Cloud Penetration Testing — AWS, GCP, Azure
Cloud Penetration Testing — AWS, GCP, Azure
Your cloud isn't a misconfiguration audit.
AWS, GCP, and Azure security reviews focused on actual attack paths — not CIS benchmark checklists. We map IAM privilege chains, lateral movement opportunities, and the seams between services.
CSPM tools find misconfigurations. We find what they lead to.
Wiz, Prowler, and Orca will tell you that your IAM role has wildcards. They won't tell you that this specific wildcard, chained with an EC2 instance profile, leads to your customer database. We chain misconfigs into actual attack paths.
- Privilege escalation graph across all roles
- Lateral movement opportunities mapped end-to-end
- Crown-jewel reachability from each entry point
- Cross-account trust relationship abuse
// Discovered chain — 4 hops to crown jewels ec2-readonly-role ↓ iam:PassRole (wildcard) ↓ ec2:RunInstances ↓ instance with admin profile ↓ FULL ACCOUNT TAKEOVER // CSPM said: "permissive PassRole" // CSPM did NOT say: "this leads to admin" // Recommended fix { "Effect": "Deny", "Action": "iam:PassRole", "Resource": "*", "Condition": { "StringNotEquals": { "iam:PassedToService": ["ec2.amazonaws.com"] } } }
Cloud surfaces
Across every major provider.
Policies, roles, trust relationships, privilege paths, MFA enforcement.
VPC peering, security groups, NACLs, public exposure, egress controls.
S3 / GCS / Blob bucket policies, encryption, public access, lifecycle.
EC2 / GCE / VM hardening, instance profiles, IMDS abuse paths.
Pod security, RBAC, network policies, secret mounts, runtime threats.
GitHub Actions, GitLab CI, OIDC trust, secret leakage, supply chain.
Scoped by account count, not engineer-hours.
Deliverables
Privilege paths, not config dumps.
Visual map of every privilege path in your cloud — entry point through escalation through crown-jewel reachability. Shows which roles, when chained, lead where attackers actually want to go.
Specific policy fixes for permissive roles, wildcard PassRole misuse, cross-account trust gaps, forgotten access keys. Each with the exact policy JSON to apply.
EKS / GKE / AKS / self-hosted clusters reviewed for RBAC, pod security standards, network policies, secret mounts, runtime threats. Falco / Tetragon / Cilium recommendations where relevant.
GitHub Actions OIDC trust review, GitLab CI runner exposure, dependency confusion risk, secret leakage through build logs. Often where the biggest privilege paths start.
Frequently Asked Questions
Common questions, answered.
AWS, GCP, or Azure — which do you cover?
Do you replace our CSPM tool?
How long does a cloud review take?
What access do you need?
How much does a cloud security review cost?
Do you test our Kubernetes clusters?
What about CI/CD supply chain?
Do you handle SaaS-to-cloud integrations (Snowflake, Databricks, MongoDB Atlas)?
Are findings mapped to compliance frameworks?
Can you do this without disrupting our environment?
What's the difference between this and a CSPM tool like Wiz or Prowler?
Can we do this as a one-time review or do you only do continuous?
How do you access our cloud accounts?
Do you cover multi-cloud and hybrid environments?
What about SaaS provider security (Okta, GitHub, etc.)?
What is cloud penetration testing
Attack-path testing for AWS, GCP, and Azure environments.
Cloud penetration testing is the security assessment of an organization's cloud infrastructure — IAM policies, network configuration, storage policies, compute hardening, container and Kubernetes deployments, and CI/CD supply chain — to identify exploitable attack paths rather than just surface-level misconfigurations. It complements but doesn't replace a Cloud Security Posture Management (CSPM) tool like Wiz, Prowler, or Orca.
The fundamental difference between CSPM and cloud pentest: CSPM tools tell you which roles have wildcard PassRole permissions; a cloud pentest tells you that this specific wildcard PassRole, chained with this EC2 instance profile assumption, leads to your customer database. We trace attack paths end-to-end so your remediation focuses on the few permissions that actually matter rather than the thousands of CSPM findings that don't.
Engagements cover the full cloud attack surface: IAM privilege escalation chains, network-level lateral movement, public-resource exposure, secrets management, container and Kubernetes runtime threats, and CI/CD supply chain risks. Multi-cloud is the norm — we test the seams between AWS, GCP, and Azure as well as the providers individually.
- AWS, GCP, Azure, plus DigitalOcean, Cloudflare, Oracle Cloud
- Read-only access via cross-account role; no agents, no install
- K8s coverage: EKS, GKE, AKS, plus self-hosted clusters
- CI/CD supply chain: GitHub Actions OIDC, GitLab CI, OIDC trust mappings
Pricing & timeline
Priced by account count and architectural complexity.
Cloud reviews are scoped by account count, region count, K8s cluster count, and CI/CD pipeline complexity. Read-only access is provisioned via a cross-account IAM role; we don't install agents or modify your environment.