SECURITY & COMPLIANCE 


Data & Information Management 

Kurrent Logic provides expert FISMA compliance and cybersecurity services, including auditing, security scans, OWASP best practices, and AD-based controls to ensure system integrity and compliance.

 SECURITY & COMPLIANCE 

Image


FISMA Compliance & Cyber Security Support

Our team has experience managing applications with FISMA High ratings in Confidentiality, Integrity, and Availability. We work closely with government security teams, including ISSOs, to ensure compliance and system integrity during FISMA assessments by gathering and submitting required artifacts and evidence.

We provide comprehensive auditing, logging all user interactions for audit readiness, and integrate with Splunk for streamlined monitoring. Our security process includes thorough scans of applications, servers, and databases using tools like Web Inspect, Invicti, and Tenable.

We follow OWASP best practices for .NET development and use Active Directory Group Policies (GPOs) to enforce security controls across all systems. This comprehensive approach ensures strong security, full compliance, and reliable system performance.

Image


FISMA Compliance & Cyber Security Support

As government contractors, our team is experienced in managing applications with FISMA ratings of High Confidentiality, High Integrity, and High Availability. To uphold these rigorous standards, we work closely with government security teams, including Information System Security Officers (ISSOs). During FISMA assessments, we gather artifacts and evidence to demonstrate compliance and maintain the integrity of the systems we manage.
Our services include comprehensive auditing and evidence gathering, ensuring all user interactions within an application are recorded and presented for audit purposes. We collaborate with Splunk teams to integrate these audits into Splunk for streamlined monitoring and reporting.

We also prioritize security scans and compliance by conducting thorough scans for applications, servers, and databases. These include tools such as Web Inspect, Invicti, and Tenable scans to ensure robust security standards are met.

In addition, we follow OWASP best practices for .NET applications to enhance security and reliability. For system-wide controls, we utilize Active Directory to configure Group Policies (GPOs), enabling us to apply and store security controls across all servers within an AD hierarchy. This comprehensive approach ensures compliance, security, and the highest standards of application integrity.


Audit Support & Integrated Security

Our audit support services provide end-to-end oversight across applications, databases, and servers. We track user activity using tools like Event Viewer and Group Policies, and centralize audit logs in Splunk for streamlined analysis.

In the Azure Cloud, we leverage Application Insights for detailed logging, advanced querying, and custom dashboards—making audits easy to review and understand.

Security is fully integrated into our process. We deploy trusted tools such as CrowdStrike, Tenable Agents, Splunk Forwarder, and Software Center to protect systems. In Azure, we implement firewalls, secure networking, and Transparent Data Encryption (TDE) for SQL Databases, in collaboration with the Azure Government Team.

This comprehensive approach ensures strong security, seamless audits, and reliable system integration.

Agile software development


Audit Support & Integrated Security

Our audit support services are designed to provide comprehensive oversight and security across applications, databases, and servers. We implement thorough auditing processes, tracking all user interactions within applications, database actions, and server activities through tools like Event Viewer and Group Policies. Additionally, we facilitate system integration by migrating audit logs to platforms like Splunk for centralized analysis and monitoring.

In leveraging Azure Cloud capabilities, we utilize Application Insights to generate detailed audits and logs, including custom logging. This allows for advanced querying, graphical data representation, and the provision of user-friendly tools for system teams to review and understand audits efficiently.

Integrated security is a core component of our approach. We collaborate with government-approved tools to secure applications and servers effectively. This includes deploying security software such as CrowdStrike, Tenable Agents, Splunk Universal Forwarder, and Software Center.

Our Azure Cloud security measures include setting up firewalls and secure networking in partnership with the Azure Government Team, as well as implementing Transparent Data Encryption (TDE) for SQL Databases to ensure data protection and compliance with high-security standards. This holistic approach ensures robust security, seamless audit processes, and reliable system integration.

Agile software development
image
image
image
imageimageimage
imageimage
image
© 2024 Kurrent Logic. The Kurrent Logic name and logos are registered trademarks of Kurrent Logic LLC.