Layer 03 · Foundation

Infra that
holds the floor.

The platform under everything else. Observable, secure, and compliant by construction — not by Friday-afternoon audit panic. We build infra that stays out of your team's way for years, then keeps doing it.

Engagement
12–28 weeks
audit → ship → handover
Surfaces
AWS · GCP · Multi-region · Edge
Compliance
SOC2 · DPDP · GDPR · HIPAA-ready
LIVE · multi-region

The floor velocity rests on

The patterns that show up in every platform engagement — and why they let your product team move fast for years.

01

Compliance is a property of the system, not a binder

SOC2 / DPDP / GDPR shouldn't be a quarterly fire drill. We bake the controls into IaC, CI, and runtime so 'pass the audit' is just 'show the runbook.'

02

Observability before optimization

You can't fix what you can't see. Every service emits traces. Every endpoint has SLOs. Every alert is actionable. We invest in observability before we touch performance.

03

Boring infra ages well

Postgres + Redis + a sane VPC + IaC will outlast every NoSQL trend of the last decade. We default to durable, well-understood pieces and only reach for the new thing where it changes user experience.

What we ship, by the person on the hook for the floor

persona

CTO / VP Eng

Pain
Infra is a black box. Costs are climbing. Audits are scary. Devs are blocked on platform work.
What we ship
A reference architecture, IaC for every resource, an observability stack that surfaces what matters, and a platform team enablement plan.
persona

Head of Security

Pain
We have policies. We don't know if they're enforced in code. The audit prep takes a month every year.
What we ship
Policy-as-code. Continuous compliance scanning. Per-env / per-tenant KMS. A SOC2 / DPDP control map that ties to actual code paths.
persona

VP Engineering

Pain
Deploys are flaky. We don't know which service is slow. On-call is brutal.
What we ship
GitHub Actions / Argo CI/CD with preview environments per PR. OpenTelemetry across services. Runbooks tied to alerts. On-call rotation that's actually sleepable.
persona

Privacy / DPO

Pain
We can't tell which systems hold which user's data. Deletion requests take a week.
What we ship
Data residency map. Per-tenant encryption. Automated deletion + export pipelines. A DPDP / GDPR-ready architecture with audit on every PII access.

Six tracks. One reference architecture.

We rarely deliver all six in a single engagement — we start with the area of biggest pain and grow the platform from there.

Reference Architecture

VPC, services, data, control plane — declared in IaC, observable end-to-end.

  • Multi-AZ · multi-region
  • Service mesh + gateway
  • Per-env Terraform

Observability Stack

OpenTelemetry across services, dashboards that surface SLO burn, alerts that wake people only when they should.

  • Traces · metrics · logs
  • Per-service SLOs
  • Actionable alerts only

CI/CD & Preview Envs

Per-PR ephemeral environments, automated tests, gated production deploys.

  • GH Actions / Argo
  • Per-PR preview env
  • Canary + rollback

Privacy by Construction

Per-tenant KMS, data residency, automated PII handling — DPDP / GDPR ready.

  • Per-tenant encryption
  • Residency map enforced in code
  • Audit on every PII access

Compliance Posture

SOC2, DPDP, GDPR, HIPAA-ready — controls mapped to actual code paths.

  • Control-to-code map
  • Continuous scanning
  • Audit-ready runbooks

FinOps / Cost

Cost-aware architecture, per-team budgets, and waste detection — without slowing devs.

  • Per-team / per-feature cost
  • Waste detector in CI
  • Quarterly cost review

Edge → VPC → Data → Control plane

A reference shape we adapt to your stack. Edge on the left, services in the VPC, data on the right, control plane on the far right binding everything to IaC, CI, secrets, and SLOs.

From audit to durable platform

Most clients have a reference platform live by week 14 and a migrated, audit-ready posture by week 22.

01
Wk 1–4

Audit & RFC

We map every resource, every dependency, every policy gap. The output is a written platform RFC with the prioritized work for the next two quarters.

Deliverables
Platform audit
RFC + roadmap
Compliance gap map
02
Wk 5–14 · ACTIVE EXAMPLE

Foundation in IaC

Every resource gets declared in Terraform. Service mesh, observability, CI/CD, and per-env KMS go live. First service moves to the new floor.

Deliverables
100% IaC coverage
Observability live
First service migrated
03
Wk 15–22

Migration & compliance

Remaining services migrate behind preview envs. Privacy controls go in. SOC2 / DPDP control-to-code map drafted. Continuous scanning live.

Deliverables
All services on platform
Privacy controls live
Audit-ready posture
04
Wk 23+

Handover & rhythm

Your platform team owns the floor with a working delivery rhythm. We stay on retainer for capability expansion or compliance milestones.

Deliverables
Platform runbook
Quarterly compliance check-in
On-call ready

Boring on purpose — durable for years

The floor isn't where you experiment. We default to choices that age well.

Cloud
AWS · GCPMulti-region · multi-AZCloudflare · Fastly
IaC
TerraformCrossplane (where fits)Per-env modules
Observability
OpenTelemetryGrafana · LokiSentry · PagerDuty
CI/CD
GitHub ActionsArgo CDPer-PR preview envs
Security
KMS · VaultOPA · RegoSnyk · Trivy
Compliance
SOC2DPDP · GDPRHIPAA-ready

What changes when the floor is solid

Aggregated across platform engagements over the last 24 months.

0.00%
Median uptime, post-cutover
Across all migrated services.
0%
MTTR — alert to recovery
vs. pre-platform baseline.
0%
Cloud spend, year-over-year
At equivalent or higher load.
0 days
SOC2 audit prep, typical
From 4-week fire drill to standard ask.
OF
OUTFITKART · MULTI-REGION

A multi-region commerce platform without a 2am cutover.

Read full case →

Migrated 18 services to a multi-region active/active platform with Terraform, OTel, and per-PR preview envs. No customer-visible incident across the cutover.

0
customer-visible incidents during cutover
MR
MERIDIAN BANK · DPDP

DPDP-ready platform without a year-long compliance project.

Read full case →

Per-tenant KMS, residency map enforced in code, automated deletion pipelines. The DPDP control-to-code map shipped with the platform — not after it.

3 days
audit prep, post-platform

Asked on the discovery call

Whichever you're already on, plus a preference for the one with the cleanest managed-service story for your stack. We don't pick a cloud religion; we pick the one that lets your team ship without becoming infra plumbers.

Single-region by default. Multi-region only when latency, residency, or DR requirements actually demand it. Multi-region adds real complexity — we don't recommend it as a first move.

Both. Most engagements are migrations because most teams already have something running. We define a path-to-platform that respects what is already shipped and lets services migrate one at a time behind preview envs.

Where it earns its keep. For most teams under 30 services, ECS or Cloud Run is plenty. For larger fleets or multi-tenant platforms, K8s with a sane operator story makes sense.

We don't replace your auditor. We deliver a control-to-code map, the runbooks, the continuous scanning, and the architecture that makes the audit a 3-day exercise instead of a 4-week one.

A reference platform + first migration is typically ₹1.5–4Cr over 16–28 weeks depending on service count. Audit-only engagements start at ₹40L.

Q2 2026 · two slots open for Platform

Talk to a Platform engineer.

Bring the messy bit. We come back with an architecture sketch and a discovery plan inside two business days — no sales theatre.

response within
48h