官术网_书友最值得收藏!

 Gathering cloud service information

We next want to discover whether the target is using any cloud-based services. Based on the IP addresses we have found we can see if there are multiple different domain and host information associated with an individual IP Address which would indicate some form of cloud based service.

Cloud services come in several different forms and offerings. Cloud services originally started the as a service trend with Software as a Service (SaaS), such as Office 365 and Exchange 365 and a Platform as a Service (PaaS) like AWS and Azure. Today, many organizations rely on cloud-based systems. Sometimes, these systems are controlled, managed, and monitored as part of the data center infrastructure. At other times, this use is regarded as Shadow IT. Shadow IT refers to the services that are brought up outside the corporate IT environment and control. They are often used for development purposes or to actually get around restricts or delays based on standard corporate IT policies. These environments can be rich with information; in fact, some of the more recent breaches of Personally Identifiable Information (PIIhave been from either unsecured or badly secured test applications, where they used real data in the databases. 

主站蜘蛛池模板: 麻江县| 芮城县| 襄城县| 凤翔县| 儋州市| 承德市| 儋州市| 抚顺县| 都兰县| 博兴县| 报价| 开封市| 博乐市| 仙居县| 枣强县| 抚州市| 青铜峡市| 泰兴市| 桃江县| 水城县| 留坝县| 凤城市| 定远县| 新沂市| 高密市| 兴国县| 招远市| 章丘市| 绥中县| 嘉义市| 顺平县| 碌曲县| 天全县| 天柱县| 枣庄市| 彭阳县| 秭归县| 洪泽县| 萨迦县| 张家界市| 惠来县|