Select Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.
Some technologies that form the infrastructure for the cloud-based services started as on-premises capabilities, and thus might not have been designed to share its resources in multi-tenancy or multi-customer environments. For example, an application might not have initially been expected to support multi-factor authentication or a its database designed to partition data by tenant.
The Vulnerabilities on Shared Technologies report provides you insight into the vulnerable technologies that a malicious user might exploit.