ChaptersEventsBlog
Register now for the December 10 session on redefining cloud security in the era of AI and automation.

Download Publication

Cloud Penetration Testing Playbook
Cloud Penetration Testing Playbook

Cloud Penetration Testing Playbook

Release Date: 07/12/2019

Working Group: Top Threats

As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud systems and components. The process described here aims to provide the foundation for a public cloud penetration testing methodology and is designed for current and future technologies that are hosted on public cloud environments or services. In particular, this document focuses on penetration testing of applications and services hosted in the cloud. It addresses the methodological and knowledge gaps in security testing of information systems and applications in public cloud environments.

This work focuses on testing systems and services hosted in public cloud environments. This refers to customer-controlled or customer-managed systems and services. For example, a custom virtual machine, managed and controlled by the cloud customer, in an IaaS environment would be in-scope whereas the hypervisor of an IaaS environment that is controlled by the cloud service provider isn’t. As for testing hybrid clouds, this document does not cover the hybrid interface and on-premises environment.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity Security
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity...
Published: 12/08/2025
It's Time to Rethink Cloud Investigations
It's Time to Rethink Cloud Investigations
Published: 12/02/2025
The Layoff Aftershock No One Talks About: The NHIs Left Behind
The Layoff Aftershock No One Talks About: The NHIs Left Behind
Published: 11/26/2025
3 Vulnerabilities in Generative AI Systems and How Penetration Testing Can Help
3 Vulnerabilities in Generative AI Systems and How Penetration Test...
Published: 11/24/2025

Interested in helping develop research with CSA?

Related Certificates & Training