Automated Security Assessments of Amazon Web Services Environments

Author:

Engström Viktor1ORCID,Johnson Pontus1ORCID,Lagerström Robert1ORCID,Ringdahl Erik2ORCID,Wällstedt Max2ORCID

Affiliation:

1. KTH Royal Institute of Technology, Teknikringen, Stockholm, Sweden

2. Foreseeti AB, Stockholm, Sweden

Abstract

Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as service misconfigurations, data breaches, and insecure changes are prevalent. Furthermore, cloud-specific tactics and techniques paired with application vulnerabilities create a large and complex search space. Various solutions and modeling languages for cloud security assessments exist. However, no single one appeared sufficiently cloud-centered and holistic. Many also did not account for tactical security dimensions. This article, therefore, presents a domain-specific modeling language for AWS environments. When used to model AWS environments, manually or automatically, the language automatically constructs and traverses attack graphs to assess security. Assessments, therefore, require minimal security expertise from the user. The modeling language was primarily tested on four third-party AWS environments through securiCAD Vanguard, a commercial tool built around the AWS modeling language. The language was validated further by measuring performance on models provided by anonymous end users and a comparison with a similar open source assessment tool. As of March 2020, the modeling language could represent essential AWS structures, cloud tactics, and threats. However, the tests highlighted certain shortcomings. Data collection steps, such as planted credentials, and some missing tactics were obvious. Nevertheless, the issues covered by the DSL were already reminiscent of common issues with real-world precedents. Future additions to attacker tactics and addressing data collection should yield considerable improvements.

Funder

KTH Center for Cyber Defense and Information Security

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference60 articles.

1. Introduction to the OCTAVE Approach

2. Mohamed Almorsy and John Grundy. 2014. SecDSVL: A domain-specific visual language to support enterprise security modelling. In Proceedings of the 23rd Australian Software Engineering Conference. IEEE, 152–161.

3. Vulnus: Visual vulnerability analysis for network security;Angelini Marco;IEEE Trans. Visual. Comput. Graph.,2018

4. MAD: A visual analytics solution for Multi-step cyber Attacks Detection

5. Michael Lyle Artz. 2002. Netspa: A Network Security Planning Architecture. Ph.D. DissertationMassachusetts Institute of Technology.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3