Skip to content

Commit 293ae05

Browse files
authored
Update pentesting-cloud-methodology.md structure
Removed sections on Attack Graph and Office365, and added a section on Common Cloud Security Features.
1 parent a02f8ad commit 293ae05

File tree

1 file changed

+2
-9
lines changed

1 file changed

+2
-9
lines changed

src/pentesting-cloud/pentesting-cloud-methodology.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -446,16 +446,9 @@ aws-security/
446446
azure-security/
447447
{{#endref}}
448448

449-
### Attack Graph
449+
## Common Cloud Security Features
450450

451-
[**Stormspotter** ](https://github.com/Azure/Stormspotter)creates an “attack graph” of the resources in an Azure subscription. It enables red teams and pentesters to visualize the attack surface and pivot opportunities within a tenant, and supercharges your defenders to quickly orient and prioritize incident response work.
452-
453-
### Office365
454-
455-
You need **Global Admin** or at least **Global Admin Reader** (but note that Global Admin Reader is a little bit limited). However, those limitations appear in some PS modules and can be bypassed accessing the features **via the web application**.
456-
457-
458-
## Confidential Computing
451+
### Confidential Computing
459452

460453
{{#ref}}
461454
confidential-computing/luks2-header-malleability-null-cipher-abuse.md

0 commit comments

Comments
 (0)