Affiliation:
1. KTH Royal Institute of Technology, Teknikringen, Stockholm, Sweden
2. Foreseeti AB, Stockholm, Sweden
Abstract
Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as service misconfigurations, data breaches, and insecure changes are prevalent. Furthermore, cloud-specific tactics and techniques paired with application vulnerabilities create a large and complex search space. Various solutions and modeling languages for cloud security assessments exist. However, no single one appeared sufficiently cloud-centered and holistic. Many also did not account for tactical security dimensions. This article, therefore, presents a domain-specific modeling language for AWS environments. When used to model AWS environments, manually or automatically, the language automatically constructs and traverses attack graphs to assess security. Assessments, therefore, require minimal security expertise from the user. The modeling language was primarily tested on four third-party AWS environments through securiCAD Vanguard, a commercial tool built around the AWS modeling language. The language was validated further by measuring performance on models provided by anonymous end users and a comparison with a similar open source assessment tool. As of March 2020, the modeling language could represent essential AWS structures, cloud tactics, and threats. However, the tests highlighted certain shortcomings. Data collection steps, such as planted credentials, and some missing tactics were obvious. Nevertheless, the issues covered by the DSL were already reminiscent of common issues with real-world precedents. Future additions to attacker tactics and addressing data collection should yield considerable improvements.
Funder
KTH Center for Cyber Defense and Information Security
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference60 articles.
1. Introduction to the OCTAVE Approach
2. Mohamed Almorsy and John Grundy. 2014. SecDSVL: A domain-specific visual language to support enterprise security modelling. In Proceedings of the 23rd Australian Software Engineering Conference. IEEE, 152–161.
3. Vulnus: Visual vulnerability analysis for network security;Angelini Marco;IEEE Trans. Visual. Comput. Graph.,2018
4. MAD: A visual analytics solution for Multi-step cyber Attacks Detection
5. Michael Lyle Artz. 2002. Netspa: A Network Security Planning Architecture. Ph.D. DissertationMassachusetts Institute of Technology.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Metalanguage for Dynamic Attack Graphs and Lazy Generation;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30