Mission-network device visibility for IL5/IL6, SCIF, and air-gapped environments.
Defense and IC environments operate under tighter constraints than federal civilian. A vendor cloud is not acceptable. A vendor tunnel is not acceptable. A vendor presence on the mission network is not acceptable. CybrIQ ships as software the agency or program installs and operates entirely — no cloud, no tunnel, no inbound vendor access — which is the only deployment shape that fits IL5/IL6, SCIF, and disconnected enclaves from the start.
Deployment posture for DoD / IC
The posture below is what a DoD authorization team, IC accreditor, or DAO will ask about first. We name it explicitly because nothing else matters until these are confirmed.
Impact-level fit
DoD impact levels are environments, not products. CybrIQ is software the program runs in whatever environment the program operates in. The fit by impact level:
- IL4 (CUI). CybrIQ deploys on program-owned hardware in IL4-authorized environments. No vendor-side dependency.
- IL5 (CUI / National Security Systems). Same deployment shape. Customer-installed, no vendor cloud, no vendor connectivity. The authorization boundary is the program's, not CybrIQ's.
- IL6 (classified up to SECRET). CybrIQ deploys in air-gapped or domain-isolated configurations. Reference-library updates move via approved-media process. The IL6 deployment briefing adds about a week for the disconnected-environment operations brief.
Authorization-side reference
- eMASS package contribution. CybrIQ output is structured for direct attachment to eMASS authorization packages — per-device records, deviation logs, signed audit-trail exports.
- cATO support. Continuous-monitoring evidence aligned with the DoD CIO's continuous-authorization-to-operate guidance. See continuous-monitoring evidence.
- RMF controls cited. NIST SP 800-53 Rev. 5 — CM-8 family, SI-4, SR-3, SR-11, IA-3, AC-19. Full mapping in the control inheritance matrix CSV.
- STIG alignment. Available on request — relevant DISA STIG categories are walked in the briefing.
CMMC for the defense industrial base
Defense contractors handling Controlled Unclassified Information operate under CMMC 2.0 Level 2. The CMMC page walks the specific control evidence (CM.L2-3.4.1, CM.L2-3.4.2, and adjacent). CybrIQ supplies the device-discovery evidence the C3PAO assessor asks for; the contractor maintains the SSP and the POA&M.
Section 889 in defense contexts
NDAA Section 889 applies to defense as much as federal civilian. The Section 889 page walks the Layer-1 fingerprint approach that catches relabeled covered hardware in defense environments — building systems, AV in briefing rooms, base operations gear. For defense audiences specifically, the briefing call covers contractor-provided equipment patterns the IG has flagged in recent oversight findings.
FedRAMP, DoD authorization, and what we do hold
CybrIQ holds no FedRAMP status today — no Marketplace listing, no "In Process" designation, no sponsoring-agency arrangement (see FedRAMP posture). For DoD environments, this is generally not a gating concern — the customer-installed deployment shape sits inside the program's existing RMF/STIG authorization boundary rather than relying on a product-level FedRAMP listing.
What CybrIQ does hold for the authorization team's reference: SOC 2 Type II (AICPA Trust Services Criteria), ISO/IEC 27001, ISO 27017 (cloud security), and ISO 27018 (PII in cloud) certifications. Reports and certificates are available on request under MNDA. Product-side controls: TLS 1.2 in transit, AES-256 at rest, MFA, SAML 2.0 SSO, RBAC, regular third-party penetration testing, and DISA STIG vulnerability remediation. Not held: DoD IL4 / IL5 / IL6 as product-level authorizations, NIAP Common Criteria, FIPS 140-3.
Procurement vehicles for defense
Carahsoft is the federal channel partner — most defense vehicles (SEWP, CIO-SP3, 2GIT) are reachable via Carahsoft's existing prime positions. Direct PO is available for pilot scoping and below-threshold acquisitions. See Contract vehicles for the full routing.
Schedule a DoD / IC briefing
30 minutes: we walk the deployment posture against your specific impact level, authorization process, and contract-vehicle preference. Cleared-personnel briefings available where the program profile requires them.
Request defense briefing