Audit Cloud IAAS

Simulate attacks to better prepare them!

Understanding the IASS Cloud Audit


The current trend leads companies to outsource all or part of their information systems. The operation, which is often advantageous, should not make us forget the security issues that are not all managed by the service provider.

Synetis offers to analyze the configuration of your resources in the cloud, including the partitioning of resources, the methods of access to administration consoles, and access to services that are too highly exposed (e.g. an ElasticSearch server that has been "forgotten" on the Internet). In addition, these audits are enhanced with architectural advice, particularly with regard to interconnections with your information system.

This audit combines architecture audit and configuration audit of elements such as GSuite, AWS and Azure. Auditing the architecture and configuration of the target information system allows us to look for weaknesses in the design, in the choice of protocols used, or in the failure to comply with recommended practices in terms of security.

After a phase of analysis of the documentation and possible interviews, the target component is audited at the configuration level in order to identify deviations from the state of the art. Offensive tests (black box and grey box) can also be added to this work in order to test the security in depth.

Protection and monitoring of

Our Audit experts
answer your questions