{"id":14757,"date":"2023-03-02T06:25:14","date_gmt":"2023-03-02T06:25:14","guid":{"rendered":"https:\/\/www.startechup.com\/?p=14757"},"modified":"2024-09-06T11:17:37","modified_gmt":"2024-09-06T11:17:37","slug":"cloud-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/","title":{"rendered":"Cloud Penetration Testing: What Do You Need to Know?"},"content":{"rendered":"<p>The cloud computing industry in Australia is expected to <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.globaldata.com\/media\/technology\/cloud-computing-spending-australia-reach-us14-1bn-2025-forecasts-globaldata\/\"><u>grow by 12.5% and reach a whopping $14.1 billion in 2025<\/u><\/a>. With such huge investments in cloud perimeter on the horizon, security measures should be a top priority. That&#8217;s where cloud penetration testing comes in!<\/p>\n\n\n\n<p>But what exactly is cloud penetration testing? And why do you need it?<\/p>\n\n\n\n<p>Let&#8217;s find out!<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_47_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69da33a8a5211\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69da33a8a5211\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#What_is_Cloud_Penetration_Testing\" title=\"What is Cloud Penetration Testing?\">What is Cloud Penetration Testing?<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Cloud_Penetration_Testing_vs_Penetration_Testing\" title=\"Cloud Penetration Testing vs. Penetration Testing\">Cloud Penetration Testing vs. Penetration Testing<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Why_is_Cloud_Pen_Testing_Important\" title=\"Why is Cloud Pen Testing Important?\">Why is Cloud Pen Testing Important?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#3_Cloud_Penetration_Testing_Methods\" title=\"3 Cloud Penetration Testing Methods\">3 Cloud Penetration Testing Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#What_are_the_Benefits_of_Cloud_Penetration_Testing\" title=\"What are the Benefits of Cloud Penetration Testing?\">What are the Benefits of Cloud Penetration Testing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#The_Shared_Responsibility_Model_in_Cloud_Penetration_Testing\" title=\"The Shared Responsibility Model in Cloud Penetration Testing\">The Shared Responsibility Model in Cloud Penetration Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#5_Common_Cloud_Security_Threats_to_Watch_Out_for\" title=\"5 Common Cloud Security Threats to Watch Out for\">5 Common Cloud Security Threats to Watch Out for<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#1_Misconfigured_Cloud_Storage\" title=\"1. Misconfigured Cloud Storage\">1. Misconfigured Cloud Storage<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#2_Insecure_APIs\" title=\"2. Insecure APIs\">2. Insecure APIs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#3_Weak_Credential_Security\" title=\"3. Weak Credential Security\">3. Weak Credential Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#4_Outdated_software\" title=\"4. Outdated software\">4. Outdated software<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#5_Distributed_Denial-of-Service_Attacks\" title=\"5. Distributed Denial-of-Service Attacks\">5. Distributed Denial-of-Service Attacks<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Cloud_Penetration_Testing_Best_Practices\" title=\"Cloud Penetration Testing Best Practices\">Cloud Penetration Testing Best Practices<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Partner_with_experienced_cloud_penetration_testers\" title=\"Partner with experienced cloud penetration testers\">Partner with experienced cloud penetration testers<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Review_your_cloud_service_provider%E2%80%99s_SLAs\" title=\"Review your cloud service provider&#8217;s SLAs\">Review your cloud service provider&#8217;s SLAs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Define_the_scope_of_your_cloud_and_determine_the_type_of_testing\" title=\"Define the scope of your cloud and determine the type of testing\">Define the scope of your cloud and determine the type of testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Establish_clear_expectations_and_timelines\" title=\"Establish clear expectations and timelines\">Establish clear expectations and timelines<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Develop_a_protocol_for_data_breaches_or_live_attack_incidents\" title=\"Develop a protocol for data breaches or live attack incidents\">Develop a protocol for data breaches or live attack incidents<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/#Need_Consultation_for_Cloud_Services\" title=\"Need Consultation for Cloud Services?\">Need Consultation for Cloud Services?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-what-is-cloud-penetration-testing\"><span class=\"ez-toc-section\" id=\"What_is_Cloud_Penetration_Testing\"><\/span><strong>What is Cloud Penetration Testing?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cloud penetration testing, otherwise known as ethical hacking, is the method of uncovering security weaknesses in cloud-based systems. It works by mimicking a malicious attack to reveal any potential security vulnerabilities that hackers can abuse. Doing this ensures organizations are better equipped to protect their data.<\/p>\n\n\n\n<p>When it comes to cloud pen testing, it&#8217;s important to note that some strict guidelines and protocols must be followed, as set forth by the cloud service providers themselves, such as AWS and GCP.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.startechup.com\/en_au\/meet-baptiste\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"960\" height=\"320\" src=\"https:\/\/www.startechup.com\/wp-content\/uploads\/StarTechUP-Cloud-Consulting-Services.jpg\" alt=\"StarTechUP Cloud Consulting Services\" class=\"wp-image-14758\" srcset=\"https:\/\/www.startechup.com\/wp-content\/uploads\/StarTechUP-Cloud-Consulting-Services.jpg 960w, https:\/\/www.startechup.com\/wp-content\/uploads\/StarTechUP-Cloud-Consulting-Services-300x100.jpg 300w, https:\/\/www.startechup.com\/wp-content\/uploads\/StarTechUP-Cloud-Consulting-Services-768x256.jpg 768w, https:\/\/www.startechup.com\/wp-content\/uploads\/StarTechUP-Cloud-Consulting-Services-18x6.jpg 18w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cloud_Penetration_Testing_vs_Penetration_Testing\"><\/span><strong>Cloud Penetration Testing vs. Penetration Testing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cloud pentesting specifically focuses on a company&#8217;s cloud-based infrastructure and services. It involves the cloud provider&#8217;s security controls and the security of the <a href=\"https:\/\/www.startechup.com\/en_au\/blog\/application-development-in-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">company&#8217;s applications, data, and other assets stored in the cloud<\/a>.<\/p>\n\n\n\n<p>In contrast, a traditional penetration test focuses on performing offensive security tests on a system, service, or network to find security weaknesses. Still, it only concentrates on processes relevant to on-premise.<\/p>\n\n\n\n<p>To put it briefly, cloud penetration testing differs from standard penetration testing in that it requires specialized knowledge and tools to test cloud-specific configurations such as virtualization and <a href=\"https:\/\/www.startechup.com\/en_au\/blog\/api-for-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">API<\/a> access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"960\" height=\"280\" src=\"https:\/\/www.startechup.com\/wp-content\/uploads\/cloud-penetration-testing-quote.jpg\" alt=\"cloud penetration testing quote\" class=\"wp-image-14759\" srcset=\"https:\/\/www.startechup.com\/wp-content\/uploads\/cloud-penetration-testing-quote.jpg 960w, https:\/\/www.startechup.com\/wp-content\/uploads\/cloud-penetration-testing-quote-300x88.jpg 300w, https:\/\/www.startechup.com\/wp-content\/uploads\/cloud-penetration-testing-quote-768x224.jpg 768w, https:\/\/www.startechup.com\/wp-content\/uploads\/cloud-penetration-testing-quote-18x5.jpg 18w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_is_Cloud_Pen_Testing_Important\"><\/span><strong>Why is Cloud Pen Testing Important?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As the usage of cloud computing quickly grows, attackers find more ways to infiltrate your system. Due to the nature of cloud-based systems, they are often at a higher risk than traditional ones due to their access and storage of sensitive data.<\/p>\n\n\n\n<p>For that reason, cloud penetration testing is important to discover any potential security threats in your cloud service before malicious actors have the chance. Not only will it help you take proactive steps to improve the security of your cloud environments, but it will also help you stay compliant with data protection regulations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Cloud_Penetration_Testing_Methods\"><\/span>3 Cloud Penetration Testing Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cloud penetration testing is all about applying penetration testing methods to cloud computing environments. Basically, it&#8217;s the process of finding, assessing, and fixing vulnerabilities in cloud infrastructure, applications, and systems.<\/p>\n\n\n\n<p>When you hire cloud penetration testers, you should also invest in using a variety of tools and techniques to spot flaws in a cloud environment and then patch them up.<\/p>\n\n\n\n<p>Penetration testing and cloud penetration testing usually fall into three main methods:<\/p>\n\n\n\n<ul>\n<li><strong>White box testing<\/strong>: During the cloud penetration testing process, pen testers get admin or root-level access to the whole cloud environment. This means they know everything about the systems they&#8217;re trying to breach before they even start, making it the most thorough method out there.<\/li>\n\n\n\n<li><strong>Gray box testing<\/strong>: Your cloud penetration tester might have some limited knowledge or access to your cloud environment. This could include info about user accounts, the IT system layout, or other details.<\/li>\n\n\n\n<li><strong>Black box testing<\/strong>: Among penetration tests, this method is the least involved. Basically, as an organization, you just need to give your cloud pen tester limited information. The goal is for them to mimic a malicious attacker who knows nothing about your cloud environment beforehand. It&#8217;s the most \u201crealistic\u201d because it really simulates how an external attacker would think and operate.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_the_Benefits_of_Cloud_Penetration_Testing\"><\/span><strong>What are the Benefits of Cloud Penetration Testing?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Many cloud providers encourage conducting cloud penetration testing to help their clients ensure the security and integrity of their cloud-based infrastructure.<\/p>\n\n\n\n<p>Including this in your overall cloud security strategy empowers you to identify and fix vulnerabilities and protect your data from potential threats. As a business in a digital world, it enables you to better understand your cloud environment&#8217;s security posture.<\/p>\n\n\n\n<p>To be more specific, here are some of the main benefits that come along with cloud pen testing:<\/p>\n\n\n\n<ul>\n<li>Identify vulnerabilities and weaknesses in your cloud infrastructure before attackers exploit them<\/li>\n\n\n\n<li>Meet industry regulations and standards to avoid any potential penalties or fines<\/li>\n\n\n\n<li>Gain peace of mind and help you focus on your business objectives<\/li>\n\n\n\n<li>Offers actionable recommendations for remediation to address security vulnerabilities<\/li>\n\n\n\n<li>Shows how identified vulnerabilities could be exploited and the potential damage they could cause<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Shared_Responsibility_Model_in_Cloud_Penetration_Testing\"><\/span><strong>The Shared Responsibility Model in Cloud Penetration Testing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-1024x576.jpg\" alt=\"The Shared Responsibility Model in Cloud Penetration Testing Inforgraphic\" class=\"wp-image-14760\" srcset=\"https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-1024x576.jpg 1024w, https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-300x169.jpg 300w, https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-768x432.jpg 768w, https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-1536x864.jpg 1536w, https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-18x10.jpg 18w, https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic-1200x675.jpg 1200w, https:\/\/www.startechup.com\/wp-content\/uploads\/The-Shared-Responsibility-Model-in-Cloud-Penetration-Testing-Inforgraphic.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Cloud penetration testing is important to ensure cloud security within the shared responsibility model and the Service Level Agreement (SLA) between the client and the cloud service provider.<\/p>\n\n\n\n<p>This shared model of cloud security is known as &#8216;security in the cloud&#8217;. This means that both cloud providers and clients are responsible for maintaining the security of the data and applications stored in the cloud.<\/p>\n\n\n\n<p>Consequently, the SLA outlines each party&#8217;s security responsibilities, with the cloud provider and client handling different aspects of cloud security. For example, the cloud provider is responsible for the physical security of the data centers, while the client is responsible for securing their data and applications stored in the same cloud environment.<\/p>\n\n\n\n<p>Simply put, the cloud service provider is not held responsible for security errors related to user identity. At the same time, the client is not responsible for the management of the physical security of the data centers by the cloud provider.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Common_Cloud_Security_Threats_to_Watch_Out_for\"><\/span><strong>5 Common Cloud Security Threats to Watch Out for<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There is a multitude of security loopholes that can lead to the exploitation of your cloud applications. And if you want to remain safe from cyber-attacks, it is time to proactively manage your cloud security.<\/p>\n\n\n\n<p>Here are five of the most common cloud security threats that organizations should watch out for:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Misconfigured_Cloud_Storage\"><\/span><strong>1. Misconfigured Cloud Storage<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Corporate data stored in the cloud is vulnerable to cybercriminals who can sell or use it for malicious purposes. One of the main reasons for this vulnerability is misconfigured cloud storage. Misconfigured cloud storage can expose data to anyone on the internet who knows where to look, making it easy for cybercriminals to access and exploit your company&#8217;s data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Insecure_APIs\"><\/span><strong>2. Insecure APIs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>APIs are commonly used in cloud services to allow different <a href=\"https:\/\/www.startechup.com\/en_au\/blog\/software-outsourcing\/\" target=\"_blank\" rel=\"noreferrer noopener\">software applications<\/a> permitted services to communicate with each other securely. However, APIs are vulnerable to cyberattacks as they require access to sensitive data and functions. Tokens can grant access to third parties without compromising user credentials.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Weak_Credential_Security\"><\/span><strong>3. Weak Credential Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When it comes to cloud security issues, weak passwords can be a major vulnerability. Attackers can use brute force techniques to guess passwords and gain access to cloud accounts. This is why using strong and unique passwords for your cloud accounts and enabling multi-factor authentication whenever possible is important.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Outdated_software\"><\/span><strong>4. Outdated software<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Outdated operating system software is a major risk to your data based in cloud environments. Many software vendors do not have streamlined update procedures, or users disable automatic updates, leaving their systems vulnerable to attack. Hackers may use a vulnerability scanner to identify outdated software, making them easy targets for exploitation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Distributed_Denial-of-Service_Attacks\"><\/span><strong>5. Distributed Denial-of-Service Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Distributed denial-of-service (DDoS) attacks are malicious efforts to take down a web service, such as websites or web applications. It works by flooding the server with requests from many different sources simultaneously and overwhelming it with immense amounts of data traffic, rendering it unable to respond or process legitimate requests. Malicious actors usually conduct this type of attack to disrupt the availability and accessibility of your cloud services.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-1024x684.jpg\" alt=\"software engineers consulting about code\" class=\"wp-image-14761\" srcset=\"https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-1024x684.jpg 1024w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-300x200.jpg 300w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-768x513.jpg 768w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-1536x1026.jpg 1536w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-18x12.jpg 18w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code-1200x801.jpg 1200w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-consulting-about-code.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cloud_Penetration_Testing_Best_Practices\"><\/span><strong>Cloud Penetration Testing Best Practices<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When conducting cloud penetration testing, following industry best practices is important to ensure the best possible security testing outcomes.<\/p>\n\n\n\n<p>Follow these tips:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Partner_with_experienced_cloud_penetration_testers\"><\/span><strong>Partner with experienced cloud penetration testers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Find a provider with knowledge and experience in cloud systems. Consider an AWS inspector or Azure security center partner who is certified and highly skilled in cloud systems.<\/p>\n\n\n\n<p>Consider these popular cloud service providers:<\/p>\n\n\n\n<ul>\n<li>AWS<\/li>\n\n\n\n<li>Azure<\/li>\n\n\n\n<li>Google Cloud Platform (GCP)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Review_your_cloud_service_provider%E2%80%99s_SLAs\"><\/span><strong>Review your cloud service provider&#8217;s SLAs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If you decide to partner with the Google Cloud platform, they have <a href=\"https:\/\/cloud.google.com\/terms\/sla\" target=\"_blank\" rel=\"noreferrer noopener\">detailed Service Level Agreements (SLAs)<\/a> that outline the performance and uptime commitments they make to their clients. So, take time to understand any CSP Service Level Agreements (SLAs) or \u201cRules of Engagement\u201d specific to cloud security that you may need to abide by.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Define_the_scope_of_your_cloud_and_determine_the_type_of_testing\"><\/span><strong>Define the scope of your cloud and determine the type of testing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Clarify the scope of your cloud security assessment, such as which applications and services require testing. Also, define the <a href=\"https:\/\/www.startechup.com\/en_au\/blog\/remote-user-testing-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\">type of testing<\/a> needed, whether it\u2019s a full or partial penetration test or an assessment of user identity and access management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Establish_clear_expectations_and_timelines\"><\/span><strong>Establish clear expectations and timelines<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Set clear expectations for the security testing process, timelines, and milestones. This will help ensure everyone is on the same page throughout the process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Develop_a_protocol_for_data_breaches_or_live_attack_incidents\"><\/span><strong>Develop a protocol for data breaches or live attack incidents<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Ready a plan for what to do during a live attack on your cloud environments or data breach. Establish protocols for who should be notified and how quickly the incident needs to be reported.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-1024x684.jpg\" alt=\"software engineers\" class=\"wp-image-14762\" srcset=\"https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-1024x684.jpg 1024w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-300x200.jpg 300w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-768x513.jpg 768w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-1536x1026.jpg 1536w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-18x12.jpg 18w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers-1200x801.jpg 1200w, https:\/\/www.startechup.com\/wp-content\/uploads\/software-engineers.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Need_Consultation_for_Cloud_Services\"><\/span><strong>Need Consultation for Cloud Services?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Choosing the right cloud service provider, performing testing, and understanding cloud security risks can be too much for startups and growing companies. That&#8217;s why it\u2019s a good idea to seek out the help of an experienced cloud infrastructure specialist.<\/p>\n\n\n\n<p>Our <a href=\"https:\/\/www.startechup.com\/en_au\/services\/cloud-consulting-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud consulting services<\/a> at StarTechUP will help empower your digital transformation while ensuring the complete security of your data and applications. We strive to help you unlock all the potential of cloud computing for your business.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.startechup.com\/en_au\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a> today and begin crafting better solutions with the power of the cloud!<\/p>","protected":false},"excerpt":{"rendered":"<p>The cloud computing industry in Australia is expected to grow by 12.5% and reach a whopping $14.1 billion in 2025. With such huge investments in cloud perimeter on the horizon, security measures should be a top priority. That&#8217;s where cloud penetration testing comes in! But what exactly is cloud penetration testing? And why do you [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":14763,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":""},"categories":[439],"tags":[],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know.jpg",1920,1080,false],"thumbnail":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-150x150.jpg",150,150,true],"medium":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-768x432.jpg",580,326,true],"large":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-1024x576.jpg",580,326,true],"1536x1536":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-1536x864.jpg",1536,864,true],"2048x2048":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know.jpg",1920,1080,false],"trp-custom-language-flag":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-18x10.jpg",18,10,true],"post-thumbnail":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know-1200x675.jpg",1200,675,true],"twentytwenty-fullscreen":["https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know.jpg",1920,1080,false]},"post_excerpt_stackable_v2":"<p>The cloud computing industry in Australia is expected to grow by 12.5% and reach a whopping $14.1 billion in 2025. With such huge investments in cloud perimeter on the horizon, security measures should be a top priority. That&#8217;s where cloud penetration testing comes in! But what exactly is cloud penetration testing? And why do you need it? Let&#8217;s find out! Table of Contents What is Cloud Penetration Testing?Cloud Penetration Testing vs. Penetration TestingWhy is Cloud Pen Testing Important?3 Cloud Penetration Testing MethodsWhat are the Benefits of Cloud Penetration Testing?The Shared Responsibility Model in Cloud Penetration Testing5 Common Cloud Security Threats&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/www.startechup.com\/en_au\/blog\/category\/software-development\/\" rel=\"category tag\">Software Development<\/a>","author_info_v2":{"name":"Andrea Jacinto","url":"https:\/\/www.startechup.com\/en_au\/blog\/author\/ajacinto\/"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.5 (Yoast SEO v21.8.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Penetration Testing: What You Should Know | StarTechUP<\/title>\n<meta name=\"description\" content=\"Understand why cloud penetration testing is important, how it works, and the industry&#039;s best practices. Learn it all here!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Penetration Testing: What Do You Need to Know?\" \/>\n<meta property=\"og:description\" content=\"Understand why cloud penetration testing is important, how it works, and the industry&#039;s best practices. Learn it all here!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Startechup Inc\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/startechup\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T06:25:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-06T11:17:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrea Jacinto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ajacinto\" \/>\n<meta name=\"twitter:site\" content=\"@startechup\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrea Jacinto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/\"},\"author\":{\"name\":\"Andrea Jacinto\",\"@id\":\"https:\/\/www.startechup.com\/#\/schema\/person\/4f1d2499822d2f247cf6408135f1200c\"},\"headline\":\"Cloud Penetration Testing: What Do You Need to Know?\",\"datePublished\":\"2023-03-02T06:25:14+00:00\",\"dateModified\":\"2024-09-06T11:17:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/\"},\"wordCount\":1593,\"publisher\":{\"@id\":\"https:\/\/www.startechup.com\/#organization\"},\"articleSection\":[\"Software Development\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/\",\"url\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/\",\"name\":\"Cloud Penetration Testing: What You Should Know | StarTechUP\",\"isPartOf\":{\"@id\":\"https:\/\/www.startechup.com\/#website\"},\"datePublished\":\"2023-03-02T06:25:14+00:00\",\"dateModified\":\"2024-09-06T11:17:37+00:00\",\"description\":\"Understand why cloud penetration testing is important, how it works, and the industry's best practices. Learn it all here!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.startechup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Penetration Testing: What Do You Need to Know?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.startechup.com\/#website\",\"url\":\"https:\/\/www.startechup.com\/\",\"name\":\"Startechup Inc\",\"description\":\"Startechup Inc.\",\"publisher\":{\"@id\":\"https:\/\/www.startechup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.startechup.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.startechup.com\/#organization\",\"name\":\"Startechup\",\"url\":\"https:\/\/www.startechup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.startechup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.startechup.com\/wp-content\/uploads\/startechup-logo-blue-red-transparent.svg\",\"contentUrl\":\"https:\/\/www.startechup.com\/wp-content\/uploads\/startechup-logo-blue-red-transparent.svg\",\"width\":181,\"height\":28,\"caption\":\"Startechup\"},\"image\":{\"@id\":\"https:\/\/www.startechup.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/startechup\/\",\"https:\/\/twitter.com\/startechup\",\"https:\/\/www.linkedin.com\/company\/startechup\",\"https:\/\/www.youtube.com\/channel\/UC_4XR4imvk28kEPt9gyhZ4g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.startechup.com\/#\/schema\/person\/4f1d2499822d2f247cf6408135f1200c\",\"name\":\"Andrea Jacinto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.startechup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a501b20ad47d10e8b11a085b6b575138?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a501b20ad47d10e8b11a085b6b575138?s=96&d=mm&r=g\",\"caption\":\"Andrea Jacinto\"},\"description\":\"A content writer with a strong SEO background, Andrea has been working with digital marketers from different fields to create optimized articles which are informative, digestible, and fun to read. Now, she's writing for StarTechUP to deliver the latest developments in tech to readers around the world.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/andrea-jacinto\/\",\"https:\/\/twitter.com\/ajacinto\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Penetration Testing: What You Should Know | StarTechUP","description":"Understand why cloud penetration testing is important, how it works, and the industry's best practices. Learn it all here!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Penetration Testing: What Do You Need to Know?","og_description":"Understand why cloud penetration testing is important, how it works, and the industry's best practices. Learn it all here!","og_url":"https:\/\/www.startechup.com\/en_au\/blog\/cloud-penetration-testing\/","og_site_name":"Startechup Inc","article_publisher":"https:\/\/www.facebook.com\/startechup\/","article_published_time":"2023-03-02T06:25:14+00:00","article_modified_time":"2024-09-06T11:17:37+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.startechup.com\/wp-content\/uploads\/Cloud-Penetration-Testing-What-Do-You-Need-to-Know.jpg","type":"image\/jpeg"}],"author":"Andrea Jacinto","twitter_card":"summary_large_image","twitter_creator":"@ajacinto","twitter_site":"@startechup","twitter_misc":{"Written by":"Andrea Jacinto","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/"},"author":{"name":"Andrea Jacinto","@id":"https:\/\/www.startechup.com\/#\/schema\/person\/4f1d2499822d2f247cf6408135f1200c"},"headline":"Cloud Penetration Testing: What Do You Need to Know?","datePublished":"2023-03-02T06:25:14+00:00","dateModified":"2024-09-06T11:17:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/"},"wordCount":1593,"publisher":{"@id":"https:\/\/www.startechup.com\/#organization"},"articleSection":["Software Development"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/","url":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/","name":"Cloud Penetration Testing: What You Should Know | StarTechUP","isPartOf":{"@id":"https:\/\/www.startechup.com\/#website"},"datePublished":"2023-03-02T06:25:14+00:00","dateModified":"2024-09-06T11:17:37+00:00","description":"Understand why cloud penetration testing is important, how it works, and the industry's best practices. Learn it all here!","breadcrumb":{"@id":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.startechup.com\/blog\/cloud-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.startechup.com\/"},{"@type":"ListItem","position":2,"name":"Cloud Penetration Testing: What Do You Need to Know?"}]},{"@type":"WebSite","@id":"https:\/\/www.startechup.com\/#website","url":"https:\/\/www.startechup.com\/","name":"Startechup Inc","description":"Startechup Inc.","publisher":{"@id":"https:\/\/www.startechup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.startechup.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.startechup.com\/#organization","name":"Startechup","url":"https:\/\/www.startechup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.startechup.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.startechup.com\/wp-content\/uploads\/startechup-logo-blue-red-transparent.svg","contentUrl":"https:\/\/www.startechup.com\/wp-content\/uploads\/startechup-logo-blue-red-transparent.svg","width":181,"height":28,"caption":"Startechup"},"image":{"@id":"https:\/\/www.startechup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/startechup\/","https:\/\/twitter.com\/startechup","https:\/\/www.linkedin.com\/company\/startechup","https:\/\/www.youtube.com\/channel\/UC_4XR4imvk28kEPt9gyhZ4g"]},{"@type":"Person","@id":"https:\/\/www.startechup.com\/#\/schema\/person\/4f1d2499822d2f247cf6408135f1200c","name":"Andrea Jacinto","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.startechup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a501b20ad47d10e8b11a085b6b575138?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a501b20ad47d10e8b11a085b6b575138?s=96&d=mm&r=g","caption":"Andrea Jacinto"},"description":"A content writer with a strong SEO background, Andrea has been working with digital marketers from different fields to create optimized articles which are informative, digestible, and fun to read. Now, she's writing for StarTechUP to deliver the latest developments in tech to readers around the world.","sameAs":["https:\/\/www.linkedin.com\/in\/andrea-jacinto\/","https:\/\/twitter.com\/ajacinto"]}]}},"_links":{"self":[{"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/posts\/14757"}],"collection":[{"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/comments?post=14757"}],"version-history":[{"count":7,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/posts\/14757\/revisions"}],"predecessor-version":[{"id":18215,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/posts\/14757\/revisions\/18215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/media\/14763"}],"wp:attachment":[{"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/media?parent=14757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/categories?post=14757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.startechup.com\/en_au\/wp-json\/wp\/v2\/tags?post=14757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}