INFORMATION ASSURANCE
An information system is the organized collection, processing, transmission, and dissemination of
information in accordance with defined procedures, whether automated or manual.  It includes the
information stored on the system, as well as the hardware and software used to maintain the
information.  The purpose of an comprehensive Information Assurance (IA) program is to protect
information systems from unauthorized access, modification, disclosure, or destruction

Information is one of the most valuable assets of a Federal or Private Sector Client. They have
invested millions of dollars to develop and use information assets, to fulfill their mission.  A
comprehensive Information Assurance (IA) program requires substantial resources to categorize
information, provide information security services—to maintain the availability, integrity, and
confidentiality of information.

The four main goals of G. W. Integrity Systems, Inc., Information Assurance program for
information systems are to establish and maintain the availability, integrity, and confidentially of
information in those systems.

  • Availability refers to the ability of the Program Manager and all authorized users to access
    the information to complete a function.  Availability is essential to information that must
    be accessible on a timely basis to meet mission requirements or avoid substantial losses.  
    Controls to protect the availability of information are required, if the information is
    critical to corporate functions.  

  • Integrity refers to accuracy or completeness of the information, or the information adheres
    to standards values. Information must be protected from unauthorized, unanticipated, or
    unintentional modification or destruction.  Integrity is important to all information-
    inaccuracy compromises the value of the information system.

  • Confidentiality refers to preventing the disclosure of the information.  Information must
    be protected from unauthorized or accidental disclosure.

  • Cost Effective IA program mangers should balance resources applied to protective
    techniques to protect information and control risks with the potential value of loss if no
    action were taken.  While it is often difficult to assign a dollar value to information,
    Program Managers must balance the potential impact of losses on the company's mission
    when priorities for allocation of organizational resources.

G.W. Integrity Systems demonstrates its commitment to its IA clients in this regard by the extent
to which we help them fulfill their obligatory requirements as it relates to the following:

  • DIACAP (Policies: PL 100-235, DoDD 8500.1, DoDI 8500.2  & DoD 8500.1/2
  • FIPS Publication 199 (Security Categorization),
  • FIPS Publication 200 (Minimum Security Requirements),
  • NIST Special Publication 800-18, Rev 1 (Security Planning),
  • NIST Special Publication 800-26, Rev 1 (Reporting Formats),
  • NIST Special Publication 800-30 (Risk Management),
  • NIST Special Publication 800-37 (Certification & Accreditation),
  • NIST Special Publication 800-53 (Recommended Security Controls),
  • NIST Special Publication 800-53A (Security Control Assessment),
  • NIST Special Publication 800-59 (National Security Systems),
  • NIST Special Publication 800-60 (Security Category Mapping),
  • Homeland Security Presidential Directive #7 Critical Infrastructure Identification,
    Prioritization, and Protection, and  
  • OMB Circular A-130 (Appendix III) Security of Federal Automated Information Resources.

There is one  principle, however, that pertains to the stated requirements, individually as well as
when integrated toward the achievement of a secured  enterprise:  project activities must be
planned and managed and proven techniques employed with respect to each stage of a secured
environment.  G.W. Integrity Systems demonstrates its commitment to its IA clients in this regard
by the extent to which we employ automated tools (Foundstone, Web Inspect, Snare and etc) and
techniques, including the following:

  • Enterprise Mission Assurance Support System (eMASS),
  • ASSERT,
  • Security Testing & Evaluation (ST&E),
  • POA&M Categorization,
  • Risk Analysis,
  • Contingency Plan Development,
  • Business Resumption Plan Development,
  • Security Awareness and Training, and
  • SAS 70 Type II.

If you would like to learn more about how we can help.  Let’s Talk.
Risk Advisory Service (RAS)
Financial Systems/Resources
Independent Verification &
Validation (IV&V)
Software Quality Assurance
(SQA)
Continuous Process
Improvement (CPI)
Test & Evaluation (T&E)
Information Assurance (IA)
G.W. Integrity Systems, Inc

Management & Technology
Consultants

GregoryWaters@gwisinc.com
240.535.9644

©2007 All rights reserved.

Legal Disclaimer and Privacy
Anchored in Integrity