Claritas One
Consulting/Cloud/Cloud Security

Cloud Security

Security as an architectural property of the landing zone — not a control added at go-live. Identity-first, posture-managed, and compliance-ready across AWS, Azure, and Google Cloud.

Shared responsibility

The hyperscaler secures the cloud. You secure what's in it.

Most cloud breaches aren't breaches of the platform — they're breaches of the customer's configuration, identity model, and deployment pipeline.

We make the shared-responsibility line explicit, operational, and auditable. The landing zone enforces it by construction. The observability layer proves it every hour.

THEY OWN

The cloud

  • Physical facility and network
  • Hypervisor and hardware
  • Managed-service runtime
  • Core platform controls
YOU OWN

Everything in it

  • Identity, access, and session
  • Data classification and encryption
  • Network segmentation and egress
  • Configuration, patching, deploys

Five control planes

Every request evaluated across all five.

No implicit trust, no long-lived credentials, no flat networks. Each plane carries a decision engine — and each decision is logged for the auditor the CISO will eventually invite in.

Plane — Identity

Identity as the control plane.

Federated SSO, MFA with phishing-resistance, just-in-time access, and short-lived credentials across every workload. IAM policies generated from code — reviewed like code.

Core controls

  • SSO federation to IdP
  • PIM / JIT access
  • Break-glass + audit trail
  • Per-service role boundaries

The secure landing zone

Security baked into
account one.

IaC-driven. Deployable in under six weeks. Any workload provisioned into it is safer before its first line of code runs than most production estates are today.

landing-zone · terraform apply live
$ claritas lz apply --baseline all --env prod --region multi
init: resolving 6 baselines from claritas/landing-zone-blueprint
="text-[#5ba3e8]">[01] identity IdP trust established (5 accounts)
="text-[#5ba3e8]">[02] network transit-gw · 3 regions · egress inspection = on
="text-[#5ba3e8]">[03] detection 42 rulesets deployed · all accounts
="text-[#5ba3e8]">[04] compliance NIST-CSF + ISO-27001 + SOC2 mapped
="text-[#5ba3e8]">[05] pipelines OPA policies live · supply-chain signatures enforced
="text-[#5ba3e8]">[06] platform break-glass armed · review cadence = weekly
✓ 6 baselines · 23 accounts · 312 resources · 0 manual steps
[01]

Account / subscription topology

OU hierarchy · guardrails · shared services

[02]

Identity baseline

IdP federation · PIM · HRIS-wired reviews

[03]

Network baseline

hub-spoke · egress inspection · private endpoints

[04]

Security services

CSPM · CNAPP · detection content · centralised log

[05]

Compliance baseline

NIST / ISO / SOC2 mapped · continuous attestation

[06]

Platform pipelines

IaC · OPA · signed supply chain · secrets

Posture management

A typical first-pass CSPM report — and what we do with it.

Most estates show hundreds of findings on first scan. The value isn't the number — it's the triage discipline that turns it into a 30-day remediation plan the engineering team will actually run.

Critical
12
  • Publicly exposed storage with PII
  • Unrotated root credentials > 365 days
  • Egress to known-bad IPs detected
High
48
  • Over-privileged roles with *:* policies
  • Databases without at-rest encryption
  • Logging disabled on production accounts
Medium
187
  • MFA inactive for privileged identities
  • Drifted IaC state vs. deployed state
  • Network flow logs not centralised

Compliance accelerators

One control library.
Every framework the buyer asks for.

We pre-map the landing zone controls to every framework our clients face. One evidence cycle, many attestations. Auditors get what they need; engineers keep their calendars.

Framework
Controls
Coverage
SOC 2 Type II
SaaS assurance
142
100%
ISO 27001
Global certification
114
100%
HIPAA
US healthcare
72
100%
GDPR
EU privacy
48
100%
PCI-DSS v4
Payments
264
94%
DORA
EU financial
118
100%
NIS2
EU critical infra
86
96%
FedRAMP Mod.
US federal
325
88%

// control library maintained in-house · delta-reviewed quarterly

Security baked in. Audits baked in. Confidence at the board level.

Tell us the compliance envelope, the cloud mix, and the last finding that kept someone up at night. We'll come back with a posture assessment and a 30-day remediation plan.