Basilisk
BASILISK
/À propos/Services/Méthodologie/Secteurs/Cas/FAQ
// localefr
esc pour fermer▂▃▄
./contact
[services_cloud]CLOUD AUDIT

The biggest attack surface today is your cloud.

In cloud, the difference between 'configured' and 'secure' is three lines of IAM policy. We conduct deep review of AWS, Azure and GCP with proprietary scripts, public benchmarks and manual validation of the most sensitive findings.

What's included

The scope below is the default for a typical engagement. Everything is adjustable during scoping, at no cost.

// audited domains
  • IAM: users, roles, policies, federation
  • Network: VPC, SG, NACLs, peering, public exposure
  • Data: S3, RDS, DynamoDB, Blob, Cloud Storage
  • Compute: EC2, Lambda, ECS, EKS, AKS, GKE
  • Logging: CloudTrail, Config, Sentinel, SCC
  • Identity providers and federated SSO
// standards and frameworks
  • CIS Benchmarks (AWS, Azure, GCP, Kubernetes)
  • AWS Well-Architected — Security pillar
  • Azure Security Benchmark
  • CSA Cloud Controls Matrix
  • ISO 27017 & 27018
  • Mapping to GDPR and PCI-DSS

Modalities

adjustable to scope
01 /

Audit Snapshot

Complete X-ray in 1-2 weeks. Ideal for due diligence, audit prep or initial baseline.

02 /

Cloud Pentest

Active exploitation from compromised profile — simulates credential leak and real pivot.

03 /

Continuous Review

Monthly or quarterly reviews with deltas, integrated ticketing and executive briefing.

How we conduct it

[pipeline]
01/inventory

Complete inventory

We discover all active resources across accounts and regions. Orphan environments and shadow accounts are the most common leak point.

02/analysis

Configuration analysis

Proprietary scripts + CIS + Well-Architected. Every deviation is categorized by severity and mapped to compliance control.

03/exploit

Prioritized exploitation

On high-risk findings (IAM wildcard, public bucket, cross-account escalation), we validate impact via manual exploitation.

04/roadmap

Remediation roadmap

Deliverable is not a finding list — it's a fix plan with suggested owner, estimated effort and security posture gain.

Deliverables

dual view · NDA
01Technical report per service (IAM, network, data, compute, logging) with specific recommendation.
02Cross inventory: resources × exposure × sensitive data × severity.
03Compliance matrix with CIS, Well-Architected and GDPR (when applicable).
04Remediation roadmap prioritized by security ROI.
05Reference Terraform / IaC files for the most recurring fixes.
06Executive briefing with 5-6 slides and business language for C-level.

Frequently asked

01Do you need admin access to our account?

No. We operate with read-only audit role. For exploitation validation on critical findings, we use mirrored test environment or pointwise authorization by window.

02Do you serve multi-cloud?

Yes — AWS, Azure and GCP by default. Oracle Cloud and IBM Cloud on demand. Kubernetes on any provider is audited together.

03What about environments with hundreds of accounts?

We use proprietary scripts with parallelism that consolidate findings across Organizations (AWS), Management Groups (Azure) and Folders (GCP).

04How is delivery for due diligence?

Condensed report version + execution certificate + compliance matrix. Investor receives evidence without access to sensitive environment data.

// related services
// contact

Prêt à découvrir vos failles ?

Premier appel de scoping gratuit et couvert par NDA. En 48 heures vous recevez proposition technique, portée et calendrier. Sans formulaires bureaucratiques.