Organisations are realising the benefits of moving infrastructure and services to the cloud however they often do not fully understand the security implications of doing so. A cloud technical security assessment will identify deficiencies in cloud security architecture, identify vulnerabilities in applications and provide recommendations to improve security of the cloud system.
An AWS Security Configuration Baseline reviews the implementation of an AWS environment, looking to identify any areas that could present risk or unintentional access to the internet. The baseline assessment considers the organisational requirements and context for cloud services and compares this against best practice implementation guidelines and hardening standards.
The following AWS functions, services and areas, where applicable, are assessed against the guiding principles for security control effectiveness:
|
|
The following AWS functions, services and areas are to be assessed against the guiding principles for audit function effectiveness:
|
|
Testing can be performed within each network segment to validate segmentation effectiveness.
The ability to access assets where there is no business or technical justification shall be identified, as well as ability to exfiltrate data through side channels.
Talk to an AWS Security SpecialistAn Azure Security Configuration Baseline reviews the implementation of an Azure environment, looking to identify any areas that could present risk or unintentional access to the internet. The baseline assessment considers the organisational requirements and context for cloud services and compares this against best practice implementation guidelines and hardening standards.
The following Azure functions, services and areas, where applicable, are assessed against the guiding principles for security control effectiveness:
|
|
Testing can be performed within each network segment to validate segmentation effectiveness.
The ability to access assets where there is no business or technical justification shall be identified, as well as ability to exfiltrate data through side channels.
Talk to an Azure Security SpecialistMicrosoft Office 365 includes many advanced security features, however many of these are either disabled or in an overly permissive state by default.
An Office 365 Security Configuration Baseline reviews the implementation of a tenancy, looking to identify any areas that could present risk or unintentional access to the internet. The baseline assessment considers the organisational requirements and context for cloud services and compares this against best practice implementation guidelines and hardening standards.
An office 365 Best Practices Security Configuration Assessment will assess the following areas:
|
|
Talk to a cloud security specialist today.
Level 34, 201 Elizabeth St
Sydney, NSW 2000
Call us: +61 2 9199 0000