Cloud Penetration Testing Service (AWS, Azure, GCP)
Digital Roxy runs cloud penetration tests against AWS, Azure, and Google Cloud environments. Every engagement covers IAM policy abuse, compute service exploitation, storage exposure, and the Kubernetes clusters running on top. Notification-compliant with AWS and Azure rules of engagement.
Cloud pentest is IAM policy attack simulation.
A cloud penetration test measures whether your cloud identity architecture, network topology, and compute configuration resist attacker techniques. The dominant attack vector in modern cloud breaches is IAM abuse, not software vulnerabilities. An over-permissive IAM role attached to an EC2 instance, a Lambda with pass-role rights to production, a Kubernetes service account with cluster-admin bindings. These findings do not show up on vulnerability scanners because they are not vulnerabilities. They are configurations.
Digital Roxy cloud pentests cover AWS, Azure, and Google Cloud environments against CIS Benchmarks and provider-specific security best practices. We review IAM policies with tools like Pacu, ScoutSuite, and Prowler, then manually exploit the over-permissions we find. Storage exposure testing, metadata service abuse testing (IMDSv1 vs IMDSv2), serverless function privilege escalation, and Kubernetes cluster penetration testing are all included where relevant. Every engagement complies with AWS and Azure penetration testing rules of engagement; provider notification is handled where required.
Cloud Vulnerability Classes We Exploit
Cloud pentest findings are mostly configuration findings. These are the patterns that show up in production AWS, Azure, and GCP environments.
Over-permissive IAM Policies
IAM roles with *:* permissions. Roles with iam:PassRole to production-capable services. Cross-account trust policies with overly broad Principal fields. AssumeRole chains that lead to admin. This is the #1 cloud attack vector for a reason.
Publicly Exposed Storage
S3 buckets with public-read. Azure Blob containers with anonymous access. GCS buckets with allUsers permissions. Even when the bucket ACL is private, the object ACLs can be public. We test both layers plus the bucket policy layer.
EC2/VM Metadata Service Abuse
IMDSv1 still enabled on EC2 instances, allowing SSRF-to-credentials chains. Azure IMDS exposure through misconfigured networking. GCP metadata service token abuse. Metadata service hardening is non-negotiable in modern cloud environments.
Kubernetes Cluster Weaknesses
Service accounts with default cluster-admin ClusterRoleBindings. Exposed Kubernetes API servers without proper authentication. Container escape through privileged pods or hostPath mounts. RBAC misconfigurations enabling privilege escalation. EKS, AKS, GKE all have their own patterns.
Lambda / Azure Function Privilege Abuse
Serverless functions with attached roles far exceeding their operational needs. Lambda functions able to write to production S3 buckets when they only need to read from a staging queue. Function secrets stored in environment variables visible through function inspection.
CloudTrail / Audit Log Gaps
CloudTrail disabled in specific regions. Azure Activity Log retention too short. GCP Audit Logs not enabled for data access. Attacker actions leave no trail. Essential finding for incident response readiness assessments.
Security Group / NSG Misconfigurations
Security Groups with 0.0.0.0/0 access on 22, 3389, 5432, 3306, or other management/database ports. Azure NSGs with "Any" source on internal management. GCP VPC firewall rules that allow far more than needed. Network exposure that IAM controls cannot protect against.
Secrets Manager / Key Vault Weaknesses
Secrets Manager with broad read permissions granted to application roles. Key Vault with admin-level Access Policies on roles that only need read. Secrets rotated but old versions never revoked. KMS keys without rotation enabled. Secrets management is often where the attack chain resolves.
Our Cloud Pentest Methodology
Methodology aligned with CIS AWS / Azure / GCP Benchmarks and MITRE ATT&CK for Cloud. IAM-first, because IAM is the control plane.
Account Scoping & Read-Only Access
Read-only audit access to the cloud account(s) in scope. For AWS, a SecurityAudit-equivalent IAM role. For Azure, a Reader + Security Reader role. For GCP, Security Reviewer. Provider-notification scope is identified; notifications are submitted where required by AWS/Azure pentest rules.
Asset Inventory & Configuration Baseline
Scout Suite, Prowler, and ScubaGear baseline the entire cloud environment against CIS Benchmarks. Resource counts, regional spread, service inventory, and initial finding list. Baseline becomes the starting point, not the full report.
IAM Graph Mapping
Build the full IAM trust graph. Every role, every policy, every cross-account trust, every federated identity. Pacu and custom tooling map privilege escalation paths. Every iam:PassRole and sts:AssumeRole edge is walked for reachability.
Storage & Data Exposure
S3, Azure Blob, GCS, RDS snapshots, EBS volumes, and all storage surfaces tested for public exposure. Object-level ACLs tested alongside bucket/container policies. Cross-account access paths to data are mapped. Public exposure findings are time-sensitive and get disclosed same-day.
Compute & Serverless
EC2, Azure VMs, and GCE instances tested for IMDS configuration, missing SSM agent posture, and SSH/RDP exposure. Lambda, Azure Functions, and Cloud Functions tested for privilege escalation paths and secret leakage. Container workloads tested for escape and image supply chain.
Kubernetes Cluster Testing (if applicable)
EKS, AKS, GKE, or self-managed clusters tested for API server exposure, RBAC misconfig, privileged pod patterns, hostPath mounts, and service account over-permissions. Tools like kube-hunter and Peirates for active enumeration. Every ServiceAccount with cluster-admin is a finding.
Report & Remediation Roadmap
Findings mapped to CIS Benchmark controls and MITRE ATT&CK for Cloud techniques. IAM graph visualization as a report appendix. Prioritized remediation roadmap with Terraform/CloudFormation/Bicep code snippets for the top findings. Free retest after remediation.
Our Cloud Pentest Toolset
Cloud tooling spans provider-native auditing, community frameworks, and custom attack tooling. The providers give you visibility; the offensive tools test whether that visibility matters.
Prowler + Scout Suite
Multi-cloud security auditing frameworks. CIS Benchmark alignment across AWS, Azure, and GCP. Baseline every engagement starts from.
Pacu
AWS offensive framework for privilege escalation and post-exploitation. IAM graph walking, Lambda backdoor testing, and credential extraction modules.
MicroBurst + ROADtools
Azure offensive tooling. Access token abuse, Key Vault enumeration, Azure AD enumeration, and service principal manipulation.
kube-hunter + Peirates
Kubernetes cluster attack frameworks. API server discovery, pod escape testing, service account abuse.
PMapper + IAM Access Analyzer
IAM privilege escalation analysis. PMapper builds a graph of who can become who and identifies reachable privilege escalation edges.
Terraformer + Custom SDK Tools
Environment reconstruction for offline analysis. Custom Python tooling on AWS, Azure, and Google SDKs for bespoke testing needs.
Cloud Pentest Engagement Tiers
Three engagement sizes. Every quote is fixed-price after a 15-minute scoping call. No hourly billing.
Single Cloud
Single AWS, Azure, or GCP account. Right for startups and single-cloud deployments.
- Single cloud provider
- IAM graph review
- Storage exposure testing
- Compute baseline testing
- 1-2 week engagement
- CIS Benchmark report
- One free retest
Multi-Account
Multi-account AWS Organization or multi-subscription Azure tenant. Right for companies with mature cloud footprints.
- Everything in Single Cloud
- Multi-account IAM testing
- Cross-account trust path analysis
- Kubernetes cluster testing
- Lambda / Function privilege testing
- 2-3 week engagement
- Two free retests
- Developer debrief with cloud team
Multi-Cloud
Combined AWS + Azure + GCP environment. Cross-cloud federation and hybrid trust testing.
- Everything in Multi-Account
- All three major clouds
- Cross-cloud federation review
- Hybrid AD-to-cloud trust testing
- SOC 2 / ISO 27001 cloud package
- MITRE ATT&CK for Cloud mapping
- 90-day remediation Slack support
Cloud Pentest Questions, Answered Directly
Explore Related Penetration Tests
Ready to scope your Cloud Pentest?
Book a 15-minute scoping call. You get a fixed-price quote within one business day.