What gets reviewed
Identity and Access
Review IAM policies, service accounts, role assignments, and federated access. Identify overprivileged identities, unused credentials, excessive permissions, and privilege escalation paths.
Storage and Databases
Assess S3 buckets, DynamoDB, storage accounts, GCS buckets, RDS instances, Azure SQL, and Cloud SQL. Review public access, encryption, backup configurations, and access logging.
Network Security
Review VPCs, security groups, network ACLs, firewall rules, and load balancers. Identify exposed services, overly permissive rules, segmentation gaps, and unencrypted traffic.
Compute, Containers & Serverless
Assess VMs, container registries, Kubernetes clusters (EKS, AKS, GKE), and serverless functions. Review security configurations, image vulnerabilities, function permissions, API gateway controls, and runtime protections.
Encryption and Key Management
Review encryption at rest and in transit. Assess KMS, Key Vault, and Cloud KMS configurations. Identify unencrypted resources and improper key access controls.
Logging and Monitoring
Evaluate CloudTrail, Azure Activity Logs, GCP Audit Logs, and security tool configurations. Assess log retention, centralization, and detection coverage.
What you receive
Public, Private & Hybrid Environments
Public Cloud Assessment
Evaluate AWS, Azure, and GCP configurations including IAM, storage, networking, and native security services. Benchmark against CIS and cloud provider best practices.
Private Cloud Assessment
Assess on-premise virtualized environments (e.g., VMware, OpenStack). Review hypervisor security, network segmentation, and identity controls.
Hybrid Cloud Review
Analyze integration between on-premises and cloud. Validate identity federation, network connectivity, and centralized monitoring.
Governance & Compliance Validation
Review policies, configurations, and monitoring against regulatory and framework requirements such as ISO 27001, SOC 2, and NIST.