Audit & Assessment

Security audits

Penetration testing and comprehensive risk assessments.

Audit & Pentest Services

A complete range of audits to assess and strengthen your security posture

Popular
2-4 weeks

Infrastructure Audit

Full assessment of your network infrastructure, servers, firewalls and security configurations

Deliverables:

Network architecture analysis
Server configuration review
Firewall and filtering rule review
Security log analysis
Network segmentation tests
Backup assessment
Detailed report with action plan
Advanced
1-3 weeks

Penetration Test (Pentest)

Real-world attack simulation by certified experts to identify exploitable vulnerabilities

Deliverables:

Recon and information gathering
Advanced vulnerability scanning
Exploit attempts (approved)
Privilege escalation
Social engineering tests (optional)
Report with proof of concepts
Prioritized remediation recommendations
Essential
1-2 weeks

Bill 25 Compliance Audit

Complete assessment of your compliance with Quebec's Bill 25 on data protection

Deliverables:

Analysis of personal data flows
Privacy policy review
Consent evaluation
Incident register verification
Security measures analysis
Detailed compliance plan
Bilingual document templates
1-2 weeks

Application Audit (Web/Mobile)

In-depth security analysis of your web and mobile applications following OWASP Top 10

Deliverables:

OWASP Top 10 tests
Source code analysis (SAST)
Dynamic testing (DAST)
API security evaluation
Authentication testing
Session analysis
Report with vulnerability POCs
1-2 weeks

Cloud Audit (AWS, Azure, GCP)

Security assessment of your cloud environments and configurations

Deliverables:

IAM configuration review
Bucket and storage analysis
Security group evaluation
Encryption verification
Log and monitoring audit
CIS Benchmark alignment
Optimization recommendations
Fast
3 days

Express Audit 72h

Rapid identification of critical risks for immediate action

Deliverables:

Advanced automated scan
Critical vulnerability analysis
Public exposure assessment
Baseline configuration tests
Executive report with priorities
Quick wins identified
Included debrief session

Proven methodology

6 steps to assess and strengthen your security posture

01

Initial consultation

Meeting to understand your context, systems and concerns

02

Scope definition

Define audit scope, systems to assess and schedule

03

Information gathering

Passive and active recon following approved methodology

04

Analysis and testing

In-depth vulnerability assessment and security testing

05

Detailed reporting

Complete documentation with evidence, impact and recommendations

06

Presentation and follow-up

Executive debrief and support for remediation

Certifications

Certified experts

A team combining offensive expertise, governance and compliance

CISSP - Certified Information Systems Security Professional

CEH - Certified Ethical Hacker

OSCP - Offensive Security Certified Professional

CISA - Certified Information Systems Auditor

ISO 27001 Lead Auditor

Ready to audit your security?

Start with a free assessment and get a prioritized action plan

Executive report
Prioritized recommendations
Retest included on critical vulnerabilities

Audit & Pentest FAQ

Everything you need to know about security audits

Can't find the answer to your question?

metadata.audit_security.title | Cybernow