Overview
Overview
KirkpatrickPrice methodologies are unique and efficient because they do not rely on static techniques and assessment methods. Effective ethical hacking services require a diligent effort to find enterprise weaknesses, just like a malicious individual would. KirkpatrickPrice is your security partner. We are committed to working with your staff to ensure effective information security practices across your environment. Our security assessment methodology is derived from various sources including the Open Source Security Testing Methodology Manual (OSSTMM), Penetration Testing Execution Standard (PTES), Information Systems Audit Standards, CERT/CC®, the SANS® Institute, National Institutes of Standards and Technology (NIST), and the Open Web Application Security Project (OWASP). The primary objective of our security assessment methodology is to clearly and effectively communicate with you both throughout the project and about our observations. It is our belief that this will enable the most accurate and efficient results because information security services are dynamic in nature. Discovery and comprehensive testing of the ongoing findings will be a mutual collaboration that is relevant to your specific AWS environment. Our experts hold AWS certifications such as Certified Cloud Practitioner, Solution Architect, and the Security Specialization.
Methodology
KirkpatrickPrice will use open source, proprietary tools, and methodologies used by “hackers” and security auditors to conduct the external vulnerability assessment and penetration test, with the exception of those tools and techniques that are known by KirkpatrickPrice to cause denial of service. KirkpatrickPrice will emulate the tactics used by an outside attacker whose goal is to attempt to breach the security of your network and computer systems, including your AWS Cloud environment. The Red Team Exercise methodology allows for both automated and manual testing effort. This service level takes an in-depth look at the systems and networks that are in scope for testing. Vulnerabilities identified from automated effort are exploited for confirmation, but additional effort is spent on post-exploitation activities (where possible) to identify and demonstrate how the initial attack could lead to further compromise if leveraged by a real attacker. Additional manual effort is spent on reconnaissance, discovery, and exploitation of vulnerabilities that are not easily captured by a vulnerability assessment. Examples of this include but are not limited to sniffing and interacting with broadcast network traffic, Man-in-the-Middle attacks, and password attacks. The assessment will occur in seven phases:
Phase 1 Objectives Definition Workshop
Activities in this phase include:
- Review current business context
- Document critical business process and assets
- Review AWS environment and associated tools (EC2, CloudTrail, etc)
- Review the threat landscape
- Define red team objective(s)
- Define approach - External or assumed breach
Phase 2 Recon & Threat Management
Activities in this phase include:
- Conduct target organization research
- Research and model relevant threats
- Research likely threats and TTP's that align with engagement objectives
- Prepare TTPs for use during engagement
Phase 3 Initial Access
Leverage identified data and vulnerabilities to exploit systems or people to gain initial access.
Phase 4 Establish Persistence
Once the initial foothold has been established, actions will be taken to maintain access.
Phase 5 Escalation/Lateral Movement
Escalate privileges and move laterally using defense evasion techniques within the organization to achieve the defined objectives.
Phase 6 Data Exfiltration
Discover, collect, and exfiltrate target data
Phase 7 Reporting & Debrief
Present a detailed report of the findings, which includes executive report, red team findings, control success and failures, and recommendations for improvement.
Highlights
- KirkpatrickPrice has issued over 20,000 reports to 2,000 clients worldwide, giving them the assurance they deserve. By conducting every audit engagement with thorough, quality testing, KirkpatrickPrice delivers reports with results you can trust.
- KirkpatrickPrice auditors have an average of 25+ years of experience and have worked in the field as CTOs, CISOs, CSOs, and more. They truly understand how hard an audit can be, and what makes them a valuable, worthwhile experience. Additionally, our refined audit delivery processes have been developed over 18 years to include SMEs, Client Success Managers, and Professional Report Writers.
- The Online Audit Manager, the world’s first compliance platform, simplifies and streamlines your audit process by allowing you to prepare for and successfully complete an audit all in one place. The platform was developed by CPAs to help manage the audit process and connect you directly to an auditor throughout your compliance journey.
Details
Unlock automation with AI agent solutions

Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
When you work with KirkpatrickPrice on any of your compliance efforts, you’re gaining a partner who truly cares about helping you achieve your security and compliance goals. You’ll work with an expert auditor, but you’ll also partner with a team of experts dedicated to your success. Your audit engagement team includes a Client Success Manager, Professional Writer, Information Security Associate, and of course an experienced Information Security Auditor.
Additionally, the Online Audit Manager connects you directly to an information security expert who will work alongside you in the platform. You are able to instantly initiate a live chat with an expert whenever a question arises that you need a quick answer to.
For support request, connect with one of our experts by calling 800-770-2791 or visiting our website