As part of a cloud configuration review, Certus Cybersecurity conducts interviews with application stakeholders to understand your application’s business context and security criteria. Following this, we execute a manual and automated tool analysis of your cloud environment. The cloud security assessment process begins with a passive cloud configuration review of existing environments, including development, staging, and production networks. Whether your cloud environment is hosted on Amazon Web Services, Google Cloud Platform, or Microsoft Azure, our security professionals have up-to-date and complete knowledge of any architecture’s security considerations and threats.
Our in-depth review of your environment will include authentication, authorization, identity management, cloud networking configurations, cloud computing, cloud storage, and other security-relevant services.
Cloud Configuration Review focuses primarily on the application’s supporting cloud infrastructure. It provides insight into how effective the cloud application is at using a cloud provider’s security controls to protect workloads, addressing security gaps between what you may think is covered by your cloud provider and what’s actually covered.