Standards-first
Confidential by design
Operable outcomes
Standards that hold under scrutiny.
RedCrest helps organizations reduce cyber risk, improve resilience, and become audit-ready — through pragmatic advisory across network, identity, and security operations.
Architecture & segmentation
Policy & access boundaries
Identity hardening (SSO/MFA)
Logging, detection & SOC alignment
Audit evidence & governance
Automation & standardization
Built by an engineer.
RedCrest is led by a senior infrastructure & security engineer based in Switzerland, experienced in
high-availability and regulated contexts — focusing on clarity, execution, and evidence.
Services
What we do
Risk & Architecture Assessment
Current-state review, risk ranking, remediation plan, exec-ready summary.
Segmentation & Trust Boundaries
Zones, flows, routing patterns, access boundaries, least-privilege foundations.
Policy & Remote Access Modernization
Policy cleanup, VPN posture, rollout strategy, operational guardrails.
Identity & Admin Access Hardening
MFA/SSO strategy, conditional patterns, privileged access controls.
Visibility & Detection Enablement
Central logging, detection use-cases, SOC alignment, alert tuning.
Audit Readiness & Governance Support
ISO/NIST-aligned evidence packs, policies, procedures, audit walkthroughs.
Advisory-first.
RedCrest focuses on consulting, best practices, delivery support and documentation —
not “black box” managed services.
Engagement formats
How to start- Rapid diagnostic (1–2 weeks): assessment + prioritized action plan.
- Delivery support (by phase): design → implementation guidance → validation.
- Audit support: evidence preparation, control mapping, interview readiness.
- Coaching: standards, runbooks, and security-by-design practices for teams.
Capabilities (skills → business value)
Why it matters- Network engineering → higher uptime, safer segmentation, simpler routing (BGP/VLAN/VRF patterns).
- Firewall architecture & migrations → fewer risky rules, cleaner policy, reduced lateral movement.
- Remote access & VPN → stronger posture, fewer incidents, predictable user experience.
- Identity & SSO/MFA → lower credential risk, controlled admin access, easier compliance.
- Hardening & baselines → fewer exploitable weaknesses, faster remediation cycles.
- Logging & detection → visibility, better triage, less noise, improved SOC performance.
- Automation → repeatable controls, faster delivery, reduced human error.
How we work
Method- 1) Scope — goals, constraints, risks, definition of done.
- 2) Map — assets, flows, trust boundaries, current controls.
- 3) Design — pragmatic target architecture & standards.
- 4) Deliver — implementation guidance, validation steps, rollback thinking.
- 5) Operate — runbooks, monitoring, and evidence for audits & incidents.
Typical deliverables
Outputs- High-level architecture diagrams (shareable and audit-friendly)
- Inter-zone flow & segmentation matrix
- Policy improvement plan + migration playbook
- Identity hardening plan (MFA/SSO/admin access patterns)
- Logging & detection blueprint (sources, pipeline, use-cases, tuning)
- Evidence pack: control mapping, procedures, and operational runbooks
Deliverables are designed to be usable by engineering teams and defensible during audits.
Contact
Next stepPreferred channel: LinkedIn (reduces email scraping and improves response time).
Location: [[City, Switzerland]] · Languages: FR/EN