Amazon · AWS Acceptable Use Policy

Prohibition on Network Abuse and Unauthorized System Access

High severity
Share 𝕏 Share in Share

What it is

You cannot use AWS to hack into systems, scan networks without permission, or disrupt internet services — even if you are doing security research without explicit authorization.

Consumer impact (what this means for users)

Security professionals and researchers using AWS for testing must ensure they have explicit written authorization for every target system they test; unauthorized scanning or probing — even for defensive purposes — violates the AUP and can result in immediate account termination and potential referral to law enforcement.

How other platforms handle this

OpenAI Medium

We implement technical, administrative, and organizational measures designed to protect your Personal Data against unauthorized access, loss, destruction, or alteration. However, no internet transmission or electronic storage is completely secure, and we cannot guarantee absolute security.

Spotify Medium

These Terms are between you and Spotify USA Inc., 4 World Trade Center, 150 Greenwich Street, 62nd Floor, New York, NY, 10007... Spotify has no liability to you, nor any obligation to provide a refund to you, in connection with internet or other Spotify Service outages or failures that are caused by...

Strava Medium

THE SERVICES AND ANY CONTENT ARE PROVIDED TO YOU "AS IS" AND "AS AVAILABLE" AND WITHOUT WARRANTY OF ANY KIND. STRAVA AND ITS SUBSIDIARIES, DIRECTORS, AFFILIATES, OFFICERS, EMPLOYEES, AGENTS, REPRESENTATIVES, PARTNERS, AND LICENSORS HEREBY DISCLAIM ALL WARRANTIES WITH REGARD TO THE SERVICES AND CONTE...

See all platforms with this clause type →
Need full compliance memos? See Professional →

Why it matters (compliance & risk perspective)

This provision applies broadly to security testing and vulnerability research, meaning even well-intentioned penetration testers or security researchers could violate the AUP if they conduct scans or tests without explicit authorization from the target system owner.

View original clause language
No Security Violations. You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device. Prohibited activities include: unauthorized access to or use of data, systems or networks; attempting to probe, scan or test the vulnerability of a system, network or account; interference with service to any user, host or network.

Institutional analysis (Compliance & legal intelligence)

(1) REGULATORY FRAMEWORK: This provision mirrors prohibitions in the Computer Fraud and Abuse Act (18 U.S.C. § 1030, DOJ/FBI enforcement), UK Computer Misuse Act 1990, EU Directive 2013/40/EU on attacks against information systems, and equivalent cybercrime statutes globally. Unauthorized access attempts, even if unsuccessful, constitute federal criminal violations under CFAA with penalties up to 10 years imprisonment for aggravated cases. NIS2 Directive (EU 2022/2555) imposes security obligations on operators of essential services that may interact with this provision where AWS is used for critical infrastructure. (2)

🔒

Compliance intelligence locked

Regulatory citations, enforcement risk, and due diligence action items.

Watcher $9.99/mo Professional $149/mo

Watcher: regulatory citations. Professional: full compliance memo.

Applicable agencies

  • FTC
    FTC has jurisdiction over unfair and deceptive practices in cybersecurity under FTC Act Section 5, and this provision's enforcement connects to broader consumer data security protections.
    File a complaint →

Provision details

Document information
Document
AWS Acceptable Use Policy
Entity
Amazon
Document last updated
March 24, 2026
Tracking information
First tracked
March 6, 2026
Last verified
April 9, 2026
Record ID
CA-P-002549
Document ID
CA-D-00028
Evidence Provenance
Source URL
Wayback Machine
SHA-256
c61af89c19589f506fd3fc8bbb8010407f0052d2e845554c876b99cc2495d2ce
Verified
✓ Snapshot stored   ✓ Change verified
How to Cite
ConductAtlas Policy Archive
Entity: Amazon | Document: AWS Acceptable Use Policy | Record: CA-P-002549
Captured: 2026-03-06 20:03:12 UTC | SHA-256: c61af89c19589f50…
URL: https://conductatlas.com/platform/amazon/aws-acceptable-use-policy/prohibition-on-network-abuse-and-unauthorized-system-access/
Accessed: April 28, 2026
Classification
Severity
High
Categories

Other provisions in this document