Pentest Cloud Infrastructure
Purpose
Assess the security configuration of cloud environments and containerized infrastructure to detect misconfigurations, excessive permissions, and vulnerabilities.
Core Workflow
- Cloud Config Audit: Assess cloud provider configuration (AWS/Azure/GCP) using
prowlerandscoutsuite. - IaC Scanning: Analyze Infrastructure-as-Code (Terraform, CloudFormation) for security flaws using
checkovandterrascan. - Container Security: Scan container images and runtime environments using
trivy,clair, anddockle. - Kubernetes Assessment: Audit K8s clusters for CIS compliance and vulnerabilities using
kube-benchandkube-hunter. - Runtime Monitoring: Analyze runtime behavior and rule violations using
falco.
References
references/tools.mdreferences/workflows.md