Technical Controls Design and Implementation
From firewall policies and vulnerability scanners to centralized authentication under LDAP or Active Directory, we have many years of experience integrating the latest technologies in support of our Clients’ security needs.
Our technical staff maintains key certifications in Microsoft, AWS, Red Hat, Palo Alto, Cisco, and Splunk. Our approach to technical controls stresses function over form. Firewalls can be implemented virtually or physically – amongst a single cloud provider or across a multi-site enterprise – provided that they are implemented under a single set of control objectives to meet our Clients’ overarching goals.
Our Process
We always begin technical controls implementation with a functional design that defines control objectives and describes how the technical implementation fulfills that objective. A more detailed design will provide specific configuration items such as IP addressing, location within a network diagram, security rules, and access controls.
All control implementation exercises end with a test to demonstrate the technology is in place and demonstrably effective.