Day 0 — Stripe checkout + intake call scheduling
You complete checkout
From the Audit Retainer page you click "Start
Audit Scale — $9,999/mo" (or Pro / Enterprise). Stripe handles payment.
garnetgrid-fulfillment creates an envelope at
garnet-tokens/audit/<slug>.json and sends a welcome email
via Postal.
Day 1–2 — Intake call
Scope, credentials, tracker integration
The intake call is the engineer who ships the work talking to your CTO / Staff Engineer / Platform Lead. Three deliverables come out of it:
- Scope document — repos in scope, cloud accounts in scope, compliance frameworks (SOC 2 / ISO 27001 / HIPAA / GDPR), exclusions (e.g. "skip the legacy /v1 API; we're sunsetting it Q3").
- Credential plan — which read-only credentials need
provisioning. AWS IAM role with
SecurityAudit+ a custom policy for cost-bill API; GCP service account withroles/viewer+ billing reader; Azure Reader role at the subscription scope; observability platform read tokens (Datadog API, CloudWatch, Grafana, Sentry). - Tracker integration plan — Garnet engineer onboards into your
Linear / Jira / GitHub Issues. Tickets land in a designated team/project labeled
garnet-audit, scoped + sized + assigned to Garnet.
Snapshot writer Worker deploys
Garnet engineer deploys the audit snapshot writer Worker into your Cloudflare account, configured with the read-only credentials provisioned in the intake call.
- Worker name:
garnet-audit-snapshot-writer - Cron trigger:
0 3 * * *(03:00 UTC daily) - R2 bindings:
garnet-snapshots,garnet-tokens - Secrets: AWS / GCP / Azure read keys, Datadog API key, GitHub PAT (for repo scans)
First nightly run completes within 24 hours. Snapshots land at
garnet-snapshots/audit/<slug>/<YYYY-MM-DD>/<source>.json.
Day 3 — First daily snapshot
The four-axis baseline lands in your R2
Snapshots cover all four axes. Each axis is one source file:
Day 7 — First weekly drift diff
Engineer sits with the diff, opens the first round of tickets
The Garnet engineer reviews the week's snapshots, computes the diff (architecture / security / cost / latency), and ships three artifacts:
- Drift report — what changed, severity-graded, estimated
time-to-fix per item. Lands in
#audit-driftDiscord channel. - Engineering tickets — for Scale + Enterprise tiers, every red/amber finding becomes a ticket in your tracker, scoped + sized + assigned to Garnet.
- Pre-mortem entries — for any finding involving a non-trivial architecture change, a 1-page pre-mortem authored before any work starts.
Day 14 — First merged ticket
Engineering follow-through
Tickets opened on Day 7 are picked up by Garnet engineer. By Day 14 the first PR typically lands in your repo: a real code change addressing one of the red findings.
Day 30 — First executive PDF
The audit-monthly Workflow renders + emails the PDF
On the 1st of next month, garnet-audit-monthly Workflow fires for
your slug. The 14-step pipeline rolls up the month's findings, ships shipped
tickets list, computes posture deltas, renders PDF via Cloudflare Browser
Rendering, stores at garnet-reports/audit/<slug>/<YYYY-MM>.pdf,
and emails it to your billing address.
The PDF covers:
- Findings dashboard (opened / closed / carried, severity-grouped, with closure rate)
- Engineering tickets shipped (repo, PR number, 1-line summary, before/after metric)
- Architecture schema diff (what's new in the topology, with rationale + blast-radius diagrams)
- Compliance posture (SOC 2 / ISO / HIPAA / GDPR % progress, gap-list, next-90-day projection)
- Cost + latency posture (cloud spend Δ, LLM spend Δ, p95 Δ vs. last month, anomaly attributions)
- 3–5 prioritized next-cycle recommendations
- Pre-mortems shipped (which changes were authored, whether they caught something pre-merge)
Steady-state cadence from here: daily snapshots, weekly drift report + tickets, monthly executive PDF. The same engineer ships every cycle.
What you DON'T see in this walkthrough
- No Big-4 partner intro deck — the engineer who scoped the audit is the engineer running it. Skip the rotating-associates ceremony.
- No 30-page slide-deck deliverable on Day 30 — the PDF is structured around shipped engineering work, not a recommendation list. Findings stay open in your tracker until merged.
- No SaaS dashboard owning your audit data — snapshots live in your R2. Diff control plane is encrypted and tenant-only. Cancellation removes Garnet's read access; your data stays.
See Audit Retainer pricing → Read the methodology → Compare vs alternatives →