Cloud Cost & Security Audit

We audit your AWS, GCP, or Azure environment, finding the ghost costs draining your runway and the security gaps hiding underneath. Most teams find both within the first week.

3-4 weeks depending on environment size

The Problem

You're paying for infrastructure you don't fully understand. Orphaned resources, overprivileged IAM roles, untagged spend, it adds up. And underneath the billing mess, there's usually a security problem waiting to be found by someone less friendly than us.

Who This Is For

Startups at 10-50 engineers with growing AWS/GCP/Azure bills and no dedicated security person. Teams preparing for SOC 2, Series A due diligence, or a first enterprise customer who sent a security questionnaire.

Typical Outcomes

Typical 20-40% reduction in monthly cloud spend
Least-privilege IAM enforced across all services
No more public buckets, exposed credentials, or unknown resources
Audit log enabled and monitored
Compliance gaps mapped with a clear remediation path

Timeline Options

Quick Scan (7 days)

  • Cloud cost audit and top waste identified
  • IAM review and top access risks
  • Security posture snapshot
  • Top 10 prioritised findings
Most Popular

Full Audit (21 days)

  • Everything in Quick Scan
  • Network segmentation review
  • Kubernetes RBAC and network policies
  • Compliance gap analysis
  • Implementation of top 10 fixes
  • Full documentation handoff

Audit + Remediation (45 days)

  • Everything in Full Audit
  • Full remediation, not just findings
  • Multi-cloud unified policies
  • Security Hub / GuardDuty setup
  • 45-day support period

This might not be a fit if...

  • You're just getting started with cloud and have nothing running yet
  • You need someone to manage your cloud day-to-day
  • You want a penetration test only (that's a different engagement)

What You Get

Full cloud cost audit, orphaned resources, idle instances, untagged spend
IAM review, who has access to what, and why
Security posture assessment, misconfigurations, exposed buckets, credential risks
Network security review, open ports, flat networks, overly permissive security groups
Compliance gap analysis for SOC 2 / ISO 27001
Prioritised findings report with fix estimates
Implementation of top 10 quick wins

The Transformation

Before

  • AWS bill growing with no clear explanation
  • Overprivileged IAM, everyone has admin somewhere
  • Untagged resources, orphaned instances, idle databases
  • No visibility into who accessed what
  • Open S3 buckets you forgot about

After

  • 20-40% cost reduction, every dollar accounted for
  • Least-privilege IAM enforced and documented
  • Full resource inventory, idle waste eliminated
  • Audit logs enabled, access patterns visible
  • Clean security posture, ready for due diligence

Engagement Models

Project-based

Fixed scope, fixed timeline, fixed price. Ideal for specific security initiatives.

Retainer

Ongoing support with priority response. Perfect for continuous security needs.

What influences pricing?

  • Team size and environment complexity
  • Timeline and urgency requirements
  • Scope of systems and platforms
  • Ongoing support and maintenance needs
Book a call to discuss your situation

Frequently Asked Questions

Ready to get started?

Book a 20-minute call to discuss your specific situation.

Book Your Free Call

See what your cloud is hiding.

Book a 20-minute infrastructure review. No pitch, just practical insights.

Book a 20-min Infra Review