Future-proof infrastructures require future-proof security

Cloud and IaaS penetration test

Cloud penetration test

A cloud penetration test is a security check in which the cloud computing system in particular is checked for vulnerabilities and security gaps. Various techniques and tools are used to test the security of the system and identify any vulnerabilities.

The results of the penetration test are then summarised in a report containing recommendations for remedying the vulnerabilities found.

A cloud penetration test can be carried out in different ways, depending on whether the target is a public or private cloud service or a hybrid cloud environment.

The cloud pentest is a form of security testing that attempts to circumvent or break the security measures of a cloud environment.

Some special features of such a test are

  • The focus is on the security of the cloud environment and not on the local network or the user's end devices.
  • Special tools and techniques are used that are tailored to the requirements of cloud environments.
  • The tester may need to have access to various cloud services and APIs to test the security of these services.
  • It is also important that the tester complies with the applicable laws and regulations in the area of data protection and cyber security.

The results of the test can be provided in the form of reports and recommendations for improvements to security measures.

Infrastructure-as-a-Service penetration test

IaaS, or "Infrastructure as a Service", is a model for the provision of IT infrastructure as a service via the internet. It enables companies and organisations to gain quick and easy access to IT infrastructure without having to worry about the procurement, operation and maintenance of hardware and software.

In the IaaS model, the service provider provides customers with virtual servers, storage, network capacities and other IT resources that are accessible via the Internet.

IaaS is an important part of the cloud computing landscape and offers companies the flexibility and scalability they need to adapt quickly to changing requirements. It is also an attractive option for companies that do not want to be burdened with the cost and effort of providing and operating IT infrastructure.

At the same time, moving the IT infrastructure to IaaS models or hybrid IT infrastructures also has direct consequences for IT security. It is not just the infrastructure itself that needs to be operated securely. The interaction of cloud services and established mechanisms, as well as the often high degree of innovation, also pose a challenge for experienced administrators and infrastructure architects.

An IaaS penetration test checks compliance with security guidelines and looks not only at the cloud-based infrastructure, but also at the interaction between the various services and the cloud platform itself.

Black Box - Little to no information

Penetration test of the infrastructure and cloud environment without previously registered users. No additional information is available.

Grey Box - Additional initial information

Access to different users who have different levels of authorisation. This allows us to check more quickly whether endpoints can be accessed by low-privileged users that should be reserved for higher-privileged users.

White Box - Comprehensive information and access to users, logs and configurations

The most effective approach: We have access to different users with different rights, as well as to parts of the source code and the logs that are generated. This allows us to gain a comprehensive picture of the security of the cloud environment and its services.