IAM blast radius
Per-principal: what can it access, what can it escalate to, what would the blast radius be in a worst case. Cloud-native analysis with Pacu, ScoutSuite, Prowler.
AWS, GCP, Azure pentest. IAM walks, public object-storage discovery, metadata-service abuse via SSRF, cross-account assume-role chains, control-plane logging gaps. Mapped to your compliance scope.
Configuration audit plus active exploitation. Read-only access by default; write access only with explicit approval.
Per-principal: what can it access, what can it escalate to, what would the blast radius be in a worst case. Cloud-native analysis with Pacu, ScoutSuite, Prowler.
S3 / GCS / Blob bucket discovery. Public read, public write, leaked credentials in objects, snapshot exposure.
For any application running on EC2/GCE/VM. SSRF to metadata, credential theft, lateral via assumed roles. IMDSv2 enforcement check.
For multi-account orgs: assume-role chains, tooling-account blast radius, audit-account independence, cross-account trust mistakes.
CloudTrail, Cloud Audit Logs, Activity Log. Data events enabled? Centralized? Sufficient for incident reconstruction?
EKS, GKE, AKS. Pod security, RBAC, service-account chains, image-pull authentication, network policies.
Read-only access to the cloud control plane. Active exploitation against the application layer where it touches cloud APIs.
Cloud pentest deliverables.
Per-finding: severity, exploit chain, blast radius, fix guidance. Provider-specific remediation (AWS, GCP, Azure).
Visual per-principal blast radius. Useful for ongoing reviews after the engagement closes.
Findings and remediation evidence formatted for SOC 2, ISO 27001, PCI auditors.
Post-fix retest included. Re-verify resolution on the new configuration state.
Common triggers for a cloud pentest.
On-prem patterns do not translate cleanly to cloud IAM. First post-migration pentest catches the mistakes.
You added GCP or Azure on top of AWS. The trust model across providers needs review.
EKS/GKE/AKS introduces a new attack surface (pod security, service accounts, network policies). Worth its own test.
Audit expects cloud configuration to be tested independent of the application layer.
Common questions for this engagement type. See main pentest FAQ for shared questions.
Read-only by default. Write access only if you want us to implement remediation pull requests as part of the engagement (rare).
AWS, GCP, Azure as standard. Oracle Cloud, IBM Cloud, Alibaba on request.
Covered. EKS, GKE, AKS, and on-prem K8s clusters tested for pod security, RBAC, service-account chains, network policies, and admission control.
60-minute scoping call covers cloud providers, account structure, and compliance context. Free.