Skip to content
@Hack23

www.hack23.com

Swedish innovation hub specializing in creating immersive and fun game experiences and expert cybersecurity consulting

🔒 Hack23 AB

Swedish innovation hub specializing in creating immersive and precise game experiences alongside expert cybersecurity consulting and solutions.

🔐 Commitment to Transparency and Security

At Hack23 AB, we believe that true security comes through transparency and demonstrable practices. Our Information Security Management System (ISMS) is publicly available, showcasing our commitment to security excellence and organizational transparency.

📋 Public ISMS Repository

Complete Information Security Management System documentation

ISMS Public Repository

🔒 Information Security Policy

Enterprise-grade security framework and governance

Information Security Policy

🏆 Security Through Transparency

Our approach to cybersecurity consulting is built on a foundation of transparent practices:

  • 🔍 Open Documentation: Complete ISMS framework available for review
  • 📋 Policy Transparency: Detailed security policies and procedures publicly accessible
  • 🎯 Demonstrable Expertise: Our own security implementation serves as a live demonstration
  • 🔄 Continuous Improvement: Public documentation enables community feedback and enhancement

"Our commitment to transparency extends to our security practices - demonstrating that true security comes from robust processes, continuous improvement, and a culture where security considerations are integrated into every business decision."

— James Pether Sörling, CEO/Founder


🔥 Black Trigram (흑괘)

Black Trigram Logo

Realistic 2D precision combat simulator inspired by traditional Korean martial arts, focusing on precise anatomical targeting, authentic combat techniques, and detailed physics-based interactions.

OpenSSF Scorecard CII Best Practices SLSA 3 Scorecard supply-chain security Test & Report Lines of Code Quality Gate Status Security Rating Maintainability Rating Reliability Rating FOSSA Status

🔐 CIA Compliance Manager

CIA Compliance Manager Logo

Security assessment platform for the CIA triad (Confidentiality, Integrity, Availability) with business impact analysis and compliance mapping to regulatory frameworks like NIST, ISO, GDPR, HIPAA, and SOC2.

FOSSA Status CII Best Practices OpenSSF Scorecard SLSA 3 Verify & Release Scorecard Supply-Chain Security Lines of Code Quality Gate Status Security Rating Maintainability Rating Reliability Rating

🔍 Citizen Intelligence Agency

CIA Logo

Political transparency platform monitoring Swedish political activity with data-driven insights, analytics, dashboard visualizations, and accountability metrics.

CII Best Practices OpenSSF Scorecard SLSA 3 Verify & Deploy Scorecard supply-chain security Quality Gate Status Security Rating

☁️ Lambda in Private VPC

AWS Lambda

Enterprise-grade multi-region active/active architecture with near-zero recovery time, comprehensive DNS failover, and AWS Resilience Hub policy compliance for mission-critical applications.

OpenSSF Scorecard Verify and Deploy Scorecard Supply-Chain Security

🧪 Sonar-CloudFormation-Plugin

SonarQube Plugin

SonarQube plugin for analyzing AWS CloudFormation templates with security best practices based on NIST, CWE, and ISO standards.

License CII Best Practices OpenSSF Scorecard

🔑 Security Services

Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.


📋 Service Overview

🌐 Availability Remote or in-person (Gothenburg)
💰 Pricing Contact for pricing
🏢 Company Hack23 AB (Org.nr 5595347807)
📧 Contact LinkedIn

🎯 Core Service Areas

Area Services Ideal for
🏗️ Security Architecture & Strategy Enterprise Security Architecture: Design and implementation of comprehensive security frameworks
Risk Assessment & Management: Systematic identification and mitigation of security risks
Security Strategy Development: Alignment of security initiatives with business objectives
Governance Framework Design: Policy development and security awareness programs
Organizations needing strategic security leadership and architectural guidance
☁️ Cloud Security & DevSecOps Secure Cloud Solutions: AWS security assessment and architecture (Advanced level)
DevSecOps Integration: Security seamlessly integrated into agile development processes
Infrastructure as Code Security: Secure CloudFormation, Terraform implementations
Container & Serverless Security: Modern application security best practices
Development teams transitioning to cloud-native architectures with security focus
🔧 Secure Development & Code Quality Secure SDLC Implementation: Building security into development lifecycles
CI/CD Security Integration: Automated security testing and validation
Code Quality & Security Analysis: Static analysis, vulnerability scanning
Supply Chain Security: SLSA Level 3 compliance, SBOM implementation
Development teams seeking to embed security without slowing innovation

🏆 Specialized Expertise

Category Services Value
📋 Compliance & Regulatory Regulatory Compliance: GDPR, NIS2, ISO 27001 implementation
ISMS Design & Implementation: Information Security Management Systems
AI Governance: Emerging AI risk management frameworks
Audit Preparation: Documentation and evidence preparation
Navigate complex regulatory landscapes with confidence
🌐 Open Source Security Open Source Program Office: OSPO establishment and management
Vulnerability Management: Open source risk assessment and remediation
Security Tool Development: Custom security solutions and automation
Community Engagement: Open source security best practices
Leverage open source securely while contributing to security transparency
🎓 Security Culture & Training Security Awareness Programs: Building organization-wide security culture
Developer Security Training: Secure coding practices and methodologies
Leadership Security Briefings: Executive-level security understanding
Incident Response Training: Preparedness and response capability building
Transform security from barrier to enabler through education and culture

💡 Why Choose Hack23 Security Services?

Three decades of hands-on experience in software development and security architecture means we understand the real challenges development teams face. We don't just point out problems—we provide practical, implementable solutions that enhance security without slowing down innovation.

Our approach: Security should be seamlessly integrated into your existing processes, not bolted on afterward. We help organizations build a culture of security awareness where protection becomes a natural part of how teams work, not an obstacle to overcome.

Passionate about transparency: As advocates for open source security, we believe in sharing knowledge and building community. Our solutions are designed to be understandable, maintainable, and aligned with industry best practices.

🏛️ CIA Compliance Manager Documentation

Current Architecture

Future Vision

🏛️ Citizen Intelligence Agency Documentation

Current Architecture

Future Vision & Operations

🔑 Security Focus Areas

mindmap
  root((🔐 CIA Triad<br>Security Focus))
    🔒 Confidentiality
      🏷️ Data Classification
        🌐 Public
        🛡️ Restricted
        🗝️ Confidential
        🔒 Secret
      🚪 Access Control
        👥 RBAC Implementation
        🔑 MFA Integration
        📉 Least Privilege
      🔑 Encryption
        🧬 AES-256
        🧿 Quantum-Safe Encryption
        🗝️ KMS Integration
    ✔️ Integrity
      🧪 Data Validation
        👁️ Manual Checks
        🤖 Automated Validation
        🔗 Blockchain Records
      🔄 Change Control
        📝 Audit Trails
        ♻️ Versioning
        🛡️ Non-Repudiation
      🏆 Quality Assurance
        🧑‍💻 Code Analysis
        🧩 Test Coverage
        🏅 SLSA Level 3
    ⏰ Availability
      🛡️ Resilience Levels
        💾 Backup/Restore
        🔥 Pilot Light
        ♨️ Warm Standby
        🌐 Multi-Site Active/Active
      📊 Recovery Metrics
        🕑 RTO Targets
        ⏳ RPO Objectives
        📈 Uptime SLAs
      👀 Monitoring
        ❤️ Health Checks
        🚨 Alerting
        💥 Chaos Testing
Loading

🌟 Featured in Press & Media

🗞️ Computer Sweden

Featured article on innovative use of technology for political transparency

Read Article

📰 Riksdag och Departement

Coverage on Citizen Intelligence Agency's monitoring capabilities

Read Article

📊 National Democratic Institute

Recognized in survey of parliamentary monitoring organizations

View Report

🎤 Technical Talks & Presentations

🎙️ Javaforum Göteborg

Presentation on secure architecture patterns

Watch Presentation

🎙️ Shift Left Like A Boss

Security podcast guest appearance discussing DevSecOps

Listen to Podcast

💼 About James Pether Sörling

mindmap
  root((👨‍💼 James Pether Sörling))
    🔐 Information & Security Leadership
      👨‍💼 CISO / ISO Roles
      🛡️ Security Architecture
      🧩 CIA Triad Implementation
      🛠️ Policy Development & Governance
      📊 Risk Management
      🔍 Audit & Compliance Oversight
      🤖 AI Governance
      🌐 Open Source Program Office
    🏛️ Frameworks & Compliance
      📄 ISO 27001
      📄 NIST 800-53
      📄 VDA-ISA
      📄 CIS Controls
      🏷️ Data Protection / GDPR
      📋 ISMS Implementation
      🧪 Continuous Improvement
    ☁️ Cloud & Platform Security
      🌐 Multi-Cloud (AWS / Azure)
      🏗️ Enterprise & Reference Architectures
        🌍 Multi-Region Design
        🔁 Resilience & Failover
        ♻️ High Availability Patterns
      🔒 Secure Cloud Services
        Security Hub
        GuardDuty
        KMS
        WAF
      🧱 Network & VPC Security
      🔑 IAM / Least Privilege
    🛠️ Infrastructure as Code
      🧾 CloudFormation
      🛠️ Terraform
      🔄 GitOps / Pipelines
      🔍 Template Scanning
      📦 Supply Chain (SLSA Level 3)
    💻 Software Engineering
      ☕ Java / Spring
      ⚛️ React / TypeScript
      🐘 PostgreSQL
      🔄 CI/CD Automation
      🧪 Automated Testing
      🧵 Secure SDLC (SSDLC)
      📈 Code Quality (SonarQube)
    🔬 Security Operations & Assurance
      🚨 Incident Response
      🕵️ Vulnerability Management
      📈 Security Monitoring
      🧪 Threat Modeling
      📜 Logging & SIEM Use
    🌍 Open Source Leadership
      📋 CIA Compliance Manager
      🏛️ Citizen Intelligence Agency
      🧩 Sonar-CloudFormation-Plugin
      🔧 cfn-nag Contributions
      🤝 Community Engagement
      👀 Code Review / Security Tooling
    🏆 Certifications & Recognition
      🎓 CISSP
      🎓 CISM
      🥇 AWS Security Specialty
      🥇 AWS Solutions Architect Professional
      🛡️ SLSA Level 3 Attestations
    🚀 Strategic Impact
      🔓 Transparency Advocacy
      🧭 Security-by-Design Enablement
      🧠 Knowledge Sharing / Speaking
      📢 Public Policy & Civic Tech
Loading

Experienced technology professional specializing in information security and delivery of secure cloud systems. Strong advocate for transparency in organizations and committed to ensuring robust security posture for modern applications through open source solutions.

📫 Connect

LinkedIn GitHub Blog Tech Talks

Last updated: 2025-05-13 08:23:39

Pinned Loading

  1. cia cia Public

    Citizen Intelligence Agency. Comprehensive open-source intelligence platform analyzing Swedish political activities using AI and data visualization. Tracks politicians, government institutions, and…

    Java 191 47

  2. sonar-cloudformation-plugin sonar-cloudformation-plugin Public archive

    Sonarqube cloudformation plugin, IaC security supports cfn-nag/checkov

    Java 26 9

Repositories

Showing 10 of 16 repositories
  • blacktrigram Public

    Black Trigram is a realistic combat simulator that teaches authentic Korean martial arts through precise anatomical targeting. Master traditional vital point techniques through modern 2D combat mechanics across 5 distinct fighter archetypes.🥋 Black Trigram (흑괘) 어둠의 무예로 완벽한 일격을 추구하라 "Master the dark arts through the pursuit of the perfect strike"

    Hack23/blacktrigram’s past year of commit activity
    TypeScript 3 Apache-2.0 1 7 (2 issues need help) 0 Updated Sep 19, 2025
  • cia-compliance-manager Public

    The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality of their systems and data based on customizable security levels, providing real-time cost estimates, business impact assessments, and technical implementation details.

    Hack23/cia-compliance-manager’s past year of commit activity
    TypeScript 12 Apache-2.0 4 1 0 Updated Sep 20, 2025
  • game Public template

    A clean, minimal template for building games with React, TypeScript, PixiJS, and Vite - built with security-first principles.

    Hack23/game’s past year of commit activity
    TypeScript 6 2 1 0 Updated Sep 19, 2025
  • cia Public

    Citizen Intelligence Agency. Comprehensive open-source intelligence platform analyzing Swedish political activities using AI and data visualization. Tracks politicians, government institutions, and parliamentary data, offering detailed insights, performance metrics, and advanced analytics.

    Hack23/cia’s past year of commit activity
    Java 191 Apache-2.0 47 3 0 Updated Sep 19, 2025
  • .github Public
    Hack23/.github’s past year of commit activity
    2 0 0 0 Updated Sep 17, 2025
  • ISMS-PUBLIC Public

    Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure

    Hack23/ISMS-PUBLIC’s past year of commit activity
    8 Apache-2.0 3 0 0 Updated Sep 17, 2025
  • homepage Public

    Webpage for org https://hack23.com

    Hack23/homepage’s past year of commit activity
    HTML 2 Apache-2.0 1 1 0 Updated Sep 16, 2025
  • lambda-in-private-vpc Public

    A highly available system that runs in multiple AWS regions at the same time. It uses AWS Resilience Hub to ensure compliance with policies for Recovery Time Objective (RTO) and Recovery Point Objective (RPO)

    Hack23/lambda-in-private-vpc’s past year of commit activity
    3 Apache-2.0 1 1 0 Updated Sep 15, 2025
  • talks Public

    How to secure your development pipeline with static application security test (SAST) / Dynamic application security test (DAST), software composition analysis (SCA) using Sonarqube.

    Hack23/talks’s past year of commit activity
    7 0 1 0 Updated Sep 2, 2025
  • RefactorAIOperationsIDE Public

    Bridging AI Intelligence with IDE Refactoring Power

    Hack23/RefactorAIOperationsIDE’s past year of commit activity
    2 Apache-2.0 0 0 0 Updated Aug 5, 2025