logo

Amazon Web Services Security Evaluation

10 Pages2101 Words84 Views
   

Added on  2023-03-21

About This Document

This document provides a security evaluation of Amazon Web Services (AWS) and discusses the vulnerabilities and threats it faces. It explores measures and techniques to compromise organizational operations. The evaluation includes penetration testing, stress testing, and vulnerability scanning using tools like sqlmap and Wireshark.

Amazon Web Services Security Evaluation

   Added on 2023-03-21

ShareRelated Documents
Amazon Web Services security evaluation
Name
Institution
Professor
Course
Date
Amazon Web Services Security Evaluation_1
Table of Contents
Introduction...............................................................................................................................................3
AWS Assets................................................................................................................................................4
AWS Security threats................................................................................................................................4
Amazon Web Service vulnerabilities.......................................................................................................4
Amazon security objectives.......................................................................................................................6
AWS vulnerability controls......................................................................................................................7
Security evaluation matrix........................................................................................................................8
Conclusion..................................................................................................................................................9
Bibliography............................................................................................................................................10
Amazon Web Services Security Evaluation_2
Introduction
Information system security has been a great challenge in today’s technology world due
to lack of proper security measures. To make sure organizational data remains secure, some
protection techniques and measures should be adopted by the subjected organization. Some of
the measures are users, organization and service provider related. In this regard, it can be
observed that the security of an information system involves several entities with different roles
to play. Since each information system or product have different requirements that have to be
met, the paper would focus on Amazon Web Services (AWS) as a product (Micro 2013, pp. 5-6).
Security evaluation would be based on several scenarios such as subjecting AWS platform to
stress testing. The security testing and analysis on AWS would also be done through penetration
testing by evaluating if some vulnerabilities exist. Sqlmap and Wireshark are some of the best
tools which would be used to perform security checks, perform database injections and subject
available resources to stress. On the same note, cross-site scripting (XSS) would be done to try
and extract confidential information such as login from novice users. Finally, the free account
would be created in the AWS platform and try to compromise the AWS application console. In
this case, the vulnerability checks would be focused on poor user accounts protection which can
be advanced later to AWS console. The system security evaluation offers an opportunity to
perform prior analysis on security risks that specific information system might be exposed to.
The goal of the study would be to assess security measures and techniques which can be used to
compromise organizational operations.
Amazon Web Services Security Evaluation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessing the Risks of Creating a Business Information System
|7
|855
|60

Mobile Devices and Network Security
|7
|1893
|181

Security Evaluation for WidgetsInc Web-Store
|11
|3970
|239

Application of Risk Mitigation and Planning Tools
|3
|830
|42

Payment Card Industry Compliances for Amazon
|4
|791
|95

Computing Technologies Assignment Report
|7
|1221
|30