Cloud Security Assessment

Services clients purchase before

Information Security Threat & Risk Assessment

Services clients purchase after

Information Security Consulting

The Business Case for Penetration Testing
Need some help?

Speak to the Risk Factory Foreman, and he'll tell you everything you need to know.

Call us on 0800 978 8139

Quote details

What is it?

A Cloud Security Assessment is the process of identifying vulnerabilities such as configuration flaws, excess builds, missing security patches, updates or fixes and programming errors on the systems comprising your cloud platform. It is conducted using automated scanning software programmed to find security vulnerabilities that may be compromised by hackers on the cloud servers hosting your data.

Why should I do it?

To ensure the security integrity of your cloud platform. Conducting this scanning assessment will identify any known security weaknesses that could be exploited by hackers to access your cloud systems. 

Routinely conducting security assessments of your cloud platform is internationally recognised best practice and required for compliance to virtually all data security governance risk and compliance frameworks.

How often should I do it?

You should conduct security assessments of your cloud platform once every 3 months (quarterly) and after any major changes.

What will Risk Factory do?

  • Conduct a security assessment of your cloud platform.
  • Identify how many devices are connected to your cloud platform.
  • Identify what operating systems, services and applications these devices are running.
  • Identify security vulnerabilities associated with the operating systems, services and applications.
  • Test each of the vulnerabilities identified against our database of known threats and attacks.

What will I receive?

  • A comprehensive report of the findings detailing a straight-forward explanation of each vulnerability identified and our cost-effective recommendations for mitigating each vulnerability. To see a sample report please contact our Risk Factory Foreman.
  • On-call telephonic support from an information security consultant for two weeks after the assessment to answer any questions you may have about the report or remedial recommendations.
  • A free rescan two weeks after the original scan to ensure recommended remedial actions were effective in mitigating the vulnerabilities originally identified.
  • A certificate of validation for compliance evidence.

Do I need to prepare anything in advance?

We just need the cloud Application Program Interface (API) connectivity details for the cloud platform you’d like us to assess. If you don’t know it, don’t panic our Factory Foreman can help you.

Don’t forget to specify the exact number of assessments you’d like to purchase when getting your quote. Our Factory Foreman will call you to schedule each assessment purchased. You can for example, purchase multiple assessments (for better value) and get them delivered over time when you need them to match your ongoing business requirements.