Services Case Study Industries Our Founder Pricing Catalogue Start Free Security Review
AWS Cloud Security IAM & Identity CloudTrail Audit Logging AWS Config Compliance VPC Network Hardening S3 Data Protection GuardDuty & Inspector KMS Encryption CloudWatch Monitoring WAF Web Application Firewall Security Hub Posture Microsoft 365 Security Tenant Security Baseline Entra ID Protection Conditional Access Defender for Business Purview DLP Exchange Online Security Intune Device Management Linux Server Security Server Hardening Baseline User & Access Management UFW Firewall Auditd Logging Fail2ban & AIDE Patch Management Windows & Active Directory Windows Server Hardening Active Directory Security Group Policy Configuration Windows Firewall Event Logging & Monitoring BitLocker Encryption WSUS Patch Management Essential Eight Perth WA 6000 AWS Cloud Security IAM & Identity CloudTrail Audit Logging AWS Config Compliance VPC Network Hardening S3 Data Protection GuardDuty & Inspector KMS Encryption CloudWatch Monitoring WAF Web Application Firewall Security Hub Posture Microsoft 365 Security Tenant Security Baseline Entra ID Protection Conditional Access Defender for Business Purview DLP Exchange Online Security Intune Device Management Linux Server Security Server Hardening Baseline User & Access Management UFW Firewall Auditd Logging Fail2ban & AIDE Patch Management Windows & Active Directory Windows Server Hardening Active Directory Security Group Policy Configuration Windows Firewall Event Logging & Monitoring BitLocker Encryption WSUS Patch Management Essential Eight Perth WA 6000
Perth CBD · Registered Australian Company

Your Business Is
a Target.
We Fix That.

// Cloud Security Platform

CLAIPS delivers documented, lab-verified cybersecurity across AWS, Microsoft 365, Windows, and Linux — for Perth SMBs and mining sector suppliers who need real protection with written evidence.

32 Lab-Verified SOPs
63 Documented Services
Fixed-Price Guarantee
Perth CBD Office

📋 Free download: Perth SMB Security Checklist — based on the ACSC Essential Eight.

// security_platform.status
All Systems Active
32
Lab-Verified SOPs
63
Documented Services
$46K
Avg SMB Breach Cost
100%
Fixed-Price Delivery
☁️ AWS Cloud SecurityActive
🪟 Microsoft 365Active
🐧 Linux ServersSecured
🖥️ Windows & ADSecured
⛏️ Essential EightCompliant
What Happens Without Security

The Cost of Doing Nothing
Is Not Zero.

Every week without documented security controls puts your business, your insurance, and your contracts at risk.

💸
Data Breach — $46,000+ Average Cost
Remediation, legal fees, downtime, and client notification. Most SMBs never fully recover within 12 months.
🚫
Cyber Insurance Rejected
Insurers require documented controls. Without them, your policy can be voided at claim time — when you need it most.
⛏️
Mining Sector Contract Lost
Tier 1 resource companies require supplier security questionnaires. Without compliance evidence, you don't make the shortlist.
⚖️
NDB 72-Hour Notification
A breach involving personal data triggers a mandatory OAIC notification window. Without an IR plan, this goes badly.

The numbers are not improving for Australian SMBs.

$46K
Average cost of a single breachACSC Annual Cyber Threat Report, 2024
43%
Of cyberattacks target small businessesACSC Annual Cyber Threat Report
1 in 5
Australian businesses impacted last yearAustralian Bureau of Statistics
94%
Of breaches preventable with basic controlsVerizon DBIR
72hrs
NDB notification window after a breachOAIC — Notifiable Data Breaches Scheme
Start Free Security Review
Start Here

Not Sure What You Need?
No Technical Knowledge Required.

Three steps. Start with an assessment — get a written report in your hands within a week.

// step_01
🔍
Identify Your Risks
A written report showing exactly what security gaps exist. Plain English. No obligation to go further.
  • Secure M365 Environment — from $3,000
  • Secure AWS Environment — from $4,200
  • Essential Eight Compliance — from $5,500
  • Full Security Baseline — from $9,500
Start Free Security Review →
// step_03
🛡️
Stay Protected
Monthly oversight and advisory so your security posture improves over time, not just on delivery day.
  • Security Essentials — from $1,400/mo
  • Security Professional — from $2,900/mo
  • Security Enterprise — from $5,200/mo
  • Incident response support
  • Supplier questionnaire assistance
Start Free Security Review →
What CLAIPS Delivers — Simulation

The Outcomes You Can
Expect from CLAIPS.

Based on a real-world lab simulation using Microsoft 365 Business Premium — the identical controls, documentation, and evidence pack delivered to every client engagement.

M365 Business Security Transformation — Lab Simulation
Simulated Client Environment
Based on a real-world lab simulation using Microsoft 365 Business Premium — identical controls, documentation, and evidence pack delivered to every client engagement across seven documented procedures.

Before CLAIPS

  • No MFA — stolen password = full account access
  • Legacy authentication enabled — bypassed all controls
  • No endpoint protection on staff devices
  • No SPF, DKIM, or DMARC — domain freely spoofed
  • Cyber insurance application rejected

After CLAIPS

MFA enforced across all users — protected even if passwords are stolen
Conditional Access deployed — high-risk logins blocked, legacy auth eliminated
Defender for Business active — real-time threat detection, ASR rules enabled
SPF, DKIM, DMARC published — domain spoofing prevented
Purview DLP active — Australian personal and financial data protected
Cyber insurance approved — written evidence pack of all controls provided
Secure Score increased from 18% to 74% — documented before and after
// procedure_referenceDelivered across seven documented procedures — tenant baseline, identity protection, conditional access, endpoint security, data loss prevention, email security, and device management. Every step documented. Every control verifiable.

What Every CLAIPS Engagement Delivers

📄
Written report in plain EnglishWhat was found, what was fixed, what to do next — no jargon.
📊
Before and after security scoreDocumented proof that your posture improved — for management reporting.
🛡️
Cyber insurance evidence packThe documentation your insurer needs to approve or renew your policy.
⛏️
Mining sector compliance evidenceWritten attestation suitable for Tier 1 resource company questionnaires.
🔁
Documented configuration baselineA record of exactly what is in place — essential for incident response.
Business Security Transformation — M365
Before
Stolen password = full access. No device protection. Domain spoofable.
After
MFA + CA enforced. Defender active. DMARC published. Score 74%.
Before
Cyber insurance rejected — no documented controls.
After
Insurance approved — full written evidence pack provided.
Before
No endpoint visibility — threats undetected.
After
Defender active — real-time alerts, vulnerability dashboard live.
Most Clients Start Here

Your First Step:
A Security Assessment.

You don't need to know what's wrong — that's what the assessment tells you. In 3–7 business days you'll have a written report showing your real risks and what to fix first.

No technical knowledge required. No obligation to proceed. The report belongs to you regardless of what you decide next.

// why_we_show_prices

Most security consultants hide their pricing. We don't — because you deserve to know what something costs before picking up the phone. Assessment prices are fixed. Everything else is quoted in writing after we understand your environment.

// entry_point — fixed_price_ex_gst
$3,000 – $5,500
Delivered in 3–7 business days
  • Written report — exact risks in your environment
  • Plain English — no technical jargon
  • What could cost you money if left unfixed
  • Prioritised list of what to fix first
  • Board-ready executive summary included
  • Evidence pack suitable for cyber insurance
💡 Most clients find the assessment pays for itself many times over — by identifying risks that would cost $10,000–$46,000+ to remediate after a breach. No obligation to proceed further.
Start Free Security Review →
5 slots available for new assessments this month
Why Businesses Choose CLAIPS

You Deal Directly
with the Founder.

No account managers. No subcontractors. The founder delivers every engagement personally — directly accountable to you from first call to final report.

📍
Based in Perth CBD37 St George's Terrace, Perth WA 6000. Available for on-site visits across Perth metro.
🎯
Founder delivers every engagement personallyNot a team of juniors. The founder does the work — the same engineer who built and lab-tested every procedure.
📋
32 lab-verified procedures — 63 documented servicesEvery engagement backed by a written procedure tested in a real lab environment before it reaches your business.
💰
Fixed prices. Written scope. No surprises.The price in your Statement of Work is the price on the invoice. Always.
🏗️
Critical infrastructure background6+ years across mission-critical rail, OT systems, and cloud — environments where failure is not an option.
🇦🇺
Registered Australian Pty LtdProfessional indemnity insurance. Written service agreements. ABN 64 696 665 782

CLAIPS vs the IT company that "does security too"

Most Perth IT companies offer security as an add-on to their support contracts. CLAIPS is a specialist security firm — it is the only thing we do, and we do it with documented, repeatable procedures that produce verifiable results.

🇦🇺
Australian Pty Ltd
🏢
Perth CBD Office
📄
Written SoW Always
🛡️
Prof. Indemnity Ins.
⛏️
Mining Sector Ready
📋
Evidence-Based Work
32
Lab-Verified SOPs
63
Documented Services
100%
Fixed-Price Delivery
🎯
Fixed-Price Guarantee
The price in your Statement of Work is the price you pay. We absorb overruns.
📬
2-Business-Day Quote
Request a quote today — receive a written fixed-price proposal within 2 business days.
📄
Evidence-Ready Reports
Every engagement closes with documentation your auditors, clients, and insurer will accept.
📍
Perth-Based Response
On-site across Perth metro. Meeting rooms at our St George's Terrace CBD office.
Technical Services

Every Platform You
Run On — Covered.

32 lab-verified procedures across 4 platforms. Every service backed by documented methodology and delivered at a fixed price.

From locking down IAM to activating Security Hub — every AWS security control covered, documented, and lab-verified.
👤

IAM & Identity Security

Least-privilege access for every user, role, and service — MFA enforced at account level.

📋

CloudTrail Audit Logging

Every API action captured, stored securely, and connected to real-time alerts.

⚙️

AWS Config Compliance

Continuous resource monitoring — alerting the moment something drifts from policy.

🌐

VPC & Network Hardening

Network segmentation and security group tightening — attack surface minimised.

🪣

S3 Bucket Security

Every bucket audited, public access blocked, encryption enforced.

🛡️

GuardDuty & Inspector

Continuous threat detection and vulnerability scanning across your AWS environment.

🔐

KMS Encryption Management

Customer managed keys with rotation, auditing, and least-privilege access.

📊

CloudWatch Monitoring & Alerting

Security event alerts for root login, MFA bypass, IAM changes — the events that matter.

🧱

WAF Web Application Firewall

WAF deployed in front of your web applications — blocking attacks and automated abuse.

🎯

Security Hub & Posture Score

A single prioritised view of your AWS security health — in plain language.

Full Zero Trust implementation across identity, endpoint, data, and email — every control lab-verified and delivered systematically.
🏢

Tenant Security Baseline

The controls Microsoft provides but doesn't switch on by default — the essential foundation every M365 business needs.

🛡️

Entra ID Identity Protection

Risk-based policies that automatically respond to suspicious logins — without blocking your staff.

🔐

Conditional Access

MFA for everyone, device compliance enforced, logins from high-risk locations blocked.

🦠

Microsoft Defender for Business

Enterprise endpoint protection deployed and tuned across every managed device.

🔏

Purview Data Loss Prevention

Sensitive data stays inside your organisation — Australian financial and personal data protected.

📧

Exchange Online Security

SPF, DKIM, DMARC, Safe Links, Safe Attachments — your domain protected, inbox defended.

📱

Intune Device Management

Only compliant, managed devices can access your M365 data — BYOD included.

A default Linux server is not a secure Linux server. We harden it, monitor it, and keep it patched — with a Lynis score to prove the improvement.
🐧

Linux Server Hardening

CIS-aligned baseline applied to SSH, kernel, services, and filesystem. Lynis score before and after.

👥

User & Access Management

Every account audited, sudo restricted, SSH keys managed — access locked to who needs it.

🔥

UFW Firewall Configuration

Default-deny inbound policy — your server only accepts the traffic it's supposed to.

📋

Auditd & Audit Logging

Comprehensive audit log of authentication, privilege use, and file access — forensic evidence when needed.

🚨

Fail2ban & AIDE Detection

Brute force attempts blocked automatically. Unauthorised filesystem changes detected.

🔄

Patch Management

Automated security patching, vulnerability scanning, and compliance reporting.

Active Directory is the most targeted asset in most on-premise networks. We harden it — and everything around it.
🪟

Windows Server Hardening

CIS Benchmark applied — unnecessary protocols removed, security policy enforced.

🏛️

Active Directory Security

AD tiering model, privileged account controls, stale objects removed, legacy protocols disabled.

📜

Group Policy Configuration

Security baseline GPO deployed — consistent policy across every device in your domain.

🔥

Windows Firewall & Network

All three profiles configured — only required traffic allowed, everything else blocked.

📊

Event Logging & Monitoring

Comprehensive audit policy — forensically useful, compliance ready.

🔒

BitLocker Encryption

Full-disk encryption on every device — data protected if hardware is stolen.

🔄

WSUS Patch Management

Centralised, auditable patch compliance across your entire Windows fleet.

Industries We Serve

Built for Perth Businesses
Across Every Sector.

Every industry faces the same threats — but different compliance obligations and different consequences. CLAIPS understands the specific pressures your sector operates under.

⛏️
Mining & Resources Suppliers
Tier 1 resource companies require documented security controls from every supplier. We complete the questionnaires, fix the gaps, and produce the evidence pack that gets you on the approved supplier list.
Supplier Questionnaires Essential Eight Cyber Insurance
⚖️
Legal & Professional Services
Law firms handle highly confidential client data and are a prime target for business email compromise. A breach doesn't just cost money — it costs your professional reputation.
Email Security Data Protection M365 Hardening
💰
Financial Services & Accounting
Accounting firms and financial advisors hold Australian financial data subject to the Privacy Act. Insurers are tightening requirements — documented controls are now non-negotiable for renewal.
Privacy Act DLP Insurance Evidence
🏥
Healthcare & Allied Health
Medical practices handle some of the most sensitive personal data under Australian law. A breach triggers mandatory NDB notification and can permanently damage patient trust.
NDB Compliance Data Protection M365 Security
🏗️
Construction & Engineering
Construction firms working on mining or government infrastructure are increasingly required to demonstrate security maturity as a condition of contract.
Contract Compliance AWS Security Endpoint Protection
🚂
Transport & Infrastructure
Transport operators and infrastructure project suppliers face strict security requirements from principal contractors. A breach on a project network can have immediate operational consequences.
Supply Chain Security Endpoint Protection Compliance Evidence
🎓
Education & Training
RTOs and private education providers hold student data, payment information, and government funding records. Ransomware groups specifically target education for its valuable data and lean IT resources.
Privacy Act M365 Hardening Staff Training
🛒
Retail & E-Commerce
Perth retailers handling card payments, customer records, and cloud infrastructure face cyber insurance requirements and OAIC notification obligations if customer data is exposed.
AWS Security Data Protection Incident Response
🤝
Don't See Your Industry?

If your business handles personal data, uses cloud services, or works with large organisations — CLAIPS can help.

Start Free Security Review
Our Process

From First Call to
Verified and Documented.

The same four steps on every engagement — because consistency is what delivers quality.

01

Discovery Call

30 minutes. We understand your environment. No sales pitch — just the right questions.

02

Written Proposal

Fixed-price Statement of Work within 2 business days. Defined scope, deliverables, and timeline.

03

Engagement

We deliver against the documented procedure. Direct access to the founder throughout.

04

Report & Evidence

Written report, configuration docs, and evidence pack — for clients, auditors, and insurers.

Start Free Security Review
Khadar Mohamed — Founder, CLAIPS Pty Ltd
Khadar Mohamed
Founder · Systems & Security Engineer
🎓AWS · Azure · M365 · Linux · Windows · Rail OT
🏢CLAIPS Pty Ltd — ABN 64 696 665 782
📍37 St George's Terrace, Perth WA 6000
📞+61 8 6102 2500 · info@claips.com.au
Connect on LinkedIn
Our Founder

The Person Who Does
The Work.

I am a Systems and Commissioning Engineer with over 6 years of experience across mission-critical rail signalling, IT infrastructure, and cloud technologies.

I currently work in a high-availability operational environment in Perth, supporting large-scale industrial systems where reliability, safety, and security are non-negotiable.

My background includes delivering complex system testing, commissioning, and integration across OT and IT environments — including Linux servers, network infrastructure, and cloud platforms.

Previously, I worked on large-scale metro rail projects, performing onboard system installation, communication network testing, and software integration.

This experience — where precision, documentation, and compliance are non-negotiable — forms the foundation of CLAIPS. I built CLAIPS to bring enterprise-level security and infrastructure standards to small and medium businesses.

No outsourcing. No shortcuts. Just proven systems that work.

🚂
Rail & OT Systems
  • CBTC, ATS, train comms systems
  • Static & dynamic testing
  • Commissioning, fault analysis
🖥️
IT & Infrastructure
  • Linux, Windows Server, Active Directory
  • Networking — IP, VLANs, firewalls
  • Hardware & system integration
☁️
Cloud & DevOps
  • AWS — EC2, S3, IAM, VPC, CloudWatch
  • Terraform, Ansible, CI/CD
  • Infrastructure as Code
🔐
Cybersecurity
  • M365 security, Defender, Intune
  • AWS GuardDuty, Config, KMS
  • Linux & Windows hardening
"The average Perth SMB cannot afford a CISO. But they can afford CLAIPS — and they deserve the same standard of protection that large organisations take for granted."
Pricing

Simple. Transparent.
No Surprises.

Security assessments are fixed price — you know exactly what you pay before we start. All other services are scoped and quoted in writing within 2 business days.

Most clients start with a $3,000 assessment. It tells you exactly what needs to be fixed, in priority order, with no obligation to proceed further. The report belongs to you.
🪟
Secure M365 in 5 Days
Complete review of your Microsoft 365 environment. Written report with board executive summary and prioritised remediation roadmap.
fixed_price · ex_gst
$3,000
  • Identity, email, devices, and data reviewed
  • Plain English — no jargon
  • Delivered in 3–5 business days
Start Free Security Review
Most Requested
☁️
Secure AWS in 5 Days
Full review of your AWS environment. Severity-rated findings with clear remediation priorities and evidence pack.
fixed_price · ex_gst
$4,200
  • IAM, network, data, and threats reviewed
  • Severity-rated — executive ready
  • Delivered in 3–5 business days
Start Free Security Review
⛏️
Essential Eight Compliance
Formal ASD maturity assessment. The evidence document your mining sector clients and cyber insurer require you to produce.
fixed_price · ex_gst
$5,500
  • ML0 to ML3 maturity per control
  • Evidence pack for insurance & auditors
  • Delivered in 5–7 business days
Start Free Security Review
⚙️
Implementation
M365, AWS, Linux, and Windows hardening — fixed-price per agreed scope, no hourly billing.
Start Free Security Review →
🔄
Managed Retainers
Monthly security oversight, reporting, and incident support — scoped to your platforms and team size.
Start Free Security Review →
⛏️
Mining & Compliance
Supplier questionnaire responses, cyber insurance support, and Essential Eight uplift programs.
Start Free Security Review →
🎓
Training & Advisory
Security awareness training, incident response planning, and data breach procedures. On-site or remote.
Start Free Security Review →

Not sure where to start?

Book a free 30-minute discovery call. No obligation. We'll tell you exactly what you need.

Start Free Security Review
Full Service Catalogue

Every Service.
Clear Scope. Written Agreement.

Browse by category. Every service has a documented procedure. Request a quote for anything below.

ServiceWhat You GetFrom
AWS Security AssessmentFull review — access controls, logging, networking, data, threat detection. Written report with severity-rated findings.$4,200
AWS Security HardeningComplete baseline — IAM, CloudTrail, Config, GuardDuty, Security Hub, VPC, S3, KMS, CloudWatch, WAF. Post-implementation verification. $7,500
Threat Detection SetupGuardDuty and Inspector activated and tuned — continuous threat intelligence with automated alerts.$2,200
Audit Logging & ComplianceCloudTrail and AWS Config — every API action captured, tamper-proof storage, real-time security event alerting.$2,200
Security Posture ReviewSecurity Hub findings scored and prioritised — single executive view for management and cyber insurance.$1,800
Web Application FirewallAWS WAF deployed — blocking injection attacks, bot traffic, and rate abuse.$2,200
ServiceWhat You GetFrom
M365 Security AssessmentComplete tenant review — identity, access, email security, device management, DLP. Board-ready written report.$3,000
M365 Foundation HardeningSecure baseline, Entra ID protection, and Conditional Access — Zero Trust controls active across your workforce.$4,200
M365 Business Security TransformationAll 7 controls — Defender, Purview DLP, Exchange Online, Intune. Secure Score before and after. Insurance evidence pack included.$9,900
Conditional Access ImplementationComplete CA policy architecture — MFA all users and admins, legacy auth blocked, device compliance enforced.$2,200
Identity Risk ConfigurationEntra ID risk policies — automatically detecting and responding to suspicious sign-ins.$1,800
Intune Device ManagementMDM and MAM for Windows, iOS, and Android — device compliance enforced, Conditional Access activated.$2,800
ServiceWhat You GetFrom
Endpoint Protection DeploymentMicrosoft Defender across all managed Windows devices — real-time detection, ASR rules, web content filtering.$2,200
Linux Server HardeningCIS-aligned baseline applied — SSH, kernel, services, filesystem, UFW, user access hardened. Lynis score before and after.$2,900/server
Linux Intrusion DetectionFail2ban blocking brute force. AIDE monitoring filesystem for unauthorised changes. Alerts configured.$1,800/server
Windows Server HardeningCIS Benchmark — unnecessary services and protocols removed, local security policy hardened.$4,200
Active Directory HardeningAD tiering, privileged account controls, stale objects removed, legacy protocols disabled, forensic audit logging. $4,500
BitLocker EncryptionFull-disk encryption with TPM integration and documented recovery key management.$1,800
Patch ManagementWSUS centralised patch management — consistent, auditable compliance across your Windows fleet.$2,200
Windows & AD AssessmentConfiguration weaknesses, privilege escalation paths, compliance gaps identified. Written report included.$3,200
ServiceWhat You GetFrom
Email Security ImplementationSPF, DKIM, DMARC, Safe Attachments, Safe Links, anti-phishing configured and verified.$2,200
Data Loss PreventionSensitivity labels and DLP policies — Australian personal and financial data protected from leaving your organisation.$2,800
Essential Eight AssessmentFormal maturity — ML0 to ML3 per control, gap analysis, board report, cyber insurance evidence pack.$5,500
Comprehensive Security AssessmentM365, AWS, and servers assessed together — one consolidated report, risk register, and board presentation.$9,500
Security Policy Development5 policies tailored to your industry — Information Security, Acceptable Use, Password, Data Classification, Remote Work.$3,000
Cyber Insurance SupportGap analysis, critical issues remediated, written attestation of controls provided for your insurer.$2,200
Supplier Questionnaire ResponseTier 1 resource company questionnaire completed — gaps fixed, evidence produced, submission reviewed. $1,800
ServiceWhat You GetFrom
Incident Response PlanCustom IR Plan — roles, escalation, containment, communication templates. 2-hour tabletop exercise included.$4,200
Data Breach ProcedureNDB-aligned procedure — assessment, containment, OAIC notification obligations, and post-incident review.$2,200
Security Awareness TrainingInteractive session — phishing, MFA, data handling, incident reporting. On-site from Perth CBD or remote.$1,800/session
Emergency Incident ResponseImmediate triage, containment, NDB assessment, incident documentation, and post-incident report. $320/hr
Security Essentials RetainerMonthly platform health reviews, patch verification, management security report. Business hours support.Quote
Security Professional RetainerEverything in Essentials plus server monitoring, quarterly training, incident response support.Quote
Security Enterprise RetainerDedicated contact, weekly reviews, on-site visits, unlimited compliance assistance, quarterly board reporting.Quote
Get In Touch

Let's Start with
a Conversation.

You don't need to know what you need — just tell us what you're running and what's worrying you. We'll come back with a clear, written proposal. No jargon, no pressure, no obligation.

🏢
CLAIPS Pty Ltd
37 St George's Terrace, Perth WA 6000, Australia
📞
+61 8 6102 2500
🕐
Monday–Friday, 8:00am–6:00pm AWST
🇦🇺
ABN 64 696 665 782
Request a Free Security Review
✓ Message sent! We'll be in touch within 1 business day.