SECURITY PROGRAM // ACTIVE ENGAGEMENT

Security Foundations — Quickstart

March 2026 // V1.0

System Identification
THREAT UNKNOWN // CORE
Confidentiality Notice

Classification

CLASSIFIED // FOR AUTHORIZED EYES ONLY

Security Foundations — Quickstart
CASE STUDY

Client Identifier

MFG-2026-001

Engagement Period

January 2026 — March 2026

Document Data

V1.0 // March 2026

01

Client & Engagement Scope

Metadata Segment 0x1A

Client Profile

SectorFintech / SMB Lending
Market StageSeed — Post-Revenue
Human Capital18 Employees
Strategic GoalCyber Insurance & Investor Readiness

Engagement Parameters

In-Scope
  • Google Workspace Identity (18 accounts)
  • Cloudflare DNS Infrastructure
  • Managed macOS Endpoints (18 devices)
  • AWS IAM Console Access
Out-of-Scope
  • Production AWS Workload Architecture
  • Physical Security
02

Security Challenges

Meridian was 14 months post-launch, processing $4M in monthly loan volume through a 18-person team. Their cyber insurance renewal required documented MFA enforcement and email authentication controls to qualify for coverage. Simultaneously, a Series A term sheet included a pre-close security review clause. The team had no dedicated security person and no existing controls. They had 6 weeks.

Core Vulnerability

Eighteen Google Workspace accounts with no MFA enforcement, no DMARC policy, and no DNS filtering. Four accounts had never set passwords beyond the default. Browser extensions installed by engineers included two with known data exfiltration histories. A single phishing email reaching any employee could compromise the Google Workspace admin console, AWS, and the core lending platform simultaneously.

03

Technical Controls

MFA Enforcement

Google Workspace 2-Step Verification enforced across all 18 accounts. Phishing-resistant security keys deployed for the 3 admin accounts. Legacy authentication protocols disabled. Break-glass account created, credentials vaulted, alert-on-use configured. MFA coverage reached 100% within 4 days. Deployed via Google Admin Console and Terraform googleworkspace provider.

GOOGLE WORKSPACEFIDO2TERRAFORM
Email Security & DMARC

SPF, DKIM, and DMARC DNS records published via Cloudflare. DMARC policy advanced from none to reject within 11 days following aggregate report analysis — one unauthorised sending source (an old Mailchimp account) identified and remediated. Material Security enrolled across all 18 mailboxes, sandboxing attachments and rewriting URLs on delivery. External forwarding rules blocked at the admin level.

DMARCMATERIAL SECURITYCLOUDFLARE
Password & Auth Policies

Google Workspace password policy hardened: minimum 12 characters, complexity enforced, reuse prevention enabled. Account lockout configured at 10 failed attempts. Session idle timeout set to 8 hours for standard accounts, 4 hours for admins. Four accounts with default or weak passwords force-reset at policy rollout.

GOOGLE WORKSPACETERRAFORM
Account Inventory & Hygiene

Full account inventory run via Google Admin SDK. Found: 2 accounts from departed contractors still active (both with AWS console access), 1 shared ops@ account with no documented owner, and 3 service accounts tagged to employees who had changed roles. All remediated within 48 hours with client approval. Automated monthly cleanup script deployed — runs 1st of each month, flags any account inactive for 45+ days.

GOOGLE WORKSPACEPYTHONGITHUB ACTIONS
DNS & Web Filtering

Cloudflare Gateway deployed as the DNS resolver for all 18 endpoints via a Jamf-managed DoH profile. Zero cost — Cloudflare Gateway is free under 50 users. Ten threat categories blocked: malware, phishing, C2, cryptomining, ransomware, spyware, DNS tunnelling, botnets, DGA domains, and newly registered domains. 214 malicious DNS queries blocked in the first 30 days. All filtering enforced on and off the corporate network.

CLOUDFLARE GATEWAYJAMFTERRAFORM
Browser Hardening

Chrome managed policy deployed to all 18 macOS endpoints via Google Admin Console. Extension installation blocked — only 1Password allowlisted by policy. Safe Browsing set to Enhanced Protection. Password saving to browser disabled. Chrome auto-updates enforced. Two previously installed extensions with known data collection histories removed. All 18 devices confirmed compliant via Chrome Browser Cloud Management.

CHROME ENTERPRISEGOOGLE ADMINJAMF
04

Impact Metrics

Post-Deployment Validation Report
100%
MFA Coverage — Day 4
11d
DMARC Policy at Reject
$0
Additional Software Cost (Under 50 Users)
6wk
Full Quickstart Deployment
05

Artifacts Handover

MFA Policy ConfigurationTerraform module for Google Workspace MFA enforcement — policy scope, allowed methods, admin phishing-resistant MFA, break-glass account.
TERRAFORMVIEW
Break-glass Account SetupScreenshot of Google Admin Console confirming emergency access account with hardware key MFA and alert monitoring.
SCREENSHOTVIEW
DNS Record VerificationSPF, DKIM, and DMARC records verified via dig output — all aligned, DMARC at reject.
CONFIG EXPORTVIEW
Material Security EnrollmentInbox-level threat protection enrolled on all 18 mailboxes.
SCREENSHOTVIEW
DMARC Q1 Aggregate ReportAggregate report analysis identifying unauthorized Mailchimp sender. Policy progression from none to reject documented.
CONFIG EXPORTVIEW
Cloudflare Gateway PolicyScreenshot of Cloudflare Dashboard confirming DNS filtering policies active — malware, phishing, C2, and cryptomining categories blocked.
SCREENSHOTVIEW
Device Enrollment ExportCSV export of all 18 endpoints enrolled in Cloudflare WARP with active DNS filtering.
CONFIG EXPORTVIEW
Chrome Policy ValidationBrowser policy validation from chrome://policy — extension blocklist, Safe Browsing, auto-update all enforced at machine level.
SCREENSHOTVIEW
GWS Chrome Policy ExportJSON export of Chrome Enterprise policies deployed via Google Admin Console.
CONFIG EXPORTVIEW
GWS Password PolicyScreenshot of password policy settings in Google Admin — 14-char minimum, complexity enforced, session timeouts active.
SCREENSHOTVIEW
Baseline Audit ReportFull account inventory exported from Google Admin SDK — documents stale accounts, orphaned accounts, and remediation actions taken.
API OUTPUTVIEW