BUILD YOUR
STRONG LASTING
SECURITY POSTURE WITH US!
Locked Stack™ security by design.︎︎ CONTACT US
TECHNICAL PROFESSIONAL SERVICES
︎︎READ MORE"The advance of technology is based on
making it fit so that you don't really even notice it,
so it's part of everyday life."
-Bill Gates
︎
RISK MANAGEMENT, COMPLIANCE & GOVERNANCE
︎︎READ MORE
- John Powell
︎
ABOUT US:
01.WHO WE ARE:
Headquartered in London, Locked Stack™ is a PCI DSS Qualified Security Assessor and a Cybersecurity, Compliance, and Data Privacy Specialist operating in the UK, Europe and USA.
Our team of experts will deliver the right IT services for your business and will stand by your side as you step into the future of IT and the Cloud. Cyber Security, Data Privacy and Dev-Ops are the fundamental building blocks of the Locked Stack.
We work with experts that are selected and representative of the upper echelons of the Corporate IT industry, AI, Big Data, Banking industry, PCI-DSS, Governance, Risk and Compliance.
Industry standards and frameworks that we implement and adhere to include but are not limited to: •ISO •PCI-DSS •GDPR •CIS •NIST •OWASP
We offer consolidated and scaled product packages of our services for: • SMB • Enterprise • Corporate Enterprise • Multinational
02.WHAT WE DO:
Locked Stack™ can help your organisation with business IT support. At Locked Stack, we put your needs first, we value our customers and are proud of our reputation as the trusted IT partner of choice. Not vendor centric, we aim to find the right IT solutions for your business, from managed IT services, business IT support or consultancy services, to plan the right path for your business. Our aim is to improve efficiency, reduce costs and introduce innovative technology to future-proof your business.
03.HOW MUCH WE VALUE SECURITY:
We are Cyber Security and Data Privacy evangelists, part of a global community of certified cyber security professionals. We offer full transparency of your operations, empowering you to remain in control of your business.
SERVICES:
PROFESSIONAL TECHNICAL SERVICES:
Our team of AWS certified solution architect professionals can help you with the management of your core infrastructure & service lines using industry best of breed practices as well as AWS and Azure toolkits to provide operational governance transparency and control over all of your company assets and resources.
A
︎ IDENTITY & ACCESS MANAGEMENT- Identity & Access Management
- Privileged Access Control
B
︎ CLOUD DIGITAL TRANSFORMATION- Cloud Architecture & Design
- Cloud Services Management
- Cloud Process Automation, Optimisation & Resilience
- Secure Cloud Integration
- AWS Well-Architected Review
C
︎ WEB & APPLICATION SECURITY- eCommerce and Application Security
- Web Platform Security Management
- Web Platform Security & Performance Management
D
︎MANAGED SECURITY SERVICES- Security Information and Event Management
- Security Operations Centre
- External Network Security (ASV)
- Internal Network Security
- Phishing Simulation Exercises
IDENTITY & ACCESS MANAGEMENT:
"Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months."
- Clifford Stoll
︎
︎︎︎IDENTITY & ACCESS MANAGEMENTWhether on-premises (data centre) or cloud-based (AWS, Azure, etc.), Locked Stack provides an end-to-end user lifecycle and role-based access review service based on industry best practice recommendations for least privilege and privileged account access control including the secure implementation of single sign-on management services.
︎
︎︎︎PRIVILEGED ACCESS CONTROL
Offering a fully comprehensive cloud monitoring managed service, Locked Stack will implement and manage all logging and monitoring requirements in accordance with industry best practice such as NIST and ISO27001 as well as mandatory compliance objectives for PCI DSS.
CLOUD DIGITAL TRANSFORMATION:
"The cloud services companies of all sizes…The cloud is for everyone. The cloud is a democracy."
- Marc Benioff
︎
︎︎︎CLOUD ARCHITECTURE & DESIGN
Using virtualization & terraforming technologies Locked Stack can deploy and scale your business processes and services to meet demand across all your geographical locations. Our qualified team of cloud security and architecture experts use industry best practice standards such and NIST and ISO27001 to assist in deploying or fully managing all of your migration and digital transformation scalability needs.
︎︎︎CLOUD ARCHITECTURE & DESIGN
Using virtualization & terraforming technologies Locked Stack can deploy and scale your business processes and services to meet demand across all your geographical locations. Our qualified team of cloud security and architecture experts use industry best practice standards such and NIST and ISO27001 to assist in deploying or fully managing all of your migration and digital transformation scalability needs.
︎
︎︎︎CLOUD SERVICES MANAGEMENT
Locked Stack™ specialises in the Implementation, optimization & management of all AWS infrastructure components to suit your business needs. Through a combined 10 years’ experience and proven track record for implementation, Locked Stack offers the highest accredited cloud-certified architects and security experts to manage your digital transformation needs, end-to-end.
︎︎︎CLOUD SERVICES MANAGEMENT
Locked Stack™ specialises in the Implementation, optimization & management of all AWS infrastructure components to suit your business needs. Through a combined 10 years’ experience and proven track record for implementation, Locked Stack offers the highest accredited cloud-certified architects and security experts to manage your digital transformation needs, end-to-end.
︎
︎︎︎CLOUD PROCESS AUTOMATION, OPTIMISATION & RESILIENCE
Locked Stack™ fully managed services portfolio provides full optimisation of Infrastructure, production services and efficiency optimization through atomization of management controls. We will increase your profitability by making the most of all the technological resources available to your business whilst at the same time, ensure resilience and scalability through automated back-ups and automated replication of services and infrastructure.
︎︎︎CLOUD PROCESS AUTOMATION, OPTIMISATION & RESILIENCE
Locked Stack™ fully managed services portfolio provides full optimisation of Infrastructure, production services and efficiency optimization through atomization of management controls. We will increase your profitability by making the most of all the technological resources available to your business whilst at the same time, ensure resilience and scalability through automated back-ups and automated replication of services and infrastructure.
︎
︎︎︎SECURE CLOUD INTEGRATION
Our fully managed Secure 3rd party integration services offer the full portfolio of design, implementation, and integration processes to ensure supplier risk assessments, secure connectivity designs (including CoCo’s) are documented and implemented in accordance with industry best practices. Our cloud-based managed VPN and secure encryption management solutions will ensure your data security requirements are met from initial concept to business as usual.
︎︎︎SECURE CLOUD INTEGRATION
Our fully managed Secure 3rd party integration services offer the full portfolio of design, implementation, and integration processes to ensure supplier risk assessments, secure connectivity designs (including CoCo’s) are documented and implemented in accordance with industry best practices. Our cloud-based managed VPN and secure encryption management solutions will ensure your data security requirements are met from initial concept to business as usual.
︎
︎︎︎AWS WELL-ARCHITECTED REVIEW
Locked Stack™ has designed a bespoke architecture review framework based on the AWS five pillars Well-Architected Framework methodology comparison:
– Operational Excellence
– Security
– Reliability
– Performance Efficiency
– Cost Optimization
Our experienced team of accredited architects will perform an end-to-end review of your AWS implementation to ensure adherence to the 5 Well-Architecture Design principles.
︎︎︎AWS WELL-ARCHITECTED REVIEW
Locked Stack™ has designed a bespoke architecture review framework based on the AWS five pillars Well-Architected Framework methodology comparison:
– Operational Excellence
– Security
– Reliability
– Performance Efficiency
– Cost Optimization
Our experienced team of accredited architects will perform an end-to-end review of your AWS implementation to ensure adherence to the 5 Well-Architecture Design principles.
To facilitate the expert end to end service delivery of all RM&G Services, Locked Stack™ has developed a unique service capability using NIST maturity framework. Utilising a combination of highly skilled consulting expertise in various Risk Management and Compliance frameworks as well as industry accepted standard, NIST, for measuring Information and Technology maturity, Locked Stack™ takes pride in our bespoke five pillar approach for service and solution delivery excellence.
01
︎ ASSESS- Identify Current Security Posture
- Identify Critical Assets
- Define Scope
- Understand Risks and Threats
- Assess Business Impact
02
︎ DEFINE- Cyber Security Strategy
- Identify Risk Appetite
- Define Roles & Responsibilities
- Formalise Security Policy
- Agree and Devliver ISMS
03
︎ DESIGN & BUILD- Architecture Design
- Security Procedures
- Disseminate Documentation
- Validate Systems& Processes
- Formalise Procedures
04
︎ MANAGE & TEST- Manage the Risk
-
Test the Controls
-
Remediate Vulnerabilities
-
Provide Assurance
- Validate BAU Controls
05
︎ MEASURE & IMPROVE- Meet Compliance Objectives
- Utilise Metrics to Improve Security Posture
- Ensure Security is Paramount
PCI DSS CONSULTING:
"Don't say it can not be done, rather say, you don't know how to do it yet."
- Tomas Bata
︎
︎︎︎SCOPE ANALYSIS
Accurate identification of the in scope people, processes, technologies, locations and third parties.
The report defines the Cardholder Data Environment (CDE) reporting requirements, merchant level and provides CHD flow diagrams and options for de-scoping.
︎
︎︎︎GAP ANALYSIS
Analysis of the gaps against the current version of PCI DSS for a defined CDE.
The report identifies the gaps and provides prioritised recommendations and a roadmap to compliance.
︎
︎︎︎REMEDIATION
A higher level review of a larger organisation’s PCI DSS scope and gaps against the current version.
The report provides insight into how an organisation can become compliant including quick wins, organisational and process changes through strategic initiatives.
︎
︎︎︎REPORT ON COMPLIANCE
A formal written Report on Compliance with a QSA signed Attestation of Compliance after completion of a formal assessment.
The output from this engagement aims to provide both merchants and service providers of all levels, 1-4 with the formal validation of their compliance on annual basis.
GDPR CONSULTING:
"Privacy is not something that we're merely entitled to, it's an absolute prerequisite."
- Marlon Brando
︎
︎︎︎GDPR HEALTH CHECK
A comprehensive review of an organisations compliance using our developed security framework.
The report identifies the gaps, big issues and challenges and provides prioritised recommendations and a roadmap to deploying appropriate security controls in accordance with Principle 6 of the GDPR (confidentiality and integrity).
︎︎︎GDPR HEALTH CHECK
A comprehensive review of an organisations compliance using our developed security framework.
The report identifies the gaps, big issues and challenges and provides prioritised recommendations and a roadmap to deploying appropriate security controls in accordance with Principle 6 of the GDPR (confidentiality and integrity).
︎
︎︎︎DATA PRIVACY IMPACT ASSESSMENT
The Data Protection Impact Assessment (DPIA) helps an organisation identify and reduce the privacy risks of a project.
It is a mandated article within the GDPR and all organisations must undertake a DPIA for new high risk projects.
︎︎︎DATA PRIVACY IMPACT ASSESSMENT
The Data Protection Impact Assessment (DPIA) helps an organisation identify and reduce the privacy risks of a project.
It is a mandated article within the GDPR and all organisations must undertake a DPIA for new high risk projects.
︎
︎︎︎GDPR POLICIES
Developing the set of policies and procedures required for a GDPR-compliant privacy framework
︎︎︎GDPR POLICIES
Developing the set of policies and procedures required for a GDPR-compliant privacy framework
︎
︎︎︎GDPR BUSINESS PROCESS MAPPING
We will perform stakeholder interviews to gather the relevant information needed to complete a process map. Information usually required is:
– Applications used to process
– Data storage locations and media e.g. file share, database etc.
– Retention Period
– Types of data involved in the process
– Names of records or forms with stored data
– Third party names with whom data is shared
– Knowledge of internal and external data transfers
The output is in PDF format and will include an embedded data flow diagram, inventory of assets as well as data types identified during the interviews.
︎︎︎GDPR BUSINESS PROCESS MAPPING
We will perform stakeholder interviews to gather the relevant information needed to complete a process map. Information usually required is:
– Applications used to process
– Data storage locations and media e.g. file share, database etc.
– Retention Period
– Types of data involved in the process
– Names of records or forms with stored data
– Third party names with whom data is shared
– Knowledge of internal and external data transfers
The output is in PDF format and will include an embedded data flow diagram, inventory of assets as well as data types identified during the interviews.
Headquarter address:
71-75 Shelton Street
Covent Garden
︎
London
United Kingdom
WC2H 9JQ︎ Phone: +44 2070728803
︎ Main mail: contact@lockedstack.com
︎ Data Protection Officer: dpo@lockedstack.com
︎ ︎ ︎ ︎