{"id":11330,"date":"2021-04-21T16:07:02","date_gmt":"2021-04-21T16:07:02","guid":{"rendered":"https:\/\/privasec837746.wpengine.com\/sea\/?page_id=11330"},"modified":"2022-04-24T14:14:08","modified_gmt":"2022-04-24T06:14:08","slug":"what-we-do-offensive-security-cloud-security-assessments","status":"publish","type":"page","link":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/","title":{"rendered":"Cloud Security Assessments"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11330\" class=\"elementor elementor-11330\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50fc9c04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50fc9c04\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c15269f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f49ead0\" data-id=\"6f49ead0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f63bc33 elementor-widget elementor-widget-heading\" data-id=\"6f63bc33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cloud Security Assessments<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60d2ba8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60d2ba8b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;2f3114d&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6857abaa\" data-id=\"6857abaa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09dff6f elementor-widget elementor-widget-heading\" data-id=\"09dff6f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Security Assessment<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b3b2f3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7b3b2f3\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc5b048 elementor-widget elementor-widget-text-editor\" data-id=\"cc5b048\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Privasec\u2019s Cloud Security Assessment service is the ideal first step for any organisation adopting cloud technologies as part of their business strategy. Cloud Service Providers operate on a \u2018Shared Security Model\u2019 whereby the lower end of the technology stack is secured, monitored and maintained by the vendor, leaving the upper end of the stack to be secured by the organisation.<\/p><p>Although the responsibility of confidentiality, integrity and availability of data in the cloud is shared between the provider and organisation, the responsibility split is far from even. Using the \u2018Iceberg\u2019 analogy demonstrates how much of the responsibility falls onto the organisation.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88e3f11 elementor-widget elementor-widget-image\" data-id=\"88e3f11\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"855\" src=\"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM-1024x855.png\" class=\"attachment-large size-large wp-image-10750\" alt=\"\" srcset=\"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM-1024x855.png 1024w, https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM-300x250.png 300w, https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM-768x641.png 768w, https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM.png 1198w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15f67f3c elementor-widget elementor-widget-text-editor\" data-id=\"15f67f3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This can be a daunting task for any organisation to undertake, even those with ready access to skilled cloud security engineers.<\/p><p>Privasec\u2019s Security Consultants have extensive experience with Cloud Security good practices and have helped numerous clients secure their cloud environments across multiple vendors. Using industry best-practices and best-of-breed assessment technology, Privasec is able to harness the power of the cloud using cloud-native functionality to rapid perform security &amp; configuration assessments across thousands of cloud security configurations.<\/p><p>Privasec\u2019s Cloud Security Assessments provide you with detailed visibility in your cloud security posture and in-depth risk analysis into various components including:<\/p><ul><li>Identity &amp; Access Management;<\/li><li>Roles and Policies;<\/li><li>Enterprise Communications;<\/li><li>Data Integrity &amp; Confidentiality;<\/li><li>System Redundancy;<\/li><li>Workloads &amp; Applications;<\/li><li>Data Storage;<\/li><li>Databases;<\/li><li>Network &amp; Routing; and<\/li><li>Container, Serverless and FaaS Security.<\/li><\/ul><p>Privasec Cloud Security Assessments provide clear, concise, actionable intelligence to business stakeholders about the current state of their cloud security posture and valuable insight on how to protect the organisation in the cloud.<\/p><p>Your Cloud Security Assessment Report includes:<\/p><ul><li>An executive summary detailing our scope, approach and summary findings and recommendations. This section is aimed at the executive management and contains summarised, non-technical descriptions of cloud security issues alongside a business interpretation of the key business security risks.<\/li><li>Detailed findings and observations section which includes the detailed assessment findings, the business security risks from identified security issues discovered by the team, as well as recommendations on how best to mitigate these risks.<\/li><li>Detailed recommendations will be based on industry best practice security recommendations to maintain the confidentiality, integrity and availability of the systems and information assets in the cloud.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0100e10 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0100e10\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;e4cadff&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d36c1b\" data-id=\"2d36c1b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef6cc78 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ef6cc78\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-950b80a elementor-widget elementor-widget-heading\" data-id=\"950b80a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Industry\u2019s Leading Red Team<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d1533 elementor-widget elementor-widget-text-editor\" data-id=\"e2d1533\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>To discuss how our Red Team can help you test your defences and\/or train your staff. Our direct and flexible approach means we can get your Red Team attack going in as quickly as 24 hours.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-664b5e2 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"664b5e2\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/privasec837746.wpengine.com\/sea\/quick-quote\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 18.71875 6.78125 L 17.28125 8.21875 L 24.0625 15 L 4 15 L 4 17 L 24.0625 17 L 17.28125 23.78125 L 18.71875 25.21875 L 27.21875 16.71875 L 27.90625 16 L 27.21875 15.28125 Z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to our Red Team Specislist<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cloud Security Assessments Cloud Security Assessment Privasec\u2019s Cloud Security Assessment service is the ideal first step for any organisation adopting cloud technologies as part of their business strategy. Cloud Service Providers operate on a \u2018Shared Security Model\u2019 whereby the lower end of the technology stack is secured, monitored and maintained by the vendor, leaving the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11407,"parent":11819,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"wds_primary_category":0,"footnotes":"","_wp_rev_ctl_limit":""},"categories":[],"tags":[],"class_list":["post-11330","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Security Assessments - Privasec SEA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security Assessments - Privasec SEA\" \/>\n<meta property=\"og:description\" content=\"Cloud Security Assessments Cloud Security Assessment Privasec\u2019s Cloud Security Assessment service is the ideal first step for any organisation adopting cloud technologies as part of their business strategy. Cloud Service Providers operate on a \u2018Shared Security Model\u2019 whereby the lower end of the technology stack is secured, monitored and maintained by the vendor, leaving the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"Privasec SEA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-24T06:14:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM-1024x855.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/\",\"name\":\"Cloud Security Assessments - Privasec SEA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2021\\\/04\\\/privasec_post.png\",\"datePublished\":\"2021-04-21T16:07:02+00:00\",\"dateModified\":\"2022-04-24T06:14:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2021\\\/04\\\/privasec_post.png\",\"contentUrl\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2021\\\/04\\\/privasec_post.png\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/what-we-do\\\/offensive-security\\\/cloud-security-assessments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/privasec.com\\\/sea\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Offensive Security\",\"item\":\"https:\\\/\\\/privasec.com\\\/sea\\\/offensive-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Security Assessments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#website\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/\",\"name\":\"Privasec SEA\",\"description\":\"Governance and Information Security Partners\",\"publisher\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/privasec.com\\\/sea\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#organization\",\"name\":\"Privasec SEA\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2020\\\/12\\\/Copy-of-Privasec5-No-Tag-Line-1.png\",\"contentUrl\":\"https:\\\/\\\/privasec.com\\\/sea\\\/wp-content\\\/uploads\\\/sites\\\/9\\\/2020\\\/12\\\/Copy-of-Privasec5-No-Tag-Line-1.png\",\"width\":850,\"height\":189,\"caption\":\"Privasec SEA\"},\"image\":{\"@id\":\"https:\\\/\\\/privasec.com\\\/sea\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security Assessments - Privasec SEA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/","og_locale":"en_GB","og_type":"article","og_title":"Cloud Security Assessments - Privasec SEA","og_description":"Cloud Security Assessments Cloud Security Assessment Privasec\u2019s Cloud Security Assessment service is the ideal first step for any organisation adopting cloud technologies as part of their business strategy. Cloud Service Providers operate on a \u2018Shared Security Model\u2019 whereby the lower end of the technology stack is secured, monitored and maintained by the vendor, leaving the [&hellip;]","og_url":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/","og_site_name":"Privasec SEA","article_modified_time":"2022-04-24T06:14:08+00:00","og_image":[{"url":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/Screenshot-2021-04-19-at-3.45.21-PM-1024x855.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/","url":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/","name":"Cloud Security Assessments - Privasec SEA","isPartOf":{"@id":"https:\/\/privasec.com\/sea\/#website"},"primaryImageOfPage":{"@id":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/#primaryimage"},"image":{"@id":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","datePublished":"2021-04-21T16:07:02+00:00","dateModified":"2022-04-24T06:14:08+00:00","breadcrumb":{"@id":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/#primaryimage","url":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","contentUrl":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2021\/04\/privasec_post.png","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/privasec.com\/sea\/what-we-do\/offensive-security\/cloud-security-assessments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/privasec.com\/sea\/"},{"@type":"ListItem","position":2,"name":"Offensive Security","item":"https:\/\/privasec.com\/sea\/offensive-security\/"},{"@type":"ListItem","position":3,"name":"Cloud Security Assessments"}]},{"@type":"WebSite","@id":"https:\/\/privasec.com\/sea\/#website","url":"https:\/\/privasec.com\/sea\/","name":"Privasec SEA","description":"Governance and Information Security Partners","publisher":{"@id":"https:\/\/privasec.com\/sea\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/privasec.com\/sea\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/privasec.com\/sea\/#organization","name":"Privasec SEA","url":"https:\/\/privasec.com\/sea\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/privasec.com\/sea\/#\/schema\/logo\/image\/","url":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2020\/12\/Copy-of-Privasec5-No-Tag-Line-1.png","contentUrl":"https:\/\/privasec.com\/sea\/wp-content\/uploads\/sites\/9\/2020\/12\/Copy-of-Privasec5-No-Tag-Line-1.png","width":850,"height":189,"caption":"Privasec SEA"},"image":{"@id":"https:\/\/privasec.com\/sea\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages\/11330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/comments?post=11330"}],"version-history":[{"count":0,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages\/11330\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/pages\/11819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/media\/11407"}],"wp:attachment":[{"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/media?parent=11330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/categories?post=11330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privasec.com\/sea\/wp-json\/wp\/v2\/tags?post=11330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}