Cloud Services

Pay-as-you-Go Cloud Services Model (Operating Expense)

Pay-as-you-Go Base Services Include

  • Complete Cloud Access Point (CAP) submission support
  • Cloud related Ports Protocols and Service Management (PPSM) and Ports, Protocols, and Service firewall submission support
  • DISA DNS support
  • SMTP support (email)
  • CAC authentication support
  • Remote Desktop Services support
  • Availability of DoD specialized templates (STIG’d images, SCCA templates, etc)

Service Objectives
Reduce speed bumps encountered in DoD cloud deployments

  • Contracting
  • Connectivity
  • Accreditation
  • Timeline of deployment

Public\Private Partnership

  • Provide knowledge transfer to government personnel
  • Act as DoD cloud broker with the cloud provider
  • Provide DoD tailored automation template libraries
    • SITG compliant images
    • DISA compliant architectures
    • Automation to facilitate recovery and incident response

Service Support Services
Service Tracking

  • Online ticketing system
  • 7 x 24 on infrastructure support
  • Provide interface to cloud provider
  • Provide Tier I infrastructure support

Financial Tracking Portal

  • Detailed daily usage tracking
  • Ability to provide usage data across multiple cloud platforms
  • Built in forecasting and budget analysis
  • Built in email alerting
  • Partnership with cloud financial management specialist

Cloud Environment Security Assessment
A core benefit of a hosted cloud solution is to leverage the economies of scale in technology that could not be realized within a traditional IT environment due to budget or skillset. A key technology that can be leverage in this way is the security infrastructure. Many organizations don’t have the budget or lack the skill to implement sophisticated industry standard security infrastructures that exist in large scale data center operations. However, operating in a hosted cloud environment may allow for usage of such technology. A key requirement when operating in a hosted cloud environment is to be able to measure change in the environment as well as monitor security policy and regulatory compliance. DCS can provide the skillset necessary to develop an ongoing configuration compliance and change identification process for a cloud environment.

Auditing Regulatory Compliance for IT Systems and Policies
A key element of a secure environment is the development and implementation of an organizational security policy. The organizational security policy is driven by a risk analysis of the information systems and threats to those systems. With extensive experience designing and managing high security environments DCS can provide valuable insight in the creation, implementation, auditing, and compliance monitoring of corporate policies. Our specialization is focused on implementation of NIST 800-53 compliant systems.

NIST Guide for Applying the Risk Management Framework to Federal Information Systems

Risk Management Framework to Federal Information Systems (NIST Special Publication 800-37)

Vulnerability Assessments and Penetration Testing
Performing routine standardized vulnerability assessments and remediation is a core fundamental cyber security concept that is a key element in securing the IT environment. DCS works with our clients to develop ongoing operational procedures for performing routine vulnerability assessments and vulnerability remediation. We also offer baseline vulnerability assessments to provide situational awareness current state of cyber preparedness.