Brian DeVore Consulting
Security & Governance

Security findings shouldn't be your first sign you have a problem.

Most SMBs discover cloud security gaps during an audit, a prospect's security review, or after a preventable incident. We help establish the AWS security baselines, implement practical hardening where it makes sense, and keep the environment from drifting into obvious risk.

Security gaps that don't show up until they hurt you

Cloud security debt accumulates quietly. Here's what we typically find in the first audit.

IAM sprawl and excessive permissions

Developers granted AdministratorAccess because it was easier. Service accounts with permissions they've never needed. Long-forgotten access keys that haven't been rotated in years.

Secrets hardcoded in repos and environment variables

Database passwords in .env files committed to Git three years ago. API keys shared in Slack. AWS credentials in CI pipelines with no rotation plan.

Compliance requirements blocking enterprise deals

A SOC2 Type II or HIPAA BAA is blocking your biggest prospect. The gap between where you are and where you need to be feels overwhelming.

What's included

Concrete deliverables — not vague "advisory" work.

IAM hardening review & implementation

Recurring AWS identity hardening focused on reducing persistent access keys, tightening permissions, moving human access toward SSO and short-lived credentials, and using workload identity or organization guardrails more intentionally where they fit.

Done-with-you secrets management setup

Done-with-you support to move secrets into a safer managed store, define rotation expectations, and share practical implementation effort without taking long-term ownership of the client environment.

AWS Security Hub baseline setup

Enable and tune a workable Security Hub baseline so findings are centralized and the client starts from something useful instead of alert fatigue.

VPC & network hardening

Review exposure paths, segmentation, ingress and egress patterns, and implement practical hardening changes that reduce unnecessary blast radius.

CloudTrail & GuardDuty baseline setup

Confirm audit logging and threat-detection baselines are enabled, routed appropriately, and documented clearly enough to support ongoing review.

Security posture review

Recurring review of material findings, posture drift, vulnerability signals, and open follow-up work so the client has a current picture of security risk.

HIPAA controls mapping

Available as project or custom-bundle scope for healthtech clients that need a practical technical controls mapping against HIPAA-oriented cloud expectations.

SOC2 readiness assessment

Available as project or custom-bundle scope when a client needs a realistic cloud-controls readiness review before formal audit work begins.

How it works

A structured approach, not trial-and-error.

1

Security audit

We assess the current AWS security posture across IAM, network exposure, logging, threat-detection baselines, secrets management, and the client delivery model.

2

Baseline the environment

We establish practical AWS security baselines such as Security Hub, CloudTrail, GuardDuty, and safer secrets handling where they are missing or weak.

3

Review by priority

We focus first on the risks most likely to create real exposure: persistent credentials, broad IAM permissions, public network paths, missing audit coverage, and unmanaged secrets.

4

Recurring posture management

Recurring scans, findings review, posture reporting, and conditional IaC policy work where the client actually uses IaC keep the environment from drifting as the team keeps shipping changes.

What you can expect

Specific, measurable results — not "improved efficiency."

Fewer

Preventable security surprises

The goal is a more defensible posture with fewer obvious gaps, not pretending risk disappears entirely.

SOC2 / HIPAA

Project scope when needed

HIPAA controls mapping and SOC 2 readiness are available when needed, but they are handled as project or custom-scope work rather than assumed monthly retainer work.

Stronger

AWS security baseline coverage

Identity hardening, done-with-you secrets work, Security Hub, audit logging, practical network hardening, and recurring posture review create a more credible baseline for AWS environments.

Who this is for

This service works best for companies in a specific situation. Here's how to know if it's right for you.

Healthtech SMBs handling PHIHIPAA compliance is both a legal requirement and a trust signal for healthcare customers. Most cloud environments have significant HIPAA gaps by default.
Fintech companies pursuing SOC2 Type IISOC2 is increasingly required by enterprise buyers. Getting your cloud controls right is the first and largest part of that work.
SaaS companies fielding security questionnaires from enterprise prospectsThat 150-question vendor security questionnaire is answerable — but only if the controls exist. We build the controls and the evidence.
Any company that has never had a formal cloud security reviewIf you've never had a formal review, there are almost certainly findings. Getting ahead of them now is far less painful than after an incident.

Pricing

Security & Governance is included in the Professional retainer ($2,500/mo) and the Growth retainer ($4,000/mo). The standard bundle scope focuses on AWS operational security work such as IAM hardening, done-with-you secrets management setup, Security Hub baselines, network hardening, logging and detection baselines, and recurring posture review. HIPAA and SOC 2 readiness work is available as project or custom-bundle scope when needed.

Common questions

Ready to get started?

Schedule a free 30-minute discovery call. No pitch deck. Just an honest conversation about your cloud environment.