Author:
Cauli Claudia,Li Meng,Piterman Nir,Tkachuk Oksana
Abstract
Abstract
Over the past ten years, the adoption of cloud services has grown rapidly, leading to the introduction of automated deployment tools to address the scale and complexity of the infrastructure companies and users deploy. Without the aid of automation, ensuring the security of an ever-increasing number of deployments becomes more and more challenging. To the best of our knowledge, no formal automated technique currently exists to verify cloud deployments during the design phase. In this case study, we show that Description Logic modeling and inference capabilities can be used to improve the safety of cloud configurations. We focus on the Amazon Web Services (AWS) proprietary declarative language, CloudFormation, and develop a tool to encode template files into logic. We query the resulting models with properties related to security posture and report on our findings. By extending the models with dataflow-specific knowledge, we use more comprehensive semantic reasoning to further support security reviews. When applying the developed toolchain to publicly available deployment files, we find numerous violations of widely-recognized security best practices, which suggests that streamlining the methodologies developed for this case study would be beneficial.
Publisher
Springer International Publishing
Reference39 articles.
1. Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press (2003)
2. Baader, F., Horrocks, I., Lutz, C., Sattler, U.: An Introduction to Description Logic. Cambridge University Press (2017)
3. Baader, F., Horrocks, I., Sattler, U.: Description logics. In: Handbook of Knowledge Representation, Foundations of Artificial Intelligence, vol. 3, pp. 135–179. Elsevier (2008)
4. Lecture Notes in Computer Science;J Backes,2019
5. Backes, J., et al.: Semantic-based automated reasoning for AWS access policies using SMT. In: FMCAD, pp. 1–9. IEEE (2018)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An intent-based solution for network isolation in Kubernetes;2024 IEEE 10th International Conference on Network Softwarization (NetSoft);2024-06-24
2. Security Automation in next-generation Networks and Cloud environments;NOMS 2024-2024 IEEE Network Operations and Management Symposium;2024-05-06
3. Test-suite-guided discovery of least privilege for cloud infrastructure as code;Automated Software Engineering;2024-03-05
4. Runtime Enforcement Using Knowledge Bases;Fundamental Approaches to Software Engineering;2023
5. Threat Modeling in Cloud Computing - A Literature Review;Communications in Computer and Information Science;2023