Applying Transparent Shaping for Zero Trust Architecture Implementation in AWS: A Case Study

Wenjia Wang,Seyed Masoud Sadjadi,Naphtali Rishe,Arpan Mahara
2024-08-08
Abstract:This study introduces a methodology integrating Zero Trust Architecture (ZTA) principles and Transparent Shaping into an AWS-hosted Online File Manager (OFM) application, enhancing security without substantial code modifications. We evaluate our approach with the Mozilla Observatory, highlighting significant security improvements and outlining a promising direction for applying Transparent Shaping and ZTA in cloud environments.
Cryptography and Security,Networking and Internet Architecture
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is that in the current Amazon Web Services (AWS) environment, the traditional perimeter - based network security model (Perimeter Security) cannot effectively respond to increasingly complex and advanced cyber threats. Specifically: 1. **Limitations of the traditional security model**: The traditional perimeter - based network security model assumes that once users and devices are authenticated and obtain access rights, they are trustworthy. However, this model is vulnerable to internal threats, complex attacks, and the problem of blurred boundaries brought about by relying on cloud computing services. 2. **The need for Zero Trust Architecture (ZTA)**: With the wide adoption of AWS applications and services, organizations urgently need a more powerful security measure to protect their data and applications from external and internal threats. The Zero Trust Architecture provides a principle of "never trust, always verify", that is, it is assumed that no user or device should be considered inherently trustworthy whether inside or outside the network. 3. **Application of Transparent Shaping**: In order to enhance the security of existing AWS applications without large - scale code modification, researchers introduced the Transparent Shaping model. This method uses aspect - oriented techniques to separate cross - cutting concerns from the main application logic, thereby achieving seamless integration of new functions and behaviors. Therefore, the paper aims to explore how to improve the security of applications such as AWS - hosted Online File Manager (OFM) through Transparent Shaping technology in the process of transitioning from the perimeter - based network security model to the Zero Trust Architecture. This not only solves the security risks existing in current AWS applications but also provides theoretical and technical support for implementing the Zero Trust Architecture in the cloud environment in the future.