NATO Communication and Information Agency’s Cyber Security Service Line provides services across a broad spectrum of:
For enquiries about engaging of our services, please contact NCI Agency Demand Management
NCI Agency Demand Management Customer Request Form
Catalogue Item |
Main Service Group |
Forensic Analysis |
Provision of resources to perform online (OCF) and stand-alone (SCF) computer forensics analysis. |
NCIRC TC RRT |
To provide resources, knowledge and coordination to support the deployment of the NCIRC Rapid Reaction Team. |
Cyber Security Incident Management |
COMSEC/COMPUSEC Incident /
Violation / Insecurity Investigation.
|
Internet Facing E-Mail Content Monitoring |
The provision of the ability to check all Inbound/Outbound Internet e-mail to ensure compliance with NATO and applicable local Security Polices; such checks include malicious code, executable content, encrypted content, SPAM, and Classified Data content. Outbound e-mail can be monitored either centrally by the NCIRC TC, or locally by appropriate IA Staff. |
Internet Web Site Monitoring |
The ability to centrally monitor customer's Internet-facing Web Sites for unauthorised changes and to take appropriate reporting/remedial actions. |
Host and Network Intrusion Detection & Prevention Monitoring |
Host
Intrusion Detection & Prevention Monitoring:
|
Gateway Security Services- Data Diodes, Firewalls, Guard Sevices, Mailguard and VPN Services. |
Gateway Security Services
provide a secure interconnection of different networks or network sections in
order to protect an organization’s key information. Includes Data
Diodes, Firewalls, Guard, Mailguard and VPN Sub-Services. |
Crypto Management and Logistic Support |
Cryptographic Device
Implementation |
CARDS, EKMS, NEKMS and DEKMS Services |
Provision of resources to
deliver the NATO wide accountability, receipt, transfer, supersession and
destruction of cryptographic keying material and equipment. |
Security Certificate Services |
Certificate Authority
Services for NS/MS, NU/NR and NMS
|
Data at Rest IA Services |
Provision of NATO Off Line Crypto Equipment (NOLCE) keying Authority. Distribution and keying of all NATO Offline systems (Eclypt, SIR, Flagstone, etc.). |
Cyber Security OPCEN Help-Desk (Ext 6666) |
Provision of a 24/7 presence of specialists to give advice on potential cyber security incidents (and appropriate escalations as required), cryptographic equipment installation, configuration, keying, operation, trouble shooting and related technical or engineering issues, production of user configuration data sheets and user documentation for IP encryption devices. |
Cyber Security Support to Exercises |
Provide CS SL exercise support activities to include duties as SPOC for exercise coordination, planning, resourcing and execution; exercise participation activities and exercise control activities. |
Cyber Security Communications Service |
Bulletins (inc NIMBL), portals
and other communications with Cyber Security communities if interest. |
On-Site Vulnerability Assessment (Level 1-4) and Remediation |
Level 1 Assessment:
|
Online Vulnerability Assessment and Remedation |
Provision of Enterprise On-Line
Vulnerability Assessment resources to carry out continuous and dynamic
evaluations / audits of CIS infrastructures/systems to identify any
vulnerabilities in Software or configurations and to provide detailed reports |
Website Assessment |
Provision of resources to assess NATO Internet facing Web sites for security mis-configuration, vulnerabilities and coding bad practices. |
Limited Technical Security Inspections |
Provision of Limited Technical
Security Inspection at locations utilising: |
Crypto Compliance Support |
Crypto Logistic Support and
Maintenance Inspections:
|
TRANSEC Vulnerability Assessment and Awareness |
TRANSEC Vulnerability
Assessment: Provision of real time monitoring of an organisation's non
secure communications (GSM, analogue, digital and VoIP), with the purpose of
presenting realistic and effective countermeasures to limit the disclosure of
intelligence information to unauthorised personnel/agencies. |
TEMPEST/ EMSEC Assessments |
TEMPEST Facility Zoning: |
Cyber Security Awareness, Outreach and Visits Coordination |
Staffs, Coordinates and Maintains a programme of visits (both in and out of the SL) in order to support CS SL development and, where appropriate, broader NATO Cyber Security aims. Encourages liaison and information sharing through outreach programmes and distribution of regular Cyber Security reporting, including Vulnerability Assessments and Cyber Sitreps. Planning, coordination and execution of multi Branch CS SL level visits and provision of advice to Branch level visits, as required. Liaison with SHAPE to facilitate appropriate security pass provision for visitors. Outreach, including through Cyber Sitreps, briefings, portals and other information campaign activities. |
Service Level Management |
Management of the CS SL contribution to NCIA Customer and Service Catalogues. Acting as a source of expertise and single point of entry for CS SL Service Level Management activities including catalogue and SLA reviews, including providing expertise in the formation of metrics and KPIs. |
Business Continuity Planning Cyber Security Consultancy |
Create and conribute to contingency plans for the continued operation of a CIS when a disaster or other serious incident occurs. |
Cyber Security Design Services |
Design CISs that are able to
adapt to changing conditions in order to accomplish appropriate levels of CIS
Security. Incorporates Vulnerability Assessment services as
required. Adopt or develop CIS Security designs that can be implemented
efficiently and that fulfil CIS Security requirements. Derive adequate CIS
Security requirements and measures for systems or networks by valuating
assets in the presence of known threat environment and vulnerabilities. It
includes the analysis the security risk induced by the implementation of a
new capability, a change to an existing one or systems that are delivered and
are about to go operational. May include provisioning of Value analysis
(potentially offered separately). Value analysis comprises the identification
and estimation of the value to the business or mission of information
processed, stored, or transmitted by the CIS, the services provided by the
CIS, and the CIS itself. May include the conduct of dedicated Vulnerability
Analysis to determine the susceptibility of computer systems, networks, or
technologies to support Capability Development. |
Cyber Security Configuration Support |
Provision of security configuration settings for in-use and future NATO Approved CIS Applications software and Networking devices and Operating Systems software. Provision of configuration guidance for the securing of Boundary Protection devices, to include the approval of information flows over those devices as part of the configuration change process or firewall rule base change request process. |
CIS Protection Support |
Provision of guidance for the implementation, configuration and management of NATO Enterprise-wide endpoint security software. |
CIS Project Cyber Security Research and Consultancy |
Cyber Security Consultancy
|
CIS Security Data Mining and Business Intelligence |
Provision of non real-time, non-investigation-related CIS Security Data Analysis for strategic trend projection. This includes business development screening of existing services for possible expansion. |
CIS Components and Supply Chain Trustworthiness Analysis |
|
Cyber Security Project Management |
Conduct and management of projects and programmes according to PRINCE2 methodology. This service includes the definition of acquisition requirements and contracting strategy, followed by a competitive outsourcing to industry from the 28 NATO nations. It includes as well partnering with industry to ensure that the latest, state-of-the-art technology is implemented in a coherent and cost-effective way. |
Cyber Risk Assessment Services |
Risk Communication &
Education |
Cyber Security Architecture Services |
Definition of security
focussed mission and NCI Agency enterprise objectives, expectations, and
responsibilities.
|
Cyber Security Policy Support |
Support the development and maintenance of technical NATO Directive and Guidance documents, and review of Cyber Security/Information Assurance/Cyber Defence related documentation. This covers both documentation through the NOS Roadmap as well as any supporting documents in NATO’s regulatory security framework. Support to NATO Policies' and high-level Directives' Development. This includes NATO Security Policy, NATO Information Management, NATO Cyber Defence Policy and all applicable Enclosures. |
Cyber Security Education and Training Support Services |
Provide technical and policy aspects of guidance on Cyber Security Education and Training guidance. |
Security Accreditation Support Services |
Security Accreditation
Preparation and Documentation (New System
s) |
Cyber Security Tool Selection |
Development of guidance in the selection of specific CIS security tools. Support and advice on Information Assurance products evaluation and certification. This service may support the maintenance of the NATO Information Assurance Product Catalogue (NIAPC). |