Independent Assessment Services to Cloud Providers

Our expertise serving cloud service providers naturally lends itself to understanding compliance requirements of our CSP clients doing business with the government sector. Our unified and agile compliance is a risk-based approach that maps policies, procedures, and controls across multiple regulatory and compliance requirements. This is true of the various compliance requirements such as FedRAMP, DFARS, CJIS, and NIST 800-53. Our services go beyond the mappings and help you navigate the challenges of demonstrating specific compliance requirements of customers in government. Our services support the following:

How It Works

There are various common elements to all government assessment services where BARR can help as our client navigate business with the government whether you are looking for an authority to operate (ATO) or general compliance reporting.

1

Document

• Categorize the system: Document risk impact (Low, Moderate, or High) based upon the FIPS 199 template.
• Select and implement security controls: Assist to select NIST baseline security controls based on the system categorization.
• Create a System Security Plan (SSP): We will assist with creation of the SSP which describes the security authorization boundary, how the implementation addresses each baseline NIST required control, roles and responsibilities, and expected behavior of individuals with system access.
• Other supplemental documentation: Security Policies, Privacy Analysis, e-Authentication Worksheet, User Guide, Rules of Behavior, IT Contingency Plan, Configuration Management Plan, Control Information Summary (CIS), Incident Response Plan, and Privacy Impact Assessment (if applicable).
2

Assess

Concerns about security and compliance reporting with government work drive organizations to seek help with review of their procedures before undergoing the audit. The purpose of a readiness review is to identify control weaknesses that need correction. Deliverables from the readiness assessment include:
• Control gaps and areas of improvement
• Prioritized observations and recommendations for remediation
• Implementation assistance
The advantage of performing a readiness assessment prior to a future examination is to give management an opportunity to address control gaps prior to an inaugural SOC examination.

3

Authorize

As an accredited FedRAMP third party assessment organization (3PAO) and independent audit firm, BARR can perform security assessments using the required templates needed for submission packages to various government entities or other external stakeholders.

Why BARR for Government Assessments

  • Trusted advisor to some of the fastest growing cloud service providers (IaaS, PaaS, SaaS) in the country
  • Serving the most regulated industries including technology, financial services, healthcare and government
  • Clients range from high-growth startups to Fortune 1000 companies
  • 100% referral and satisfaction rate from our clients
  • Competitive, fixed rates to accommodate growing enterprises
  • We put you and your business first, providing unparalleled communication and accessibility at all times

Recent Blog Posts

Union Station skyline, Kansas City

5 Things to Know About BARR Advisory

| Cloud Computing, Compliance Updates, News, Risk Management, SaaS, SOC Reporting, Vulnerability Management | No Comments

At BARR Advisory, we exist to simplify the path to security and compliance for a more secure world. We empower innovative technology and cloud service providers to anticipate, navigate and…

HITRUST News Alert

HITRUST CSF v9.1 Release: Integrating GDPR and New York State Cybersecurity Requirements

| Cloud Computing, Compliance Updates, Federal, Healthcare Security, News, Risk Management, Vulnerability Management | No Comments

The Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) announced the release of version 9.1, which incorporates the EU General Data Protection Regulation (GDPR) and New York State Cybersecurity…

data security code

Amazon Web Services Provides the Tools, But it Won’t Secure Your Data for You

| Cloud Computing, Compliance Updates, News, Risk Management, SaaS, Vulnerability Management | No Comments

In what’s become a frighteningly frequent occurrence, another unsecured Amazon Web Services (AWS) S3 bucket has jeopardized hundreds of millions of customers’ personal data. Often, breaches occur because Cloud clients…

Contact Us for a Free Consultation

We’re here to help you! Speak with a BARR specialist about your security and compliance needs.