Detroit TAC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, October 27, 2011

Amazon Web Services vulnerabilities were found and fixed, others are likely susceptible.

Posted on 5:52 AM by Unknown

Researchers find "massive" security flaws in cloud architectures

By Tim Greene, 


German researchers say they found flaws in Amazon Web Services that they believe exist in many cloud architectures and enable attackers to gain administrative rights and to gain access to all user data.
While the researchers say they have told AWS about the security holes and AWS has fixed them, they believe the same types of attacks would be effective against other cloud services, "since the relevant Web service standards make performance and security incompatible."
A research team at Ruhr University Bochum used a variety of XML signature-wrapping attacks to gain administrative access of customer accounts, then create new instances of the customer's cloud, add images and delete them. In a separate exploit, the researchers used cross-site scripting attacks against the open-source, private-cloud software framework Eucalyptus.

MORE FLAWS: Amazon Web Services receives critical gov't certification 

They also found the Amazon service to be susceptible to cross-site scripting attacks.
"It's not only a problem of Amazon's," says Juraj Somorovsky, one of the researchers. "These are general attacks. Public clouds are not so secure as they seem to be. These problems could be found in other cloud frameworks also."
Somorovsky says the researchers are working on a high-performance libraries that can be used with XML security to eliminate the vulnerability that was exploited with the XML signaturewrapping attacks. They will be ready sometime next year. Signature-wrapping attacks re-use validAmazon Web Services acknowledged it worked with the Ruhr University team to correct the problems they found. "...[N]o customers have been impacted," a spokesperson for AWS said in an email. "It is important to note that this potential vulnerability involved a very small percentage of all authenticated AWS API calls that use non-SSL endpoints and was not a potentially widespread vulnerability as has been reported."

AWS has posted a list of best practices that, if followed, would have protected customers from the attacks the Ruhr University team devised as well as other attacks. These are:
• Only utilize the SSL-secured / HTTPS endpoint for any AWS service and ensure that your client utilities perform proper peer certificate validation. A very small percentage of all authenticated AWS API calls use non-SSL endpoints, and AWS intends to deprecate non-SSL API endpoints in the future.
• Enable and use Multi-Factor Authentication (MFA) for AWS Management Console access.
• Create Identity and Access Management (IAM) accounts that have limited roles and responsibilities, restricting access to only those resources specifically needed by those accounts.
• Limit API access and interaction further by source IP, utilizing IAM source IP policy restrictions.
• Regularly rotate AWS credentials, including Secret Keys, X.509 certificates, and Keypairs.
• When utilizing the AWS Management Console, minimize or avoid interaction with other websites and follow safe Internet browsing practices, much as you should for banking or similarly important / critical online activities.
• AWS customers should also give consideration to utilizing API access mechanisms other than SOAP, such as REST / Query
.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Tech News Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • When touring the Large Hadron Collider, stay with your group
  • Hooray, the supercommittee failed! Commentary: Failure no help, but greater harm averted
    By Darrell Delamaide  — The supercommittee to cut the deficit was a bad idea, and its failure is a good thing for America. Pundits are...
  • Quantum Computing Almost Here
    R. Colin Johnson   IBM recently demonstrated the components necessary to build a quantum computer, including superconducting microchips th...
  • Wet Electronics Open Door to New Possibilities
    R. Colin Johnson Gadgets, gizmos and wireless wonders must be fastidiously protected from moisture today, but researchers using circuitry w...
  • 2012 Salary and Skills report
    http://www.techrepublic.com/blog/career/infographic-2012-salary-and-skills-report/4545?tag=nl.e101
  • Medical Privacy Secured on Smartphones
    R. Colin Johnson | Anti-cloning encryption technology is being used to secure validated medical data, which can only be accessed by an att...
  • Entry-level IT jobs will be plentiful in 2012, experts predict
    Help desk, app development, analytics among the hottest prospects for college grads By Carolyn Duffy Marsan Here is good news for coll...
  • Rise of the 'maker movement'
    Rise of the 'maker movement' What does 'do-it-yourself' culture mean for the future of development?  ...
  • (no title)
    Toy Dept.: Parrot AR.Drone 2.0 Visits WWJ Reporting Matt Roush SOUTHFIELD — It’s hard to believe that a four-bladed toy helicopter with onb...
  • Melissa Harris-Perry: World wide web access to local communities
    Melissa Harris-Perry: World wide web access to local communities : 'via Blog this' Visit NBCNews.com for breaking news , world news ...

Categories

  • Android (1)
  • BDPA (3)
  • BDPA Local Chapter (3)
  • Career Networking (20)
  • Cool Stuff (14)
  • Education Tech (8)
  • Election (1)
  • FoodforThought (32)
  • FreeStuff (2)
  • Funny (2)
  • Green Power (7)
  • Hackerspace (6)
  • Local Tech Events (2)
  • Med Tech News (9)
  • Money (1)
  • MovieTech (1)
  • New Technology (5)
  • Open Source Tech News (7)
  • Personal Achievement (1)
  • personal rant (1)
  • Presidental (2)
  • SocialNetworkTech (1)
  • Space Tech (10)
  • Tech News (35)
  • Tech News Security (12)
  • Tech Tip (5)
  • Tech Tips (1)
  • Tech Toys (2)

Blog Archive

  • ►  2013 (202)
    • ►  September (6)
    • ►  August (21)
    • ►  July (17)
    • ►  June (17)
    • ►  May (26)
    • ►  April (23)
    • ►  March (32)
    • ►  February (28)
    • ►  January (32)
  • ►  2012 (200)
    • ►  December (27)
    • ►  November (31)
    • ►  October (33)
    • ►  September (12)
    • ►  August (14)
    • ►  July (5)
    • ►  June (9)
    • ►  May (13)
    • ►  April (9)
    • ►  March (24)
    • ►  February (10)
    • ►  January (13)
  • ▼  2011 (95)
    • ►  December (10)
    • ►  November (27)
    • ▼  October (18)
      • Using Twitter to Follow Attitudes About Vaccines
      • Erasable E-Paper Saves Trees, Cuts Costs
      • What is IT
      • UnCollege - Hacking Your Education
      • Amazon Web Services vulnerabilities were found and...
      • Cities Awarded $50 Million to Get Smart
      • Using Twitter to Follow Attitudes About Vaccines
      • 10 Reasons to Join BDPA
      • Grant Disbursement: BDPA Detroit ($739)
      • Thailand flooding could affect PC supplies, prices
      • Interest in Mobile WiFi Hotspots Fuels New Solutions
      • Motivational Moment
      • Motivational Moment
      • Phone Microscope Diagnoses Disease
      • Providing Reliable Wireless Communications for Fir...
      • India announces $35 tablet computer for rural poor
      • Autism Traits Prove Valuable for Software Testing
      • Motivaltional Moment
    • ►  September (11)
    • ►  August (24)
    • ►  July (5)
Powered by Blogger.

About Me

Unknown
View my complete profile