Cloud Security assessment
Mark Ballew
Contact for pricing
About this service
Summary
What's included
Overview of security requirements
Take a birds eye view of the application and documentation to look for overarching security issues in the product.
Developer access audit
Look at how the product is being accessed by developers and suggest security changes. This is a good point to create a a SOC2 document, if required.
Workflow audit
Insure that credentials are not leaked, re-used, or stored. Suggest ways to automatically roll keys and certificates.
Policy audit
Check that there are not excessive access to critical infrastructure such as databases, applications, logs, metrics. VPCs are restrictive. VPNs are set up correctly
Skills and tools
Work with me