Overview
Scope follows risk: baseline hardening for newer environments, or phased remediation where access has grown organically.
Each phase targets measurable control improvement and produces evidence your security and audit stakeholders can consume.
Core services
Components we combine and sequence based on your constraints and timeline.
Identity
IdP integration, SSO/SAML/OIDC, MFA rollout patterns.
Application access
Role matrices, permission APIs, and audit logging expectations.
Cloud IAM
Account structure, policies, SCPs/guardrails, key management.
Process
Access request workflows, reviews, and termination handling.
Typical flow
A reference sequence; we adapt depth and gates to your organisation.
| # | Stage | What happens |
|---|---|---|
| 01 | Discover Posture review | Interviews, config sampling, and gap list prioritised by risk. |
| 02 | Plan Roadmap | Phased remediation with business impact notes. |
| 03 | Remediate Implement | Technical changes paired with policy updates. |
| 04 | Verify Assurance | Tests, evidence packs, and handover for internal audit cycles. |
Who we work with
Organisations preparing for customer security questionnaires, ISO or SOC programmes, or consolidating ad hoc admin access.
Infrastructure
Okta, Entra ID, Google Workspace, and native IAM across AWS, Azure, and GCP.
Deliverables
Concrete outputs, documented and handed over with the build.
- Identity provider integration
- Role and permission design for apps
- Cloud IAM hardening and reviews
- Runbooks for access changes
Engagement model
Partnership patterns we document in the SOW or master agreement.
- -Assessment-first on existing systems
- -Remediation in agreed phases
Commercial model
Assessment depth, remediation breadth, IdP landscape, and cloud footprint set scope. We quote after discovery.
We start with a focused discovery (paid or unpaid, depending on complexity). You receive a written scope or SOW: milestones, acceptance tests, and a defined change process. NDAs and your procurement steps are routine.
Fixed scope
Documented requirements, milestones, and acceptance criteria. Delivery targets an agreed release or go-live.
When it applies
Targeted hardening or greenfield access design with clear boundaries.
Phased programme
Successive increments with checkpoints, integrations, and change control as scope evolves.
When it applies
Phased remediation across many apps or cloud estates.
Ongoing partnership
Retained monthly capacity for maintenance, incremental features, releases, and operational support.
When it applies
Access reviews, policy changes, and incident support after baseline controls land.
Fees are quoted per engagement after discovery. Third-party cloud, licensing, and usage charges are usually billed to your accounts unless we agree otherwise.
Request a proposal