Skip to Content

FISMA Compliant Hosting

Intellica Corporation is a leading provider of secure databases and managed hosting services, with over 10 years of experience delivering enterprise applications in a secure FISMA, HIPAA and FedRAMP compliant environment.

Our systems have undergone stringent government testing and scanning and have earned an Authority to Operate (ATO) and because HIPAA falls under the FISMA law, your system will be protected under the same stringent rules. Our security, flexibility and reliability is what keeps our customers coming back year after year.

For Intellica, web accessibility (section 508) is about allowing people with disabilities to have access to the same information that people without disabilities have. For this reason all applications that we develop, are or are in the process of being fully Section 508 compliant.
Our systems infrastructure includes all the necessary automated tools required to maintain a Federal system in compliance with NIST SP 800-53 r4. All of our security policies have been audited and comply with current Federal security standards.

Every new system operating within the federal government, whether hosted within the government's firewalls or at our datacenter, will require an Authorization to Operate (ATO). Our security team, utilizing NIST Special Publications and Interagency Reports, provides guidance on recommended security controls for specific technologies and sector-specific applications. Employing this technology and using a policy-neutral security control catalog such as the NIST SP 800-53 has the following benefits:

1. Allows us to focus on the security capabilities required for our customer's mission and business success and more importantly, the protection of our customer's information.

2. Allows us to analyze each security control for its applicability to specific technologies, environments of operation, missions and business functions, document them well and have them delivered to our customers as part of our services.

3. As part of the tailoring process for your secure Federal system, utilizing technology and a policy neutral security control catalog such as the NIST SP 800-53 allows our security team to specify security policies for security controls that have variable parameters.

The specialization of security plans using the tailoring guidance and overlays, together with a robust set of technology and policy-neutral security controls, promotes cost-effective, risk-based information security for organizations in any sector, for any technology, and in any operating environment. As part of the ATO process, we will develop all the required documentation including all the security policies to maintain and manage the following controls:

  • Access Control
  • Media Protection
  • Awareness and Training
  • Physical and Environmental Protection
  • Audit and Accountability
  • Planning
  • Security Assessment and Authorization
  • Personnel Security CM Configuration Management
  • Risk Assessment
  • Contingency Planning
  • System and Services Acquisition
  • Identification and Authentication
  • System and Communications Protection
  • Incident Response
  • System and Information Integrity
  • Maintenance
  • Program Management