Rhodium Solutions

Body

About Us

Rhodium Solutions is a Canberra based IT firm specialising in Cyber Security and cloud based technologies. We have extensive experience working with various government departments in Essential Eight maturity, cloud solution implementation and large-scale program delivery and management. We pride ourselves on working collaboratively with our clients to offer tailored solutions to complex business problems.

At Rhodium, we aim to foster a work culture that focuses on developing and growing our team to provide better outcomes for our clients. We aspire to make a positive impact in the technology sector.

 

Our Cyber Service Offering Includes:

 

E8 Uplift

  • Assessment and uplift of E8 maturity to a target maturity. This includes uplifting system configuration, system hardening, policy and procedure development and uplift to support the maturity target, E8 governance and project reporting, E8 maintenance and sustainment.

 

Cyber Governance, Risk and Compliance (GRC)

  • Security Risk assessments of ICT systems including SSP and SRMP creation and uplift.
  • Department Policy development and uplift to align to Government frameworks such as the PSPF and ISM.
  • PSPF Direction advice.
  • Creation and implementation of governance models such as ‘authority to operate’.

 

Security Architects

  • System architecture review to ensure security compliance against government frameworks such as PSPF, ISM, E8.
  • Design and implementation of cloud infrastructure to align to government standards such as the ASD’s Blueprint for Secure Cloud.
  • Creation of multi-cloud strategies and cloud native applications.
  • Zero trust architecture.
  • Creation of security architecture guardrails to assist projects with design of IT systems.
  • Security by Design approach by providing end to end project support during design, test and build phases.

 

IRAP Assessors

  • Performs assessment of IT systems against the ISM and provides a report summarising findings and recommendations to uplift the security of a system to desired control targets i.e Protected uplift.

 

Penetration Testing

  • Penetration testing services to identify vulnerabilities in systems, applications, and networks before malicious actors can exploit them. Our experienced resources conduct these simulation testing and provide a summary report with recommendations.