Evolve Security’s AWS penetration testing methodology is driven by the Shared Responsibility Model, in which cloud customers are primarily responsible for the security of their applications, data, and access management to cloud resources, and focuses on discovering common and complex flaws in cloud environments. Leveraging an objective-based approach, Evolve Security assesses IaaS, PaaS, and SaaS layers of the cloud environment and helps to identify:
- Outdated and Vulnerable Software
- Misconfigured Cloud Services
- Shadow IT
- Weak and Overly Permissioned IAM Accounts
- Insecure Resource Policies
Evolve Security works with your organization to understand the unique deployment, configuration, and risk profile of your AWS resources and infrastructure. In a collaborative effort with your team, we help model realistic and high-probability attack scenarios to stress test your cloud security posture against skilled adversaries. This includes threat-modeling and identifying cloud-access entry points (APIs, Administrative Interfaces, Login Portals), unintended data leaks in public storage (S3, EBS), insecure applications (Server-Side Request Forgery with access to an AWS Metadata server), and internal risk analysis. Evolve Security’s cloud experts contextualize attack paths against your environment, including evaluating the exploit likelihood and potential impact of discovered issues, to drive actionable security improvements. Tailored reporting provides your team with important technical processes, findings, and strategic recommendations to help streamline remediation efforts, in addition to executive overviews to highlight the most important business risks.