What Is Cloud Penetration Testing
ď‚— Cloud penetration testing is often performed in a
similar fashion to external penetration test where
your organization’s data is hosted with one of the
main cloud service providers. VeriClouds is not
needed at the customer site to perform the
pentest or to establish VPN connections where as
with on-prem penetration testing, this would be
required.
Testing It Offers
ď‚— Clouds Cloud Penetration Testing:
ď‚— Infrastructure as a Service (IaaS)
ď‚— Platform as a Service (PaaS)
ď‚— Software as a Service (SaaS)
ď‚— Cloud hybrid testing (On premise and public cloud
based solutions)
ď‚— Cloud Compliance Testing (PCI DSS, HIPPA, GLBA,
and FFIEC regulations)
ď‚— Social engineering options available that imitate
techniques used by hackers to target your employees
to obtain your company’s private information
Methods Used
ď‚— Cloud Penetration Testing use industry-proven
methodologies, such as:
ď‚— Open Source Security Testing Methodology Manual
(“OSSTMM”)
ď‚— The National Institute of Standards and Technology
(“NIST”) Special Publication 800 (“NIST SP 800-115”)
 Open Web Application Security Project (“OWASP”) Testing
Guide
ď‚— Penetration Testing Execution Standard
ď‚— Penetration Testing Framework
ď‚— As well as, proven techniques that blackhat hackers utilize
Cloud penetration testing

Cloud penetration testing

  • 3.
    What Is CloudPenetration Testing  Cloud penetration testing is often performed in a similar fashion to external penetration test where your organization’s data is hosted with one of the main cloud service providers. VeriClouds is not needed at the customer site to perform the pentest or to establish VPN connections where as with on-prem penetration testing, this would be required.
  • 5.
    Testing It Offers Clouds Cloud Penetration Testing:  Infrastructure as a Service (IaaS)  Platform as a Service (PaaS)  Software as a Service (SaaS)  Cloud hybrid testing (On premise and public cloud based solutions)  Cloud Compliance Testing (PCI DSS, HIPPA, GLBA, and FFIEC regulations)  Social engineering options available that imitate techniques used by hackers to target your employees to obtain your company’s private information
  • 7.
    Methods Used  CloudPenetration Testing use industry-proven methodologies, such as:  Open Source Security Testing Methodology Manual (“OSSTMM”)  The National Institute of Standards and Technology (“NIST”) Special Publication 800 (“NIST SP 800-115”)  Open Web Application Security Project (“OWASP”) Testing Guide  Penetration Testing Execution Standard  Penetration Testing Framework  As well as, proven techniques that blackhat hackers utilize