While cloud service adoption has surged in the past few years, many organisations have been unaware of the security shortfalls in their cloud platforms and services. People have assumed that services provided on cloud platforms are “secure by default”. Unfortunately, this is not the case.
There are many areas where configuration or design errors could permit unintended access into the environment, expose sensitive data without proper security controls, or increase the likelihood of lowcomplexity attacks against the infrastructure succeeding. Our service gives you a much clearer view of how secure your cloud services are and what you can do to improve them.
Stage One:
AWS Tenancy Review
Stage Two:
Azure Tenancy Review
Stage Three:
Office 365 Tenancy Review
Stage Four:
Reporting
We have built on our long-standing experience in traditional penetration testing to incorporate the adoption of cloud-based services and platforms.
We have combined our experience gained during the growth of cloud with the services, testing methodologies and tooling used to assess cloud platforms. This enables us to evaluate cloud provider platforms and configurations to determine where issues or insecure configurations may exist.
Provides a thorough examination and test of cloud platforms and configurations.
Details issues that comprise a threat to the integrity of cloud platforms and configurations.
Outlines where elements of cloud platforms and configurations are configured correctly and securely.
Provides peace of mind by discovering vulnerabilities and outlining how they can be addressed.
Any critical issues or immediate threats will be communicated to you in real time, allowing for the earliest triage and remediation.
Engaging and working with MTI performing our recurring penetration testing was a very smooth experience. The team quickly understood our specific needs, the technical environment, and any specific test scenarios we requested. Good feedback from the consultants during the actual penetration test and a very professional report with vulnerabilities in order of priority and suggested corrective measures. All in all a job well done.
Michael Zetterlund
Chief Product Officer, Ariane Systems