Cloud
Security
-
AWS, GCP, Azure and
KubernetesDoyensec is capable of assessing the security of both public and private cloud setups. When tasked with advanced cloud audits, we begin our engagements with a detailed security architecture review. Leveraging technical documentation and punctual interviews, we determine the most critical assets, the internal data flows and the security controls built around those.
By combining tooling (Cloudspoit, Prowler, G-Scout and custom scripts) with manual review, we perform in-depth audits that expose concrete risks and suggest actionable mitigations. Examples of identifiable misconfigurations, weaknesses, and departures from best practices include, but are not limited to, exposed services, lack of network filtering, weaknesses in identities management, missing network isolation and insecure network design that could facilitate data exfiltration or lateral movement.
Given the fast-changing offering of public cloud services and features, our consultants are hands-on practitioners that alternate engagements with research and training. When combining a web application engagement with a cloud audit puts Doyensec in a privileged position to identify vulnerabilities at the intersection of applications and cloud controls. This is a typical blind spot that is often missed by standard web engagements.
our research articles
Research is one of our founding principles and we invest in it heavily. All of our researchers have the privilege to use 25% of their time exclusively for self-directed research.
show more publications