A penetration tester is assessing the security of a client’s externally facing cloud infrastructure. After running reconnaissance, the tester notices that several services and systems are exposed, including a web server, application server, storage buckets, and an unknown portal requiring authentication. After closely examining each of the exposed resources, the tester stumbles upon confidential documents available without any security controls. Which of the following is the most likely reason the resources are exposed?
Snagggggin
3 months ago