I don't know where to start and have a limited budget

Identify your security maturity level

"Security" is a broad term -- in reality it's a very complicated ecosystem where technologies, people and processes meet. It's difficult to gauge your overall maturity, and know the right areas to focus and how to prioritise resource and budgets focusing on the root-cause of problems. Additionally, security exposures and risks aren't always technical weaknesses, they can arise easily due to rushed deadlines, rapid growth, mergers and acquisitions and also budgeting constraints.

Our Maturity Health Check service is a review process to evaluate the maturity of all major facets for managing information security in your business. This service typically leverages on soft-skills and our extensive experience to work through technologies and processes to understand your security posture. We then leverage this information to provide a prioritised list of recommendations for your to take action in a practical and cost-effective way.

At elttam, your project is delivered by a reputable team of security professionals who have extensive experience managing business security strategies.

Our methodology®

Initial meeting to discuss the health check, set expectations and ensure SME's and management are prepared and available for our onsite visit.

Phase 1

Onsite meeting to step through the health check with personnel for each component (technology, people and processes), discussing in detail your current circumstances.

Phase 2
Information gathering

Review all available evidences related to the health check, such as compliance requirements, past security test reports, security metrics and so on.

Phase 3

Perform essential research and security assessment activities (e.g. penetration testing) for areas which require active assessment if required.

Phase 4

Present a detailed report encompassing your current security maturity level and a prioritised list of recommendations to take action. Job done!
Contact us to receive the full detail of our methodology.

Phase 5

Our focus areas

The following is a snapshot of our assessment areas:

Network & infrastructure

Network and firewall setup, configuration and management.

Data protection

Data protection technologies and processes.

Employee awareness

Security awareness of employees at different roles, e.g. devs, Ops, CXO

End-point & systems security

End-point configuration. System and device deployment, hardening and management.

Application security & SDLC

Software Development LifeCycle practices and application security.

Access control

Identity management and access rights management.

Audit & compliance

Audit and compliance preparation and readiness.

Disaster recovery & incident response

Preparation and readiness for disasters and incidents.


Facility, building and personnel physical security practices.

Why elttam?

A structured methodology built on proven best-practices (CAPEC, OWASP, OSSTMM)

A team with an established reputation and over a decade of experience

Tailored security services to fit any project or business

Providing services to global software companies and ASX listed enterprises

Made in Australia!

Contact us

Let's talk

Email us


PGP public key


Suite 3, Level 27, 1 Farrer Place, Sydney 2000, NSW

Suite 3, Level 27, 1 Farrer Place, Sydney

(+61) 02 8004 5952


Suite 504, 365 Little Collins Street, Melbourne 3000, Victoria

Suite 504, 365 Little Collins Street, Melbourne

(+61) 03 9005 1058