Authors
Thijs van Ede, Niek Khasuntsev, Bas Steen, Andrea Continella
Publication date
2022/11/7
Book
Proceedings of the 2022 on Cloud Computing Security Workshop
Pages
63-74
Description
In recent years, misconfigurations of cloud services have led to major security incidents and large-scale data breaches. Due to the dynamic and complex nature of cloud environments, misconfigured (e.g., overly permissive) access policies can be easily introduced and often go undetected for a long period of time. Therefore, it is critical to identify any potential misconfigurations before they can be abused. In this paper, we present a novel misconfiguration detection approach for identity and access management policies in AWS. We base our approach on the observation that policies can be modeled as permissions between entities and objects in the form of a graph. Our key idea is that misconfigurations can be effectively detected as anomalies in such a graph representation. We evaluate our approach on real-world identity and access management policy data from three enterprise cloud environments. We …
Total citations
2023202421
Scholar articles
T van Ede, N Khasuntsev, B Steen, A Continella - Proceedings of the 2022 on Cloud Computing Security …, 2022