Microsoft 365 & Azure AD
Exchange Online, SharePoint, OneDrive, Teams, Azure AD identities, conditional access, and related services.
Reveal misconfigurations and identity paths in Azure, AWS, and Microsoft 365 before attackers do.
Cloud platforms and Microsoft 365 concentrate data and identity in a way that traditional infrastructure never did. Misconfigurations, overly permissive roles, and weak access controls can provide attackers with direct routes to mailboxes, files, and critical services.
Cyber Defence’s cloud and M365 tests focus on how identities, roles, policies, and configurations combine to create or prevent attack paths.
Platforms
We tailor each engagement to your actual cloud usage and roadmap.
Exchange Online, SharePoint, OneDrive, Teams, Azure AD identities, conditional access, and related services.
Subscriptions, resource groups, networking, storage, compute, Key Vault, and identity / role assignments.
IAM policies, EC2, S3, RDS, networking, and management plane access.
Interactions between on-premises AD, Azure AD, and cloud services, including synchronisation and SSO.
Focus areas
We focus on realistic identity and configuration abuse, not only checklist misconfigurations.
Identifying users, groups, and service principals with excessive privileges.
Assessing MFA, conditional access, and legacy protocols for weaknesses and bypass opportunities.
Reviewing file and mailbox sharing, guest access, and external collaboration settings.
Testing how management portals and APIs could be abused if credentials or tokens are compromised.
Highlighting where activity is not logged effectively, hindering detection and response.
Mapping how combinations of roles and misconfigurations could be used to gain higher privileges.
We will review your cloud and Microsoft 365 estates in the context of how your organisation actually uses them, and provide clear, prioritised remediation guidance.