Software Supply Chain Security

Cloud Marketplace Security: What AWS and Azure Listings Actually Verify

Buying software through AWS Marketplace or Azure Marketplace feels safe. But what security verification actually happens before a listing goes live?

Bob
Application Security Lead
4 min read

Cloud marketplaces have become a primary distribution channel for enterprise software. AWS Marketplace, Azure Marketplace, and Google Cloud Marketplace offer the appeal of simplified procurement, consolidated billing, and the implicit trust of being associated with a major cloud provider.

That implicit trust is the problem. Many buyers assume that a listing on AWS Marketplace means AWS has vetted the software for security. The reality is more nuanced, and understanding what marketplace verification actually covers is important for making informed purchasing decisions.

What AWS Marketplace Verifies

AWS Marketplace has a listing review process, but it is primarily focused on functionality and compliance with marketplace policies, not comprehensive security assessment.

AMI scanning. For listings that include Amazon Machine Images, AWS performs vulnerability scanning against known CVEs. This catches obvious issues (running an OS with unpatched critical vulnerabilities) but does not analyze the application code.

Container image scanning. Container listings are scanned for known vulnerabilities in OS packages and common dependencies. Again, this is vulnerability scanning, not security assessment.

Seller verification. AWS verifies the seller identity and legal entity. This prevents anonymous publishing but does not guarantee the seller security practices.

Functional testing. AWS tests that the listing deploys correctly and functions as described. This is quality assurance, not security testing.

What AWS does NOT do: Code review, penetration testing, authentication and authorization review, data handling assessment, or ongoing security monitoring of listed products.

What Azure Marketplace Verifies

Azure Marketplace has a similar verification scope:

Certification programs. Azure offers certification badges for listings that meet certain criteria. The "Azure Certified" badge indicates that the software has passed automated testing for Azure compatibility and basic security scanning.

Vulnerability scanning. Container and VM images are scanned for known vulnerabilities.

Security assessment for managed applications. Azure Managed Application listings go through a more rigorous review because they deploy into the customer subscription and require permissions.

What Azure does NOT do: Comprehensive application security review, supply chain analysis of the vendor dependencies, or ongoing security monitoring.

What Google Cloud Marketplace Verifies

Google Cloud Marketplace follows a similar pattern. Listings are reviewed for functionality and basic compliance, with vulnerability scanning for container and VM images. Google does not perform comprehensive security assessment of listed software.

The Gap Between Perception and Reality

The core issue is that marketplace presence is perceived as a security endorsement but functions more like a distribution platform with basic quality gates.

A vendor on AWS Marketplace could have:

  • Unpatched application-level vulnerabilities
  • Insecure default configurations
  • Vulnerable open-source dependencies
  • Poor data handling practices
  • No incident response capability

None of these would be caught by the marketplace verification process.

What Buyers Should Verify Independently

Request SBOMs. Ask the vendor for a Software Bill of Materials for the marketplace listing. This reveals the open-source components and their versions, allowing you to check for known vulnerabilities independently.

Review security documentation. Request the vendor security whitepaper, SOC 2 report, penetration testing results, and incident response plan. These are standard enterprise procurement requirements regardless of distribution channel.

Check vulnerability disclosure history. Review the vendor CVE history and how they handle vulnerability reports. A vendor with a transparent disclosure process and timely patches is more trustworthy than one with no public security track record.

Test in isolation. Deploy marketplace software in an isolated environment before connecting it to production systems. Test authentication, authorization, network behavior, and data handling.

Evaluate permissions. For managed applications that request permissions in your cloud account, review the requested permissions carefully. The principle of least privilege applies to marketplace software just as it does to your own applications.

Monitor after deployment. Marketplace software running in your environment is your responsibility. Monitor it for suspicious behavior, keep it updated, and include it in your vulnerability management program.

How Safeguard.sh Helps

Safeguard.sh helps you evaluate the security of software acquired through cloud marketplaces. Our platform analyzes the dependencies in marketplace listings, identifies known vulnerabilities, and generates SBOMs for software that the vendor has not provided one for. After deployment, Safeguard.sh continuously monitors marketplace software components for new vulnerabilities, ensuring that cloud marketplace acquisitions meet your security standards.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.