摘要: Vulnerability assessments are best practices for computersecurity and requirements regulatory compliance. Potentialand existing security holes can be identified during vulnerabilityassessments breaches could averted. However, the unique nature of cloud computing environmentsrequires more dynamic assessment techniques. The proliferationof services cloud-aware applications introduce morecloud vulnerabilities. But, current measures identification, mitigation prevention vulnerabilities do not suffice. Our investigations indicate a possible reason this inefficiencyto lapses in availability precise, vulnerability information. We observed also that most research efforts context concentrate on IaaS, leaving other models largely unattended. Similarly, tackle general rather than specific Yet, mitigating is important security. Hence, paper proposes new approach addresses mentioned issues by monitoring, acquiring adapting publicly available information effective assessments. correlate from public databases develop Network Tests have implemented, evaluated verified suitability our approach.