Skip to content
Salus Cyber

Security Configuration Review

Cloud Security Review

Secure your cloud environment.

Ensure you are following industry-leading best practices with our cloud security assessment.

Salus Cyber consultants can assist you in identifying the cloud services or applications that need to be reviewed, the security requirements and objectives, and the specific security controls to be assessed. The recommendations will bring your cloud environment in-line with industry-standard guidance such as the CIS benchmarks and NCSC recommendations.

The configuration review process involves an in-depth analysis of cloud resources, with a focus on security configurations such as firewall configurations, encryption, and software update policies.

The organisation’s cloud tenancy practices will be assessed during the configuration review process, such as the handling of privileged users, use of multi-factor authentication, and logging & monitoring.

Data protection mechanisms in-use within your cloud environment will be reviewed with the intent of identifying missing or misconfigured security configurations. This process will evaluate the protections around data at rest, data in transit, data classification, and data loss prevention measures.

Our cloud security review can also consist of an architecture review against known good-practice to ensure the design of the environment fits with fundamental design principles.

First Line Dark


By identifying and addressing weaknesses in your cloud infrastructure, future resources will be deployed into an environment that was already securely configured, reducing the risk of future assets being vulnerable.


Identifying configuration issues in your cloud early could save money over the long term by preventing costly data breaches or downtime.


Many industries have strict regulations about data protection and security. A cloud security review can help ensure that you meet these compliance requirements.


Cloud computing makes it easy to spin up new infrastructure ad hoc, which can make it harder to securely manage these assets. A cloud security review can help keep track of or identify weaknesses in such cloud resources.

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back