Your One Stop IT Security Shop
Cart 0

IT Security Consulting

Our Value


ALFTEL Systems offers a variety IT Security Services with specialization in Security Assessment and Compliance.

Understanding your security and compliance posture is the first step in information security assurance. When your IT team lacks the expertise, resources or bandwidth to manage your Security Assessment initiatives, the security professionals at ALFTEL Systems will step in and fill the gaps. Independent third party Security Assessments are the best strategy to objectively discover vulnerabilities in your infrastructure before any damage occurs. Our Security Assessment experts will put your IT environment to the test and develop a smart risk management plan uniquely tailored to your organization.

ALFTEL Systems will secure your information systems with established standard assessment methods and procedures, based on the Risk Management Framework (RMF) defined in NIST 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, Communications Security Establishment ITSG-33, IT Security Risk Management: A Lifecycle Approach, as well as other related standards and client-specific guidelines. Our assessors will determine if security controls are correctly implemented, operate as intended, and produce the desired outcomes to protect the security and integrity of your organizational IT Systems.

We maintain Government of Canada certified secure facilities in the greater Ottawa area and have cleared staff to support our work for federal and other regulated customers.

Contact us to discuss your IT Security Consulting needs.

Our Services


  • Security Assessment and Authorization (SA&A)
  • Certification And Accreditation (C&A)
  • Privacy Impact Assessment (PIA)
  • Threat Risk Assessment (TRA / HTRA)
  • Vulnerability Assessment (VA)
  • Security Gap Analysis
  • Product and Service Compliance

Our Expertise


  • Business Needs for Security (BNS)
  • Injury Assessment (IA)
  • Business Impact Assessment (BIA)
  • Security Classification & Categorization (SC&C)
  • Statement of Sensitivity (SOS)
  • Statement of Acceptable Risk (SOAR)
  • Statement of Residual Risk (SORR)
  • Baseline Security Requirements and Profile (BSP)
  • Security Requirements Traceability Matrix (SRTM)
  • Privacy Requirements Traceability Matrix (PRTM)
  • Threat and Risk Assessment Report (TRA)
  • Statement of Applicability (SOA)
  • Security Assessment Plan (SAP)
  • Security Concept of Operations (CONOPS)
  • Privacy Impact Questionnaire and Checklist (PIQ)
  • Privacy Assessment Plan (PAP)
  • Security Roles and Responsibilities Matrix (RACI)
  • Security Architecture (SA)
  • High Level Design and Security Controls (HLD)
  • Detailed Level Design and Security Controls (DLD)
  • Safeguard Implementation Plan (SIP)
  • Vulnerability Assessment Plan and Report (VA)
  • Security Test and Evaluation Plan and Report (ST&E)
  • Security Plan of Actions and Milestones (POAM)
  • Risk Register (RR)
  • Security Assessment Report (SA)
  • Business Continuity and Disaster Recovery Plan (BC/DR)
  • IT Security Policy Development (SP)
  • Incident Management Plan (IMP)
  • Physical and Personnel Security Assessment (PPSA)
  • Security Assessment Evidence Package (SEP)