Value for our clients:

  • assessing the overall security of cloud-based services
  • an overview of data that is publicly available through cloud services
  • detecting security vulnerabilities, glitches and misconfigurations in cloud-based assets and services
  • detecting misconfigured or not configured security components in the cloud services of Microsoft Azure, Microsoft Azure AD, Amazon AWS and/or Google Cloud

The cloud penetration testing service helps identify issues such as:

  • complete domain takeover due to outdated systems and/or poor security practices
  • takeover of the client’s server and gaining access to the intranet through remote code execution
  • access to sensitive internal information, session keys and internal communications using MiTM and ARP spoofing attacks
  • important components on the client network that use default passwords
We have conducted cloud penetration testing in critical infrastructure companies, the financial sector, the public sector and many other areas.

PHASES OF THE SERVICE 1

Pre-engagement communication with the client

2

Intelligence phase

3

Checking the default values for security settings

4

Detecting security vulnerabilities

5

Carrying out sample attacks

6

Preparing a report and presenting the results


Provide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.

KPMG Baltics OÜ

+372 626 8700
cyber@kpmg.ee
Ahtri 4, 10151 Tallinn, Estonia
${item.title}
KPMG Baltics KPMG Global Privaatsuspoliitika
KPMG IT Audit
Email again:

Analysis of employee awareness

Analysis of employee awareness focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.

Email again:

Threat assessment

Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.

Email again:

Maturity assessment

Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.

Email again: