System Design Services

System Design Services

Home >Services >Professional Services

PROFESSIONAL SERVICES

CertiPath’s experienced personnel include authors, inventors and top practitioners in the emerging identity space. Our subject matter experts apply hands-on knowledge to create systems that leverage PIV and other high-assurance credentials in in all application spaces, including E-PACS, federation, and logical access.

As leaders in the HSPD-12, FIPS 201, FICAM, PIV/PIV-I, and PKI markets, we know of areas where the technology presents operational challenges to applications that use PIV/PIV-I credentials. CertiPath places great emphasis on addressing operational challenges by providing services that solve these challenges head-on. We offer strategic services that can greatly enhance the cybersecurity posture of the federal enterprise and commercial entities.

These services include:

  • Application development leveraging FIPS 201 conformant PIV and PIV-I credentials
  • Designing and testing E-PACS and their secure use of PIV/PIV-I/CAC/CIV credentials
  • Activities leveraging CertiPath’s PKI expertise, including PKI interoperability with the Federal PKI trust fabric; CertiPath operates a bridge certification authority (CA) that is cross-certified with the Federal Bridge and has supported the CA owner/operator FPKI Annual Review process for a federal client
  • Performing facility assessments to measure compliance with all next generation federal physical security and identity management mandates
  • Developing, deploying, reviewing, and enforcing security policies that satisfy business objectives and government regulations
  • Developing security Requirement Traceability Matrixes (RTMs) that trace requirements from source documents to test documents
  • Developing security architectures and conducting architecture reviews
  • Conducting IT security threat, vulnerability, risk, and countermeasure operations: We identify principal threats that systems might face, categorize vulnerabilities and residual risks, perform risk and vulnerability assessments, and identify and implement countermeasures
  • Conducting and supporting system and subsystem testing
  • Performing FICAM segment architecture compliance assessments: We provide services that meet FICAM requirements, including PIV issuance, key military and commercial security guidelines, federal directives, and guidance or instructions