CLAIPS delivers documented, lab-verified cybersecurity across AWS, Microsoft 365, Windows, and Linux — for Perth SMBs and mining sector suppliers who need real protection with written evidence.
Every week without documented security controls puts your business, your insurance, and your contracts at risk.
Three steps. Start with an assessment — get a written report in your hands within a week.
Based on a real-world lab simulation using Microsoft 365 Business Premium — the identical controls, documentation, and evidence pack delivered to every client engagement.
You don't need to know what's wrong — that's what the assessment tells you. In 3–7 business days you'll have a written report showing your real risks and what to fix first.
No technical knowledge required. No obligation to proceed. The report belongs to you regardless of what you decide next.
Most security consultants hide their pricing. We don't — because you deserve to know what something costs before picking up the phone. Assessment prices are fixed. Everything else is quoted in writing after we understand your environment.
No account managers. No subcontractors. The founder delivers every engagement personally — directly accountable to you from first call to final report.
Most Perth IT companies offer security as an add-on to their support contracts. CLAIPS is a specialist security firm — it is the only thing we do, and we do it with documented, repeatable procedures that produce verifiable results.
32 lab-verified procedures across 4 platforms. Every service backed by documented methodology and delivered at a fixed price.
Least-privilege access for every user, role, and service — MFA enforced at account level.
Every API action captured, stored securely, and connected to real-time alerts.
Continuous resource monitoring — alerting the moment something drifts from policy.
Network segmentation and security group tightening — attack surface minimised.
Every bucket audited, public access blocked, encryption enforced.
Continuous threat detection and vulnerability scanning across your AWS environment.
Customer managed keys with rotation, auditing, and least-privilege access.
Security event alerts for root login, MFA bypass, IAM changes — the events that matter.
WAF deployed in front of your web applications — blocking attacks and automated abuse.
A single prioritised view of your AWS security health — in plain language.
The controls Microsoft provides but doesn't switch on by default — the essential foundation every M365 business needs.
Risk-based policies that automatically respond to suspicious logins — without blocking your staff.
MFA for everyone, device compliance enforced, logins from high-risk locations blocked.
Enterprise endpoint protection deployed and tuned across every managed device.
Sensitive data stays inside your organisation — Australian financial and personal data protected.
SPF, DKIM, DMARC, Safe Links, Safe Attachments — your domain protected, inbox defended.
Only compliant, managed devices can access your M365 data — BYOD included.
CIS-aligned baseline applied to SSH, kernel, services, and filesystem. Lynis score before and after.
Every account audited, sudo restricted, SSH keys managed — access locked to who needs it.
Default-deny inbound policy — your server only accepts the traffic it's supposed to.
Comprehensive audit log of authentication, privilege use, and file access — forensic evidence when needed.
Brute force attempts blocked automatically. Unauthorised filesystem changes detected.
Automated security patching, vulnerability scanning, and compliance reporting.
CIS Benchmark applied — unnecessary protocols removed, security policy enforced.
AD tiering model, privileged account controls, stale objects removed, legacy protocols disabled.
Security baseline GPO deployed — consistent policy across every device in your domain.
All three profiles configured — only required traffic allowed, everything else blocked.
Comprehensive audit policy — forensically useful, compliance ready.
Full-disk encryption on every device — data protected if hardware is stolen.
Centralised, auditable patch compliance across your entire Windows fleet.
Every industry faces the same threats — but different compliance obligations and different consequences. CLAIPS understands the specific pressures your sector operates under.
If your business handles personal data, uses cloud services, or works with large organisations — CLAIPS can help.
Start Free Security ReviewThe same four steps on every engagement — because consistency is what delivers quality.
30 minutes. We understand your environment. No sales pitch — just the right questions.
Fixed-price Statement of Work within 2 business days. Defined scope, deliverables, and timeline.
We deliver against the documented procedure. Direct access to the founder throughout.
Written report, configuration docs, and evidence pack — for clients, auditors, and insurers.
I am a Systems and Commissioning Engineer with over 6 years of experience across mission-critical rail signalling, IT infrastructure, and cloud technologies.
I currently work in a high-availability operational environment in Perth, supporting large-scale industrial systems where reliability, safety, and security are non-negotiable.
My background includes delivering complex system testing, commissioning, and integration across OT and IT environments — including Linux servers, network infrastructure, and cloud platforms.
Previously, I worked on large-scale metro rail projects, performing onboard system installation, communication network testing, and software integration.
This experience — where precision, documentation, and compliance are non-negotiable — forms the foundation of CLAIPS. I built CLAIPS to bring enterprise-level security and infrastructure standards to small and medium businesses.
No outsourcing. No shortcuts. Just proven systems that work.
Security assessments are fixed price — you know exactly what you pay before we start. All other services are scoped and quoted in writing within 2 business days.
Book a free 30-minute discovery call. No obligation. We'll tell you exactly what you need.
Browse by category. Every service has a documented procedure. Request a quote for anything below.
| Service | What You Get | From |
|---|---|---|
| AWS Security Assessment | Full review — access controls, logging, networking, data, threat detection. Written report with severity-rated findings. | $4,200 |
| AWS Security Hardening | Complete baseline — IAM, CloudTrail, Config, GuardDuty, Security Hub, VPC, S3, KMS, CloudWatch, WAF. Post-implementation verification. | $7,500 |
| Threat Detection Setup | GuardDuty and Inspector activated and tuned — continuous threat intelligence with automated alerts. | $2,200 |
| Audit Logging & Compliance | CloudTrail and AWS Config — every API action captured, tamper-proof storage, real-time security event alerting. | $2,200 |
| Security Posture Review | Security Hub findings scored and prioritised — single executive view for management and cyber insurance. | $1,800 |
| Web Application Firewall | AWS WAF deployed — blocking injection attacks, bot traffic, and rate abuse. | $2,200 |
| Service | What You Get | From |
|---|---|---|
| M365 Security Assessment | Complete tenant review — identity, access, email security, device management, DLP. Board-ready written report. | $3,000 |
| M365 Foundation Hardening | Secure baseline, Entra ID protection, and Conditional Access — Zero Trust controls active across your workforce. | $4,200 |
| M365 Business Security Transformation | All 7 controls — Defender, Purview DLP, Exchange Online, Intune. Secure Score before and after. Insurance evidence pack included. | $9,900 |
| Conditional Access Implementation | Complete CA policy architecture — MFA all users and admins, legacy auth blocked, device compliance enforced. | $2,200 |
| Identity Risk Configuration | Entra ID risk policies — automatically detecting and responding to suspicious sign-ins. | $1,800 |
| Intune Device Management | MDM and MAM for Windows, iOS, and Android — device compliance enforced, Conditional Access activated. | $2,800 |
| Service | What You Get | From |
|---|---|---|
| Endpoint Protection Deployment | Microsoft Defender across all managed Windows devices — real-time detection, ASR rules, web content filtering. | $2,200 |
| Linux Server Hardening | CIS-aligned baseline applied — SSH, kernel, services, filesystem, UFW, user access hardened. Lynis score before and after. | $2,900/server |
| Linux Intrusion Detection | Fail2ban blocking brute force. AIDE monitoring filesystem for unauthorised changes. Alerts configured. | $1,800/server |
| Windows Server Hardening | CIS Benchmark — unnecessary services and protocols removed, local security policy hardened. | $4,200 |
| Active Directory Hardening | AD tiering, privileged account controls, stale objects removed, legacy protocols disabled, forensic audit logging. | $4,500 |
| BitLocker Encryption | Full-disk encryption with TPM integration and documented recovery key management. | $1,800 |
| Patch Management | WSUS centralised patch management — consistent, auditable compliance across your Windows fleet. | $2,200 |
| Windows & AD Assessment | Configuration weaknesses, privilege escalation paths, compliance gaps identified. Written report included. | $3,200 |
| Service | What You Get | From |
|---|---|---|
| Email Security Implementation | SPF, DKIM, DMARC, Safe Attachments, Safe Links, anti-phishing configured and verified. | $2,200 |
| Data Loss Prevention | Sensitivity labels and DLP policies — Australian personal and financial data protected from leaving your organisation. | $2,800 |
| Essential Eight Assessment | Formal maturity — ML0 to ML3 per control, gap analysis, board report, cyber insurance evidence pack. | $5,500 |
| Comprehensive Security Assessment | M365, AWS, and servers assessed together — one consolidated report, risk register, and board presentation. | $9,500 |
| Security Policy Development | 5 policies tailored to your industry — Information Security, Acceptable Use, Password, Data Classification, Remote Work. | $3,000 |
| Cyber Insurance Support | Gap analysis, critical issues remediated, written attestation of controls provided for your insurer. | $2,200 |
| Supplier Questionnaire Response | Tier 1 resource company questionnaire completed — gaps fixed, evidence produced, submission reviewed. | $1,800 |
| Service | What You Get | From |
|---|---|---|
| Incident Response Plan | Custom IR Plan — roles, escalation, containment, communication templates. 2-hour tabletop exercise included. | $4,200 |
| Data Breach Procedure | NDB-aligned procedure — assessment, containment, OAIC notification obligations, and post-incident review. | $2,200 |
| Security Awareness Training | Interactive session — phishing, MFA, data handling, incident reporting. On-site from Perth CBD or remote. | $1,800/session |
| Emergency Incident Response | Immediate triage, containment, NDB assessment, incident documentation, and post-incident report. | $320/hr |
| Security Essentials Retainer | Monthly platform health reviews, patch verification, management security report. Business hours support. | Quote |
| Security Professional Retainer | Everything in Essentials plus server monitoring, quarterly training, incident response support. | Quote |
| Security Enterprise Retainer | Dedicated contact, weekly reviews, on-site visits, unlimited compliance assistance, quarterly board reporting. | Quote |
You don't need to know what you need — just tell us what you're running and what's worrying you. We'll come back with a clear, written proposal. No jargon, no pressure, no obligation.