Cloud Configuration Review
A Cloud Configuration Review is a configuration assessment of your AWS, Azure or GCP cloud environment against established security standards, including CIS benchmarks. This assessment is focused on reviewing and evaluating potential vulnerabilities without engaging in active exploitation.
We support Cloud Configuration Reviews for the following cloud environments:
Cobalt conducts a configuration review of your AWS, Azure, or GCP cloud environment against established security standards, including CIS benchmarks.
The goal of this assessment is to identify misconfigurations. We will outline the potential impact, and provide recommendations for remediation. Example findings include: overly permissive IAM policies, open security groups, and unencrypted storage buckets. This assessment is focused on reviewing and evaluating potential vulnerabilities without engaging in active exploitation.
For Cloud Configuration Reviews, our team follows these steps:
- Target scope reconnaissance
- Component enumeration
- Based on automated component discovery
- Automated component configuration assessment
- Detail risks, based on Center for Internet Security (CIS) best practices
- Manual review of the identified misconfigurations
- Reporting, triaging, and retesting
In general, the cloud providers that we work with no longer need to know before we perform our audit. However, each cloud provider may have their own procedure. We’ve included links to procedures that we know of in the section for each provider.
Source IP Addresses
Cloud providers may need to include IP addresses associated with pentester traffic in their allowlist. We’ll share these addresses when you create a Cloud Configuration Review.
Amazon AWS
Our pentesters need access to review your AWS configurations. You should prepare:
- A dedicated AWS account for each pentester, with access to each target system.
- Identity and Access Management (IAM) API credentials for each affected AWS account.
- Include the following managed policies for the pentest user or role:
SecurityAudit
ViewOnlyAccess
- Include the following managed policies for the pentest user or role:
- Identity and Access Management (IAM) API credentials for each affected AWS account.
These are the required policy Amazon Resource Names (ARN):
arn:aws:iam::aws:policy/SecurityAudit
arn:aws:iam::aws:policy/job-function/ViewOnlyAccess
If available, you should also include the architecture of your cloud environment.
What is covered
An AWS Cloud Configuration Review will identify misconfigurations. This assessment is focused on reviewing and evaluating potential vulnerabilities without engaging in active exploitation.
Cloud Configuration Reviews meet the Security standards based on the Center for Internet Security (CIS) Benchmarks.
AWS CIS Benchmarks cover IAM, Storage, Logging, Monitoring, and Networking.
Specific services that can be covered as part of the AWS configuration review include:
- AWS Cloudtrail
- AWS Cloudwatch
- AWS EC2
- AWS ELB
- AWS IAM
- AWS RDS
- AWS Redshift
- AWS Route 53
- AWS S3
- AWS SES
- AWS SNS
- AWS SQS
- AWS VPC
Google Cloud Platform (GCP)
Our pentesters need access to review your GCP configurations. You should prepare:
- A dedicated GCP account for each pentester, with access to each target system.
- GCP access keys.
- Identity and Access Management (IAM) API credentials for each affected GCP account.
- To provide API credentials, use a (service) account with Viewer and Security Reviewer permissions.
What is covered
A GCP Cloud Configuration Review will identify misconfigurations. This assessment is focused on reviewing and evaluating potential vulnerabilities without engaging in active exploitation.
Cloud Configuration Reviews meet the Security standards based on the Center for Internet Security (CIS) Benchmarks.
GCP CIS Benchmarks address the following areas:
- GCP Identity and Access Management
- GCP Logging and Monitoring
- GCP Networking
- GCP Virtual Machines
- GCP Storage
- GCP Cloud SQL Database Services
- GCP BigQuery
Microsoft Azure
Our pentesters need access to review your Azure configurations. You should prepare:
- A dedicated Azure account for each pentester, with access to each target system.
- Identity and Access Management (IAM) API credentials (read-only) for each dedicated account.
What is covered
An Azure Cloud Configuration Review will identify misconfigurations. This assessment is focused on reviewing and evaluating potential vulnerabilities without engaging in active exploitation.
Cloud Configuration Reviews meet the Security standards based on the Center for Internet Security (CIS) Benchmarks.
Azure CIS Benchmarks address the following areas:
- Identity and Access Management
- Microsoft Defender
- Storage Accounts
- Database Services
- Logging and Monitoring
- Networking
- Virtual Machines
- Key Vault
- AppService