Summary
AWS, Azure, and GCP have pentesting policies that you and your organization must abide by. Benchmark checks verify the performance of your organization’s cloud services. Cloud provider SLAs are a good source of general benchmarks. CIS also has specific benchmarks for cybersecurity. Cloud service enumeration is a way that an attacker can find out information about how your organization uses cloud services. There are scripts you can execute to test your organization’s susceptibility to vulnerabilities.
Vulnerability assessments can be performed by vulnerability scanning applications. Before pentesting, it’s important to have a recent history of vulnerability assessments and mitigation for the findings of those assessments. Common security misconfigurations must be addressed first before your organization is ready to pentest.
Exposed services are internet services and ports in your organization’s cloud network that an attacker can use to cyber...