• 1 Security Architecture for the Federal Enterprise (S.A.F.E.™) Implementation
    There are five key and correlative components that every information technology organizations should possess to sustain their network operations. These components are: Security Management Program, Security Policy, Security Plan, Security Procedures, and a Security Processes – “Five P’s” to Security
  • 2 Security Assessment
    Extensive experience in assessing the reliability of IT systems within various agencies of the Federal government Review systems for compliance with all relevant Federal guidelines, including FISMA, NIST (i.e., 800-26, 800-30, 800-53, etc.), OMB Circular A-123/A-130, HIPPA, HSPD, DIACAP, and Audit Readiness and Remediation; full certification and accreditation efforts are provided
  • 3 Security Engineering
    Applying network security rigor and expertise to every engineering, systems application/development project via Threat/Vulnerability Assessments, Policy Development, Strategic Planning, Disaster Recovery / Continuity of Operations
  • 4 TModeling and Simulation (M&S)
    Subject Matter Expert (SME) Support for Information Assurance M&S M&S SME Support for Training and Training Development

Identify

Identifies and evaluates technological and functional risks through determination of system criticality, functionality, exposure, sensitivity, mission requirements, and other risk factors.

Engage

Determine how to effectively implement and exceed security requirements while maintaining a reasonable level of effort and cost.

Perform

Performs POA&M Support for SB/SE, to include findings and reconciliation with auditing bodies

Welcome to Harris Development, LLC

Security Enterprise Architecture
Security Architecture for the Federal Enterprise (S.A.F.E.™) Implementation - There are five key and correlative components that every information technology organizations should possess to sustain their network operations.  These components are: Security Management Program, Security Policy, Security Plan, Security Procedures, and a Security Processes – “Five P’s” to Security

Accomplish security review of information technology security deployment, practices, and policies to assess the organization’s security posture. Read More...