SOC Engineering
Whether building a new or transforming an existing Security Operations Center (SOC), Dark Wolf’s professionals can define a SOC’s mission and objectives, design its architecture, build its infrastructure, develop policies and procedures, and run tests to ensure it can detect and respond to the latest cybersecurity threats. We customize our solution to your organization’s cybersecurity risks, budget, and infrastructure. Our objective for a SOC is to improve your security posture, reduce the risk of breaches, and improve incident response. We are architecting and building SOCs for Air Force programs.
UAS Cyber
Drawing from our deep experience assessing small Unmanned Aerial Systems (sUAS)s, Ground Control Systems, Payloads, and Communications for commercial and government entities, Dark Wolf’s Drone Wolf Playbook is the authoritative guide to small unmanned system (sUxS) assessments. We will follow this playbook to assess sUxS devices that your organization relies upon for its critical operations. The Playbook is publicly available and it details the methods and tools we use to assess sUxS Cybersecurity. We have introduced hundreds of participants in our “Hack Our Drone” workshop to sUxS cybersecurity at conferences such as Xponential, Black Hat, and the PX4 Developers Summit. Our test teams have a deep understanding of the flight software, ground control applications, and communications protocols commonly used on sUxS devices and their payloads through our experience assessing devices used by the Department of Defense and commercial organizations.
Zero Trust
Our Cybersecurity Engineers can apply best practice, NIST, and DoD Zero Trust Architecture guidance to transform an organization’s information security approach from “moat and fence” to constantly validating identity and permission against individual assets. We recognize that Zero Trust is not a tool or configuration. Rather, it is a collection of design principles, system practices, and implementation methods to constantly validate a user prior to action against an asset. For example, on behalf of the United States Space Force, Dark Wolf built a cloud native access point (CNAP) that can provide and maintain the identity of a user or process to other services throughout the cloud environment.
RMF Compliance
The purpose, design, and implementation of some information systems do not lend them to Innovative ATO approaches. This includes systems that are not cloud based, built on legacy technology, or are brittle but must have a renewed ATO. In these cases, Dark Wolf professionals follow a disciplined process for working through each of the 7 steps of the RMF. We categorize the system and determine security requirements, select controls, implement and document controls, and interact with assessment teams to bring the system to its accreditation. We support our process with tools and templates to accelerate the timeline for building artifacts and tracking control burndowns. We provide RMF support to the government and to technology startups new to business with the Federal government that must complete RMF requirements for their products.