z-logo
open-access-imgOpen Access
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
Author(s) -
Sören Bleikertz,
Matthias Schunter,
Christian W. Probst,
Dimitrios Pendarakis,
Konrad Eriksson
Publication year - 2010
Publication title -
technical university of denmark, dtu orbit (technical university of denmark, dtu)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/1866835.1866853
Subject(s) - cloud computing , scalability , computer security , computer science , cloud computing security , flexibility (engineering) , popularity , audit , business , database , operating system , accounting , psychology , social psychology , statistics , mathematics
Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront investments, are shadowed by security challenges which inhibit its adoption. Managed through a web-services interface, users can configure highly flexible but complex cloud computing environments. Furthermore, users misconfiguring such cloud services poses a severe security risk that can lead to security incidents, e.g., erroneous exposure of services due to faulty network security configurations. In this article we present a novel approach in the security assessment of the end-user configuration of multi-tier architectures deployed on infrastructure clouds such as Amazon EC2. In order to perform this assessment for the currently deployed configuration, we automated the process of extracting the configuration using the Amazon API. In the assessment we focused on the reachability and vulnerability of services in the virtual infrastructure, and presented a way for the visualization and automated analysis based on reachability and attack graphs. We proposed a query and policy language for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. We have implemented the security assessment in a prototype and evaluated it for practical scenarios. Our approach effectively allows to remediate today's security concerns through validation of configurations of complex cloud infrastructures.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom