This analysis describes what Amazon's agreement states, permits, or reserves. It does not constitute a legal determination about enforceability. Regulatory applicability and practical outcomes may vary by jurisdiction, enforcement context, and individual circumstances. Read our methodology
This provision prohibits using AWS compute resources to conduct DDoS attacks, which is a common misuse of cloud infrastructure, and the restriction on open proxies and relays addresses abuse vectors that are frequently exploited for anonymizing malicious traffic.
The AWS AUP applies to all customers and their end users, establishing categories of prohibited conduct that, if violated, may result in service suspension or termination including without prior notice as the policy states. For businesses running production workloads on AWS, an unexpected suspension could disrupt operations, data access, and downstream services. You can review the full list of prohibited activities at https://aws.amazon.com/aup/ and audit your workloads to confirm they do not fall within any prohibited category.
How other platforms handle this
You may not use Runway's tools to create content that promotes, glorifies, or facilitates acts of terrorism, mass violence, or genocide, or that could be used to provide material support to individuals or organizations engaged in such activities.
Customer will not, and will not permit any other person (including any End User) to: ... (d) attempt to reverse engineer, decompile, or otherwise attempt to discover the source code or underlying components (e.g., algorithms, weights, or systems) of the Mistral AI Products, including using the Outpu...
You may not use the Services to attempt to circumvent, disable, or otherwise interfere with safety-related features of the Services, including features that prevent or restrict the generation of certain types of content.
Monitoring
Amazon has changed this document before.
Receive same-day alerts, structured change summaries, and monitoring for up to 10 platforms.
"Network Abuse. Taking actions that would reasonably result in retaliation against the AWS network, including launching a Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack against any website or server. Conducting any open proxy or open relay activities.— Excerpt from Amazon's AWS Acceptable Use Policy
Professional Governance Intelligence
Need to monitor specific governance provisions?
Professional includes provision-level monitoring, governance timelines, regulatory mapping, and audit-ready analysis.
Built from archived source documents, structured governance mappings, and historical version tracking.
This provision prohibits using AWS compute resources to conduct DDoS attacks, which is a common misuse of cloud infrastructure, and the restriction on open proxies and relays addresses abuse vectors that are frequently exploited for anonymizing malicious traffic.
No. ConductAtlas is an independent monitoring service. We are not affiliated with, endorsed by, or sponsored by Amazon.