Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

Download Publication

Cloud Penetration Testing Playbook: Korean Translation
Cloud Penetration Testing Playbook: Korean Translation

Cloud Penetration Testing Playbook: Korean Translation

Release Date: 04/02/2021

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud systems and components. The process described here aims to provide the foundation for a public cloud penetration testing methodology and is designed for current and future technologies that are hosted on public cloud environments or services. In particular, this document focuses on penetration testing of applications and services hosted in the cloud. It addresses the methodological and knowledge gaps in security testing of information systems and applications in public cloud environments.

This work focuses on testing systems and services hosted in public cloud environments. This refers to customer-controlled or customer-managed systems and services. For example, a custom virtual machine, managed and controlled by the cloud customer, in an IaaS environment would be in-scope whereas the hypervisor of an IaaS environment that is controlled by the cloud service provider isn’t. As for testing hybrid clouds, this document does not cover the hybrid interface and on-premises environment.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Optimizing Secrets Management to Enhance Security and Reduce Costs
Optimizing Secrets Management to Enhance Security and Reduce Costs
Published: 10/22/2024
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security ...
Published: 10/21/2024
5 Behaviors for Transforming Your Cybersecurity Leadership
5 Behaviors for Transforming Your Cybersecurity Leadership
Published: 10/21/2024
Navigating Cloud Security: A Shared Responsibility
Navigating Cloud Security: A Shared Responsibility
Published: 10/17/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training