Vulnerabilities on Shared Technologies

Select Reports > Portal > Repository > Standard Content > Cloud > Vulnerabilities on Shared Technologies.

Some technologies that form the infrastructure for the cloud-based services started as on-premises capabilities, and thus might not have been designed to share its resources in multi-tenancy or multi-customer environments.

For example, an application might not have initially been expected to support multi-factor authentication or a its database designed to partition data by tenant.

The Vulnerabilities on Shared Technologies report provides you insight into the vulnerable technologies that a malicious user might exploit.