{"id":5635,"date":"2025-07-02T08:15:37","date_gmt":"2025-07-02T06:15:37","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=5635"},"modified":"2025-06-30T21:55:42","modified_gmt":"2025-06-30T19:55:42","slug":"31327","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/","title":{"rendered":"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud"},"content":{"rendered":"<p data-start=\"1305\" data-end=\"2261\">Cloud-Umgebungen wie Amazon Web Services (AWS) gewinnen f\u00fcr Unternehmen zunehmend an Bedeutung. Mit der Shared Responsibility Model wird die Sicherheit zwischen AWS und dem Kunden aufgeteilt: AWS sorgt f\u00fcr die Sicherheit der Cloud, der Kunde f\u00fcr die Sicherheit in der Cloud. Penetrationstests in AWS erfordern fundiertes technisches Wissen zu den genutzten Services und deren Konfigurationen. Die Vorbereitung umfasst die Festlegung des Umfangs sowie die Identifikation der genutzten Dienste.<\/p>\n<p data-start=\"1305\" data-end=\"2261\">Nicht alle Angriffe sind erlaubt, da AWS bestimmte Penetrationstests reguliert. Typische Techniken umfassen unter anderem externe Erkundung und Privilegienausweitung. Es gibt diverse Werkzeuge, die bei der Sicherheitsanalyse unterst\u00fctzen, wie AWS CLI, Prowler oder Scout Suite. Die Komplexit\u00e4t von Cloud-Umgebungen und die gemeinsame Verantwortung erh\u00f6hen die Risiken, weshalb regelm\u00e4\u00dfige Pr\u00fcfungen und ein tiefes Verst\u00e4ndnis der Cloud-Sicherheit essenziell sind.<\/p>\n<p data-start=\"2263\" data-end=\"2325\">Quelle und Links:<br data-start=\"2270\" data-end=\"2273\" \/><a class=\"\" href=\"https:\/\/www.hackthebox.com\/blog\/aws-pentesting-guide\" target=\"_new\" rel=\"noopener\" data-start=\"2273\" data-end=\"2325\">https:\/\/www.hackthebox.com\/blog\/aws-pentesting-guide<\/a><\/p>\n<p>Aktuelle Themen im Bereich Datenschutz und IT-Sicherheit: Ein \u00dcberblick<br \/>\n<a href=\"https:\/\/it-news-blog.com\/?p=3004\">https:\/\/it-news-blog.com\/?p=3004<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wir sind Experten f\u00fcr Datenschutz und IT-Sicherheit &#8211; seit 2003<br \/>\n<\/strong><\/p>\n<p>Unsere erfahrenen Spezialisten unterst\u00fctzen Sie unter anderem bei:<\/p>\n<p>&#8211; der Einf\u00fchrung und Beachtung von DSGVO, BDSG und TTDSG<br \/>\n&#8211; der Umsetzung von ISO 27001, TISAX, PCI-DSS oder NIS-2<br \/>\n&#8211; der Vorbereitung auf Audits und Zertifizierungen<\/p>\n<p>Kostenloses Erstgespr\u00e4ch &#8211; unverbindlich &amp; transparent -&gt; <a href=\"https:\/\/www.tec4net.com\/web\/impressum\">www.tec4net.com\/web\/impressum<\/a><\/p>\n<p><strong>tec4net GmbH &#8211; Datenschutz und IT-Sicherheit praktikabel umsetzen.<\/strong><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.tec4net.com\">www.tec4net.com<\/a> \u2013 <a href=\"https:\/\/www.it-news-blog.com\">www.it-news-blog.com<\/a> \u2013 <a href=\"https:\/\/www.it-sachverstand.info\">www.it-sachverstand.info<\/a> \u2013 <a href=\"https:\/\/www.datenschutz-muenchen.com\">www.datenschutz-muenchen.com<\/a> \u2013 <a href=\"http:\/\/it-sicherheit-muenchen.com\">www.it-sicherheit-muenchen.com<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span data-slate-fragment=\"JTVCJTdCJTIydHlwZSUyMiUzQSUyMnBhcmFncmFwaCUyMiUyQyUyMmNoaWxkcmVuJTIyJTNBJTVCJTdCJTIydGV4dCUyMiUzQSUyMkFsbGUlMjB1bnNlcmUlMjBORVdTJTIwdW50ZXIlMjAtJTIwaHR0cHMlM0ElMkYlMkZ3d3cudGVjNG5ldC5jb20lMkZ3ZWIlMkZjYXRlZ29yeSUyRmFsbGdlbWVpbiUyMiU3RCU1RCU3RCU1RA==\">Alle unsere NEWS -&gt; <a href=\"http:\/\/news.tec4net.com\">http:\/\/news.tec4net.com<\/a> \u2013 <a href=\"https:\/\/x.com\/tec4net\">https:\/\/x.com\/tec4net<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud-Umgebungen wie Amazon Web Services (AWS) gewinnen f\u00fcr Unternehmen zunehmend an Bedeutung. Mit der Shared Responsibility Model wird die Sicherheit zwischen AWS und dem Kunden aufgeteilt: AWS sorgt f\u00fcr die Sicherheit der Cloud, der Kunde f\u00fcr die Sicherheit in der Cloud. Penetrationstests in AWS erfordern fundiertes technisches Wissen zu den [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[3758,3760,3761,3756,3759,3757,3755],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-02T06:15:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T19:55:42+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud\",\"datePublished\":\"2025-07-02T06:15:37+00:00\",\"dateModified\":\"2025-06-30T19:55:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\"},\"wordCount\":270,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"AWS Compliance und Sicherheitsnormen\",\"AWS Shared Responsibility Model\",\"Cloud-Sicherheitsanalyse und Penetrationstest\",\"Datenschutz in Cloud-Umgebungen AWS\",\"EDV-Gutachten Cloud Sicherheit\",\"IT-Sicherheitsberatung f\u00fcr AWS Systeme\",\"Penetrationstest AWS Cloud Sicherheit\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\",\"name\":\"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2025-07-02T06:15:37+00:00\",\"dateModified\":\"2025-06-30T19:55:42+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/","og_locale":"de_DE","og_type":"article","og_title":"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/","og_site_name":"tec4net","article_published_time":"2025-07-02T06:15:37+00:00","article_modified_time":"2025-06-30T19:55:42+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud","datePublished":"2025-07-02T06:15:37+00:00","dateModified":"2025-06-30T19:55:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/"},"wordCount":270,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["AWS Compliance und Sicherheitsnormen","AWS Shared Responsibility Model","Cloud-Sicherheitsanalyse und Penetrationstest","Datenschutz in Cloud-Umgebungen AWS","EDV-Gutachten Cloud Sicherheit","IT-Sicherheitsberatung f\u00fcr AWS Systeme","Penetrationstest AWS Cloud Sicherheit"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/","url":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/","name":"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2025-07-02T06:15:37+00:00","dateModified":"2025-06-30T19:55:42+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2025\/07\/02\/31327\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"AWS Penetrationstest: Umfassende Anleitung f\u00fcr Sicherheitstests in der Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/5635"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=5635"}],"version-history":[{"count":3,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/5635\/revisions"}],"predecessor-version":[{"id":5651,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/5635\/revisions\/5651"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=5635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=5635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=5635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}