Zero Trust Compliance — In Plain English
Every technical control GetBulwark builds
has a direct compliance counterpart.
Zero Trust means no user, no device, and no transaction is trusted by default — access is verified at every step. For a law firm, it means the technical architecture of your practice matches the standard of care your regulator expects, your PI insurer requires, and your clients assume you already have.
Enforced MFA on Every Account
In law firm terms: no one accesses your client file system, your accounts inbox, or your completion documents without a second verification step. A compromised password is not enough.
Enforced at the Google Workspace Admin Console — not recommended to staff, not optional, not skippable. Every account. Every login. Every access to a client matter. Legal regulators across the UK list MFA as a baseline control. GetBulwark makes it a technical requirement, not a policy aspiration.
→ Regulatory compliance — access control baseline met
DMARC at Reject — Payment Diversion Protection
In law firm terms: no external party can send email that appears to come from your firm's domain. The fraud chain that relies on your domain being spoofed cannot begin.
DMARC, DKIM, and SPF correctly configured and set to reject policy. This is the single most important technical control against Payment Diversion Fraud in the conveyancing context. It means that when an attacker attempts to spoof your domain to instruct your client's solicitors to redirect funds, the email is rejected before it is delivered. The fraud chain is broken at the first link.
→ Payment Diversion Protection — domain verified, spoofing blocked
24/7 Endpoint Monitoring — All Devices
In law firm terms: every device used to access client matters — including solicitors' personal laptops — is monitored for the kind of behaviour that precedes a data exfiltration or account compromise event.
24/7 managed detection and response. Average response time: 8 minutes from anomaly detection to containment. Average undetected attacker dwell time in unprotected environments: 21 days. That is 21 days of access to your client files, your completion emails, and your accounts transactions before anyone knows they are there.
→ Your practice is monitored to the standard of a regulated firm
Monthly Compliance Reports
In law firm terms: a monthly written record of your firm's security posture — the document your senior partner can sign off, your PI broker can see, and your regulator can be handed during a practice inspection.
Every month, Bulwark delivers a structured report covering MFA status, email authentication, device compliance, access permissions, and any risk items. This is the evidence trail that distinguishes an unfortunate incident from a negligent one in any regulatory or insurance investigation. It is what digital good faith looks like on paper.
→ Regulatory compliance — documented, timestamped, audit-ready
Daily Backup — Client Matter Continuity
In law firm terms: if your Workspace is compromised, your client files, your correspondence, and your completed matter records are independently backed up and recoverable. You do not lose the work product of the firm.
Daily automated backup of Google Workspace — emails, Drive, shared matter folders. Independently retained and restorable at the file level. Solicitors accounts rules across all UK jurisdictions require that client matter records are maintained. A ransomware event or a compromised Workspace that destroys records is a regulatory exposure on top of a security one. Bulwark closes that risk.
→ Accounts rules compliance — client records protected and recoverable
Initial Security Audit — Free
In law firm terms: 45 minutes to understand exactly where your firm's security posture stands against your regulator's expectations and your PI insurer's renewal questions — before they ask.
A structured 20-point manual review of your Google Workspace, covering every control relevant to Law Society Compliance and payment fraud prevention. Delivered as a scored PDF within 48 hours. No obligation. No commitment. The audit exists because the conversation about your firm's security posture should happen with you in control of the information — not in response to a complaint.
→ Book the audit before your regulator does it for you