Least-Privilege Calls to Amazon Web Services

被引:1
|
作者
Gill, Puneet [1 ]
Dietl, Werner [1 ]
Tripunitara, Mahesh [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cloud computing; Security; Web services; Databases; Documentation; Context; Syntactics; Computer security; amazon web services; least-privilege;
D O I
10.1109/TDSC.2022.3171740
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address least-privilege in a particular context of public cloud computing: calls to Amazon Web Services (AWS) Application Programming Interfaces (APIs). AWS is, by far, the largest cloud provider, and therefore an important context in which to consider the fundamental security design principle of least-privilege, which states that a thread of execution should possess only those privileges it needs. There have been reports of over-privilege being a root cause of attacks against AWS cloud applications, and a least-privilege set for an API call is a necessary building-block in devising a least-privilege policy for a cloud application. We observe that accurate information on a least-privilege set for an invoker of a method to possess is simply not available for most such methods in AWS. We provide a meaningful characterization of least-privilege in this context. We then propose techniques to determine such sets, and discuss a black-box process we have devised and carried out to identify such sets for all 707 API methods we are able to invoke across five AWS services. We discuss a number of interesting discoveries we have made, some of which are surprising and some alarming, that we have reported to AWS. Our work has resulted in a database of least-privilege sets for API calls to AWS, which we make available publicly. Developers can consult our database when configuring security policies for their cloud applications, and we welcome contributors that augment our database. Also, we discuss example uses of our database via an assessment of two repositories and two full-fledged serverless applications that are available publicly and have policies published alongside. We observe that the vast majority of policies are over-privileged. Our work contributes constructively to securing cloud applications in the largest cloud provider.
引用
收藏
页码:2085 / 2096
页数:12
相关论文
共 50 条
  • [1] WebJail: Least-privilege Integration of Third-party Components in Web Mashups
    Van Acker, Steven
    De Ryck, Philippe
    Desmet, Lieven
    Piessens, Frank
    Joosen, Wouter
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 307 - 316
  • [2] Determination and Enforcement of Least-Privilege Architecture in Android
    Hammad, Mahmoud
    Bagheri, Hamid
    Malek, Sam
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2017), 2017, : 59 - 68
  • [3] Automating Isolation and Least Privilege in Web Services
    Blankstein, Aaron
    Freedman, Michael J.
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 133 - 148
  • [4] Dynamic, context-aware, least-privilege Grid delegation
    Ahsant, Mehran
    Basney, Jim
    Johnsson, Lennart
    [J]. 2007 8TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2007, : 90 - +
  • [5] DELDROID: An automated approach for determination and enforcement of least-privilege architecture in android
    Hammad, Mahmoud
    Bagheri, Hamid
    Malek, Sam
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 149 : 83 - 100
  • [6] NodeSentry: Least-privilege library integration for server-side JavaScript
    De Groef, Willem
    Massacci, Fabio
    Piessens, Frank
    [J]. ACM International Conference Proceeding Series, 2014, 2014-December (December): : 446 - 455
  • [7] Amazon web services
    Muni, A
    Hansen, J
    [J]. DR DOBBS JOURNAL, 2005, 30 (12): : 66 - 67
  • [8] Ruby/Amazon & Amazon Web Services
    Macdonald, I
    [J]. DR DOBBS JOURNAL, 2005, 30 (02): : 30 - +
  • [9] Auditing amazon web services
    Kohnke, Adam
    [J]. ISACA Journal, 2019, 3 : 51 - 55
  • [10] Watching the watchmen: Least privilege for managed network services
    Liu, Guyue
    Li, Ao
    Canel, Christopher
    Sekar, Vyas
    [J]. PROCEEDINGS OF THE THE 20TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2021, 2021, : 147 - 154