Penetration Testing in the Cloud Demands a Different Approach Attackers use a different set of techniques to target the cloud, meaning defenders must think differently when pen testing cloud environments.