Cloud Penetration Testing Services
Assurance testing of cloud services against HMG approved standards and/or industry best practice.
Features
- Cloud Security Architecture design security review
- Cloud security assessment
- Threat profiling
- Supports compliance with HMG Minimum Cyber Security Standards
- Supports NCSC Cyber Assessment Framework objectives B, C & D
- Supports verification of Service operators security claims
- Supports implementation of Cloud Security Principles (NCSC)
- Supports reviews of Cloud Security Alliance standards
Benefits
- Identification of People, Process and Technology risks
- Identification non-compliance with Service contract requirements
- Improves understanding of 3rd party Cyber Security posture
- Supports development of effective business resilience and continuity plans
- Supports evidence gathering of adherence to HMG mandated standards
- Supports evidence gathering against legal obligations
Pricing
£650 to £1,200 a unit a day
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at simon.newell@saluscyber.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
3 8 9 6 9 6 4 8 8 6 6 8 1 1 6
Contact
SALUS DIGITAL SECURITY LIMITED
Simon
Telephone: 01242374087
Email: simon.newell@saluscyber.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
1. Cloud instance development (IaaS/PaaS) security
2. Security evaluation of applications hosted on the cloud instance.
3. Identification of System administration vulnerabilities - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Security testing is conducted in line with the agreed scope for testing defined by the client and or the clients managed service provider.
- System requirements
-
- The client has agreement to test 3rd party services
- Permission is granted to deploy testing hardware as appropriate
- Permission is granted to deploy testing software as appropriate
- Permission is granted to test in accordance with scope
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Monday to Friday 9am - 5.30pm
Monday to Friday out of hours by arrangement
Weekends by arrangement - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
1. We provide remote testing services as standard (please see rate card).
2. Onsite testing includes travel and subsistence costs (please see rate card).
3. An account manager is provided for the service offer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We conduct an initial engagement meeting to outline the service offer and provide support on how to scope the boundaries of the security assurance task to be completed.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Assurance testing results in a report which is the property of the client. Reports are retained for record in line with agreed data retention policies agreed during the initiation of the contract. This retention may be to support follow on testing and act as a reference point.
- End-of-contract process
- Services are offered at Fixed price based on the scoping agreement. Variation to that scope will result in a re-costing exercise. There is no additional end of contract fees payable.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Assurance testing services do not affect user access to the system unless specific testing requires services to be suspended temporarily.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Exporting of data is not applicable to this assurance testing service
- Data export formats
- Other
- Other data export formats
- Data is not exportable
- Data import formats
- Other
- Other data import formats
- This service does not require the user to upload data
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The service is guaranteed for the duration of the agreed scope of the task.
- Approach to resilience
- This service is an independent assessment process and resilience is delivered through access to multiple qualified assessors and ability to delivery continuity of service
- Outage reporting
- Email alerts. If testers are disrupted and or refused access to conduct the testing the service manager will contact the client directly to resolve the issue.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Not applicable to the service offer for assurance testing.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- NCSC CHECK (Infrastructure and Web Applications)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- We operate under contractual governance standards dictated by the National Cyber Security Centre for the delivery and security of services to support IT Health Check Services (CHECK). We are also a Cyber Essentials Certification Body and hold IASME Gold Governance Certification for a small enterprise.
- Information security policies and processes
-
1. ISO9001 Quality management
2. IASME Gold Governance covering:
a. Risk assessment and management
b. Monitoring
c. Change Management
d. Training and managing people
e. Backup
f. Incident response and business continuity
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Covered by processes aligned with ISO 9001, IASME Gold certification, and ISO 27001 (in progress)
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Salus is a CHECK certified company certified to conduct IT Health Check services and our internal processes are managed to the highest standards required to support the CHECK service contract with the NCSC.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Approaches consistent with the requirements of ISO 9001 (quality management). IASME Gold Governance, and ISO 27001 best practice.
Additionally, compliance with the NCSC Check requirements to the safe retention and management of client data. - Incident management type
- Supplier-defined controls
- Incident management approach
-
ISO 9001 and IASME Gold Governance standards.
Our processes align with the core principles within the ISO 27035 and NIST CSF structures but aligned with processes consistent and reasonable for small business.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Corporate progress on adhering to the principles of ISO14000 Family of standards is underway. - Covid-19 recovery
-
Covid-19 recovery
Covid-19 management is in line with current Public Health England guidance.
We support work from home and continue to monitor and control in person working. - Tackling economic inequality
-
Tackling economic inequality
Salus operates ethically in all of its functions and we ensure there is not bias in our reward polices which discriminate against people based on gender, race, religious beliefs or disabilities. - Equal opportunity
-
Equal opportunity
Salus cyber is an equal opportunities employer. - Wellbeing
-
Wellbeing
Personal and mental health are important to the company and we ensure we maintain regular contact with all employees as a group and as individuals.
We adopt flexible working to support individuals needs where practical and ensure we adapt to emergency domestic situations with compassion and pragmatism.
People are our most valuable asset.
Pricing
- Price
- £650 to £1,200 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at simon.newell@saluscyber.com.
Tell them what format you need. It will help if you say what assistive technology you use.