Get Started

Security Engagement Pricing
SOC 2 Control Area
CC7.1–CC7.2 (Vulnerability detection & monitoring)
CC6.1–CC6.8 (Logical/physical access, encryption)
CC1.4 (Security awareness training)
CC8.1 (Change management)
CC3.1–CC3.4 (Risk assessment)
CC7.3–CC7.5 (Incident response)
A1.1–A1.3 (Availability)
Baseline
Pentest + cloud config
Cloud IAM + storage review
—
—
—
—
—
Growth
Full-scope pentest + cloud assessment
Full cloud architecture review
Secure coding workshop
CI/CD security tooling
Assessment-based
—
—
Enterprise-Ready
Multi-phase pentest with retests
Full cloud architecture review
Full program + threat modeling + IR exercise
CI/CD + security champions
Threat modeling + comprehensive assessment
IR tabletop exercise + IR plan
DR/backup validation
Package 1: Baseline
Who it's for: Pre-seed startups with a product in development or just launched. No security posture, no compliance pressure yet, but want to build on a solid foundation.
The problem it solves: You're building fast and have no idea what's exposed. You need a clear picture of risk without a month-long engagement or a 100-page report.
What's included:
Application & Network Pentesting
- Targeted penetration test of the core application — focused on authentication, authorization, session management, API security, and input validation
- External network reconnaissance and port scan to identify exposed services, misconfigurations, and unnecessary attack surface
- Findings report written for engineers: what's broken, why it matters, how to fix it, with proof-of-concept where applicable
- SOC 2 coverage: This test satisfies the penetration testing requirements under CC7.1 (detection of vulnerabilities) and CC7.2 (monitoring of system components). The report is formatted for auditor consumption and can be submitted directly as SOC 2 evidence
Application & Network Pentesting
- Configuration review of your primary cloud environment (AWS, GCP, or Azure) — IAM policies, network security groups, storage permissions, logging, and encryption settings
- Identification of the top misconfigurations that create real exposure: public buckets, overly permissive roles, missing MFA on root/admin accounts, unencrypted data stores
Deliverables:
- Pentest report (executive summary + technical findings with remediation steps)
- Cloud security scorecard with prioritized action items
- SOC 2 evidence package covering penetration testing and vulnerability management controls
Timeline: 3 days
Transition to ongoing: Optional embedded security engineering — 2 hours/month fractional placement. Async Slack access for security questions, review of architecture decisions, and quarterly re-assessment.
Package 2: Growth
Who it's for: Seed-stage startups with a product in production, early customers, and growing engineering teams. Starting to receive security questionnaires from prospects. Need to demonstrate security maturity without hiring a full-time security person.
The problem it solves: You're accumulating security debt, your cloud footprint is growing, and your developers are making security decisions without guidance. You need real testing, developer enablement, and a fractional security presence.
What's included:
Everything in Baseline, plus:
Application & Network Pentesting
- Full-scope white-box penetration test — application, APIs, and network infrastructure
- Business logic testing beyond OWASP Top 10: multi-tenancy isolation, privilege escalation paths, race conditions, payment/billing logic
- Authenticated testing across all user roles to validate authorization boundaries
- Retest of critical and high findings within 30 days of remediation at no additional cost
- SOC 2 coverage: Expanded testing covers CC7.1 and CC7.2 comprehensively, including internal vulnerability assessment. Retest evidence demonstrates control effectiveness over time — auditors want to see this
Cloud Security Assessment
- Deep-dive into cloud architecture: VPC design, network segmentation, container/serverless security, CI/CD pipeline review, secrets management
- Logging and monitoring baseline assessment: are you capturing the right events to detect and respond to incidents?
- SOC 2 coverage: Addresses CC6.1 through CC6.8, CC7.1–CC7.4 (system monitoring, incident detection, and response). Assessment results provide evidence for change management (CC8.1) and risk assessment (CC3.1–CC3.4) controls
Developer Training
- Half-day secure coding workshop tailored to your stack (React/Node, Python/Django, Go, Ruby on Rails, etc.) — not generic OWASP slides, but live examples from your actual codebase
- Secure code review checklist customized for your team's tech stack and common vulnerability patterns
- SOC 2 coverage: Training satisfies CC1.4 (security awareness) and supports CC8.1 (change management) by demonstrating that developers are trained on secure coding practices. Attendance records and training materials serve as auditor evidence
Deliverables:
- Full pentest report with retest results
- Cloud security assessment with architecture recommendations
- Developer training materials and secure coding checklist
- SOC 2 evidence package covering penetration testing, vulnerability management, security awareness, and monitoring controls
Timeline: 1-2 weeks
Transition to ongoing: Embedded security engineering — 4 hours/month fractional placement. Attend architecture discussions, review sensitive PRs, tune security tooling, respond to security questionnaires, and provide ongoing threat assessment.
Package 3: Enterprise-Ready
Who it's for: Late-seed startups closing enterprise deals where security posture is a gate. Preparing for SOC 2 audit or Series A due diligence. Need to demonstrate real security maturity across the board.
The problem it solves: Enterprise prospects are requiring pentest reports, SOC 2 compliance evidence, and detailed security questionnaire responses before signing. Investors are asking about your security posture. You need comprehensive testing, a security-trained engineering team, and an embedded security presence — without a full-time hire.
What's included:
Everything in Growth, plus:
Application & Network Pentesting (comprehensive)
- Multi-phase penetration test: external network, internal network (if applicable), web application, mobile application (if applicable), and API
- Advanced testing: chained attack scenarios, social engineering assessment (phishing simulation targeting the engineering team), and cloud-specific attack paths (SSRF to metadata, IAM escalation, cross-account pivoting)
- Formal pentest report suitable for direct submission to enterprise prospects, auditors, and investors
- Two retest cycles included — demonstrate remediation to auditors and prospects
- SOC 2 coverage: Comprehensive testing satisfies CC7.1 and CC7.2 in full. Multi-phase testing with retests provides the strongest evidence package — demonstrates both vulnerability identification and remediation verification. Phishing simulation results support CC1.4 (security awareness)
Cloud Security Assessment (comprehensive)
- Full cloud security architecture review across all environments (dev, staging, production)
- Container security assessment (if applicable): image scanning, runtime security, orchestration configuration
- Disaster recovery and backup validation — verify that backups exist, are encrypted, and are actually restorable
- Data flow mapping: where sensitive data lives, how it moves, who can access it, and where the gaps are
- SOC 2 coverage: Addresses the full CC criteria set including availability (A1.1–A1.3), confidentiality (C1.1–C1.2), and processing integrity. Data flow mapping directly supports CC6.1 and the privacy criteria. DR validation covers A1.2 (recovery objectives)
Developer Training (comprehensive)
- Full-day secure development program including secure coding, threat modeling, and incident response
- Threat modeling workshop: teach the engineering team to identify security risks during design, before code is written. Run a live threat model on an upcoming feature
- Incident response tabletop exercise: walk the team through a simulated breach scenario. Who does what? What gets communicated? Where are the gaps?
- Security champions program setup: identify and train 1–2 engineers as internal security advocates who can conduct first-pass security reviews and triage security tooling alerts
- SOC 2 coverage: Comprehensive training program satisfies CC1.4 in full. Threat modeling evidence supports CC3.1–CC3.4 (risk assessment). Incident response exercise demonstrates CC7.3–CC7.5 (incident response and recovery). Security champions program supports CC1.3 (organizational structure and accountability)
Embedded Security Engineering (included in initial engagement)
- 8 hours/week of fractional security engineering during the engagement period — attend standups, review PRs, participate in architecture discussions, and build security into the development process in real time
- Security program documentation: incident response plan, vulnerability management policy, acceptable use policy — written lean and usable, not 80-page templates
- Board/investor security brief: concise, non-technical summary of security posture, investments made, and roadmap for fundraising decks and board updates
Deliverables:
- Comprehensive multi-phase pentest report with retest results
- Full cloud security assessment with architecture review and data flow mapping
- Developer training program (secure coding + threat modeling + IR exercise)
- Security champions program documentation and training
- Security program policies (incident response, vulnerability management, acceptable use)
- Investor/board security brief
- Complete SOC 2 testing evidence package — penetration testing, vulnerability management, security awareness, monitoring, incident response, and change management controls. Mapped to specific CC criteria with auditor-ready formatting
Timeline: 2+ weeks
Transition to ongoing: Embedded security engineering — 8 hours/month fractional placement. Function as the team's fractional security lead: attend architecture reviews, review sensitive PRs, maintain security tooling, respond to security questionnaires, prepare for SOC 2 audit cycles, and provide continuous threat assessment as the product and infrastructure evolve.
Possible Add-ons:
- CI/CD SAST and AI security integration
- IR Tabletops
- AI Security training for the security team
- Red team engagement to test controls
SOC 2 Coverage at a Glance
Every package includes testing that satisfies specific SOC 2 control requirements. Reports are formatted for auditor review and can be submitted directly as evidence.