Select Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.
Some technologies that form the infrastructure for the cloud-based services started as on-premises capabilities, and thus might not have been designed to share its resources in multi-tenancy or multi-customer environments. For example, an application might not have initially been expected to support multi-factor authentication or its database designed to partition data by tenant.
|
Dashboards |
Reports |
|---|---|
|
n/a |
Lists the vulnerable technologies that a malicious user might exploit.