RedCrest
Advisory · Architecture · Audit Readiness · Switzerland
Standards-first Confidential by design Operable outcomes

Standards that hold under scrutiny.

RedCrest helps organizations reduce cyber risk, improve resilience, and become audit-ready — through pragmatic advisory across network, identity, and security operations.

Architecture & segmentation Policy & access boundaries Identity hardening (SSO/MFA) Logging, detection & SOC alignment Audit evidence & governance Automation & standardization
Built by an engineer. RedCrest is led by a senior infrastructure & security engineer based in Switzerland, experienced in high-availability and regulated contexts — focusing on clarity, execution, and evidence.

Services

What we do
Risk & Architecture Assessment Current-state review, risk ranking, remediation plan, exec-ready summary.
Segmentation & Trust Boundaries Zones, flows, routing patterns, access boundaries, least-privilege foundations.
Policy & Remote Access Modernization Policy cleanup, VPN posture, rollout strategy, operational guardrails.
Identity & Admin Access Hardening MFA/SSO strategy, conditional patterns, privileged access controls.
Visibility & Detection Enablement Central logging, detection use-cases, SOC alignment, alert tuning.
Audit Readiness & Governance Support ISO/NIST-aligned evidence packs, policies, procedures, audit walkthroughs.
Advisory-first. RedCrest focuses on consulting, best practices, delivery support and documentation — not “black box” managed services.

Engagement formats

How to start
  • Rapid diagnostic (1–2 weeks): assessment + prioritized action plan.
  • Delivery support (by phase): design → implementation guidance → validation.
  • Audit support: evidence preparation, control mapping, interview readiness.
  • Coaching: standards, runbooks, and security-by-design practices for teams.

Capabilities (skills → business value)

Why it matters
  • Network engineering → higher uptime, safer segmentation, simpler routing (BGP/VLAN/VRF patterns).
  • Firewall architecture & migrations → fewer risky rules, cleaner policy, reduced lateral movement.
  • Remote access & VPN → stronger posture, fewer incidents, predictable user experience.
  • Identity & SSO/MFA → lower credential risk, controlled admin access, easier compliance.
  • Hardening & baselines → fewer exploitable weaknesses, faster remediation cycles.
  • Logging & detection → visibility, better triage, less noise, improved SOC performance.
  • Automation → repeatable controls, faster delivery, reduced human error.

How we work

Method
  • 1) Scope — goals, constraints, risks, definition of done.
  • 2) Map — assets, flows, trust boundaries, current controls.
  • 3) Design — pragmatic target architecture & standards.
  • 4) Deliver — implementation guidance, validation steps, rollback thinking.
  • 5) Operate — runbooks, monitoring, and evidence for audits & incidents.

Typical deliverables

Outputs
  • High-level architecture diagrams (shareable and audit-friendly)
  • Inter-zone flow & segmentation matrix
  • Policy improvement plan + migration playbook
  • Identity hardening plan (MFA/SSO/admin access patterns)
  • Logging & detection blueprint (sources, pipeline, use-cases, tuning)
  • Evidence pack: control mapping, procedures, and operational runbooks

Deliverables are designed to be usable by engineering teams and defensible during audits.

Contact

Next step

Preferred channel: LinkedIn (reduces email scraping and improves response time).

Location: [[City, Switzerland]] · Languages: FR/EN