Distinguishers

  • Designed and currently provide 24/7 operations for DISA’s Kwajalein-to-Guam fiber-optic submarine cable system.
  • Provide C&A support to 19 major USCG Command, Control, Communications Engineering Center systems.
  • Designed the software for the U.S. Coast Guard Data Delivery System (CGDDS) and led system development and training.
  • Provide OSD’s Joint Improvised-Threat Defeat Organization (JIDO) J6/CIO with SETA support including Configuration Management and Information Security.




Truestone is a systems integrator & end-to-end technology services & solutions provider. We employ ITIL best-practices and an integrated process approach to effectively deliver managed services to meet business and customer requirements. Truestone has been certified ISO 20000 since 2011.

We employ ITIL best-practices and an integrated process approach to effectively deliver managed services to meet business and customer requirements.

IT, Communications, and Cyber Security Services

Supporting your systems and their security requirements across the entire development life cycle

Truestone IT and cyber security architects, engineers and subject matter experts bring with them a top down, holistic understanding of our customer’s mission, its IT and communications systems, their relationships to each other, their data flows and the principles that govern their acquisition, design and evolution. This strategic perspective enables us to effectively align the system security level processes, policies and best practices of DoD’s Risk Management Framework (RMF) with the System Development Life Cycle (SDLC), successfully transition from systems Certification and Accreditation (C&A) to Assessment and Authorization (A&A), and provide effective ongoing cybersecurity support after transition.

Categorize System
Categorize System

  • Categorize system in accordance with CNSSI 1253, NIST 800-60 and FIPS 199. Document results in the security plan
  • Assign Qualified Personnel to Risk Management Framework (RMF) Roles
  • Register system

Monitor Security Controls
Monitor Security Controls

  • Monitor Security Controls
  • System Decommission

Authorize System
Authorize System

  • Final Risk Determination and Authorization Decision
  • Authorization Authority (AO) determines the risk to the organization’s operations by weighing the current security state of the system, against the operational need for the system

Access Security Controls
Access Security Controls
  • Develop and Approve Security Assessment Plan
  • Conduct Assessment Activities

Implement Security Controls
Implement Security Controls

  • Implement Security Controls
  • Obtain Type Authorizations and Stand Alone Information System Authorizations

Select Security Controls
Select Security Controls

  • Select Security Controls
  • Overlay Applications and Selection
  • Monitor Strategy


Truestone and the U.S. Coast Guard
Since 2005, Truestone has successfully supported USCG cyber security efforts:
  • Primary USCG Tempest and C&A partner
    • Visual TEMPEST Inspections (VTI) and Instrumented TEMPEST Surveys (ITS)
    • TEMPEST Library and Documentation Support
    • TEMPEST Personnel Development Program Support
    • Participated in rewrite of COMDTINST TEMPEST manual
  • Achieved ATO for USCG Bertholf, resolving 496 discrepancies
  • Developed more than 100 C&A packages for USCG systems
  • Built USCG C&A process for virtualized environment
  • Wrote and standardized USCG firewall installation instructions and baseline configuration
  • Worked with TISCOM to achieve a USCG-wide ATO as a Computer Network Defense Service Provider (CNDSP)
  • Successfully transitioned from Certification and Accreditation (C&A) to DoD’s Risk Management Framework with its Assessment and Authorization (A&A) security processes, policies and best practices.

Aligning the Risk Management Framework with the System Acquisition Lifecycle provides our customer not only secure systems, but also an understanding of the system’s Total Cost of Ownership.
Securely connecting vital installations worldwide
The success of today’s military missions and federal agency initiatives rely on easily scalable and secure IT and communications systems — systems that can successfully withstand today’s brutally complex and ceaselessly evolving threat environment. Also, forces and agents around the world, operating far from their central commands, must be confident that if a breach of any type occurs, response, damage mitigation and remediation will return your enterprise to full operational resiliency with industry leading practices. Truestone offers a complete array of services and solutions designed to meet these critical obligations while driving streamlined operations, escalating efficiencies and lowering costs.
On-shore, Off-shore, and Undersea
From offshore oil rig inspection crews and missile ranges on remote islands, through IT and communications systems on U.S. Navy carriers and Coast Guard vessels, Truestone has proven it continually delivers the high-end technology services and solutions that keep missions moving forward — anywhere in the world. Our teams have specialized experience in satellite, terrestrial, and undersea communications systems including design and build-out of infrastructure, managing installations and augmenting and upgrading systems, circuit work and provisions.

We provide proven expertise across the entire spectrum of IT and communications systems operations — from Initiation, Design, and Implementation, through Operations and Maintenance, to final system Disposal. Where appropriate, Truestone utilizes the Agile methodology, an iterative approach to system and software development allowing us to work smarter and deliver critical functionality sooner while continually meeting the rigorous and changing requirements of a customer’s mission.
The Truestone Advantage
Truestone’s IT and cyber security capabilities have and will continue to earn the trust of today’s most demanding and high-visibility Department of Defense (DoD) and Federal Civilian customers at installations across the globe — trust that can be earned only with fierce customer commitment and exceptional program performance. This is the Truestone advantage.

IT and Communications

  • Complete System Development Life Cycle (SDLC) support
  • Enterprise and network operations
  • Server and systems administration
  • Desktop and work center support
  • Application development and management
  • Telecommunications infrastructure
  • Compliance
  • Mission and business applications, tools, portals, and web services

Cyber Security

  • TEMPEST Control Plans, Design, Inspection, and Certification
  • Assessment and Authorization (A&A)
  • Threat detection, network vulnerability management and continuous monitoring
  • Configuration Management
  • Data protection and encryption
  • Web and URL filtering
  • Protection services for networks, servers and desktops
  • Disaster Recovery/COOP