Service 09 / 10 / Security · Run From $42k/engagement × Retest included

Security
baked in, not bolted on.

Threat modeling, hardening, pen-tests, SOC 2 readiness. Findings that ship as PRs, not as a PDF that sits in a shared drive for a year.

$42k
From / engagement
2–3w
Pen-test
12w
SOC 2 readiness
100%
Retest included

Four shapes of work,
one operating posture.

Threat-model, harden, test, certify. Done together they reinforce each other; done alone they decay.

A / Model

Threat modeling

A written model your team can defend; not a STRIDE worksheet.

  • System decomposition C4 + DFD
  • STRIDE walkthrough facilitated
  • Trust boundaries named
  • Top-10 risks ranked + owned
  • Mitigations as PRs where possible
B / Harden

Cloud + app hardening

CIS benchmarks, OWASP ASVS, custom posture per service.

  • CIS benchmarks AWS/GCP/K8s
  • OWASP ASVS L2 default
  • Secret scanning in CI
  • IAM least-privilege enforced
  • Network egress controlled
C / Test

Pen-test & retest

Findings that ship as PRs, not as a PDF.

  • Web + API + cloud standard
  • Mobile add-on optional
  • Report in 5 days committed
  • Retest included within 90d
  • Attestation letter on close
D / Certify

SOC 2 & ISO

Audit-ready evidence, not theater.

  • SOC 2 Type I 12 weeks
  • SOC 2 Type II + 6mo observation
  • ISO 27001 18–24 weeks
  • HIPAA / FedRAMP scoped
  • Auditor liaison included

Security work that persists
past the audit.

Built so that posture doesn’t regress after the certificate hangs on the wall.

01

Threat model

Written, versioned, reviewed. Every new high-risk feature triggers an update — not a one-off Confluence page.

02

Pen-test report

Five business days after testing ends. Findings with reproductions, suggested fixes, and severity rationale. Retest within 90 days.

03

Hardening PRs

Where the fix is code or IaC: shipped as PRs against your repos, not as recommendations. Reviewable and merge-able.

04

Detection & response

Detection rules in your SIEM (or one we set up), wired to your paging. Runbook per alert. Tabletop exercise to test it.

05

Compliance evidence

Vanta/Drata-compatible evidence collection or manual. Policies tailored to your operating reality, not templates.

06

Annual retest

Pen-test repeated annually with diff reporting against prior years. Trend visible to leadership in a 1-page summary.

Engagements,
not retainers.

Security is usually scoped as a project, not a monthly retainer. Pricing reflects scope, not seat-time.

Targeted

Pen-test only

From $42k · 2–3 weeks
  • Web + API + cloud surface
  • Report in 5 business days
  • Retest within 90 days
  • Attestation letter
Most common

Threat-model + pen-test

From $84k · 5–6 weeks
  • Threat model + risk register
  • Pen-test + retest
  • Hardening PRs (up to 15)
  • Detection rule starter set
Compliance

SOC 2 readiness

From $148k · 12 weeks
  • Full Type I prep
  • Policy + control + evidence
  • Auditor liaison through close
  • Type II observation guidance

Findings that ship,
not findings that sit.

The difference between a pen-test that improves you and one that doesn’t is what happens after the report.

01 / Week 1

Scope & model

Written scope, named in-scope and out-of-scope surfaces, threat model with you in the room. No surprises during testing.

02 / Week 2–3

Test & document

Active testing with daily standups so you’re never surprised. Findings documented as they’re confirmed, not at the end.

03 / Week 4

Report + PRs

Report inside 5 business days of test end. Hardening PRs against your repos where the fix is code or IaC.

04 / 90 days

Retest

Free retest of all findings within 90 days of the original report. Attestation letter once severity-1 and severity-2 are closed.

Things buyers ask
on the first call.

If something isn’t answered here, ask in your intro email — we keep this list short on purpose.

What pen-test methodology do you use?+

OWASP ASVS L2 as the floor, OWASP API Security Top 10, cloud-specific CIS benchmark verification, custom test plan per system. Black-box, gray-box, and white-box on request.

Can you do the SOC 2 audit too?+

No — we’re not a CPA firm and shouldn’t be. We work alongside three audit firms we trust; we prepare you and stay through fieldwork.

Do you do bug-bounty management?+

Yes, through HackerOne or Bugcrowd. We tune the scope, triage incoming reports, and ship the fixes. Most clients see a steady-state ~3 reports/week after the launch surge.

What about offensive red-team work?+

Yes, on the larger engagements. Multi-week red team with phishing, physical, and assumed-breach scenarios. Always with a clear rules of engagement document signed by your CISO.

Got something hard
that needs to be real?

Send a paragraph about the problem. We’ll come back inside 48 hours with a written take — team shape, cost envelope, riskiest assumptions.

hello@kvb.dev Browse services