cybersecurity art merging hacker alerts, digital risks, and data protection in a tech domain.

Cybersecurity

Aretum has wide-reaching experience in supporting the Federal Government with cybersecurity. We cover all aspects of securing our nation’s cyber infrastructure from implementations of Program Management, Zero Trust, Penetration Testing, A&A for Federal programs support, and Continuous Security Monitoring. We provide comprehensive cyber solutions including employing Artificial Intelligence, such as Machine Learning.

Aretum’s experience with executing cyber covers working on securing networks, applications, and systems in on-premise environments and in the cloud. We have experience in all aspects of architecting, planning, implementing, managing, and maintaining the security of applications and systems, at a program and enterprise level for our customers.

Our experts have successfully implemented and run security for agencies in on-premises environments, DISA’s datacenters and commercial government cloud environments (e.g. AWS GovCloud)

Offerings

Illustration of a cloud with a lock on it

digital graphics and a shield with a lock

cybersecurity concept, internet security, screen with padlock

A government office where cybersecurity policies are being drafted, with officials discussing regulations and standards to protect national infrastructure

Penetration Testing

Overview

Our cyber and IT security teams have implemented the use of automated and continuous penetration testing for multiple government programs.

As part of our cyber offerings, our security engineers conduct regular penetration testing and risk assessments to identify vulnerabilities in the environment. We leverage tools like AWS Inspector, Azure Security Center, and implement OWASP principles to design, develop, acquire, operate, and maintain applications and systems.

Offerings

Aretum has teams with experience in both external and internal network penetration testing. There are many aspects including:

  • Discovering information leakage in DNS records, scanning for open ports, looking at versions of services to find known exploits
  • Testing web application using SQL injection
  • Using cross-site scripting (XSS)
  • Adding cross-site request forgery (CSRF)
  • Attacking jump servers or the DMZ

Our internal penetration testing focuses on searching for unpatched software, open ports, file shares, privilege escalation misconfigurations, weaknesses in SMB and RDP protocols, as well as support for older TLS and SSL protocols and self-signed certificates.

people pulling on digital graphics of a network to test it's strength

Sleek futuristic network visualization with glowing nodes and threads on a dark background, representing advanced digital forensic investigation and threat detection techniques.

Following NIST SP 800-30 and its successive risk assessment processes, our team supports:

  • Risk evaluation by looking at the overall maturity of information security architecture
  • Implementation of security controls, software supply chains, and security solutions
  • Continuous monitoring strategies and programs
  • Ongoing authorizations

Our threat modeling allows our team to “think like an attacker” and focus on ones that are the most likely to occur. This effort involves looking at approaches to Denial of Service (DOS) attacks, brute-force attacks, spoofing, tampering, and elevation of privilege. We use scenarios that target system entry points and data, both at rest and in transit. We believe risk evaluation and threat modeling are essential to a federal agency.

doctor holding stethoscope to a laptop

Complex software supply chains, use of open-source components, and automated CI/CD pipelines increase the risk of introducing vulnerable software into the IT stack.

Much of securing vulnerabilities on a continuous basis includes protecting outdated, unpatched, or susceptible components, such as libraries, plugins, or frameworks, which can expose applications to known security flaws. We can help build strategies for discovering unsupported or outdated software, including the operating system (OS), web/application servers, database, applications, APIs, and libraries. We also offer patch management tools and frameworks and provide continual testing remediation.

hand touching complex digital graphics

We have implemented support for A&A in multiple federal agencies to initially obtain an Authority to Operate (ATO) and to manage and maintain ongoing Plan of Action and Milestones (POA&Ms) .

We ensure compliance with DISA Security Technical Implementation Guides (STIGs). We offer security architecture support, IA vulnerability assessments, threat and remediation reporting, and 100% compliance with IA Human Capital Training and Certification requirements (DoD Directive (DoDD)) 8140.01 & DoD 8570.01-m).

Offerings

A detailed illustration of a secured database with folders and files labeled as confidential, surrounded by locks and gears, representing data compliance measures.

Checklist business performance monitoring concept, Business using tablet online survey filling out check digital form task, online survey question form, target marketing planning with quality control

a business woman teaching cyber security on a whiteboard giving a presentation

Project Planning  Depict project timelines and milestones on a digital board

Document with approved stamp on it with computer keyboard on table at office.

Continuous Monitoring, Response & Remediation

Overview

We have proven experience recommending, implementing, and maintaining enterprise-level security assessment platforms. Our capabilities include using Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP) audits, and third-party tools.

Our government approved Standard Operating Procedures provide continuous monitoring by human experts supported by cutting edge automated threat response tools.

Offerings

We perform daily security log monitoring for Areas of Responsibility (AOR) resources. Our team identifies any possible intrusions and provides 24/7/365 Tier 3 security response support for resolution to any outage or out-of-parameter conditions within 15 minutes of occurrence.

Auditor Investigating Corporate Fraud concept with magnifying glass

Cyber threat hunting is like actively searching for hidden dangers in a network before they cause damage. It's a proactive approach to cybersecurity.

digital-network-illustration-with-security-hole-being-repaired