Exposed services, permissions, and integrations
Every network should undergo vulnerability assessments before they’re pentested. Make sure the organization whose cloud network you’re pentesting has had some vulnerability assessments conducted recently.
A vulnerability assessment (sometimes called a vulnerability audit) is a systematic process where a checklist is used to identify common security weaknesses, misconfigurations, and other vulnerabilities pertaining to a type of computer system. A vulnerability assessment is a systematic process of identifying, analyzing, and prioritizing vulnerabilities in a system, network, or application. It involves scanning the system to identify existing weaknesses, flaws, or vulnerabilities that could be exploited by attackers. An old-fashioned vulnerability assessment may have a human network security specialist use a manual list of common vulnerabilities in a particular operating system or application and look through the software...