Vulnerabilities on Shared Technologies
In the Reports Portal, select > > > > .
Some technologies that form the infrastructure for the cloud-based services started as on-premises capabilities, and thus might not have been designed to share its resources in multi-tenancy or multicustomer environments. For example, an application might not have initially been expected to support multi-factor authentication or its database designed to partition data by tenant.
| Dashboards | Reports |
|---|---|
|
n/a |
Vulnerabilities on Shared Technologies |
- Vulnerabilities on Shared Technologies
- Lists the vulnerable technologies that a malicious user might exploit.