Planning & Preparation
In the planning stage, the scope and goals of the project are defined. This includes the type of VAPT exercise to be undertaken, the target systems, planned duration, testing framework, and other considerations. It is important for both parties to discuss and agree how the activity will be conducted on a high level, taking into account various factors that can have a direct and indirect impact on the effectiveness and success of the project. For example, whether a staging environment is to be utilised, how to communicate critical vulnerabilities if any are discovered during project execution, to what extent vulnerabilities are to be exploited, and so on.
We carry out both internal and external network pen tests, so you can secure internal systems as well as those exposed to the internet. Depending on the scope, a black or gray box is conducted. An external black box PT typically mimics the path a hacker would take, with no prior knowledge of the network. Internal testing, amongst other benefits, can highlight the potential damage that could be caused by an insider, or other user with system access, who has malicious intent.
Once a network is compromised, hackers can move to exploit security weak spots in Active Directory. Our assessment identifies points of concern in your Active Directory environment by running various attack simulations. A risk analysis is performed, and results are summarised in a report that neatly explains the vulnerabilities uncovered during the engagement, the level of risk they pose and remediation steps that can be taken.
As cloud adoption gathers pace, and more sensitive data moves off premise, understanding how to secure that information becomes critical. The Cloud security assessment service uncovers security holes residing in cloud infrastructure, whether hosted on AWS, Azure or GCP. Depending on the nature and level of your cloud use, and the agreed scope, we will robustly test applications, platforms and infrastructure. Our cloud assessment also includes container security, where we test deployments of Kubernetes.

