Pentera Cloud
About the product
Pentera Cloud is a module designed for automatic security testing of cloud infrastructure (including IaaS/PaaS services in AWS, Azure, GCP). Pentera Cloud enables secure simulation of attacks on an organization’s cloud resources in its actual production environment. This module discovers and maps all relevant elements of the cloud environment (computing instances, databases, storage, privileged accounts, etc.) in different regions, and then verifies configurations for vulnerabilities and errors that could lead to security breaches. Pentera Cloud tests, among other things, common cloud attack vectors (e.g., cloud service privilege abuse, flawed resource access policies, publicly accessible services requiring authentication, etc.), checking the cloud’s resilience to techniques described in MITRE ATT&CK for Cloud. This module can also analyze attack paths between the cloud and the local network, detecting scenarios in which an attacker exploits weaknesses in the hybrid environment (e.g., pivoting from on-premises networks to cloud services or vice versa). At the end of the tests, Pentera Cloud generates a report identifying potential attack chains involving cloud services, reveals critical configuration vulnerabilities, and recommends corrective actions.
Pentera Cloud is used by organizations that use cloud infrastructure or platforms and want to verify their cloud security status. This module helps identify non-compliance with cloud service configuration practices (e.g., improper IAM permissions, public S3 buckets containing sensitive data, lack of key encryption, or exposed API secret keys). With automated testing, DevOps teams and security teams can quickly verify the security of new cloud deployments (e.g., after deploying a new service or changing the configuration). Pentera Cloud is also useful for compliance audits (e.g., CIS Benchmarks, ISO27017, etc.). It allows companies operating in a hybrid model to ensure that the integration of their local data center with the cloud does not create unintended attack vectors.