What the first 90 days look like, with the deliverables an agency keeps at each step.
Most federal evaluators have been told a deployment "takes a few weeks." That is rarely a useful number. This page walks the actual shape — week 1, week 2, month 1, month 2, and month 3 — with concrete artifacts at each step, the realistic edge cases that change the shape, and the SCIF / air-gap variant where it differs.
Week 1 — environment readiness
The week is procurement-side and network-side. CybrIQ has nothing installed yet. The agency confirms scope, identifies the host hardware, and prepares the read-only switch access.
- Scope confirmation. Which buildings, which VLANs, which switch families. One pilot building is typical scope; a single CUI enclave is typical scope for CMMC programs.
- Host hardware. A small Linux or Windows server for the External Scan Engine (ESE), and another for the main instance — both on agency-controlled hardware. Specs are light; the briefing call confirms the right size.
- SNMP credentials. Read-only SNMP v3 credentials, scoped to the switches in scope, prepared by the agency's network team.
- SSP boundary diagram. Initial draft of where CybrIQ sits in the authorization boundary, for the authorization team's reference.
Deliverable at end of week 1: a written environment-readiness checklist, signed off by the agency, that confirms install can begin.
Week 2 — install and first identification
Software install on agency hardware. ESE pulls its first read of the in-scope switches. The reference library begins identifying.
- Install. ESE and main instance installed on the agency's hardware. SSL between components, inside the agency network. No outbound vendor connectivity required.
- Reference library load. Initial library (signed package) installed. Library updates configured for the agency's chosen path: online (where allowed), staged via update server, or signed offline packages.
- First poll. ESE polls the in-scope switches at the default 30-second cadence. First Device DNA fingerprints generated.
- First identifications. Within hours: known device classes identified against the 750-million-device reference library. Unknown or low-confidence devices flagged for review.
Deliverable at end of week 2: a first inventory of every device on every in-scope port, with identification confidence, vendor, model class, MAC, VLAN, switch port, and last-seen timestamp.
Month 1 — baseline and tuning
The first month is where the deployment moves from "operating" to "in production for evidence." The agency baselines what is normal and tunes thresholds to that baseline.
- Authorization-list baseline. The agency reviews the inventory against the existing asset register and decides which devices are authorized for which VLANs. The result is a baseline policy.
- Threshold tuning. Default event volume is roughly one event per 100 ports per week in stable production; the agency tunes per VLAN where volume is noisier or quieter.
- SIEM integration. Syslog (RFC 5424) or REST feed to the agency's SIEM (Splunk, Sentinel for Government, QRadar, Elastic). Sample detection content delivered.
- NAC integration (if applicable). pxGrid / REST / context-server integration with the agency's NAC. Event payload aligned with the NAC's quarantine workflow.
- First Section 889 sweep. Full inventory matched against the covered-entity reference library; deviation report produced.
Deliverable at end of month 1: baselined authorization-list policy, deviation report, and SIEM/NAC integration in production.
Month 2 — evidence and reporting
Month two is when the deployment moves from "tuned" to "producing audit-grade evidence." Audit trail begins. POA&M references are prepared. Continuous-monitoring strategy is documented.
- Audit trail. Signed CSV / JSON exports — signed at the control plane with a SHA-256 hash — begin running on the cadence the agency selects (typically weekly or monthly).
- Controls-mapped evidence pack. NIST SP 800-53 Rev. 5 controls (CM-8 family, SI-4, SR-3, SR-11, IA-3, AC-19) mapped to the evidence the deployment now produces. The agency's SSP can reference this directly.
- CDM data feed (federal civilian). Field names aligned with HWAM expectations. The CDM dashboard sees more rows than it did before deployment.
- eMASS package contribution (DoD). Per-device records, deviation logs, signed audit-trail exports structured for direct attachment to the program's eMASS authorization package.
- Board / oversight reporting (where applicable). First monthly inventory + deviation summary in the format the agency's CIO or oversight committee reads.
Deliverable at end of month 2: first month of audit-grade evidence, controls-mapped, with the audit-trail format the agency's authorization team and assessors expect.
Month 3 — steady state and scale
Month three is the steady-state shape. The agency operates the deployment as part of routine continuous monitoring. CybrIQ's involvement narrows to library updates, product updates, and the quarterly check-in.
- Steady-state event volume. Around half an event per port per week at default thresholds in stable production. Volume is predictable; alert fatigue is the failure mode CybrIQ is built to avoid.
- Scale considerations. One ESE handles up to 500 switches. Larger deployments add ESEs without adding main instances; multi-site deployments add ESEs at each site.
- USB protection (optional, opt-in). If the agency added the optional workstation agent for USB-protection, month 3 is typically when the agent rollout reaches the steady-state population.
- Quarterly check-in. Library version review, product release review, tuning review, and any change-management items for the next quarter.
Deliverable at end of month 3: a steady-state continuous-monitoring deployment producing audit-grade evidence on the agency's selected cadence.
Variants that change the shape
- SCIF / air-gapped. Add roughly one week for the disconnected-environment operations brief and the approved-media path for library updates. Otherwise the install and tuning shape is the same.
- Multi-site. Each additional site adds one ESE install. The main instance is shared across sites if the agency's network design allows it; otherwise each site has its own.
- Older switch families. Where the in-scope switches do not expose modern LLDP/CDP or do not support SNMP v3, week 1 includes a network-team conversation about supplementary signal sources. Sometimes a network refresh has to precede.
- Active C3PAO assessment. CMMC L2 contractors going into an assessment compress the shape: install in week 1, tuning in week 2, evidence pack in week 3.
What does not change
Regardless of variant: customer-installed software on agency hardware, no vendor cloud in the path, read-only switch access via SNMP, no SPAN / mirror / inline taps, no agents on managed devices (USB-protection agent is optional, separate, and opt-in). The deployment posture sits inside the agency's authorization boundary the whole time.
Walk this timeline against your environment
30 minutes: we walk the 90-day shape against your scope, your authorization route, and your existing SIEM / NAC. The end of the call is a concrete week-by-week plan you can show your authorizing official.
Schedule briefing