Contact Us
Menu
Contact Us

Cloud Security

Cloud Security

Organisations are realizing the benefits of moving infrastructure and services to the cloud however they often do not fully understand the security implications of doing so. A cloud technical security assessment will identify deficiencies in cloud security architecture, identify vulnerabilities in applications and provide recommendations to improve security of the cloud system.

aws-logo

AWS Fit-for-Purpose Security Configuration Baseline

An AWS Security Configuration Baseline reviews the implementation of an AWS environment, looking to identify any areas that could present risk or unintentional access to the internet. The baseline assessment considers the organisational requirements and context for cloud services and compares this against best practice implementation guidelines and hardening standards.

Security Control Effectiveness

The following AWS functions, services and areas, where applicable, are assessed against the guiding principles for security control effectiveness:

  • AWS Accounts (including access policies and MFA implementation)
  • Root access and keys
  • IAM Users
  • IAM Groups
  • IAM Roles
  • IAM Access Keys
  • IAM Identity Providers
  • Key Pair Usage
  • Security Groups
  • Network ACLs
  • GuardDuty
  • VPCs
  • Gateway configuration
  • Azure AD integration, as configured within AWS
  • Change management and DevOps procedures for the deployment of new objects/environments
  • Elastic IP audit
  • S3 Bucket policies and ACLs
  • SQS queue policies
  • SNS topic policies
  • KMS key policies
  • CloudTrail configuration
  • CloudWatch
  • ECR
  • Service Control Policies
  • Route 53 DNS Management
  • RDS access control
  • SSO implementation
  • Account separation
  • Internet Gateways
  • Direct Connect & relevant routing
  • S3/Glacier backups access
  • Snapshot backups access
  • NFS EC2 + storage gateway

Audit Function Effectiveness

The following AWS functions, services and areas are to be assessed against the guiding principles for audit function effectiveness:

  • GuardDuty
  • Notification and alerting scenarios
  • Third-party alert aggregation
  • S3 Logs
  • ELB Logs
  • CloudTrail Logs
  • AWS Config Logs
  • VPC flow logs
  • CloudTrail event logs

Network Segmentation Testing

Testing can be performed within each network segment to validate segmentation effectiveness.

The ability to access assets where there is no business or technical justification shall be identified, as well as ability to exfiltrate data through side channels.

Talk to an AWS Security Specialist

azure-logo

Azure

An Azure Security Configuration Baseline reviews the implementation of an Azure environment, looking to identify any areas that could present risk or unintentional access to the internet. The baseline assessment considers the organisational requirements and context for cloud services and compares this against best practice implementation guidelines and hardening standards.

Security Control Effectiveness

The following Azure functions, services and areas, where applicable, are assessed against the guiding principles for security control effectiveness:

  • Identity and Access Management (IAM)
  • Security Center
  • Storage Accounts
  • Database Services
  • Log and Audit Profiles
  • KeyVault
  • Activity Logs
  • Network Security Groups
  • Network Watcher
  • Secrets and Key Management
  • AppService

Network Segmentation Testing

Testing can be performed within each network segment to validate segmentation effectiveness.

The ability to access assets where there is no business or technical justification shall be identified, as well as ability to exfiltrate data through side channels.

Talk to an Azure Security Specialist

office365-logo

Office 365

Microsoft Office 365 includes many advanced security features, however many of these are either disabled or in an overly permissive state by default.

An Office 365 Security Configuration Baseline reviews the implementation of a tenancy, looking to identify any areas that could present risk or unintentional access to the internet. The baseline assessment considers the organisational requirements and context for cloud services and compares this against best practice implementation guidelines and hardening standards.

An office 365 Best Practices Security Configuration Assessment will assess the following areas:

  • Basic admin protections
  • Logging and audit configuration
  • Basic identity protections
  • Exchange Online tenant-wide settings
  • Mail flow, transport
  • Sharing configuration and policies
  • Legacy authentication
  • Admin accounts
  • Data & user accounts
  • Security management
  • Threat protection
  • Identity and access management
  • Information protection
  • Anti-phishing
  • Anti-malware
  • Email authentication and DNS records
Talk to an Office 365 Security Specialist

Book a Free Consultation

Talk to a cloud security specialist today.