Breaches in the weaknesses of securitypolicies are Identified and proattack trails are informed to the administrators of the system in order to ensure concerned services are checked and action is taken to make them secure.
The advantage of this work is their proposed tool which provides.Strong analysis of security attacks and vulnerabilities, this analysis helps vendors to improve their security policies the drawback is that their proposed framework is specific to Amazon. This work would have contributed more if it would have been general instead of specific to Amazon.