CLA0D1T – Auditing AWS Services S3 and IAM

Year : 2024 | Volume :12 | Issue : 03 | Page : –
By

Lisshutharan Segaran,

Yousif Elamin,

Garima Sinha,

  1. Student, Department of Computer Science & Engineering, Jain (Deemed-to-be University), Kochi, Bengaluru, Karnataka, India
  2. Student, Department of Computer Science & Engineering, Jain (Deemed-to-be University), Kochi, Bengaluru, Karnataka, India
  3. Professor, Department of Computer Science & Engineering, Jain (Deemed-to-be University), Kochi, Bengaluru, Karnataka, India

Abstract

The swift embrace of cloud computing has revolutionized how organizations handle and provide their services, delivering unmatched scalability, flexibility, and cost-effectiveness. However, this shift has also introduced a range of new security challenges and vulnerabilities, particularly concerning data access and identity management. This project specifically aims to address these issues within the context of Amazon Web Services (AWS), focusing on auditing the Simple Storage Service (S3) and Identity and Access Management (IAM) services. The primary objective is to identify, analyze, and prioritize potential misconfigurations in access policies and permissions, which are critical components in safeguarding networks, applications, and data storage. Through a structured and comprehensive methodology, this auditing process will systematically classify various misconfigurations, assess their severity, and propose effective remediation strategies. The audit will encompass a detailed review of access control policies, ensuring that they adhere to the principle of least privilege, and scrutinize IAM roles, policies, and permissions to detect any deviations from best practices. By evaluating the impact of identified vulnerabilities, the project will prioritize them based on the potential risk to the organization’s security posture. The anticipated outcomes of this project aim to empower organizations to proactively enhance their cloud security measures, ultimately fostering a safer and more robust cloud computing environment. By addressing these critical security aspects, the project will contribute significantly to mitigating risks associated with cloud adoption and help organizations better protect their digital assets against emerging threats.

Keywords: Cloud Computing, Cloud Security Challenges, IAM, S3, Auditing Services, Access Policies

[This article belongs to Journal Of Network security (jons)]

How to cite this article:
Lisshutharan Segaran, Yousif Elamin, Garima Sinha. CLA0D1T – Auditing AWS Services S3 and IAM. Journal Of Network security. 2024; 12(03):-.
How to cite this URL:
Lisshutharan Segaran, Yousif Elamin, Garima Sinha. CLA0D1T – Auditing AWS Services S3 and IAM. Journal Of Network security. 2024; 12(03):-. Available from: https://journals.stmjournals.com/jons/article=2024/view=172059



Fetching IP address…

References

  1. Amazon. (2018, 25 September). Amazon S3, Object storage built to retrieve any amount of data from anywhere. Retrieved from aws.amazon.com: https://aws.amazon.com/s3/.
  2. Amazon. (2023, 01 January). Amazon S3. Retrieved from aws.amazon.com: https://aws.amazon.com/.
  3. Amazon IAM. (2023, 15 October). AWS Identity and Access Management. Retrieved from aws.amazon.com: https://aws.amazon.com/iam/.
  4. Amazon S3. (2023, 01 November). Amazon S3 – Cloud Object Storage. Retrieved from aws.amazon.com: https://aws.amazon.com/s3/.
  5. Bellavista, P., Corradi, A., Foschini, L., & Solimando, M. (2019, December). The Audit4Cloud Platform for Auditing the Networking Performance of Public Clouds. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.
  6. CodiumAI Team. (2023, 06 December). Creating Powerful Command-Line Tools in Python: A Practical Guide. Retrieved from codium.ai: https://www.codium.ai/blog/creating-powerful-command-line-tools-in-python-a-practical-guide/.
  7. Digital Cloud Training. (n.d.). AWS IAM. Retrieved from digitalcloud.training: https://digitalcloud.training/aws-iam/.
  8. Divyesh Maheta. (2023, 29 December). Python with Machine Learning: Make User Experience Interactive. Retrieved from bacancytechnology.com: https://www.bacancytechnology.com/blog/python-with-machine-learning.
  9. Episyche. (n.d.). How to build a CLI Tool using Python. Retrieved from episyche.com: https://episyche.com/blog/how-to-build-a-cli-tool-using-python.
  10. Huy, A. Q., & Hung, P. D. (2019, January). Security and cost optimization auditing for amazon web services. In Proceedings of the 2nd International Conference on Software Engineering and Information Management (pp. 44-48).
  11. Innovatureinc. (2023, 07 September). Top 10 Cloud Computing Trends in 2023. Retrieved from innovatureinc.com: https://innovatureinc.com/top-10-cloud-computing-trends/.
  12. Ismail, U. M., & Islam, S. (2020). A unified framework for cloud security transparency and audit. Journal of Information Security and Applications, 54, 102594.
  13. Lehtinen, J. (2023). Technical review setup for Amazon Web Services: assessing Amazon cloud computing service configurations.
  14. Lins, S., Schneider, S., & Sunyaev, A. (2016). Trust is good, control is better: Creating secure clouds by continuous auditing. IEEE Transactions on Cloud Computing, 6(3), 890-903.
  15. Manmohan Singh Bohara. (2020, 21 April). Programming AWS IAM using AWS python SDK boto3 — Part 3. Retrieved from medium.com: https://medium.com/geekculture/automating-aws-iam-using-lambda-and-boto3-part-3-3100088a4454.
  16. scalefactory. (2019, 18 October). s3audit-ts. Retrieved from github.com: https://github.com/scalefactory/s3audit-ts.

Regular Issue Subscription Review Article
Volume 12
Issue 03
Received May 28, 2024
Accepted July 12, 2024
Published September 14, 2024

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.