Automated Security Assessments of Amazon Web Service Environments

نویسندگان

چکیده

Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing operations, especially at large scales, can quickly intractable. Customer-side issues such as service misconfigurations, data breaches, insecure changes are prevalent. Furthermore, cloud-specific tactics techniques paired with application vulnerabilities create a complex search space. Various solutions modeling languages for security assessments exist. no single one appeared sufficiently cloud-centered holistic. Many also did not account tactical dimensions. This paper, therefore, presents domain-specific language AWS environments. When used model environments, manually or automatically, the automatically constructs traverses attack graphs assess security. Assessments, require minimal expertise from user. The was primarily tested on four third-party environments through securiCAD Vanguard, commercial tool built around language. validated further by measuring performance models provided anonymous end users comparison similar open source assessment tool. As of March 2020, could represent essential structures, tactics, threats. tests highlighted certain shortcomings. Data collection steps, planted credentials, some missing were obvious. Nevertheless, covered DSL already reminiscent common real-world precedents. Future additions attacker addressing should yield considerable improvements.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Web Service Composition

Director I certify that this thesis satisfies all the requirements as a thesis for the degree of Master of Science. This is to certify that we have read this thesis and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of Master of Science. I hereby declare that all information in this document has been obtained and presented in accordance with academic ...

متن کامل

Web Service Security

Authentication is the process of making sure that the person who is requesting a web service is really the person that they claim to be. This is done by requiring the user to provide a set of credentials. In return, they will receive a security token that can be used to access the server. The credentials usually take the form of a user id and password. On the other hand, the security token that...

متن کامل

Web Service Security - XKMS (TrustPoint)

Funktionsweise, nennt Vor-und Nachteile und gibt Einblick in die Realisierung eines XKMS Re-sponders im Rahmen des Projektes TrustPoint.

متن کامل

Semi-Automated Management of Web Service Contracts

Service-oriented computing as a concept for providing interoperability and flexibility within heterogeneous environments has gained much attention within the last few years. Dynamically integrating external Web services into enterprise applications requires automatic contracting between service requestors and providers and automatic contract monitoring. This paper suggests a semi-automatic appr...

متن کامل

Semantic Security in Service Oriented Environments

As the technical infrastructure to support Grid environments matures, attention must be focused on integrating such technical infrastructure with technologies to support more dynamic access to services, and ensuring that such access is appropriately monitored and secured. Current approaches for securing organisations thorugh conventional firewalls are insufficient; access is either enabled or d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on privacy and security

سال: 2022

ISSN: ['2471-2574', '2471-2566']

DOI: https://doi.org/10.1145/3570903