Cloud Infrastructure Assessments Flashcards
Data received by an API must pass service-side validation routines
Insecure Application Programming Interface (API)
APIs should use secure authentication and authorization such as SAML or
OAuth/OIDC before accessing data
Improper Key Management
Logs must be copied to non-elastic storage for long-term retention
Insufficient Logging and Monitoring
Cloud storage containers are referred to as buckets or blobs
Unprotected Storage
A content delivery network policy that instructs the browser to treat requests
from nominated domains as safe
Cross Origin Resource Sharing (CORS) Policy
A virtual machine that is created and configured for a particular purpose and then
shut down or even left running without properly decommissioning it
Dormant VM
An open-source tool written in Python that can be used to audit instances and
policies created on multicloud platforms, including Amazon Web Services,
Microsoft Azure, and Google Cloud Platform
ScoutSuite
An auditing tool for AWS that is used to evaluate the cloud infrastructure against
AWS benchmarks, GDPR compliance, and HIPAA Compliance
Prowler
An open-source cloud penetration testing framework to test the security
configuration of an AWS account
Pacu
Attacker’s may use multicloud services to create their attack platform
Cloud Forensics