Cloud Computing Penetration Testing Checklist & Important Considerations