Problem/Scope:
IT Security Support contract providing security engineering, architecture, administration and program support to the Identity, Credential and Access Management (ICAM) Service Provider with Agile development methodologies.
Solution:
J5 Consulting provided the following solutions to resolve our client’s need for ICAM support, threat assessments and modeling to further enhance system development and design architecture:
Solution Points:
- Provided an appropriately sized system development methodology that ensured government compliance to effectively identify threats to the network, application and hosting platforms.
- Security guidance and architecture for the adoption of secure development practices as the ICAM Service Provider’s advocate for implementation of DevSecOps to move security considerations earlier into the SDLC process.
- Provided services implementing and testing NIST 800-53 security controls for new and existing projects as well as prepared Site Security Plans (SSP) and Security Control Traceability Matrix (SCTM) documents required for system authorization.
Result/Benefit:
J5’s solutions are enhancing and enabling our customer’s efforts to develop secure applications that provide better, faster and more reliable results and critical ICAM services. Our solutions directly support risk management and continuous monitoring and improve implementation of security controls.