- Adviesdiensten
Cloud Security: 4-Week Assessment
With the growth of cloud adoption, it is crucial to look into not only technological advancement but also ensure that all of your Company’s most vital assets have been properly secured.
KPMG's Cloud Security Assessment is tailored to your needs to ensure that the most crucial elements of your Company's cloud environment have been secured. The assessment does a deep-dive into your cloud infrastructure combining KPMG expertise with Microsoft tools to secure your Azure and Microsoft 365 environments. The assessment is performed in three stages to ensure a comprehensive analysis:
Face-to-Face
Our KPMG experts meet with you to discuss your cloud infrastructure. This allows for our experts to learn about your environment and fine tune their work to adapt to your needs and expectations. This phase is dedicated towards getting to know your environment as well as what aspects are crucial for your business to ensure that special attention is paid to securing these assets.
Assessment
Having knowledge about your cloud infrastructure along with your goals and expectations, KPMG performs a manual review tailored toward your infrastructure. Unlike many automated tests that are created to work on every cloud environment, KPMG's manual approach is backed by years of cyber security experience and countless projects analyzing diverse environments to help better address your needs and ensure that your crown jewels are secured.
The manual review consists of an in-depth analysis on the following aspects of your Microsoft Cloud environments:
- Azure Portal Configurations – AAD, IAM, virtual machines, databases, storage, virtual networks, monitoring, alerts, key vault.
- Microsoft 365 Configurations – Exchange, SharePoint, OneDrive, Microsoft 365 ATP, Windows Defender ATP, Microsoft Cloud App Security, DLP, AIP.
Reporting
After the assessment, KPMG gathers all discovered results into one comprehensive report. This report outlines all identified issues ranked by risk describing what implications each issue poses along with technical recommendations related to mitigation of these issues.