This message was posted by a user wishing to remain anonymous
As more vendors are hosting software in the cloud, are information security analysts requesting for a connection into the vendor's cloud environment? i.e. a connection would allow verification of vulnerabilities, policy compliance etc.