Vulnerabilities on Shared Technologies

In the Reports Portal, select Repository > Standard Content > Cloud > CSA > The Treacherous 12.

Some technologies that form the infrastructure for the cloud-based services started as on-premises capabilities, and thus might not have been designed to share its resources in multi-tenancy or multicustomer environments. For example, an application might not have initially been expected to support multi-factor authentication or its database designed to partition data by tenant.

Dashboards Reports

n/a

Vulnerabilities on Shared Technologies

Vulnerabilities on Shared Technologies
Lists the vulnerable technologies that a malicious user might exploit.