6.12 Vulnerabilities on Shared Technologies

Select > Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.

Some technologies that form the infrastructure for the cloud-based services started as on-premises capabilities, and thus might not have been designed to share its resources in multi-tenancy or multi-customer environments. For example, an application might not have initially been expected to support multi-factor authentication or a its database designed to partition data by tenant.

The Vulnerabilities on Shared Technologies report provides you insight into the vulnerable technologies that a malicious user might exploit.