External network perimeter
Every public IP, port, service, certificate, and DNS record. Reconciled against your firewall rules and ACLs.
Internal and external network testing, Active Directory review, AWS / GCP / Azure configuration audit, network segmentation validation, hybrid-cloud trust analysis. We test the boundaries your compliance scope depends on.
What's in an infra & network audit.
Every public IP, port, service, certificate, and DNS record. Reconciled against your firewall rules and ACLs.
East-west traffic, VLAN segmentation, jump host hygiene, legacy protocols still on the wire, plaintext credentials in transit.
Kerberoasting, ASREProast, ADCS misconfiguration, AdminSDHolder abuse, GPO trust, delegation chains, group nesting.
IAM blast-radius walks, public S3 / GCS / Blob, security-group hygiene, KMS misuse, metadata-service exposure, control-plane logging, cross-account / cross-project trust.
For PCI / HIPAA / SOC 2: verify the network boundary actually contains the scope you claimed. Many segmentations leak.
On-prem to cloud, cloud to cloud, VPN, Direct Connect, ExpressRoute, SD-WAN. Trust chains across boundaries are where lateral movement starts.
How an infra audit runs.
Infra audit deliverables.
What we found vs what your CMDB says. Shadow IT, forgotten environments, expired certs, orphan accounts.
Visual paths from external foothold to crown-jewel data, with intermediate techniques. Useful for engineering planning and board reporting.
Per-principal: what they can access, what they can escalate to, what they could do in a worst case. Cloud-native.
Where your network actually segments and where it does not. Critical for compliance scope.
Specific GPO / ADCS / delegation changes, ranked by attack risk and ops impact.
Findings and remediation evidence formatted for SOC 2, ISO 27001, PCI auditors.
When an infra audit is the move.
New role, undocumented network, decade of accumulated AD policy. Get the lay of the land before someone exploits what you do not know about.
On-prem patterns do not translate cleanly to cloud IAM. Audit before the first incident shows you why.
Compliance scope depends on network and access boundaries. We verify the boundary holds.
Two networks, two identity providers, two cloud accounts. We map the combined attack surface and the trust boundaries.
Infra audit FAQ.
Significant overlap. An infra audit is broader (configuration + design); a pentest goes deeper on exploitation. Often run together.
AWS, GCP, Azure. Oracle Cloud, IBM Cloud, Alibaba Cloud on request. Kubernetes (EKS, GKE, AKS, on-prem) covered.
We cover both. Most environments are hybrid for years. Entra-only audits available.
Yes, as a standalone for PCI. Faster engagement, focused report, segmentation-only evidence pack.
Read-only by default. Write access only on request for IaC remediation pull requests.
60-minute call covers the environment and the compliance context. We quote the audit that matches what you actually need.