Cloud Security Penetration Testing

AWS, Azure, GCP - independent cloud security testing that exposes real attack paths and produces the technical evidence your regulators, auditors, and enterprise customers require.

Review My Cloud Security

Why It Matters

Cloud misconfigurations are the leading cause of large-scale data breaches today - and increasingly, a direct compliance failure. ISO 27001, SOC 2, NIS2, DORA, and PCI DSS all require organisations to demonstrate that their cloud environments are actively tested against real-world attack scenarios. A CSPM tool generating automated reports doesn't satisfy that requirement. An independent penetration test conducted by certified engineers does.

What Do We Test?

Multi-Cloud Attack Simulation
External and assumed-breach testing across AWS, Azure, and GCP. We test IAM privilege escalation paths, storage exposure (S3 buckets, Azure Blob containers, GCS buckets), serverless function injection (Lambda, Azure Functions), container escape from managed Kubernetes services (EKS, AKS, GKE), and exposure of cloud management APIs and metadata services - including SSRF attacks that reach the Instance Metadata Service (IMDS) to steal temporary credentials.
Identity & Privilege Escalation
We map all IAM roles and policies to identify privilege escalation paths invisible to standard reviews - for example, a developer role that can create Lambda functions and attach them to an admin execution role, effectively granting full account control without any explicit high-privilege assignment. We test cross-account trust relationships, service-linked role misuse, and identity federation misconfigurations.
Compliance Evidence & Hardening Review
We compare your live cloud configuration against CIS Benchmark hardening standards for AWS, Azure, and GCP, and identify drift between intended and actual security posture. Our reports are structured to serve as technical evidence for ISO 27001 audits, SOC 2 assessments, DORA ICT risk management documentation and other.

How It Works

  1. Scope Definition & Compliance Alignment

    We define the engagement scope and map testing objectives to the specific compliance frameworks your organisation is working towards (ISO 27001, SOC 2, GDPR, DORA, PCI DSS, or others).

  2. External Reconnaissance

    Identification of exposed services, public storage buckets, leaked credentials in public code repositories, and misconfigured DNS pointing to cloud resources.

  3. Privilege Escalation & Lateral Movement

    Exploitation of misconfigured IAM roles, resource-based policies, and cloud service trust relationships to demonstrate real business impact with full attack chain documentation.

  4. Report, Debrief & Compliance Mapping

    Detailed findings report structured for both your engineering team and your compliance/audit process.

FAQ

Does a cloud pentest satisfy PCI DSS Requirement 11.4?
Yes - a properly scoped penetration test of the cloud environment hosting cardholder data satisfies the annual internal and external penetration testing requirements of PCI DSS v4.0 Requirement 11.4, provided it meets the methodology requirements (segmentation testing, scope covering all system components).
Do you need admin access to our cloud account?
It depends on the engagement type. For configuration review, we use read-only access. For full attack simulation, we use a low-privilege credential to simulate an attacker with limited initial access - which is more realistic and produces more meaningful findings.
Can you test a multi-cloud environment (e.g., AWS + Azure)?
Yes - multi-cloud engagements are supported. We scope each provider separately and assess cross-cloud trust relationships as part of the engagement.
What's the difference between a cloud pentest and a CSPM tool?
Cloud Security Posture Management (CSPM) tools automate configuration checks. They produce lists of misconfigurations but cannot chain them into real attack paths or demonstrate exploitability. Regulators and auditors increasingly distinguish between automated scanning and genuine penetration testing - and compliance frameworks specify that independent penetration testing is required, not just automated tooling.

Why Dhound?

Compliance-Focused Expertise

Compliance Expertise

We work with SaaS, fintech, and regulated companies, helping them meet security requirements for PCI DSS, SOC 2, DORA and other standards.

Plain-English Reports

Plain-English Reports

We deliver test insights in a manner both executive and tech departments could get value, not just raw scan output.

Retesting Included

Retesting Included

Complimentary retesting of vulnerabilities fixed by your team, to ensure that your system no longer contains these holes.

Request a Cloud Security Assessment

Get in touch to discuss your cloud environment, scope the assessment, and receive a tailored proposal.