After obtaining the Government Competency status from AWS, Telos set their sights on the next goal – securing the Security Competency. While some of the criteria for this competency were already met in the Government Competency evaluation, Telos needed to provide two external, public-facing references this time around in the competency review process. So the work effort focused on obtaining the appropriate customer approvals to publish two case studies…with the possible goal of a combined case study of two organizations’ use of Xacta.
We approached two customers who are using the Xacta solution in tandem about participating in a joint case study. The sponsor of the highly secure Commercial Cloud Services (C2S) environment and the AWS Internal Compliance team both agreed to document how they are accelerating the compliance process with Xacta. Thus our joint C2S/AWS case study process began.
The lengthy and rigorous approval process for the case study depended on the support and sponsorship of the C2S sponsor (a member of the Intelligence Community) and AWS. Their combined effort on the case study solidified our ability to publish these references externally and achieve the Security Competency designation.
Demonstrating our extensive work with the Intelligence Community (IC) and with the AWS Internal Compliance team has resulted in high praise for our cloud compliance solutions. Xacta is a cyber risk management platform that allows users to continuously monitor and automate compliance processes. Xacta customers can utilize AWS services to select controls specific to them and reduce redundant efforts.
Monitoring security standards and offering cybersecurity services to protect your information have always been our specialty and underlying mission. Partnering with AWS to offer our support with the cloud security process further allows us to use our product to create a secure and protected environment for customers.
Working in collaboration with the IC and AWS enabled us to release the C2S case study, detailing the mission for continuous Authorization to Operate (ATO). The ATO process assesses each AWS service to ensure each can be used to support workloads in the C2S environment.
I encourage you to download the case study to learn about reducing the time and cost of security compliance, and read featured quotes from both CIA sponsors and the AWS team.
The Empower and Protect Blog brings you cybersecurity and information technology insights from top industry experts at Telos.