This document provides a security evaluation of Amazon Web Services (AWS) and discusses the vulnerabilities and threats it faces. It explores measures and techniques to compromise organizational operations. The evaluation includes penetration testing, stress testing, and vulnerability scanning using tools like sqlmap and Wireshark.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Amazon Web Services security evaluation Name Institution Professor Course Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Introduction...............................................................................................................................................3 AWS Assets................................................................................................................................................4 AWS Security threats................................................................................................................................4 Amazon Web Service vulnerabilities.......................................................................................................4 Amazon security objectives.......................................................................................................................6 AWS vulnerability controls......................................................................................................................7 Security evaluation matrix........................................................................................................................8 Conclusion..................................................................................................................................................9 Bibliography............................................................................................................................................10
Introduction Information system security has been a great challenge in today’s technology world due to lack of proper security measures. To make sure organizational data remains secure, some protection techniques and measures should be adopted by the subjected organization. Some of the measures are users, organization and service provider related. In this regard, it can be observed that the security of an information system involves several entities with different roles to play. Since each information system or product have different requirements that have to be met, the paper would focus on Amazon Web Services (AWS) as a product (Micro 2013, pp. 5-6). Security evaluation would be based on several scenarios such as subjecting AWS platform to stress testing. The security testing and analysis on AWS would also be done through penetration testing by evaluating if some vulnerabilities exist. Sqlmap and Wireshark are some of the best tools which would be used to perform security checks, perform database injections and subject available resources to stress. On the same note, cross-site scripting (XSS) would be done to try and extract confidential information such as login from novice users. Finally, the free account would be created in the AWS platform and try to compromise the AWS application console. In this case, the vulnerability checks would be focused on poor user accounts protection which can be advanced later to AWS console. The system security evaluation offers an opportunity to perform prior analysis on security risks that specific information system might be exposed to. The goal of the study would be to assess security measures and techniques which can be used to compromise organizational operations.
AWS Assets Amazon Web Services supports many business entities which depends on it to run its daily operations. Some of the assets that can be adversely affected by insecure AWS are; organizational database, Network and hardware devices such as computers, routers and sensors. The database is the key to any organizational operations and failure to secure data may render organizational operations unreliable (Micro 2013, pp. 5). Next, the network supports all online operations and sharing of data within and outside the organization. Its security should be guaranteed for successful business operations. Finally, hardware devices such as computers should be accorded necessary security prevention by securing them with strong ant malware. AWS Security threats Some of the threats that can affect Amazon business operations are; Hacking, malware attacks, unsecured web interfaces and Denial of services (DoS) (Micro 2013, pp. 2). Hacking can be done by either internal or external entities with vested interests such as competitors and experts doing it for a hobby. Malware infection is also performed by third parties through the sharing of data or employees injecting infected disks intentionally. Unsecured web interfaces are caused by developers failing to adhere to secure design principles. These threats have a higher magnitude of impacts on service delivery because the attacker on one of the service or assets results to operational issues. Amazon Web Service vulnerabilities Amazon Web services have set up its infrastructure framework in such a way that it remains the responsibility of all stakeholders to secure its infrastructure. It is important to note that system security cannotbe a task dedicatedto a single entity. TheAWSbeing an infrastructure that supports different services in use by various entities, making the sole responsibility of each of the service provider cannot guarantee the required security. It is from
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
distribution of the security responsibilities that hackers try to evaluate vulnerabilities that system users have left open without their knowledge. Under shared responsibilities, Amazon keeps vigilant over the security of its applications but it is the responsibility of the system owner to make sure all security configurations are done. When attacking the system, system vulnerabilities would majorly evaluate the concept of shared responsibility because it is obvious that shared resources have so many loopholes. It is understood that Amazon has set guidelines and requirements for creating strong authentication but many system users would end up using obvious passwords that can be easily guessed. During system security vulnerability testing, password snooping has been one of the major criteria that was intensively evaluated. Through eavesdropping by capturing transmitted packets, it was possible to observe that Amazon has secured its application through data encryption. To customers who create weak passwords, it was possible to analyze available usernames and try to guess the possibility of getting the right password through multiple combinations. The password vulnerability was tested by creating a free account with Amazon platform and requested a friend to change the password. Being aware of the username, password search was done by trying the possible combination of possible passwords. Though password cracking was unsuccessful, it was observable that weak password such as using individual names as well as relatives can be a security threat. Additionally,vulnerabilityevaluationoftheAmazonplatformhasbeendoneby analyzing development and configuration loopholes which included scanning to check the nature of protection done. Vulnerability check was done through the use of tools such as sqlmap and data packets analysis captured through the use of Wireshark. The combination of these tools was quite useful because it was possible to subject the Amazon platform under SQL injection. As an attacker, it was possible to observe that combination of sqlmap and Wireshark gave promising
results. It was very impressive to see tools being used to suppress the AWS by inducing stress on the system. Stress testing was done by initiating multiple result requests simultaneously. Both stress testing and SQL injection were done at the user level and AWS console level login. By inducing stress on to the system, it was possible to over-utilize resources that are required by other users which might have caused Denial of Services (DoS). Stress was evaluated by subjecting the system under immense request from Linux based attacker while trying to access the same infrastructure from a windows based computer as novice users. The slowness in gaining access to an individual created a free account was a clear indication that the AWS server was receiving many requests that before. After ending the stress testing process, system testing access was done and it was fine. In this regard, it was observed that the system can be subjected to intense spam request by inducing undesirable resource requests which result in DoS. As the system was under induced stress testing, SQL injection was being done by scanning continuously on any open port directed to available databases. Besides, programming loopholes were being tested by trying to check the feasibility of escape and special characters being unhandled at the exception level. Amazon security objectives The goal of Amazon is to offer secure and stable services to all its customers. To achieve its goals, Amazon has come up with a security framework to secure its infrastructure. It is the responsibility of every Amazon service consumer to secure the infrastructure with strong authentication credentials. The next security requirements from the customers' are to report any suspected security breach to the Amazon security team. The last security requirement is for Amazon to monitor any security issue and report it to the customer.
AWS vulnerability controls During security evaluation on penetration and stress testing, it was observable that our requested were being terminated immaturely. This was obvious that our connection to the system was being watched and where necessary terminated. If the service provider does not monitor system operations, it can be compromised which might result in DoS to the actual system users. This was a clear indication that failure by the Amazon to keep track of the security operations, its services might be interrupted to cause substantial business impact to the Amazon. On the same note, it was observed that after XSS interrogation, some system users responded immediately but changed their mind. Some of the details shared could not work as they pop out an error that password had been changed a moment ago. This was a clear indication that some system users had detected some form of fraud and had act immediately before the worst could happen. It was also presumed that some system users reported the instance to Amazon. Important to note is that Amazon does not allow integration of its platform with other third-party applications. The final security measures observed from AWS security evaluation was customer involvement on instanceswherecustomerraisecomplain.TotesttheAmazonresponseeffectiveness,a complaint was filed with the support desk and within a short time, the feedback was received through a call and mail. After a couple of minutes, they called again to confirm if the system had stabilized. It was observed that Amazon takes the security of its infrastructure and data privacy very seriously.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Security evaluation matrix Vulnerability testedLikelihoodImpact/Control measures Penetration testinghighPerformfrequenttestingtomakesurevulnerabilitiesare detected before data breaches can happen. AWS keeps track of all processes and communicates to the customer in case they detect any anomaly. Cross-sitescripting (XSS) HighThe XSS was done from the customer and service provider perspective. From the AWS case, it was not possible to get access to the system without following the required procedure. However, it was possible from the user’s perspective because somecustomerswereabletosharetheirdatawithout considering the security of the applications. AWS and its users should be aware of security measures which should be enforced by all responsible parties. SQLinjectionand stress testing HighStress testing was done by performing SQL injection which would be meant to send multiple requests to the server with an aim of causing DoS to the normal users. AWS should keep track of all processes taking place and if any process seems to over-utilize system resources, be terminated immediately.
Conclusion Technology infrastructure requires the best security measures and close monitoring to make sure data breaches does not have devastating effects if it occurs. The main goal was to evaluate the Amazon We service security level, infrastructure techniques applied and incidence response when reported by customers or when observed by the Amazon security team. The evaluationwasbasedonpenetrationtesting,passwordcrackingandcross-sitescripting. Vulnerability testing was done through the use of tools such as sqlmap and Wireshark. Sqlmap was used to test for vulnerability such as open ports and subjecting system under stress by inducing unnecessary resource requests. Through stress testing, it was possible to observe multiple requests being generated by sqlmap while at the same time SQL injection into the available database being scanned. Though no database was detected due to security protection, vulnerability scanning runs successfully inducing server with so many requests that made services somehow unavailable. Stress testing was meant to make resources unavailable which in turn would cause DoS to the actual system users. Cross-site scripting was attempted on both user and Amazon support by trying to trick subjected parties to share system login credentials which were meant to make unauthorized access to customers' data. In this regard, it would be important to point out that Amazon security has been given the required security and it is difficult to gain access to either customer or amazon console with proper authentication.
Bibliography Micro, T., 2013. Best Practices for Security and Compliance with Amazon Web Services.White Paper, 1-11.