Improve Cloud Security
NetSPI’s Azure penetration test reduces organizational risk and improves cloud security
Whether you are migrating to Azure, developing cloud native applications in Azure, using Azure Kubernetes Service (AKS), or pentesting annually for compliance, penetration testing Microsoft Azure helps you ensure your cloud infrastructure is secure.
During an Azure penetration test, NetSPI identifies high impact vulnerabilities found in your Azure services, including applications exposed to the internet.
Gartner estimates up to 95% of cloud breaches occur due to human error, such as misconfigurations, and attackers continuously scan the internet to find these exposures.
Testing also identifies exposed credentials, excess privileges, and misconfigurations in your Azure Active Directory integration. These issues can lead to the compromise of your Azure infrastructure and enable an attacker to expose sensitive data, take over Azure resources, or pivot to attack your internal network.
Deliverables include an Azure penetration testing report with prioritized vulnerabilities, and actionable guidance to assist you in reducing risk and securing your Azure attack surface.
Azure Pentesting Techniques
NetSPI’s Azure pentest service includes a cloud services configuration review and external and internal penetration testing techniques, such as:
- System and services discovery
- Automated vulnerability scanning
- Manual verification of vulnerabilities
- Manual web application testing
- Manual network protocol attacks
- Manual dictionary attacks
- Network pivoting
- Domain privilege escalation
- Access sensitive data and critical systems
What to Know
Scanning internet-facing cloud resources is a high priority, but a complete cloud security assessment of the hardness of your Microsoft Azure infrastructure requires multiple steps, such as:
- Discovering all Internet-facing assets a hacker could find as potential entry points into your Azure account
- Identifying additional attack surfaces exposed by cloud and Active Directory integration
- Identifying known and common vulnerabilities on Internet-facing assets and web applications
- Identifying confidential data exposure on publicly available resources
- Identifying less severe vulnerabilities that can be chained together to obtain unauthorized access to other systems, applications, and sensitive data
- Verifying findings using manual penetration testing techniques and removing false positives
- Delivering actionable guidance for how to remediate verified vulnerabilities
Do I need to get Azure penetration testing approval from Microsoft?
No. As of June 2017, Microsoft no longer requires pre-approval to conduct a penetration test against Azure resources. Microsoft explains, “We don’t perform penetration testing of your application for you, but we do understand that you want and need to perform testing on your own applications. That’s a good thing, because when you enhance the security of your applications you help make the entire Azure ecosystem more secure.” NetSPI’s penetration tests comply with Microsoft Cloud Unified Penetration Testing Rules of Engagement.
Why You Need to Use Manual Penetration Testing Processes in Addition to Multiple Toolsets During Azure Penetration Testing
NetSPI Critical Vulnerability Discoveries Found Through
NetSPI’s External Pentesting Identifies
Powered by Resolve™
Web application engagements are managed and delivered through Resolve, NetSPI’s vulnerability management and orchestration platform. Resolve elevates your vulnerability management and pentesting program.
Azure Penetration Testing Resources
Watch this on-demand webinar where Karl Fosaaen covers some of the common initial Azure access vectors, along with a handful of escalation paths for getting full control over an Azure tenant, plus some techniques for maintaining privileged access.
If your organization is currently leveraging the cloud, there’s a good chance you are using Amazon Web Services (AWS) or Microsoft Azure. No matter which platform you’re on, it is important to note that each cloud provider has its own security considerations.
Read this blog from cloud expert, Karl Fosaaen for an overview of how to use each option in the Get-AzurePasswords module within MicroBurst. As each targeted service in the script has a different way of getting credentials, this blog helps users understand how things are working.