Cookie Consent by Free Privacy Policy Generator
Secarma’s Cloud Configuration Security Review tests the configuration of the chosen cloud providers management interfaces for security misconfigurations. This should be considered a critical requirement for any businesses that has moved or is looking to move onto cloud infrastructure.
Who is it for?

Who is it for?

Many organisations these days have at least some workloads hosted within the cloud. Whether it’s a simple “lift-and-shift ” of moving onsite assets to the cloud, or something more ‘cloud native’, it’s important to make sure that these systems are secure.

We offer security testing appropriate for all levels of complexity, from simple security reviews of cloud hosted virtual machines, to deep-dive assessments of cloud-native applications.

How can we help?

How can we help?

If you’re hosting an application in the cloud and are concerned about application vulnerabilities within the system, then we can perform a traditional application penetration test.

However, if your concern is with how the hosting environment itself is set up then the most efficient way to determine if a cloud setup is secure, is to review the configuration panel itself.

This is an open book approach to security testing that ensures that available security options are configured, that systems are locked down, and that accounts with access are appropriately protected.

What we test

What we test

The specifics of the testing depend entirely on the deployment and features in use on the target cloud platform, however some commonly assessed areas include:

  • Identity and Access Management - Ensuring account utilise multifactor authentication and adhere to the principle of least privilege.
  • Storage - Ensuring that permissions to storage such as AWS S3 Buckets and Azure Storage are locked down and that keys are protected.
  • Network and Instance Security - Ensuring that the cloud platform adequately filters traffic and segments services.
  • Transit Security - Ensuring that data in transit between systems is encrypted and the configuration is hardened.
  • Logging and Monitoring - Ensuring that any actions taken within the cloud platform, and that may impact the systems security, are appropriately logged and that significant issues are highlighted to administrators for review.
  • Remote Access - Ensuring that remote access to the cloud platform is hardened against internet-based attacks.
  • Key Management - Ensuring that services such as Azure Key Vault and AWS Key Management are appropriately used and hardened, and that logging is enabled.

Want to know more about how a cloud configuration security review could benefit your organisation? Get in touch with one of our experts today for more information.

Download our Fact Sheet

Download

Other services

Privacy and Data Protection Services

As UK data protection laws evolve away from the requirement to employ Data Protection officers,...

IoT Cyber Scheme

Internet of Things (IoT) is a standard against which manufacturers of IoT devices can have their...

Threat Modelling

Threat Modelling is a structured tabletop exercise which is used to identify and...

Incident Response Scenario Testing

Modern organisations face a range of cybersecurity risks and whilst every effort may be made to...

Firewall Configuration Security Review

Firewalls are an essential component of network security as they monitor incoming and outgoing...

Cyber Security Maturity Assessment

Our Cyber Security Maturity Assessment (CSMA) evaluates your organisation's current security...

Build Configuration Security Review

A build configuration security review can provide system administrators with a comprehensive...

VISM (Virtual Information Security Manager)

Developing and maintaining a robust cybersecurity posture can be challenging for organisations who...