Technical auditing and penetration tests

The massive uptake of cloud services in recent years, and the Office 365 suite in particular, provides new tools for businesses but can also create new attack vectors, new vulnerabilities and new risks.

Do you know your level of risk?

The office 365 suite sits at the core of subscribed companies, a security incident that leverages weaknesses in a company’s Office 365 configuration could have considerable impact on business operations and reputation.

Audit approach:

# Context: Identification of threats, regulations and technical context.

# Analysis: Analysis of policies, configurations and formalization of recommendations.

# Restitution: Qualification of the level of risk and formalisation of the action plan.


  • Managerial summary
  • Detailed audit and its annexes