Skip to Main Content

Ask Me Anything: Advanced Cloud Pen Testing Scenarios

Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and Patrick Mayo, as they reveal key signs of attacker activity. They explain how an internal network foothold can lead to cloud access, why attackers may target other employees via compromised accounts, and how expanding Cloud Penetration Tests can help identify overlooked vulnerabilities between environments.

By Edwin David, Patrick Mayo, Justin Elze and Mike Felch
October 30, 2024
Cloud Penetration Testing

Cloud Penetration Tests are a critical component of cloud security, but integrating other testing methods can take the assessment to the next level. Adding elements like social engineering, assumed breach scenarios, or compromised developer components to your cloud assessment enhances the ability to detect real-world attack paths, monitoring blind spots and gaps in policies and procedures.

Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and Patrick Mayo, as they reveal key signs of attacker activity. They explain how an internal network foothold can lead to cloud access, why attackers may target other employees via compromised accounts, and how expanding Cloud Penetration Tests can help identify overlooked vulnerabilities between environments.

In this session, attendees learned to:

  • Enhance cloud penetration testing with social engineering, assumed breaches, or compromised developer scenarios
  • Identify attacker tactics across internal and cloud environments, including lateral movement and phishing
  • Leverage real-world attack simulations to uncover vulnerabilities missed in standard assessments