There is widespread speculation that the recent attack on Sony was accomplished by utilizing credit card information stolen via compute resources purchased from Amazon’s EC2 cloud offering. This high profile incident has attracted attention in the mainstream press and in the blogosphere, underscoring the interconnected and anonymous nature of cloud computing, as well as