{"id":26,"date":"2024-01-08T11:05:46","date_gmt":"2024-01-08T10:05:46","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=26"},"modified":"2024-11-28T11:28:05","modified_gmt":"2024-11-28T10:28:05","slug":"cloud-iaas-pentest","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/cloud-iaas-pentest\/","title":{"rendered":"Cloud &amp; IaaS penetration test"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-d82290e304038972ac069ebc8150fc62\"><strong>Cloud &amp; IaaS penetration test<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color has-large-font-size wp-elements-c037e781e08492a7d085f386ebe0f416\" style=\"font-style:normal;font-weight:600\">Future-proof infrastructures require future-proof security<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure PenTest<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-cloud-IaaS.svg\" alt=\"Cloud and IaaS penetration test\" class=\"wp-image-462\" style=\"width:470px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5780d3d wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">Cloud penetration test<\/h2>\n\n\n\n<p>A cloud penetration test is a security check in which the cloud computing system in particular is checked for vulnerabilities and security gaps. Various techniques and tools are used to test the security of the system and identify any vulnerabilities.<\/p>\n\n\n\n<p>The results of the penetration test are then summarised in a report containing recommendations for remedying the vulnerabilities found.<\/p>\n\n\n\n<p>A cloud penetration test can be carried out in different ways, depending on whether the target is a public or private cloud service or a hybrid cloud environment.<\/p>\n\n\n\n<p>The cloud pentest is a form of security test that attempts to circumvent or break the security measures of a cloud environment.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" style=\"margin-top:50px\">Some special features of such a test are<\/h4>\n\n\n\n<ul class=\"wp-block-list checklist\">\n<li>The focus is on the security of the cloud environment and not on the local network or the user's end devices.<\/li>\n\n\n\n<li>Special tools and techniques are used that are tailored to the requirements of cloud environments.<\/li>\n\n\n\n<li>The tester may need to have access to various cloud services and APIs to test the security of these services.<\/li>\n\n\n\n<li>It is also important that the tester complies with the applicable laws and regulations in the area of data protection and cyber security.<\/li>\n<\/ul>\n\n\n\n<p>The results of the test can be provided in the form of reports and recommendations for improvements to security measures.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">Infrastructure-as-a-Service penetration test<\/h2>\n\n\n\n<p>IaaS, or \"Infrastructure as a Service\", is a model for the provision of IT infrastructure as a service via the internet. It enables companies and organisations to gain quick and easy access to IT infrastructure without having to worry about the procurement, operation and maintenance of hardware and software.<\/p>\n\n\n\n<p>In the IaaS model, the service provider provides customers with virtual servers, storage, network capacities and other IT resources that are accessible via the Internet.<\/p>\n\n\n\n<p>IaaS is an important part of the cloud computing landscape and offers companies the flexibility and scalability they need to adapt quickly to changing requirements. It is also an attractive option for companies that do not want to be burdened with the cost and effort of providing and operating IT infrastructure.<\/p>\n\n\n\n<p>At the same time, moving the IT infrastructure to IaaS models or hybrid IT infrastructures also has direct consequences for IT security. It is not just the infrastructure itself that needs to be operated securely. The interaction of cloud services and established mechanisms, as well as the often high degree of innovation, also pose a challenge even for experienced administrators and infrastructure architects.<\/p>\n\n\n\n<p>An IaaS penetration test checks compliance with security guidelines and looks not only at the cloud-based infrastructure, but also at the interaction between the various services and the cloud platform itself.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-container-core-group-is-layout-938f3215 wp-block-group-is-layout-flex\" style=\"margin-top:60px\">\n<div class=\"wp-block-group unfold-element wp-container-content-958eb9dc is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-5adf0b57 wp-block-group-is-layout-flex\" style=\"border-bottom-width:2px;padding-bottom:40px\">\n<div class=\"wp-block-group unfold-title is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading wp-container-content-68ac353a\">Black Box - Little to no information<\/h6>\n\n\n\n<figure class=\"wp-block-image size-full unfold-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-plus.svg\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-content is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-c0d58a60 wp-block-group-is-layout-flex\" style=\"padding-top:25px;padding-bottom:0px\">\n<p>Penetration test of the infrastructure and cloud environment without previously registered users. No additional information is available.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-element wp-container-content-958eb9dc is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-5adf0b57 wp-block-group-is-layout-flex\" style=\"border-bottom-width:2px;padding-bottom:40px\">\n<div class=\"wp-block-group unfold-title is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading wp-container-content-68ac353a\">Grey Box - Additional initial information<\/h6>\n\n\n\n<figure class=\"wp-block-image size-full unfold-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-plus.svg\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-content is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-c0d58a60 wp-block-group-is-layout-flex\" style=\"padding-top:25px;padding-bottom:0px\">\n<p>Access to different users who have different levels of authorisation. This allows us to check more quickly whether endpoints can be accessed by low-privileged users that should be reserved for higher-privileged users.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-element wp-container-content-958eb9dc is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-5adf0b57 wp-block-group-is-layout-flex\" style=\"border-bottom-width:2px;padding-bottom:40px\">\n<div class=\"wp-block-group unfold-title is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading wp-container-content-68ac353a\">White Box - Comprehensive information and access to users, logs and configurations<\/h6>\n\n\n\n<figure class=\"wp-block-image size-full unfold-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-plus.svg\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-content is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-c0d58a60 wp-block-group-is-layout-flex\" style=\"padding-top:25px;padding-bottom:0px\">\n<p>The most effective approach: We have access to different users with different rights, as well as to parts of the source code and the logs that are generated. This allows us to gain a comprehensive picture of the security of the cloud environment and its services.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-55c8832ebfa7507e7e2cea0ffcd4b304\">When does a Cloud &amp; IaaS PenTest make sense for my company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-f450b4bb2b0538cf119b838ddce7ec6a\">\n<li>They rely on cloud applications and infrastructure-as-code.<\/li>\n\n\n\n<li>You want to create secure cloud solutions for the long term.<\/li>\n\n\n\n<li>You always want to be scalable without compromising on security.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Enquire now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1323\" data-uid=\"69dc271aa2657\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1323\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1323\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69dc271aa2657\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><h4 class=\"has-base-color\">Order a cloud &amp; IaaS penetration test now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69dc271aa2657-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69dc271aa2657-label\" class=\"forminator-label\">What type of penetration test should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-1-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Web application (full stack)\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Web\" id=\"forminator-field-checkbox-1-1-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-1-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Web application (full stack)<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-2-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"API\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"api\" id=\"forminator-field-checkbox-1-2-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-2-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">API<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-3-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Geraet\" id=\"forminator-field-checkbox-1-3-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-3-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT device<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-4-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Netz\" id=\"forminator-field-checkbox-1-4-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-4-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT network<\/span><\/label><label id=\"forminator-field-checkbox-1-5-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-5-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Corporate network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Unternehmensnetz\" id=\"forminator-field-checkbox-1-5-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-5-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Corporate network<\/span><\/label><label id=\"forminator-field-checkbox-1-6-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-6-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Kubernetes\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Kubernetes\" id=\"forminator-field-checkbox-1-6-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-6-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Kubernetes<\/span><\/label><label id=\"forminator-field-checkbox-1-7-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-7-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"IoT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IoT\" id=\"forminator-field-checkbox-1-7-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-7-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">IoT device<\/span><\/label><label id=\"forminator-field-checkbox-1-8-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-8-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"ActiveDirectory\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"AD\" id=\"forminator-field-checkbox-1-8-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-8-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">ActiveDirectory<\/span><\/label><label id=\"forminator-field-checkbox-1-9-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-9-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Cloud application and infrastructure\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Cloud\" id=\"forminator-field-checkbox-1-9-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-9-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Cloud application and infrastructure<\/span><\/label><label id=\"forminator-field-checkbox-1-10-69dc271aa2657-label\" for=\"forminator-field-checkbox-1-10-69dc271aa2657\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Infrastructure-as-Code\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IaC\" id=\"forminator-field-checkbox-1-10-69dc271aa2657\" aria-labelledby=\"forminator-field-checkbox-1-10-69dc271aa2657-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Infrastructure-as-Code<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-1_69dc271aa2657\" id=\"forminator-form-1323__field--select-1_69dc271aa2657-label\" class=\"forminator-label\">Has a penetration test already been carried out?<\/label><select  id=\"forminator-form-1323__field--select-1_69dc271aa2657\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-1_69dc271aa2657-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"page-break-2\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-2\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-2_69dc271aa2657\" id=\"forminator-form-1323__field--select-2_69dc271aa2657-label\" class=\"forminator-label\">Which approach should be used for the penetration test?<\/label><select  id=\"forminator-form-1323__field--select-2_69dc271aa2657\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-2\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-2_69dc271aa2657-label\" aria-describedby=\"forminator-form-1323__field--select-2_69dc271aa2657-description\"><option value=\"WhiteBox\"  data-calculation=\"0\">White box - a lot of information is available to the testers (e.g. access to log information, source code, different user types)<\/option><option value=\"GrayBox\"  data-calculation=\"0\">Gray Box - some but not all information is available to the testers<\/option><option value=\"BlackBox\"  data-calculation=\"0\">Black box - no information is available to the testers.<\/option><\/select><span id=\"forminator-form-1323__field--select-2_69dc271aa2657-description\" class=\"forminator-description\">We recommend the white box approach, as it is the most efficient in terms of implementation.<\/span><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-3\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-3-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"3\"\n\t\t\t\tdata-label=\"Page  3\"\n\t\t\t\tdata-actual-label=\"Page 4\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69dc271aa2657\" id=\"forminator-field-name-1_69dc271aa2657-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69dc271aa2657\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69dc271aa2657\" id=\"forminator-field-email-1_69dc271aa2657-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69dc271aa2657\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69dc271aa2657\" id=\"forminator-field-phone-1_69dc271aa2657-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69dc271aa2657\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69dc271aa2657\" id=\"forminator-field-textarea-1_69dc271aa2657-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69dc271aa2657\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69dc271aa2657\" id=\"forminator-field-consent-1_69dc271aa2657-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69dc271aa2657__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69dc271aa2657\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69dc271aa2657-label\" aria-describedby=\"forminator-field-consent-1_69dc271aa2657__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69dc271aa2657__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"ecaf00b4d6\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/26\" \/><input type=\"hidden\" name=\"form_id\" value=\"1323\"><input type=\"hidden\" name=\"page_id\" value=\"26\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/cloud-iaas-pentest\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1323.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cloud &amp; IaaS Penetrationstest Zukunftsf\u00e4hige Infrastrukturen ben\u00f6tigen zukunftsf\u00e4hige Sicherheit Cloud Penetrationstest Ein Cloud Penetrationstest ist eine Sicherheits\u00fcberpr\u00fcfung, bei der speziell das Cloud-Computing-System auf Schwachstellen und Sicherheitsl\u00fccken hin \u00fcberpr\u00fcft wird. Dabei werden verschiedene Techniken und Werkzeuge verwendet, um die Sicherheit des Systems zu testen und eventuelle Schwachstellen zu identifizieren. Die Ergebnisse des Penetrationstests werden dann in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":3873,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/26\/revisions\/3873"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}