Abstract:
A direct network connection is established between a customer network and a service provider network. Computing resources are then provisioned in the service provider network in an automated fashion. The network connection between the service provider network and the customer network is also configured such that data can be transmitted from one of the computing resources to another one of the computing resources by way of at least a portion of the customer network. Test data is then transmitted from one computing resource to another computing resource by way of at least a portion of the customer network. One or more test results are then generated based upon characteristics of the transmission of the test data from one resource to the other resource by way of the customer network. The resources may be de-provisioned in an automated fashion following completion of the testing.
Abstract:
Distributed computer systems prepare and instantiate snapshots by processing sets of nodes representing computer resources that are portions of a larger system. A user may choose to prepare or instantiate a snapshot containing all or only a portion of the data within the distributed computer system, such as a template of the distributed computer system. A template snapshot may be available in an electronic marketplace for other users to purchase and instantiate into a replica of the distributed computer system.
Abstract:
Devices and methods are provided for determining computer resource connectivity and providing computer resource protection. A computer system may identify a first indication of each network configuration between a computing resource and a data resource. The system may identify a second indication of a request for credentials associated with accessing at least one of the computing resource or the data resource. The system may determine an action including accessing the computing resource and the data resource using a network configuration and a credential. The system may determine that the action has occurred a number of times that is less than a threshold. The system may cancel a credential or network configuration associated with the action.
Abstract:
Various electronic resources, such as multi-tenant or cloud resources, can be pooled together for access by specified members associated with a given pool. For example, users with access to different resources can enable their resources to be pooled together for purposes such as reduced pricing and increased flexibility. In some instances, a user can pool resources configured for a particular purpose, such that the user can effectively lease out an entire environment. The users accessing the pool can pay for some or all portion of the cost of the resources during the period of usage.
Abstract:
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can host virtual machine networks. A component of a hosted virtual machine network is configured in a manner to receive commands directed towards a simulated network device. The component may then execute a process or processes on the hosted virtual machine network which correspond to the received command.
Abstract:
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can host virtual machine networks. A component of a hosted virtual machine network is configured in a manner to receive commands directed towards a simulated network device. The component may then execute a process or processes on the hosted virtual machine network which correspond to the received command.
Abstract:
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can host virtual machine networks. A component of a hosted virtual machine network is configured in a manner to receive commands directed towards a simulated network device. The component may then execute a process or processes on the hosted virtual machine network which correspond to the received command.
Abstract:
An automated security assessment service of a service provider network may identify, and notify a customer of, misconfigured VM instances that can be access (e.g., via the Internet). A scanner tool may call an automated reasoning service to identify any VM instances of a customer that can be accessed, and may receive information from the automated reasoning service that is usable to exchange packets with those identified instances. The scanner tool can use the information to send requests to the identified instances. After receiving responses from the identified instances, the scanner tool can store, in storage of a network-based storage service, and in association with a customer account of the customer, encrypted data about the results of the scan (e.g., any VM instances that are vulnerable to attackers), and this encrypted data is thereby accessible to the customer with proper decrypt permissions.
Abstract:
Systems for performing a security assessment of a target computing resource, such as a virtual machine or an instance of a virtual machine, include a scanning service that facilitates duplication of all or a portion of the target computing resource, and then performs the security assessment on the duplicate computing resource to avoid consuming processing time, processing power, and storage space of the target computing resource. A snapshot of the target computing resource, containing the data necessary to reproduce the portion to be assessed, is captured and used to implement the duplicate computing resource in newly allocated resources. The snapshot can be an image of a logical volume implementing the target computing resource. To reproduce a target virtual machine, the snapshot may include a configuration used to instantiate the target virtual machine; the scanning service may implement a duplicate virtual machine that is instantiated with the same configuration.
Abstract:
Customers of a computing resource service provider may operate one or more computing resource provided by the computing resource service provider. In addition, the customers may execute agent using the one or more computing resources provided by the computing resource service provider. Operational information from customer-operated computing resources may be obtained by the agents and evaluated for security threats. The operational information may be evaluated based at least in part on a set of security rules. The security rules may be generated at least in part on customer input to generate customer defined security rules.