Service List
Download Comp-Sheet
Quick Contact
Security Program Strategy
The Security Strategies offered at Tech Knowledge Solutions allows our clients to align business needs with security goals. In order to meet overarching business goals, it is essential to establish clear security priorities that support the long-term goals of the business. The Security Strategy will elevate your security posture, design business-relevant cybersecurity controls, identify the path to vulnerability remediation, and obtain compliances while accommodating future business growth.
Governance
Tech Knowledge Solutions (TKS) will assists commercial and government agencies with IT Governance by offering practical frameworks, processes, and tools to optimize existing governance systems or to initiate governance for the first time.
- IT Corporate Governance (ITIL)
- Data Analysis
- Cost Analysis and Management (Value & Cost Management)
Compliance Readiness
Command Cyber Readiness Inspection (CCRI)
- Tech Knowledge Solutions will assist your company with achieving a passing grade with our expert CCRI consulting team.
- Tech Knowledge Solutions has the know how to best consult and advise Commanders, Facility Security Officers (FSOs), Information System Security Managers (ISSMs), Security Analysts, and System Engineers on how to efficiently prepare and successfully pass their CCRI.
- Tech Knowledge Solutions will help your company prepare for your inspection as well as asset with completing an After-Action Plan (AAP).
- Tech Knowledge Solutions will help train your personnel, prepare your environment, and develop a customized path to CCRI Success
FISMA
The Federal Information Systems Act (FISMA) requires government agencies to implement an information security program that effectively manages risk.
Failure to meet federal standards can impact your organization, Tech Knowledge Solutions has a variety of services that you can leverage to meet your FISMA compliance needs.
We will help to:
- Maintain an inventory of information systems
- Categorize information and information systems according to risk level
- Maintain a system security plan
- Implement security controls (NIST 800-53)
- Conduct risk assessments
- Certification and accreditation
- Conduct continuous monitoring
Validation
Allow Tech Knowledge Solutions to assist your company with validating implemented controls; ensuring effectiveness.
We will:
- Illustrate the viability and health of the security standards deployed
- Maintain a security authorization that meets the FedRAMP requirements
- Monitor security controls, assess them on a regular basis, and demonstrate that the security posture of services offered are continuously acceptable
Risk Management
Our risk management consulting and risk analysis programs are based on industry best practices and are performed by knowledgeable experts. Each risk assessment seeks to the following basic tasks:
- Identify the specific assets that need to be protected. This can include company employees, proprietary information, money, manufactured goods, reputation, supply chain and more.
- Identify and quantify the types of risks that could identify the assets.
- Determine the criticality of each potential risk event. In this sense, we define criticality as the product of probability of occurrence multiplied by the impact of the event on the company. When criticality is properly measured organizations can be assured that only cost-justified security measures will be implemented.
Risk Management Framework
- Tech Knowledge Solutions will ensure the security controls are implemented so-as to adequately protect the confidentiality, integrity and availability of the system and the data it stores and processes.
- Tech Knowledge Solutions will work with each customer to ensure our services complement existing program capabilities to result in a strong program that results in secure networks and systems, while also ensuring compliance with the OMB-mandated RMF program requirements.
Assess Only
The Assess Only process facilitates incorporation of new capabilities into existing approved environments, while minimizing the need for additional ATOs.
Authorization to Operate / Authority to Connect
If your organization is struggling with getting through the process of obtaining an ATO with conditions or just needs direction on how to get started, Tech Knowledge Solutions can help.
- Tech Knowledge Solutions is intimately familiar with the RMF A&A (Assessment & Authorization) processes and procedures and the associated laws, regulations, and procedures that mandate a formal process for compliance and will ensure it is implemented and followed.
We will:
- Define system boundaries
- Establish security categorizations according to FIPS PUB 199
- Assess the effectiveness of the security controls in place with a Security Test and – – Evaluation (ST&E) and Security Assessment Report (SAR)
- Manage and remediate weaknesses uncovered as a result of an assessment through continuous monitoring and creating Plan of Action and Milestones (POA&Ms) when required
Tech Knowledge Solutions will articulate and design the following documents:
- System Security Plan (SSP)
- Systems Administrator Guide (SAG)
- Contingency and Business Continuity Plan (CBCP)
- Continuity of Operation Plan (COOP)
- Concept of Operations (CONOPS)
- Incident Response Plan (IRP)
- Configuration Management Plan (CMP)
- Other policies, procedures, and/or plans as needed