Risk Management Framework & National Defense Cyber Security

Resilliant’s principals have spent decades protecting the nation’s most sensitive assets, network infrastructure, and the health records of millions of service members and Veterans. It’s the kind of work where failure is not an option, ever.

Resilliant has decades of experience reducing the risk of critical interagency data sharing, Federal Health IT, and national security engagements. We start by using established models such as NIST 800 Series, Secure Information Event Management (SIEM), Risk Management Framework (RMF), DoD Instructions (DoDI), Directives (DoDD), Manuals (DoDM), Directive-Type Memoranda (DTM) & Administrative Instructions (AI), to include TASKORDs and PLANORDs, and the Intelligence Community Directive (ICD) Series.

Resilliant has proven success in this area reflected in its extensive experience with many accreditation vehicles that include:

  • DoD 8510.01 Risk Management Framework (RMF) for DoD IT
  • NIST 800-37
  • Director of Central Intelligence Directive (DCID) 6/3
  • Joint SAP Implementation Guide (JSIG)
  • DoD Joint Security Implementation Guide

We augment this process expertise with technology expertise. Resilliant uses cutting edge technology, such as next-generation firewalls (NGFW), big data SIEM solutions, and sandboxed virtual execution of code, to develop best-of-breed security embedded stacks for our customers. We have guided organizations through all phases of C&A/A&A, to include control selection, auditing, artifact generation, and plan of actions and milestones (POA&M) management, with 100% success in attaining ATO/ATC.

Resilliant engineers have experience with numerous vulnerability scanners, to include Retina, Acunetix, and Nessus—along with the DoD implementation of Nessus Security Center, called Assured Compliance Assessment Solution (ACAS).  We are also certified in various Microsoft, Red Hat Linux, and Cisco. Through our engagements, we have become computer network defense experts, tackling the latest risks to information systems, such as advanced persistent threats (APTs), zero-day exploitations, and insider threat. Our experts engage with the Dark Web and hacker communities to ensure that threats are identified and countered before they become issues.