cloud security risk assessment

Overview

Cloud computing presents new and evolved risks to organizations. 

Security Risk Assessment is designed to help organizations assess the suitability of migrating services to Cloud environments and also assess existing risks in full or hybrid Cloud deployments. Pelta consultants have extensive experience in risk assessment aligned with the needs of a company. Our knowledge in auditing allows us to understand the impact of adopting cloud solutions for businesses. We use Cloud Security Alliance (CSA) best practices, in addition to NIST, ENISA, and industry-specific cloud security guidelines and local regulations such as the Personal Data Protection Act.

Findings from a cloud security assessment can help protect business operations, personnel data and customer information that may be held in cloud environments.

Benefits

  • Cloud Security Assessment boosts the security of your public clouds by identifying threats caused by misconfigurations, unwarranted access, and non-standard deployments.
  • Minimise and mitigate the risk of critical data being leaked from cloud environments.
  • Enhance security, ensuring users are valid and only have access to the resources and information they need, and for the minimum time required.
  • Gain full visibility of users and what they have access to in the cloud

Service Highlights

Cloud Security Risk Assessment is a review of security configurations within cloud infrastructure. We review the Cloud environment to ensure security controls are configured in line with industry best practice and the client’s own requirements. Pelta Consultants are speciliszed in  reviewing:

  • Microsoft Azure
  • Amazon Web Services (AWS)
  • Google Cloud Platform (GCP)

Pelta Consultants review the security controls and settings of the environment for the services identified.

 

Among the areas for review are:

 

  • Access & identity management settings applied (including authentication and review of access control policy)
  • Configurations (for suitability)
  • Malware defences
  • Data protection, e.g. encryption, password policies and implementation (including account lockout policies)
  • Backup and recovery procedures and the approach to business continuity
 

Once the assessment is completed, we provide a detailed report outlining key issues identified and remedial recommendations to manage those issues.