A security analysis of amazon's elastic compute cloud service

Balduzzi, Marco; Zaddach, Jonas; Balzarotti, Davide; Kirda, Engin; Loureiro, Sergio
SAC 2012, 27th ACM Symposium On Applied Computing, Security Track, March 26-30, 2012, Trento, Italy

Cloud services such as Amazon's Elastic Compute Cloud and IBM's SmartCloud are quickly changing the way organizations are dealing with IT infrastructures and are providing online services. Today, if an organization needs computing power, it can simply buy it online by instantiating a virtual server image on the cloud. Servers can be quickly launched and shut down via application programming interfaces, offering the user a greater exibility compared to traditional server rooms. This paper explores the general security risks associated with using virtual server images from the public catalogs of cloud service providers. In particular, we investigate in detail the security problems of public images that are available on the Amazon EC2 service. We describe the design and implementation of an automated system that we used to instantiate and analyze the security of public AMIs on the Amazon EC2 platform, and provide detailed descriptions of the security tests that we performed on each image. Our findings demonstrate that both the users and the providers of public AMIs may be vulnerable to security risks such as unauthorized access, malware infections, and loss of sensitive information. The Amazon Web Services Security Team has acknowledged our findings, and has already taken steps to properly address all the security risks we present in this paper.

 


DOI
Type:
Conference
City:
Trento
Date:
2012-03-26
Department:
Digital Security
Eurecom Ref:
3548
Copyright:
© ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SAC 2012, 27th ACM Symposium On Applied Computing, Security Track, March 26-30, 2012, Trento, Italy http://dx.doi.org/10.1145/2245276.2232005

PERMALINK : https://www.eurecom.fr/publication/3548