Built to the controls federal assessors audit against.

Standards held. Self-audit posture published. Implementation depth under NDA. This page tells you what you need to verify the platform meets your procurement bar — without giving a competitor the topology to copy.

We operate in AWS GovCloud.

The same boundary federal agencies require. US-persons access controls. KMS keys that never leave GovCloud HSMs. No data transfer to commercial AWS regions.

What we hold. What we're building toward.

Item
Status
AWS GovCloud operating boundary
Yes
NIST 800-53 control baseline
Aligned to FedRAMP Moderate
FedRAMP authorization
Path documented; not yet authorized
CMMC L2 self-audit
Complete; findings and POA&M under NDA
OSCAL evidence emission
Native
FIPS-validated cryptography
Yes
Multi-framework crosswalk
CMMC L2 · FedRAMP Moderate · SOC 2 Type II · ISO 27001:2022
Continuous monitoring
First-class; closure tied to control families
Incident response
First-class; orchestrated to control families

By design. Available under NDA.

AWS account topology diagrams

Region-level deployment maps

Cross-account API layouts

Service-by-service architecture

Identity provider product names

Encryption library names or modes

Specific control-family-to-feature mappings

Internal data-model patterns

All of the above are discussed under NDA. Implementation depth that helps a buyer evaluate the platform is shared with qualified parties; implementation depth that helps a competitor clone the moat is not published.

CAC/PIV. MFA. One sign-in across the ecosystem.

CAC/PIV federation

DoD PKI smart-card authentication supported for federal operators.

MFA-enforced

Multi-factor authentication required on every operator portal.

Role-based access

Granular RBAC with roles scoped to organization and data classification. Least privilege enforced.

Findings and remediation plan published.
Available under NDA.

The full FORCE self-audit — including findings and the published remediation plan — is available to qualified parties under NDA. We don't market authorizations we haven't earned. We document the posture, publish the gaps, and ship the fixes.

Request Self-Audit Access →

Responsible disclosure welcomed.

Security researchers and assessors with concerns or disclosures should contact us directly. We respond within one business day.

chris@bigforgeone.com