Cloud Security Assessments

Let's work together to ensure security is treated as a first-class citizen in all aspects of your business.

WHAT ARE...

Cloud Security Assessments

The more businesses move to the cloud, the more threats will grow. Seeing that the cloud supports the main infrastructure of your business, it is of utmost importance to ensure all of your data, processes, and platforms are secure. Just like you would have regular check-ups with your physician, it is recommended to regularly test the security posture of your Cloud Infrastructure.

OUR APPROACH

How we assess your security

Our Cloud Security Assessment comprises 2 main security concepts:

  • Penetration testing
    Involves assuming the role of a cyber attacker with the intent of breaking in and gaining access by means of exploiting system vulnerabilities and technical oversights in the implementation.
  • Vulnerability Assessment
    Aims to identify any security weaknesses in a system that is commonly known and exploited. During an assessment, methodologies similar to penetration tests are employed with a clear focus on finding known vulnerabilities.

Deimos performs automated security testing as well as manual testing as part of all its security packages. Performing an automated security assessment first allows the team to catch all low-hanging fruit, before focussing on more complex attack vectors. Most often, the real value comes from manual testing.

Below are various steps performed as part of a Cloud Security Audit:
  • Inspect application and infrastructure
  • Run automated scans
  • Review scan results
  • Perform manual testing
  • Review test results
  • Compile finding in a Security Audit Report
  • Review the Security Audit Report with you, the client
Project Kickoff

The Security Audit starts off with a project kickoff meeting. This meeting allows us to align on expectations and determine any specific areas you, the client, wants us to focus on. This session is also used to get a good understanding of the business and its use of technology.

Discovery

The Discovery sessions are used to gain a better understanding of the various systems at play. Discovery sessions are extremely important to any closed-box testing. It provides us with an opportunity to fast-track our understanding of the systems under attack.

Assessment

This is where the magic happens. During the assessment step, our security and infrastructure engineers perform a review of your systems in the hope of surfacing any security issues and/or concerns.

Reporting

We compile our findings into a well-written report. We always include recommendations on how to address any issues we raise.

Review

We will review the report together. Our Security Engineers will explain our findings in detail and facilitate any conversations about potential remediations.

KEY DELIVERABLES

What you’ll see from us

Report

Deimos will schedule a workshop with the Deimos Security team to discuss the findings and recommendations in more detail.

Workshop

Deimos can offer the services of its Software Architects, Security Engineers, and Software Engineers to assist with fixing the issues outlined in the report. This will be done on a time and material basis.

Resolution

Deimos can offer the services of its Software Architects, Security Engineers, and Software Engineers to assist with fixing the issues outlined in the report. This will be done on a time and material basis.

WHY DEIMOS?

Why we’re the best fit for your business

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Turpis sed lorem morbi arcu vivamus elit id diam diam. Et scelerisque convallis volutpat sit in vitae a elit justo. Enim eleifend facilisis nullam egestas arcu, phasellus eu, lorem ornare. Duis eu vitae eu sed molestie vitae sed dignissim.
Aenean mattis integer blandit adipiscing odio morbi et dui vestibulum. Ullamcorper viverra ligula arcu euismod odio ac, aenean. Non natoque fermentum ut scelerisque tempor, eget. Nullam tristique iaculis in lacus, sagittis, id aliquet sit. Cum semper mi elementum, nulla aliquet gravida amet.
Lectus ut purus vitae viverra. Orci felis tristique praesent quam nec id egestas convallis. Sed ut molestie egestas ipsum, elit augue viverra nunc, nec. Viverra integer et malesuada quam malesuada aenean sagittis. Ornare integer pharetra, purus mollis faucibus lectus feugiat. Cursus elit tristique at nec. Et fusce felis vitae ultrices hendrerit auctor.

LET'S CHAT

Let one of our certified experts get in touch with you