Audit & Compliance
Navigate compliance from readiness through certification.
Trust & transparency
We are a security company. We hold ourselves to the same standard we hold our clients. This page documents how we secure our platform, your data, and our own operations — and the engagements we run for teams that need the same posture.
§ 01 · Engagements
Five practitioner-led engagement shapes. Start with a gap analysis. End with attestation, a clean pen test report, and a security leader who has read every runbook you own.
Navigate compliance from readiness through certification.
Strategic security leadership on demand.
Find vulnerabilities before attackers do. Critical findings receive same-day escalation with remediation guidance.
Deploy and manage advanced endpoint protection. Vendor-neutral: we evaluate and recommend based on your environment and budget.
Security architecture design and implementation scoped to your environment, compliance requirements, and budget.
§ 02 · Investment
Everything below is the actual starting price. Scope shapes the number. We'll tell you before we bill you.
Strategic security leadership, risk management, and board-level reporting on demand.
Web, API, mobile, network, and cloud penetration testing with same-day critical escalation.
End-to-end compliance readiness through certification — SOC 2, ISO 27001, HIPAA, and more.
Zero Trust design, SIEM/SOAR implementation, and security automation for your environment.
LLM threat assessment, prompt injection testing, RAG pipeline security, and AI governance review.
Emergency incident containment, forensics, and recovery with 24/7 availability.
§ 03 · AI security
EU AI Act enforcement began August 2025 with full obligations phased through 2026. We run LLM threat assessments, prompt-injection defence, and AI governance for teams shipping production AI.
Protect your AI/ML stack from adversarial attacks, RAG pipelines, and model supply chains.
Navigate AI regulation and governance frameworks. EU AI Act enforcement began Aug 2025 with full obligations phased through 2026. Bias assessments use industry-standard methodologies with clearly defined scope and limitations.
§ 04 · Posture
AWS ap-south-1. IaC-provisioned. AES-256 at rest. TLS 1.3 in transit. RLS-isolated tenants. WORM-stored evidence.
AWS ap-south-1 (Mumbai). All infra provisioned via IaC with no manual console changes in production.
AES-256 for all stored data — database volumes, S3 buckets, backups.
TLS 1.3 enforced for all endpoints. TLS 1.0 and 1.1 disabled. HSTS with 1-year max-age.
Every table carries a tenant ID. RLS policies make cross-tenant reads structurally impossible.
Evidence artefacts are encrypted with per-tenant KMS keys. One tenant's breach cannot decrypt another.
Evidence is written once, read many — hashed, timestamped, and immutable for the audit window.
§ 05 · Disclosure
If you believe you've found a security issue, please email us first. We triage inside 24 hours and target a fix SLA based on severity. We will credit the reporter publicly if desired.
Email first. We triage inside 24 hours, target a fix SLA based on severity, and will credit the reporter publicly if desired. We do not pursue legal action against researchers acting in good faith.
security@blackfyre.techPGP: 0x4B2A F8D1 · keys.openpgp.org
§ Start
A 30-minute call. We'll scope the engagement, name the practitioner, and ship a signed SOW the same day.