Skip to main content

Help us improve the Digital Marketplace - send your feedback

SALUS DIGITAL SECURITY LIMITED

Cloud Penetration Testing Services

Assurance testing of cloud services against HMG approved standards and/or industry best practice.

Features

  • Cloud Security Architecture design security review
  • Cloud security assessment
  • Threat profiling
  • Supports compliance with HMG Minimum Cyber Security Standards
  • Supports NCSC Cyber Assessment Framework objectives B, C & D
  • Supports verification of Service operators security claims
  • Supports implementation of Cloud Security Principles (NCSC)
  • Supports reviews of Cloud Security Alliance standards

Benefits

  • Identification of People, Process and Technology risks
  • Identification non-compliance with Service contract requirements
  • Improves understanding of 3rd party Cyber Security posture
  • Supports development of effective business resilience and continuity plans
  • Supports evidence gathering of adherence to HMG mandated standards
  • Supports evidence gathering against legal obligations

Pricing

£650 to £1,200 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.newell@saluscyber.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

3 8 9 6 9 6 4 8 8 6 6 8 1 1 6

Contact

SALUS DIGITAL SECURITY LIMITED Simon
Telephone: 01242374087
Email: simon.newell@saluscyber.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
1. Cloud instance development (IaaS/PaaS) security
2. Security evaluation of applications hosted on the cloud instance.
3. Identification of System administration vulnerabilities
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Security testing is conducted in line with the agreed scope for testing defined by the client and or the clients managed service provider.
System requirements
  • The client has agreement to test 3rd party services
  • Permission is granted to deploy testing hardware as appropriate
  • Permission is granted to deploy testing software as appropriate
  • Permission is granted to test in accordance with scope

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday to Friday 9am - 5.30pm
Monday to Friday out of hours by arrangement
Weekends by arrangement
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
1. We provide remote testing services as standard (please see rate card).
2. Onsite testing includes travel and subsistence costs (please see rate card).
3. An account manager is provided for the service offer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We conduct an initial engagement meeting to outline the service offer and provide support on how to scope the boundaries of the security assurance task to be completed.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Assurance testing results in a report which is the property of the client. Reports are retained for record in line with agreed data retention policies agreed during the initiation of the contract. This retention may be to support follow on testing and act as a reference point.
End-of-contract process
Services are offered at Fixed price based on the scoping agreement. Variation to that scope will result in a re-costing exercise. There is no additional end of contract fees payable.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Assurance testing services do not affect user access to the system unless specific testing requires services to be suspended temporarily.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Exporting of data is not applicable to this assurance testing service
Data export formats
Other
Other data export formats
Data is not exportable
Data import formats
Other
Other data import formats
This service does not require the user to upload data

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The service is guaranteed for the duration of the agreed scope of the task.
Approach to resilience
This service is an independent assessment process and resilience is delivered through access to multiple qualified assessors and ability to delivery continuity of service
Outage reporting
Email alerts. If testers are disrupted and or refused access to conduct the testing the service manager will contact the client directly to resolve the issue.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Not applicable to the service offer for assurance testing.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
NCSC CHECK (Infrastructure and Web Applications)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
We operate under contractual governance standards dictated by the National Cyber Security Centre for the delivery and security of services to support IT Health Check Services (CHECK). We are also a Cyber Essentials Certification Body and hold IASME Gold Governance Certification for a small enterprise.
Information security policies and processes
1. ISO9001 Quality management
2. IASME Gold Governance covering:

a. Risk assessment and management
b. Monitoring
c. Change Management
d. Training and managing people
e. Backup
f. Incident response and business continuity

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Covered by processes aligned with ISO 9001, IASME Gold certification, and ISO 27001 (in progress)
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Salus is a CHECK certified company certified to conduct IT Health Check services and our internal processes are managed to the highest standards required to support the CHECK service contract with the NCSC.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Approaches consistent with the requirements of ISO 9001 (quality management). IASME Gold Governance, and ISO 27001 best practice.

Additionally, compliance with the NCSC Check requirements to the safe retention and management of client data.
Incident management type
Supplier-defined controls
Incident management approach
ISO 9001 and IASME Gold Governance standards.

Our processes align with the core principles within the ISO 27035 and NIST CSF structures but aligned with processes consistent and reasonable for small business.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Corporate progress on adhering to the principles of ISO14000 Family of standards is underway.
Covid-19 recovery

Covid-19 recovery

Covid-19 management is in line with current Public Health England guidance.

We support work from home and continue to monitor and control in person working.
Tackling economic inequality

Tackling economic inequality

Salus operates ethically in all of its functions and we ensure there is not bias in our reward polices which discriminate against people based on gender, race, religious beliefs or disabilities.
Equal opportunity

Equal opportunity

Salus cyber is an equal opportunities employer.
Wellbeing

Wellbeing

Personal and mental health are important to the company and we ensure we maintain regular contact with all employees as a group and as individuals.

We adopt flexible working to support individuals needs where practical and ensure we adapt to emergency domestic situations with compassion and pragmatism.

People are our most valuable asset.

Pricing

Price
£650 to £1,200 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.newell@saluscyber.com. Tell them what format you need. It will help if you say what assistive technology you use.