Skip to content
RedHunt
[ CLOUD.SECURITY ]

Cloud doesn't fail at CVEs —
it fails at identity.

IAM graphs. Trust boundaries. Assume-role chains. We test your cloud the way attackers target it — through identity, not just infrastructure. AI-ready methodology for clouds running LLMs and agents.

Scope a cloud review
> HYPERSCALERS

All three. Same methodology.

AWS

IAM graph analysis, org-wide SCP review, KMS + S3 posture, Lambda/Cognito abuse paths, STS chain mapping.

AZURE

Entra ID tenant review, role assignment graph, Key Vault + Storage posture, Function App / Logic App exposure.

GCP

Org / folder / project hierarchy, IAM + service-account graph, Cloud Functions / Run exposure, workload-identity abuse.

> FOCUS AREAS

What we look at.

IAM Graph Analysis

Who can become whom? We map assume-role edges, service-account impersonation, and privilege-escalation paths that humans cannot reason about without graphs.

Kubernetes Hardening

CIS-benchmark aligned review plus cluster-escape scenarios — RBAC abuse, pod breakout, supply-chain in admission controllers.

CSPM + IaC Review

Not just running a scanner. We read Terraform / Pulumi / CDK modules for drift risk and golden-path violations.

AI-Ready Assessment

For clouds running LLMs, RAG pipelines, or agentic workloads: we layer OWASP LLM + MITRE ATLAS checks onto the cloud review.

Multi-Cloud Posture

Unified findings across AWS + Azure + GCP with a single risk view. One report, consistent severity scoring.

Container & Registry

Image-scan beyond CVE — SBOM-aware, secrets in layers, runtime capability drift, signed-image enforcement gaps.

> SAMPLE SCENARIOS

A dozen of the 40+ scenarios we test.

Excerpts from our cloud assessment library. Full methodology available on engagement.

Cross-account role assumption without MFA
Over-permissive wildcard IAM policies on secret stores
Public snapshot / image exposure
Service-account key sprawl
Orphaned access keys with admin rights
IMDSv1 exposure on EC2 / compute
Lambda environment variable secret leakage
Misconfigured logging → no audit trail
Tenant-wide Conditional Access gaps
Workload identity federation abuse
K8s pod escape via privileged containers
OIDC federation misconfig → any-user assume-role

[ STUB — expand with IAM graph visualisation + full scenario catalog per 05-content-matrix.md §5 ]

Scope a cloud review