Gain Visibility Over Your Cloud Security Gaps.

Cybra offers a full suite of external penetration testing services in Australia.

What is a cloud pentest?

A cloud pentest is a broad term that could cover your cloud infrastructure, apps, workloads, resources, and identity management.

The scope is customised per client requirements.

Cloud pentest pricing

The price for a cloud penetration test can vary greatly depending on the size and scope of the environment and how many resources and workloads are to be included.

Dangers of cloud pentests

All penetration testing has a chance of adversely affecting systems, but this is very rare, particularly in cloud environments due to the abundance of system resources bandwidth and redundancies.

Benefits of a cloud pentest

The assessment identifies security gaps and vulnerabilities in your cloud environment that you can remediate before they are exploited by a malicious actor.

What systems can be tested?

Our penetration tests can be conducted on all cloud provider platforms, including AWS, Azure, and GCP.

Out of scope

Unless required by the customer, Denial of Service (DoS) is strictly out of scope for external penetration testing.

Approach

Cloud penetration tests are conducted by experienced security consultants using specialised software and tools remotely over the internet, simulating a malicious attacker who is attacking from the internet.

Types of cloud attacks

Cloud pentests cover a range of cyber attacks, such as:

  1. Account takovers
  2. Priveleage escalation
  3. API misconfigurations
  4. Insecure access management
  5. Vulnerability exploitation


Authenticated testing

Most cloud engagements are conducted with an assortment of test IAM accounts that are created by the customer and provided to us for testing. These accounts typically have varying degrees of access.

Tools

Various open-source and commercial software and scripts are deployed during cloud penetration tests.

Security posture management and similar platforms are often deployed to gain a security baseline of your environment and to inform penetration testing activities.

Firewalls/WAFs

While firewalls and WAFs are effective and mitigating some risks of exposing systems to the internet, they can sometimes interfere with penetration testing results. For the best outcome, Cybra will request that we are added to the allow-list of any such devices.

Detection / Monitoring

While not required, it is recommended to have some level of system and security monitoring in place during a penetration test as this allows the customer to observe how their systems react to a simulated hack, providing valuable insights for the security team.

What is a pentest report?

After a penetration test, the observations, findings, results and recommendations are presented in a professional report hand-written by our experienced consultants.

Who is the report for?

The penetration test report is formulated in a way that it can be read by executives/board, managers and technical staff.

Compliance objectives

Penetration test reports can be used as supporting evidence for relevant compliance frameworks.

What’s in the report?

The penetration test report includes an executive summary, technical summary, technical findings, vulnerability details and recommendations on how to remediate all identified issues.

What format is the report in?

The penetration test report is securely delivered to you in PDF format.

The report is professionally laid out so its easy for customer to navigate through the report.

Retest reports

Cybra offers an optional service to retest any vulnerabilities identified after you have a chance to fix the issues. This is known as a retest and an updated report is provided to you showing all remediated and non-remediated issues.

More Penetration Testing Resources

Penetration Testing Australia
Learn the obvious and not so obvious benefits of modern Penetration Testing.
Penetration Test Australia | Sydney | Melbourne | Brisbane
A Complete Penetration Testing Guide for Businesses in Australia.

Book a free Cyber Security consultation today