AWS Cloud Security Review
Today’s technology is rapidly adopting cloud technology to assist organisations in moving to a cloud-based or hybrid infrastructure to provide flexible, redundant and cost-effective computing on an enterprise. level.
The main issues associated with this technology is its inherent availability and default configuration, which is often exploited by attackers as they can easily access and attack these services with little risk of identification. A compromised account could prove fatal for most organisations as attackers could access resources located in the cloud, and internal resources in hybrid environments.
Pentest People’s AWS Security Review Assessment audits your Amazon Web Services (AWS) environment and the encased services from a ‘Blue Team’ perspective to identify any vulnerabilities that have been caused by misconfigurations, lack of best practices or insecure configurations. This allows you to remediate the vulnerabilities before they are exploited by an attacker. This testing is performed remotely from Pentest People’s office and data centre locations using credentials to your AWS environment.
Overview of Methodology
Cloud infrastructures vary in size, complexity, technologies, and in approaches to configuration, so Pentest People’s exact technical approach to each infrastructure may be very different. However, there are certain fundamental areas that are examined, which are as follows:
The AWS Security Review has a strong focus on publicly available information that could be leveraged in targeted attacks. Information such as links to cloud resources, document metadata, email addresses, and leaked credentials, are gathered to identify common and applicable attacks from unauthenticated attackers.
The configuration of the AWS environment and all encased services are systematically investigated and compared to industry-standard best practices and Pentest People’s in-house guidance to establish a secure environment, which is resilient to modern cyber-attacks. Pentest People understand that there can requirements and external factors that need to be satisfied — the consultant will take these into consideration when completing the post-assessment report.
What Are The Risks?
Due to the rapid adoption of AWS cloud services, many companies that have embraced this technology are facing new and old cyber risks that can lead to the compromise of customer-owned cloud platforms, and on-premise infrastructures with hybrid cloud setups. All of which can have devastating consequences to any organisation.
How Can We Help?
Our cloud trained consultants can assist in identifying vulnerabilities caused by, misconfigurations, bad practices and systems that are vulnerable to AWS-based vulnerabilities. These services allow you to remediate any security vulnerabilities before attackers can exploit them.
With our AWS Cloud Security Review, you gain access to SecurePortal
Until now, the traditional deliverable from a Penetration Test engagement has been a lengthy 100+ page PDF report.
Pentest People have developed a solution to this issue where you interact with your vulnerabilities within the SecurePortal.
With the move to Cloud being a relatively new aspect within businesses its of great importance to make sure you’re set up correctly.
Stay ahead of emerging threats against Cloud Infrastructures by ensuring your platform follows best practices
Rest assured that your assessments are performed by qualified Security Consultants.
Our specialised team of security consultants hold industry qualifications such as CHECK Team Member & Team Leader, CCIE, CISSP and CEH.
Understand the security issues you face within a cloud network through a very thorough assessment from a qualified security consultant.
- Assurance that your cloud infrastructures and services are secure enough to withstand cloud-based attacks
- Ensuring sufficient logging and controls are in place to mitigate these attacks.
- Comply with various regulatory bodies who mandate regular Penetration Testing be performed within your infrastructure
- Be able to focus efforts on important security issues by identifying the high-risk items identified in the Penetration Testing report