Cybersecurity
Cybersecurity2019-01-04T19:51:36+00:00

Cybersecurity by Design (CbD)

NDP provides cybersecurity expertise throughout the system development lifecycle. NDP’s highly skilled and cross-disciplined engineers, architects, and administrators specialize in secure system development and deployment.

Cybersecurity by Design (CbD)

NDP provides cybersecurity expertise throughout the system development lifecycle. NDP’s highly skilled and cross-disciplined engineers, architects, and administrators specialize in secure system development and deployment.

Cybersecurity Architecture and Engineering

We excel at deriving customer and client system level requirements to design innovative and secure system architecture in areas such as:

  • Defense in Depth: An important principle of the Defense in Depth strategy is that achieving a secure system requires a balanced focus on three primary elements: People, Technology and Operations. The Defense in Depth strategy relies on the intelligent application of techniques and technologies that exist today applied with a balance between the protection capability and cost, performance, and operational risk.
  • Securing Network and Systems: We have extensive expertise in securing information systems including architecture and requirements of hardware, software and network elements as well as incorporating continuous monitoring.
  • Auditing: We perform auditing services (to include penetration testing and vulnerability assessments) at the OS, application, and system configuration level. This applies to hardware, software, and network elements of information systems.
  • Certification and Accreditation (C&A) and Assessment and Authorization (A&A): This is a core competency of NDP. We are intimately familiar with the approving agencies across the Armed Services and the Intelligence Communities, and have expertise in applying government policies to Information Systems and achieving smooth C&A and A&A.
  • Risk Assessments: As part of the risk assessment, the NDP team identifies the threats to an information system which enables us to provide the appropriate security controls to maintain the information system’s cyber posture. Our risk assessments include insider threat considerations.
  • Cyber Incident Response: We assist our customers in identifying incidents early in the process to ensure a timely response. Our experience includes event detection and security engineering to ensure that all tools (IDS/IPS, firewalls, syslog servers, SIEM, etc.) are optimally configured to ensure early detection.
  • Cyber Forensics: Our team utilizes industry standard tools to provide forensics support to obtain, detect, recover, and analyze digital evidence obtained during cyber incident response engagements.
  • Cross Domain Solutions Engineering: We develop cross-domain solutions for multi-level classification environments for both secure information sharing and tactical data transfer environments.
  • Certified Professionals: Our team consists of highly qualified and certified cybersecurity, IA, Network, and Software professionals compliant with DoD IA work Force Management objectives (DoD 8570.01-M).

We focus on building a secure system from the ground up, whether it’s new system start-ups, legacy technology integrations, or even physical to virtual/cloud migrations. We ensure your system, software, and components properly meet your business and operational needs, while defending against today’s threats, risks, and vulnerabilities.

In addition to our engineering and architecture expertise, we have extensive federal government compliance experience; we systematically ensure your system will be NIST 800-37, DoD RMF, and ICD-503 compliant. Our unique approach to security control implementations, security documentation, and security assessments are second-to-none, resulting in fewer liens and Plan of Action and Milestones (POA&M) items.