Skip to content

Introducing Chris Parker, Cloud Security Consultant


In this edition of the Meet the ICS Expert series, we sit down with Chris Parker, a cloud security penetration testing consultant at Incursion Cyber Security (ICS), to look into his expertise in cloud security audits. Parker’s background in the military and focus on offensive cybersecurity positions him to offer invaluable insights into cloud security audits, shedding light on common cloud security blind spots, the integration of AI technologies, and the tooling consultants at ICS deploy to ensure robust approach is taken when testing cloud security measures. Join us as Chris shares his knowledge and expertise in helping businesses both small and large in securing their cloud infrastructure environments.

“As I approached the end of my military service, cybersecurity wasn’t initially on my radar. With a background in communications, I was leaning towards roles in the telecommunications industry. However, everything changed when I attended an InfoSec event, the talks were interesting which cemented my interest in the industry. That event led me to enrol in a course that provided offensive cybersecurity skills training eventually earning me a CPSA certification, paving the way for a career transition into cyber. I began my journey with NCC Group through their consultancy program, starting as a junior consultant gradually advancing to the role I currently hold with ICS.”

Cloud penetration testing is like a traditional internal or external penetration testing environment, but with a focus on the cloud infrastructure rather than a physical location. The distinction lies in its execution within a data centre rather than an abstract entity. The specific type of hosting environment is determined by the cloud estate and customer IP ranges within it. Cloud configuration and build reviews are very much part of a cloud assessment. Cloud reviews are largely governed by the cloud vendor like AWS, GCP or Azure, generally when doing a config review, you are looking to see if that cloud environment is configured to best practice standards. 

However, in the cloud, it’s easy to make mistakes, and many people misconfigure their settings due to misunderstanding the shared responsibility model. This includes during simulated attacks, which are integral to penetration testing, where controls play a crucial role in configuration reviews.” 

“Cloud, Multi-Cloud, and Cloud-native (serverless environments) each bring unique security risks and challenges. Access management, access key rotation, and the secure storage of credentials, along with insufficient role-based access, are critical concerns. Insecure interfaces and API configurations further compound the risks. Misconfigurations, such as inadvertently exposing data in public repositories, pose significant threats, exacerbated by the complexities of managing change and maintaining visibility into exposures. 

Architecture complexities also heighten security vulnerabilities, especially when there’s a lack of understanding or strategy around secure architecture. Common errors like exposing information through remote desktop protocol add to the risks. The democratisation of IT, with users spinning up servers independently, often leads to configuration issues and code exposure in public repositories. Moreover, threat actors are leveraging AI/ML to automate and scale advanced cloud attacks, amplifying the risks across architectural complexities and multi-cloud environments.” 

“The common flaws I often see generally fall into one of the following five pillars: 

  • Failure to understand shared responsibilities: Many organizations mistakenly assume that cloud service providers handle all security aspects, resulting in confusion and gaps in security measures. This misconception can expose businesses to significant risks, including data breaches and compliance violations. 
  • Sprawl and Shadow IT: Employees frequently circumvent official channels to adopt unauthorized cloud services, leading to a lack of visibility and control over sensitive data. This can pose significant business risks, such as loss of intellectual property and regulatory non-compliance. 
  • Infrastructure as Code (IaC) misconfigurations: Errors in configuring cloud resources using IaC tools can create vulnerabilities, exposing data to unauthorized access. Such misconfigurations can have severe consequences for businesses, including data leaks and reputational damage. 
  • Rapidly changing cloud environments: Continuous updates and changes in cloud configurations pose challenges for businesses to maintain compliance and security requirements. Failure to keep pace with these changes can leave organizations vulnerable to cyber threats and regulatory fines. 
  • Inadequate Identity Access Management (IAM) policies: Poorly managed IAM policies often lead to unauthorised access to cloud resources, increasing the risk of data breaches and insider threats. This can result in significant financial losses and damage to the organisation’s reputation. 

Common issues such as insecure API configurations, inadequate access privileges, and failure to rotate keys are vulnerabilities I encounter quite a bit that can easily be mitigated by implementing the correct controls and configurations. It may surprise you to learn that some organisations still don’t have Multi Factor Authentication (MFA) in place which is a really easy way to minimise potential impact of a security breach.”  

“In my view, while AI holds a great deal of potential, its effectiveness hinges on proper and continuous training. It’s a fantastic tool for businesses and security teams, provided there’s a commitment to ongoing refinement and continuous education.  However, it’s important to recognise AI is just an assistant rather than a fully training ready to go resource. Its role is to complement a human cybersecurity consultants’ expertise rather than replace it entirely.”  

“At Incursion Cyber Security, we employ a methodology grounded in industry best practices across our pen testing and broader cybersecurity services. Utilising tools like Scout Suite, NESSUS, and Prowler, we conduct thorough cloud asset reviews while aligning with CIS security benchmarks to ensure the relevance and currency of our findings.  

Moreover, for leading cloud platforms such as Azure, AWS, and GCP, we leverage their API tools via command-line interface for streamlined communication. Our assessments are guided by the CIS benchmark, minimizing false positives and reinforcing our commitment to delivering high-quality cybersecurity services tailored to our clients’ needs.” 

“Where businesses are not conducting regular penetration tests in their cloud environments and relying solely on their cloud vendors for security, my advice would be to shift their perspective on security. 

While cloud service providers are responsible for the security of the cloud infrastructure itself, including the data centres and physical environments, the business is solely responsible for the assets they have stored and operated within their cloud environment. It’s essential to recognise that the flexibility the cloud offers is only beneficial when configured securely. 

Many companies overlook the fact that cloud vendors do not manage or control what’s stored in their client’s cloud environments, nor are they responsible for who accesses it, or the day-to-day security measures. Therefore, it’s crucial to factor security into the management of cloud services as part of your overall cloud strategy.” 

“I discovered a publicly accessible cloud storage area containing sensitive client data, which could be easily accessed via a standard web browser due to misconfigured access rights. I notified the client immediately, emphasising the potential impact of this type of regulatory data breach could have on their business operations. This incident is just one of many I’ve uncovered, reinforcing the critical importance of correctly configuring all cloud security controls. This also demonstrates the vital role of maintaining proactive client-tester communications and nurturing a strong client-tester partnership in mitigating risks and preserving trust.”

“As a cybersecurity consultant, I understand the significant impact budget constraints can have on cloud security strategies, particularly considering the concerning increase in cloud breaches. This disparity between priority and budget allocation highlights the critical need for boards to view cybersecurity budgets as business enablers rather than cost centres. My suggestion is to prioritise penetration testing as a cost-effective method to optimise resource allocation. By aligning strategic investments with evolving security standards and trends, organisations can enhance their cloud security posture within budget constraints.”  

“Consistently engage in learning by exploring platforms like Hack The Box to learn about various vulnerabilities. Utilise gamification to learn the basics of infrastructure, applications and cloud technologies to gain an understanding of the common vulnerabilities and basic testing practices. Cloud service providers also offer free training sometimes, for learning about cloud computing specific to their own brand platforms. 

Developing a solid understanding of both Windows and Linux systems is essential for success in cybersecurity and cloud penetration testing. Given the breadth of knowledge required in the field, consider focusing on a particular area of interest to become a specialist. Decide whether you prefer offensive or defensive roles within the industry and tailor your learning path from there.” 

At Incursion Cyber Security we offer a number of robust Cloud Infrastructure vulnerability assessments from security cleared, certified experts. Discover how a pen test can help you to maintain compliance and increase operational resilience.

What our clients say

Incursion are professional with their approach whether this be within the internal team or external stakeholders. They are responsive which makes the engagement flow really well throughout the project, communication is great; attending daily stand up call, responding to WhatsApp messages quickly as well as reaching out to the wider team if needed. The level of work produced is to a high standard and follows industry best practices, Incursion make sure they thoroughly cover everything on the agreed scope. This has led to us receiving further work from the customer and an extension in our engagement. Incursion have no issues with working collaboratively within a team which has really helped with working in an agile environment. Overall, Incursion are a pleasure to work with.

Chloe – Leonardo

Our audit was very useful – written in a non-technical manner, enabling us to understand cyber threats and also provided a series of recommendations for each one. Can’t recommend highly enough.

Incursion are professional with their approach whether this be within the internal team or external stakeholders. They are responsive which makes the engagement flow really well throughout the project, communication is great; attending daily stand up call, responding to WhatsApp messages quickly as well as reaching out to the wider team if needed. The level of work produced is to a high standard and follows industry best practices, Incursion make sure they thoroughly cover everything on the agreed scope. This has led to us receiving further work from the customer and an extension in our engagement. Incursion have no issues with working collaboratively within a team which has really helped with working in an agile environment. Overall, Incursion are a pleasure to work with.

Chloe – Leonardo