Amazon · AWS Acceptable Use Policy

Prohibition on Malicious Code Distribution

High severity
Share 𝕏 Share in Share 🔒 PDF

What it is

You cannot use AWS to spread computer viruses, ransomware, or any other software designed to damage or compromise other people's computers or networks.

Consumer impact (what this means for users)

Security researchers and cybersecurity firms hosting malware samples or conducting threat research on AWS must implement strict isolation controls and ensure their activities are clearly authorized, as unintended distribution of malicious code from AWS-hosted infrastructure could trigger immediate account termination.

Cross-platform context

See how other platforms handle Prohibition on Malicious Code Distribution and similar clauses.

Compare across platforms →
Need full compliance memos? See Professional →

Why it matters (compliance & risk perspective)

This prohibition applies to cybersecurity vendors, researchers, and threat intelligence firms that may host malware samples or conduct research on AWS — such activities require specific precautions and authorization to avoid violating the AUP.

View original clause language
You may not use the Services to transmit, distribute, or store any content that contains viruses, trojan horses, worms, time bombs, corrupted files, ransomware, or any other malicious or destructive code that may affect the operation of another's computer or network.

Institutional analysis (Compliance & legal intelligence)

1) REGULATORY FRAMEWORK: Distribution of malicious code implicates the CFAA (18 U.S.C. § 1030(a)(5)), which criminalizes intentional damage to protected computers. The EU Directive 2013/40/EU on cybercrime offenses and the Budapest Convention on Cybercrime create parallel international obligations. GDPR Article 32 requires appropriate technical measures to prevent unauthorized processing, including malware propagation affecting personal data. NIS2 Directive requires essential entities to implement cybersecurity measures that would preclude malware distribution as a side effect of cloud operations. Primary enforcement is through DOJ CCIPS, FBI Cyber Division, and EU national cybercrime units. 2)

🔒

Compliance intelligence locked

Regulatory citations, enforcement risk, and due diligence action items.

Watcher $9.99/mo Professional $149/mo

Watcher: regulatory citations. Professional: full compliance memo.

Applicable agencies

  • FTC
    The FTC has authority over deceptive and unfair practices in cybersecurity under Section 5 of the FTC Act, including failure to implement reasonable security measures that enable malware distribution.
    File a complaint →

Provision details

Document information
Document
AWS Acceptable Use Policy
Entity
Amazon
Document last updated
April 29, 2026
Tracking information
First tracked
April 27, 2026
Last verified
April 27, 2026
Record ID
CA-P-003254
Document ID
CA-D-00028
Evidence Provenance
Source URL
Wayback Machine
SHA-256
35a0e34b7136e83dd0dca01e14dd192b01d7012211f2617232fe3d1a27218091
Verified
✓ Snapshot stored   ✓ Change verified
How to Cite
ConductAtlas Policy Archive
Entity: Amazon | Document: AWS Acceptable Use Policy | Record: CA-P-003254
Captured: 2026-04-27 10:50:37 UTC | SHA-256: 35a0e34b7136e83d…
URL: https://conductatlas.com/platform/amazon/aws-acceptable-use-policy/prohibition-on-malicious-code-distribution/
Accessed: May 2, 2026
Classification
Severity
High
Categories

Other provisions in this document