Dreamware / Services / Cloud & Architecture / Security Architecture
Security Architecture
Zero trust, identity, compliance frameworks.
About this service
Security architecture is about making deliberate decisions about how your systems handle trust, access, and data — and documenting those decisions so they can be reviewed, challenged, and improved. It's not about buying a security product; it's about designing systems that are secure by default.
We work with zero trust principles: every access request is verified, every component assumes it can't trust the network, and least-privilege access is the default rather than the exception. We implement identity and access management that's practical for your team to operate without creating so much friction that people work around it.
For organisations with compliance requirements — PCI DSS, SOC 2, ISO 27001, or the NZ Information Security Manual — we understand the technical controls required and can design and implement them efficiently. We've helped NZ government agencies meet NZISM requirements and technology businesses achieve SOC 2 certification.
How Dreamware approaches this
Security architecture starts with threat modelling: understanding what you're protecting, who might want to compromise it, and how they might try. We use structured threat modelling techniques (STRIDE or similar) to produce a threat model that drives security control selection.
We then design the control set: network architecture, identity and access management, secrets management, data encryption at rest and in transit, audit logging, and incident response capability. We prioritise controls by risk reduction and implementation complexity — security spending should be proportionate to actual risk.
What you get
- Threat model — documented threats, attack surfaces, and risk ratings
- Security architecture document — designed control set with rationale
- Identity and access management implementation — SSO, MFA, and least-privilege role design
- Secrets management setup — vault or cloud-native secrets management configured
- Security baseline — hardened configuration for your cloud environment
- Compliance gap analysis — for organisations with specific compliance requirements
- Incident response plan — documented procedures for common security incidents
Investment guide
Security architecture engagements typically run $12,000–$45,000 NZD. Threat modelling and security architecture review for an existing system runs $8,000–$15,000. Full security architecture design and implementation for a new system or compliance programme runs $20,000–$45,000. Ongoing security advisory retainers available for organisations wanting continued security guidance.
All pricing in NZD excluding GST. Fixed-price engagements where scope allows — we'll confirm pricing after a free scoping conversation.
Ready to get started?
Book a free conversation. We'll tell you honestly what's realistic, what it costs, and how we'd approach it.