About this service

Key benefits

Ensure that all elements of AWS environment are being utilized securely;

Adhere to security best practices;

Mitigate the risks posed by misconfigurations and increase the security of your environment.

Services included

- Amazon EC2 Security Assessment: Comprehensive review of your EC2 instances, AMIs, and associated security groups.

- Amazon S3 Bucket Security Assessment: Detailed analysis of your S3 storage buckets, their permissions, and associated policies to prevent unintended data exposures.

- RDS and Database Security: Evaluation of relational database services, including automated backups, encryption at rest, and fine-grained access control.

- AWS IAM Role and Policy Review: Deep dive into Identity and Access Management roles, users, groups, and policies, ensuring the principle of least privilege is adhered to and avoiding overly permissive configurations.

- Amazon VPC and Networking Analysis: Examination of your Virtual Private Cloud configurations, security groups, NACLs, VPC flow logs, and VPN/Direct Connect setups.

- Amazon Lambda Security Assessment: Assessment of your serverless computing services, permissions, and associated triggers.

- Amazon Cognito User Pool and Identity Pool Review: Comprehensive examination of your Cognito configurations, ensuring robust user authentication and authorization mechanisms.

- CloudTrail and CloudWatch Logging Audit: Evaluation of your logging, monitoring, and alerting setups to identify any security events or misconfigurations.

- KMS and Secrets Manager Review: Securely manage cryptographic keys and secrets by assessing their lifecycle, rotation policies, and access controls.

- ECR, ECS and EKS Security Assessment: Analysis of your container services, including task definitions, network modes, and associated IAM roles.

Achieve and maintain compliance

and more.

Simulate the atacker's point of view

◼ Black box

Zero-knowledge attack
simulation. The penetration
testing team tries to infiltrate
your systems as a hacker
would, using only public data,
without prior knowledge of the
target.

◻ Grey box

Simulation of an insider attack,
where penetration testers act
as employees with legitimate
access but limited system
knowledge. This is the most
common pentest perspective.

◪ White box

Full-knowledge security
testing. Pentesters have
complete details about the
systems, network diagrams,
source code, and other targets
in scope.

Report and deliverables

Our report contains a high-level management summary and details of all vulnerabilities, classified based
on severity, risk, and likelihood. All issues are reported along with their respective mitigation controls.

The reports can be used for vendor and third party risk assessments, M&A due diligence, compliance,
and regulatory requirements such as SOC 2, PCI-DSS, HIPAA, ISO 27001, GDPR, CCPA, and others.

Blaze also provides a cybersecurity attestation letter that can be shared with customers and partners as
evidence of penetration testing.

Certified with CREST, OSCP, OSWE, OSCE

and other industry accreditations.

Performed by cyber security experts

Average duration between 7 to 25 business days

About Blaze Information Security

We like to present our team as ethical hackers who believe in technical excellence.

We are experts in offensive cybersecurity and our service portfolio is built to guarantee strong defenses of organizations worldwide.

GLOBAL EXPERIENCE

TECHNICAL EXCELLENCE

PASSION FOR CYBERSECURITY