Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, October 27, 2011

Amazon Web Services vulnerabilities were found and fixed, others are likely susceptible.

Posted on 5:52 AM by Unknown

Researchers find "massive" security flaws in cloud architectures

By Tim Greene, 


German researchers say they found flaws in Amazon Web Services that they believe exist in many cloud architectures and enable attackers to gain administrative rights and to gain access to all user data.
While the researchers say they have told AWS about the security holes and AWS has fixed them, they believe the same types of attacks would be effective against other cloud services, "since the relevant Web service standards make performance and security incompatible."
A research team at Ruhr University Bochum used a variety of XML signature-wrapping attacks to gain administrative access of customer accounts, then create new instances of the customer's cloud, add images and delete them. In a separate exploit, the researchers used cross-site scripting attacks against the open-source, private-cloud software framework Eucalyptus.

MORE FLAWS: Amazon Web Services receives critical gov't certification 

They also found the Amazon service to be susceptible to cross-site scripting attacks.
"It's not only a problem of Amazon's," says Juraj Somorovsky, one of the researchers. "These are general attacks. Public clouds are not so secure as they seem to be. These problems could be found in other cloud frameworks also."
Somorovsky says the researchers are working on a high-performance libraries that can be used with XML security to eliminate the vulnerability that was exploited with the XML signaturewrapping attacks. They will be ready sometime next year. Signature-wrapping attacks re-use validAmazon Web Services acknowledged it worked with the Ruhr University team to correct the problems they found. "...[N]o customers have been impacted," a spokesperson for AWS said in an email. "It is important to note that this potential vulnerability involved a very small percentage of all authenticated AWS API calls that use non-SSL endpoints and was not a potentially widespread vulnerability as has been reported."

AWS has posted a list of best practices that, if followed, would have protected customers from the attacks the Ruhr University team devised as well as other attacks. These are:
• Only utilize the SSL-secured / HTTPS endpoint for any AWS service and ensure that your client utilities perform proper peer certificate validation. A very small percentage of all authenticated AWS API calls use non-SSL endpoints, and AWS intends to deprecate non-SSL API endpoints in the future.
• Enable and use Multi-Factor Authentication (MFA) for AWS Management Console access.
• Create Identity and Access Management (IAM) accounts that have limited roles and responsibilities, restricting access to only those resources specifically needed by those accounts.
• Limit API access and interaction further by source IP, utilizing IAM source IP policy restrictions.
• Regularly rotate AWS credentials, including Secret Keys, X.509 certificates, and Keypairs.
• When utilizing the AWS Management Console, minimize or avoid interaction with other websites and follow safe Internet browsing practices, much as you should for banking or similarly important / critical online activities.
• AWS customers should also give consideration to utilizing API access mechanisms other than SOAP, such as REST / Query
.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • How a Baptist pastor in Florida became the go-to IT guy
    NorthRidge Church pastor Terrill Gilley installs security gateways, watches for network attacks By Ellen Messmer   As a Baptist pastor,...
  • When touring the Large Hadron Collider, stay with your group
  • 14 Ways to Take Your IT Career to the Next Level - Network World
    14 Ways to Take Your IT Career to the Next Level - Network World
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • 10 Free Google Chrome Extensions to Increase Your Productivity - Network World
    10 Free Google Chrome Extensions to Increase Your Productivity - Network World
  • The No. 1 place to work in IT: Quicken Loans - Network World
    The No. 1 place to work in IT: Quicken Loans - Network World
  • The ACTEra – WHY YOU SHOULD HAVE BEEN AT THE BDPA 2013 CONFERENCE! | The Aspiring Critical Thinker's Era
    The ACTEra – WHY YOU SHOULD HAVE BEEN AT THE BDPA 2013 CONFERENCE! | The Aspiring Critical Thinker's Era
  • 10 hard-earned lessons of a lifetime in IT - Network World
    10 hard-earned lessons of a lifetime in IT - Network World

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ►  November (27)
    • ▼  October (18)
      • Using Twitter to Follow Attitudes About Vaccines
      • Erasable E-Paper Saves Trees, Cuts Costs
      • What is IT
      • UnCollege - Hacking Your Education
      • Amazon Web Services vulnerabilities were found and...
      • Cities Awarded $50 Million to Get Smart
      • Using Twitter to Follow Attitudes About Vaccines
      • 10 Reasons to Join BDPA
      • Grant Disbursement: BDPA Detroit ($739)
      • Thailand flooding could affect PC supplies, prices
      • Interest in Mobile WiFi Hotspots Fuels New Solutions
      • Motivational Moment
      • Motivational Moment
      • Phone Microscope Diagnoses Disease
      • Providing Reliable Wireless Communications for Fir...
      • India announces $35 tablet computer for rural poor
      • Autism Traits Prove Valuable for Software Testing
      • Motivaltional Moment
    • ►  September (11)
    • ►  August (24)
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile