VSI Technologies maintains a formal Information Security Program governed by executive leadership with defined roles, responsibilities, and accountability structures.
VSI systems are built on a zero-trust security architecture where no implicit trust is granted to any user, device, or network segment regardless of location.
All VSI systems implement encryption standards meeting or exceeding federal requirements:
| Data State | Algorithm | Key Length | Standard |
|---|---|---|---|
| At Rest | AES-GCM | 256-bit | FIPS 140-2 Validated |
| In Transit | TLS 1.3 | 256-bit | NIST SP 800-52 Rev 2 |
| Key Management | RSA / ECDSA | 4096 / P-384 | NIST SP 800-57 |
| Hashing | SHA-256 / SHA-384 | — | FIPS 180-4 |
| Key Exchange | ECDH / DHE | P-256 or higher | NIST SP 800-56A |
All cryptographic modules are validated under FIPS 140-2 Level 1 or higher. See the FIPS 140-2 Attestation document for complete module listings and validation certificate numbers.
VSI implements comprehensive IAM controls aligned to NIST SP 800-63 Digital Identity Guidelines.
VSI maintains 24/7 security monitoring capabilities aligned to NIST SP 800-137 (Continuous Monitoring) and NIST SP 800-61 (Incident Response).
VSI personnel operate under physical security requirements appropriate to the engagement:
VSI personnel security program ensures trustworthy individuals handle government and sensitive client programs:
VSI implements ICT supply chain risk management (SCRM) aligned to NIST SP 800-161 and Executive Order 14017.
VSI cloud deployments are architected to government cloud security requirements:
VSI maintains a comprehensive vulnerability management and testing program:
VSI maintains the following current compliance attestations and certifications:
| Framework | Level/Status | Scope | Renewal |
|---|---|---|---|
| FedRAMP | Moderate Aligned | VSI Cloud Platform | Annual |
| SOC 2 Type II | Certified | All VSI Services | Annual |
| NIST 800-53 Rev 5 | Implemented | Government Deployments | Annual Review |
| CMMC 2.0 | Level 2 Aligned | DoD Programs | Triennial C3PAO |
| DISA STIG | Applied | All System Components | Per Release |
| FIPS 140-2 | Level 1+ Modules | All Cryptographic Functions | Per Module |