloaded when ‘it’ was still employed at AWS it means personal, external storage devices are permitted on the AWS management network. Bad, bad, bad.