Security Testing for entities hosted in cloud

For the applications that are getting migrated to cloud / planned to be hosted in the cloud will need additional security considerations. Failure to ensure proper security protection when using cloud services may potentially result in higher costs and loss to business. Organizations must consider security controls for different services viz. Infrastructures as a service(Iaas), Software as a service (SaaS) or Platform as a service. Which applications should be moved to cloud?     ·         Low to Medium Risk What are the key security risks while hosting in cloud?     ·         Isolation Failure – Multi tenancy is a key thing in cloud. Failure in controls that separate the storage, memory, identity and access control and routing between tenants is a huge risk.     ·         Authentication and Authorization     ·...

About Us

This blog is dedicated to Penetration Testing. Here you will find Penetration testing artefacts, how to approach and perform pen testing on Infrastructure, Web, mobile and much more. Some interesting Penetration testing stories will also feature now and then. We hope the pen testing community finds this useful.

Comments

Popular posts from this blog

Change the default SSH keys in Kali Linux ......One important step post installation

Keeping logs of your console commands during pentesting