Why does Infracom separate testing from governance signoff?
Because regulators, auditors, and boards apply more weight to assurance opinions issued by a party that did not deliver the underlying work. Separating Tier 2 testing from Tier 3 signoff is the structural way to demonstrate that the opinion is independent of the delivery — which is what IM8, MAS TRM, CSA CCoP, ISO 27001, and Australia's PSPF / Essential Eight regime each, in their own way, ask for.
What is the difference between CREST and OSCP — and why does Infracom hold both?
CREST is an organisational and methodological framework recognised by Singapore CSA, the UK government, and the Australian government for penetration testing services; Infracom is a listed CREST Pathway+ Organisation. OSCP is Offensive Security's hands-on technical certification, demonstrating that an individual operator can identify and exploit vulnerabilities under exam conditions. The two credential families are complementary — CREST recognises OSCP through its Equivalency Programme. Infracom's testing team holds both, so clients benefit from organisational governance assurance and operator-level technical depth in the same engagement.
Does Infracom hold the Cyber Trust Mark (CTM) Tier 3 certification required of licensed cybersecurity service providers?
Infracom is ISO 27001 certified, and CSA explicitly recognises ISO 27001 as a CTM-equivalent certification that satisfies the minimum CTM Tier 3 (Promoter) requirement for licensed cybersecurity service providers. Maintaining both ISO 27001 and CTM in parallel would mean duplicated audit, documentation, and certification overhead for the same control set — a cost we choose not to pass to clients. Our ISO 27001 scope explicitly covers SQEP services, the people-process-technology delivery environment, and is recognised internationally — including in the Australian market under the Feb 2026 SG–AU MOU.
How does Infracom's model align with Singapore regulatory frameworks?
The three-tier model maps directly across Singapore's regulatory stack. For government agencies, IM8 / ICT&SS sets the baseline; for financial institutions, MAS TRM sets the technology risk expectations; for CII operators, the CSA CCoP applies; for any system handling personal data, PDPA applies. Each framework has a different audit posture, but all of them expect independence between control implementation, testing, and signoff. Tier 1 SQEP supports preparation; Tier 2 testing provides evidence; Tier 3 GRC delivers the independent opinion. Each tier's deliverables are kept separable so the organisation can present them individually under regulator review.
How does the same methodology work for Australian clients?
Australia's regulatory environment is anchored on the ASD Information Security Manual, the PSPF, and the Essential Eight Maturity Model — with Maturity Level 2 mandated for non-corporate Commonwealth entities and increasingly expected by AU enterprise. Infracom's methodology lifts directly: Tier 1 SQEP advisors support Essential Eight uplift planning, Tier 2 testing maps to the AU technical assurance expectation, and Tier 3 GRC delivers ISO 27001 alignment recognised by AU procurement. The Feb 2026 SG–AU MOU on Cyber Security Cooperation explicitly includes mutual recognition of cybersecurity certification schemes — providing the bilateral framework Infracom's methodology is built to operate within.
Does Infracom operate its own SOC?
No. Where managed detection and response or 24/7 SOC capability is needed, Infracom delivers it as a reseller of CSRO-licensed partner SOC services. This is a deliberate choice: it keeps Infracom's GRC and assurance practices structurally independent from operational SOC delivery, preserving the segregation that underpins our signoff opinions.