Global cybersecurity requires a concerted and collaborative effort among nation states, industry, and academia to develop and implement common security policies, frameworks, and technologies. U.S., allied, and coalition defense partners are increasingly reliant on interconnected platforms, applications, systems, and networks to execute warfighting, security, peacekeeping, and humanitarian operations around the world. Tetra Tech helps our defense clients secure their systems and networks against real and emerging threats.
Tetra Tech has a deep understanding of applying U.S. federal information assurance (IA) and cybersecurity standards such as Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 recommended security controls for federal information systems and organizations, NIST SP 800-37 guide for applying the risk management framework to federal information systems, Trusted Facility Manual (TFM), Federal Information Security Management Act (FISMA), and Department of Defense Directive (DoDD) 8570 IA workforce improvement.
Tetra Tech protects client infrastructure and applications from external and internal security threats. Some of our cyber-related services include:
- Authority to Operate (ATO)
- Computer forensics
- Information Assurance (IA)
- IA Vulnerability Alerts (IAVA)
- Certification and accreditation (C&A)
- Host Based Security System (HBSS)
- System Security Plans (SSP)
- Risk management
- Vulnerability Scanning Service (VSS)
- Privacy Impact Assessment (PIA)