Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Cloud Penetration Testing
Cloud Penetration Testing

Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications

eBook
£15.99 £23.99
Paperback
£29.99
Subscription
Free Trial
Renews at £16.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. £16.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Cloud Penetration Testing

How Do Enterprises Utilize and Implement Cloud Networks?

Welcome, readers! Whether you’re already an experienced penetration tester or you’re new to cybersecurity, penetration testing cloud networks requires specialized knowledge. One of the key differences between penetration testing cloud networks and penetration testing on-premises networks and computer systems is that the organization you’re working for doesn’t own everything in its computing environment. When you conduct red team engagements in cloud networks, both the organization you work for and its cloud provider (whether that's Amazon Web Services (AWS), Azure, or Google Cloud Platform (GCP)) have needs that must be respected. The good news is if you master the skill of pentesting cloud networks, you may have a lucrative career ahead of you. Organizations use the cloud now more than ever, and demand for cloud services continues to grow.

Penetration testers simulate cyber attacks within...

Cloud networks today

To be able to effectively test your pentest target, you must first understand it. Cloud networks have been popular with the enterprise market ever since AWS took its current form in 2006. Microsoft Azure and GCP have been around since 2008. These three cloud platforms are the most frequently used by businesses and enterprises of all kinds, all around the world. Most enterprises use at least one cloud platform in their networks these days. Some enterprises even use multiple cloud platforms. So, what are cloud platforms, and why are they so popular? How do cloud platforms improve how companies do business over the internet?

In the 1990s, enterprises had to host their own data centers on their premises. Web hosting providers started to operate that decade, but they only offered web servers and email servers. That’s good for an organization’s website and email, but not for anything else. If companies needed to run their own, more complex applications...

Hybrid cloud, all-cloud, and multi-cloud networks

Cloud networks can take a few different forms. Some organizations maintain their client machines (such as PCs and mobile devices) on their own premises and then run their backend servers completely on one particular cloud platform. It’s an all-cloud network on one platform such as AWS, Azure, or GCP.

Some organizations run some server machines on their own premises and run the rest of their network on one or multiple cloud platforms. That’s a hybrid cloud network—partly on-premises, partly in the cloud.

Some organizations deploy their networks through more than one cloud platform. They may have some parts of their network running on AWS and other parts on Azure, for example. That’s a multi-cloud network.

Let’s examine how these different ways to operate cloud networks work, and why organizations may choose one way over another.

All-cloud networks

An all-cloud network is when an enterprise...

Why an organization would have a multi-cloud network

As I’ve mentioned, AWS, Azure, and GCP each have some services that are unique to each of them. A business may find that the combination of PaaS and SaaS applications that best serve its operational needs are all on different cloud platforms. An enterprise could have Azure OpenAI Service for automated customer service, Amazon GameLift to host its online video game servers, and a payment gateway on GCP to process customer credit card transactions.

Michael Warrilow, VP Analyst at Gartner, says this:

“Most organizations adopt a multi-cloud strategy out of a desire to avoid vendor lock-in or to take advantage of best-of-breed solutions. We expect that most large organizations will continue to willfully pursue this approach.”

According to a survey Gartner conducted in 2019, 81% of their respondents are working with two or more providers. That was at least a few years ago. Gartner foretasted an increase in...

The cloud migration process

Cloud migration is when an organization moves its data and services from its on-premises infrastructure to a cloud provider. With the rapid growth of the cloud market over the past 15 or 20 years, a large number of enterprises have engaged in the cloud migration process. But cloud migration isn’t simple, and it can be done incorrectly or ineffectively.

All enterprises must plan carefully in order to migrate to the cloud effectively. Depending on the situation and their needs, they may prefer to migrate to the cloud in stages over the course of months or years rather than do it all at once.

When planning a cloud migration strategy, organizations should understand the problems that can occur with cloud migration so that they can be avoided.

An enterprise’s services may experience downtime during the cloud migration process. Depending on how it migrates to the cloud, some of its servers may have to go completely offline for a period of...

Security responsibilities in the cloud

As a cloud pentester, it’s important for you to understand how the shared responsibility model works in the cloud. The two entities involved are the organization that’s using cloud services, and the cloud provider. When you conduct red team engagements, the organization is the entity you report to, whether you’re an employee or a third-party contractor.

Overall, the organization and the cloud provider have shared security responsibilities. This is often called the shared responsibility model. However, cloud security controls and responsibilities are divided between the two entities.

It’s important for you to understand what the cloud provider is responsible for and what the organization you’re working for is responsible for. At the beginning of each pentest or red team engagement, you will sign a contract that outlines the scope of the pentests and what you’re allowed and not allowed to do. You absolutely...

The difference between IaaS, PaaS, and SaaS

All of the services provided by AWS, Azure, and GCP are either SaaS, PaaS, or IaaS. The classification of each of these cloud services will directly affect what you’re allowed to do when you’re pentesting, as I’ve explained. So, understanding the differences between these types of services is crucial!

SaaS means the cloud provider gives your organization lots of components—the infrastructure everything runs on, its software platform and related APIs, and the application-level functions of its software. For instance, when we use Gmail, we’re using a fully SaaS application. AWS defines SaaS thus:

“SaaS is a business and software delivery model that enables organizations to offer their solution in a low-friction, service-centric approach.”

So, your organization is putting its data into the service, but it isn’t doing much—or any—software application development. Your...

Summary

So, with this chapter, you now understand the basic nature of your testing targets—cloud networks. Later on in this book, I’ll explain more information you’ll need to know as a red teamer that’s specific to AWS, Azure, and GCP. But in the next chapter, we’ll explore how cloud networks in general are cyber-attacked. In a cloud pentest, the cloud is the “what” and your simulated cyber attacks are the “how.”

Further reading

To learn more on the topics covered in this chapter, you can visit the following links:

  • What is red teaming?: https://www.synopsys.com/glossary/what-is-red-teaming.html
  • About AWS: https://aws.amazon.com/about-aws/
  • The History of Google Cloud Platform: https://acloudguru.com/blog/engineering/history-google-cloud-platform
  • The History of Microsoft Azure: https://techcommunity.microsoft.com/t5/educator-developer-blog/the-history-of-microsoft-azure/ba-p/3574204
  • What are the benefits of cloud computing? (IBM): https://www.ibm.com/topics/cloud-computing-benefits
  • What is cloud networking?: https://www.cisco.com/c/en/us/solutions/cloud/what-is-cloud-networking.html
  • A Brief History of Containers: https://d2iq.com/blog/brief-history-containers
  • What is DevSecOps? A guide from PortSwigger: https://portswigger.net/solutions/devsecops/guide-to-devsecops
  • Multi-Cloud vs. Hybrid Cloud: 10 Key Comparisons: https://www.spiceworks.com/tech/cloud/articles...
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform
  • Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)
  • Get acquainted with the penetration testing tools and security measures specific to each platform
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively. In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set. By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.

Who is this book for?

This book is for aspiring Penetration Testers, and the Penetration Testers seeking specialized skills for leading cloud platforms—AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.

What you will learn

  • Familiarize yourself with the evolution of cloud networks
  • Navigate and secure complex environments that use more than one cloud service
  • Conduct vulnerability assessments to identify weak points in cloud configurations
  • Secure your cloud infrastructure by learning about common cyber attack techniques
  • Explore various strategies to successfully counter complex cloud attacks
  • Delve into the most common AWS, Azure, and GCP services and their applications for businesses
  • Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Nov 24, 2023
Length: 298 pages
Edition : 1st
Language : English
ISBN-13 : 9781803248486
Category :
Concepts :
Tools :

What do you get with a Packt Subscription?

Free for first 7 days. £16.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Nov 24, 2023
Length: 298 pages
Edition : 1st
Language : English
ISBN-13 : 9781803248486
Category :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
£16.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
£169.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts
£234.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just £5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total £ 104.97
Practical Threat Detection Engineering
£44.99
Attacking and Exploiting Modern Web Applications
£29.99
Cloud Penetration Testing
£29.99
Total £ 104.97 Stars icon

Table of Contents

19 Chapters
Part 1: Today’s Cloud Networks and Their Security Implications Chevron down icon Chevron up icon
Chapter 1: How Do Enterprises Utilize and Implement Cloud Networks? Chevron down icon Chevron up icon
Chapter 2: How Are Cloud Networks Cyber Attacked? Chevron down icon Chevron up icon
Chapter 3: Key Concepts for Pentesting Today’s Cloud Networks Chevron down icon Chevron up icon
Part 2: Pentesting AWS Chevron down icon Chevron up icon
Chapter 4: Security Features in AWS Chevron down icon Chevron up icon
Chapter 5: Pentesting AWS Features through Serverless Applications and Tools Chevron down icon Chevron up icon
Chapter 6: Pentesting Containerized Applications in AWS Chevron down icon Chevron up icon
Part 3: Pentesting Microsoft Azure Chevron down icon Chevron up icon
Chapter 7: Security Features in Azure Chevron down icon Chevron up icon
Chapter 8: Pentesting Azure Features through Serverless Applications and Tools Chevron down icon Chevron up icon
Chapter 9: Pentesting Containerized Applications in Azure Chevron down icon Chevron up icon
Part 4: Pentesting GCP Chevron down icon Chevron up icon
Chapter 10: Security Features in GCP Chevron down icon Chevron up icon
Chapter 11: Pentesting GCP Features through Serverless Applications and Tools Chevron down icon Chevron up icon
Chapter 12: Pentesting Containerized Applications in GCP Chevron down icon Chevron up icon
Chapter 13: Best Practices and Summary Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
(11 Ratings)
5 star 63.6%
4 star 9.1%
3 star 9.1%
2 star 0%
1 star 18.2%
Filter icon Filter
Top Reviews

Filter reviews by




Raymond Dec 07, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
With AWS, Azure, and GCP gaining prominence, mastering their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you’ll explore the intricacies of cloud security testing and gain valuable insights into how pentesters and red teamers evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you’ll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.What you will learnFamiliarize yourself with the evolution of cloud networksNavigate and secure complex environments that use more than one cloud serviceConduct vulnerability assessments to identify weak points in cloud configurationsSecure your cloud infrastructure by learning about common cyber attack techniquesExplore various strategies to successfully counter complex cloud attacksDelve into the most common AWS, Azure, and GCP services and their applications for businessesUnderstand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentesting. Plus, it's written by Kim Crawley!! ( also wrote Hacker Culture: A to Z which is also super 1337 !! )
Amazon Verified review Amazon
Jeremiah Ginn Feb 11, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Kim Crawley has done a great job of organizing a very complex subject for the average engineer to consume. She provides the necessary details the seasoned Cyber Professional that is looking to start working on Cloud use cases for their skillset.Often we get lost in our engineering mind trying to make everything perfect before approaching a new skillset that we know we need to move forward in our career. Kim's approach makes each lesson bite sized and easy for a time-boxed learning session.I highly recommend buying the book for any semi-technical business leader as she gives you the crash course in what are the security personnel talking about in this meeting. If nothing else, buy the book to identify what you need to learn about cloud security.Her approach to the "Purple Team" is something I highly welcomed in the book. Read it to find out what I'm talking about.Thank you Kim for your great work. I enjoyed my time with your book!
Amazon Verified review Amazon
Tomica Kaniski Feb 06, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
If you are getting started with penetration testing, more specifically cloud penetration testing, this book has everything you need to get started - it starts with penetration testing basics, which prepare you for more specific tasks and tools of penetration testing across the three major clouds. It discusses fundamentals, tools, and techniques, but not in a very deep sense - ideal for beginners. Seems that this book is not meant for the more experienced audience, although even this type of audience can find a thing or two for themselves (mostly in additional references). Would recommend this book as an entry point into penetration testing and multi-cloud penetration testing, to get acquainted with the basic procedures and tools.
Amazon Verified review Amazon
Brandon Lachterman Dec 08, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Honestly, this is one of my favorite subjects, and I learned a LOT with this one. If you are interested in upping your pentest or red team game.... dont think, just buy this. Like now. Thorough, explained well, to the point, and very informative.
Amazon Verified review Amazon
John Jan 31, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Not too technical. Not too theoretical. A good blend of theory and practical examples that give the cloud pentesting beginner a great idea of where to start in this pentesting space. Tools used are clearly identified and explained. This book is definitely for cloud pentesting beginners like me. I am happy with my purchase of the book. Thanks Kim!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.