Amazon · AWS Acceptable Use Policy · View original document ↗

Network and Infrastructure Abuse Prohibition

Medium severity Medium confidence Explicitdocumentlanguage Unique · 0 of 325 platforms
Share 𝕏 Share in Share 🔒 PDF
Recent governance activity Amazon recorded 5 documented changes in the last 30 days.
Start monitoring updates
Monitor governance changes for Amazon Create a free account to receive the weekly governance digest and monitor one platform for governance changes.
Create free account No credit card required.
Document Record

What it is

AWS prohibits using its services to conduct unauthorized access to systems, disrupt networks, or run security scans against third-party systems without permission.

This analysis describes what Amazon's agreement states, permits, or reserves. It does not constitute a legal determination about enforceability. Regulatory applicability and practical outcomes may vary by jurisdiction, enforcement context, and individual circumstances. Read our methodology

ConductAtlas Analysis

Why it matters (compliance & governance perspective)

This clause is operationally significant for security professionals, penetration testers, and researchers who use AWS infrastructure, as it requires documented authorization before conducting any security assessments of external systems from AWS resources.

Interpretive note: The scope of 'proper authorization' is not further defined in the document, leaving some ambiguity about what documentation or consent formats AWS would consider sufficient.

Consumer impact (what this means for users)

Customers who conduct security testing, vulnerability research, or network scanning from AWS services must ensure they have explicit authorization from the target system owners, or risk AUP enforcement action including service suspension.

How other platforms handle this

Runway Medium

You may not use Runway's tools to create content that promotes, glorifies, or facilitates acts of terrorism, mass violence, or genocide, or that could be used to provide material support to individuals or organizations engaged in such activities.

Mistral AI Medium

Customer will not, and will not permit any other person (including any End User) to: ... (d) attempt to reverse engineer, decompile, or otherwise attempt to discover the source code or underlying components (e.g., algorithms, weights, or systems) of the Mistral AI Products, including using the Outpu...

Perplexity AI Medium

You may not use the Services to attempt to circumvent, disable, or otherwise interfere with safety-related features of the Services, including features that prevent or restrict the generation of certain types of content.

See all platforms with this clause type →

Monitoring

Amazon has changed this document before.

Receive same-day alerts, structured change summaries, and monitoring for up to 10 platforms.

Start Watcher free trial Or create a free account →
▸ View Original Clause Language DOCUMENT RECORD
"
You may not use the Services to: access or use any system without authorization; interfere with or disrupt the integrity or performance of any system, network, or data; or conduct or facilitate any security or vulnerability scan, penetration test, or similar assessment of third-party systems or networks without proper authorization.

— Excerpt from Amazon's AWS Acceptable Use Policy

ConductAtlas Analysis

Institutional analysis (Compliance & governance intelligence)

(1) REGULATORY LANDSCAPE: This provision engages the Computer Fraud and Abuse Act in the US and equivalent statutes in other jurisdictions (e.g., the UK Computer Misuse Act, EU Directive on attacks against information systems). Authorized penetration testing is a standard practice in regulated sectors such as financial services and healthcare; the AUP's authorization requirement aligns with these regulatory expectations but places the compliance burden on the customer. (2) GOVERNANCE EXPOSURE: Medium. For organizations providing managed security services or penetration testing from AWS infrastructure, the burden of maintaining documented authorization records for all target systems is a compliance and operational requirement under this clause. (3) JURISDICTION FLAGS: EU and UK security researchers should be aware of local computer misuse laws that may apply independently of the AUP. US federal contractors conducting authorized assessments should ensure AWS AUP compliance procedures align with any applicable federal testing frameworks. (4) CONTRACT AND VENDOR IMPLICATIONS: Managed security service providers using AWS as their testing infrastructure should ensure client contracts explicitly document authorization scope, as this directly maps to AUP compliance obligations. Vendor assessments for AWS-hosted security tooling should include AUP authorization documentation requirements. (5) COMPLIANCE CONSIDERATIONS: Organizations conducting security testing on AWS should maintain written authorization records for all target systems. Security teams should document that internal testing (e.g., of own AWS-hosted infrastructure) is explicitly authorized and that any third-party or client testing engagement includes clear written scope authorization.

Full compliance analysis

Regulatory citations, enforcement risk, and due diligence action items.

Track 1 platform — free Try Watcher free for 14 days

Free: track 1 platform + weekly digest. Watcher: 10 platforms + same-day alerts. No credit card required.

Applicable agencies

  • FTC
    Unauthorized access and network abuse may constitute unfair or deceptive practices under FTC jurisdiction, particularly in consumer-facing contexts
    File a complaint →

Applicable regulations

CFAA
United States Federal
DMCA
United States Federal
DSA
European Union

Provision details

Document information
Document
AWS Acceptable Use Policy
Entity
Amazon
Document last updated
May 5, 2026
Tracking information
First tracked
April 27, 2026
Last verified
May 12, 2026
Record ID
CA-P-010907
Document ID
CA-D-00028
Evidence Provenance
Source URL
Wayback Machine
Content hash (SHA-256)
35a0e34b7136e83dd0dca01e14dd192b01d7012211f2617232fe3d1a27218091
Analysis generated
April 27, 2026 10:50 UTC
Methodology
Evidence
✓ Snapshot stored   ✓ Hash verified
Citation Record
Entity: Amazon
Document: AWS Acceptable Use Policy
Record ID: CA-P-010907
Captured: 2026-04-27 10:50:37 UTC
SHA-256: 35a0e34b7136e83d…
URL: https://conductatlas.com/platform/amazon/aws-acceptable-use-policy/network-and-infrastructure-abuse-prohibition/
Accessed: May 13, 2026
Permanent archival reference. Stable identifier suitable for legal filings, compliance documentation, and research citation.
Classification
Severity
Medium
Categories

Other risks in this policy

Professional Governance Intelligence

Need to monitor specific governance provisions?

Professional includes provision-level monitoring, governance timelines, regulatory mapping, and audit-ready analysis.

Arbitration clauses AI governance Data rights Indemnification Retention policies
Start Professional free trial

Or start with Watcher →

Built from archived source documents, structured governance mappings, and historical version tracking.

Frequently Asked Questions

What does Amazon's Network and Infrastructure Abuse Prohibition clause do?

This clause is operationally significant for security professionals, penetration testers, and researchers who use AWS infrastructure, as it requires documented authorization before conducting any security assessments of external systems from AWS resources.

How does this clause affect you?

Customers who conduct security testing, vulnerability research, or network scanning from AWS services must ensure they have explicit authorization from the target system owners, or risk AUP enforcement action including service suspension.

Is ConductAtlas affiliated with Amazon?

No. ConductAtlas is an independent monitoring service. We are not affiliated with, endorsed by, or sponsored by Amazon.