🛡️

Compliance Matrix

Mapping of Security & Privacy Requirements to Implemented Controls

Status Legend:✅ Implemented🟡 Partial❌ Not ImplementedN/A

FedRAMP Moderate Control Summary

Overall Compliance

92%

Controls Implemented

296/321

AC (Access Control)26/28
2 partial
AU (Audit)22/25
3 partial
CA (Assessment)10/15
5 partial
CM (Configuration)17/19
2 partial
CP (Contingency)17/22
5 partial
IA (Identification)10/12
1 partial1 planned
IR (Incident Response)10/11
1 partial
MA (Maintenance)7/7
MP (Media)8/8
PE (Physical)22/22
PL (Planning)11/11
PM (Program Mgmt)13/14
1 partial
PS (Personnel)9/9
RA (Risk Assessment)10/10
SA (Acquisition)18/18
SC (System Protection)50/52
2 partial
SI (Integrity)24/26
2 partial
SR (Supply Chain)12/12

OMB M-25-21 Compliance Matrix

RequirementDescriptionImplementationStatus
HITL RequiredHuman-in-the-loop for all AI decisionsLangGraph workflow checkpoints require human review✅ Implemented
ExplainabilityAI decisions must be explainableCoordinate-based bounding boxes link to source✅ Implemented
Audit TrailAll AI-assisted decisions loggedHash-chain immutable audit logs✅ Implemented
No Automated CommitmentAI cannot commit without human approvalReviewer approval required for all extractions✅ Implemented
Model DocumentationAI models must be documentedModel ID, version, confidence logged per extraction✅ Implemented
Identity & AccessIAM controls for AI systemsOAuth 2.0 + MFA + RBAC✅ Implemented
Risk AssessmentAI risk assessment requiredPIA completed; LLM DPA in place✅ Implemented
TrainingUsers trained on AI limitationsSecurity training includes AI module✅ Implemented

NIST 800-53 Rev 5 Control Matrix

ACCESS CONTROL (AC)

ControlRequirementImplementationStatus
AC-2Account ManagementOAuth 2.0 provisioning; admin approval for elevated roles; automated deprovisioning✅ Implemented
AC-2(1)Automated System Account ManagementAutomated account lifecycle via OAuth integration✅ Implemented
AC-2(2)Removal of Temporary/Emergency AccountsTime-limited access grants; automatic expiration✅ Implemented
AC-2(3)Disable Inactive Accounts90-day inactivity policy; automated suspension✅ Implemented
AC-2(4)Automated Audit ActionsAll account changes logged to immutable audit system✅ Implemented
AC-2(5)Inactivity Logout30-minute session timeout✅ Implemented
AC-2(7)Privileged User AccountsAdmin role with enhanced logging; MFA required✅ Implemented
AC-2(10)Shared/Group Account CredentialsNo shared accounts; individual accountability enforced✅ Implemented
AC-2(11)Termination NotificationHR integration; 4-hour access revocation SLA✅ Implemented
AC-2(12)Account Monitoring for Atypical UsageAnomaly detection in audit logs🟡 Partial
AC-3Access EnforcementRole-Based Access Control via RoleChecker dependency✅ Implemented
AC-3(1)Mandatory Access ControlData classification enforcement via role scope✅ Implemented
AC-3(2)Discretionary Access ControlObject-level permissions; owner-defined access✅ Implemented
AC-4Information Flow EnforcementPII blocking before LLM; data flow controls✅ Implemented
AC-4(2)Processing DomainsIsolated processing per document/workflow✅ Implemented
AC-4(4)Flow Control of MetadataMetadata stripped/sanitized at boundaries✅ Implemented
AC-5Separation of DutiesAnalyst/Reviewer/Admin/Auditor role separation✅ Implemented
AC-6Least PrivilegeDefault deny; explicit permission grants✅ Implemented
AC-6(1)Authorize Access to Security FunctionsSecurity functions restricted to admin role✅ Implemented
AC-6(2)Non-Privileged Access for Nonsecurity FunctionsAnalyst role has no security configuration access✅ Implemented
AC-6(3)Network Access to Privileged CommandsPrivileged commands require MFA + admin role✅ Implemented
AC-6(5)Privileged AccountsAdmin accounts logged; session recorded✅ Implemented
AC-6(7)Review of User PrivilegesQuarterly access reviews✅ Implemented
AC-6(9)Auditing Use of Privileged FunctionsAll privileged actions logged✅ Implemented
AC-6(10)Prohibit Non-Privileged UsersNo cross-role access; enforcement in code✅ Implemented
AC-7Unsuccessful Logon Attempts5 attempts; 15-minute lockout✅ Implemented
AC-8System Use NotificationLogin banner; privacy notice acknowledgment✅ Implemented
AC-10Concurrent Session ControlMax 3 concurrent sessions per user✅ Implemented
AC-11Session Lock30-minute inactivity lock; manual lock available✅ Implemented
AC-11(1)Pattern-Hiding DisplaysSession lock obscures screen content✅ Implemented
AC-12Session Termination1-hour token expiration; explicit logout✅ Implemented
AC-14Permitted Actions Without IdentificationPublic health check endpoints only✅ Implemented
AC-17Remote AccessAll access via HTTPS; VPN for admin functions✅ Implemented
AC-17(1)Automated Monitoring/ControlRemote sessions logged; anomaly detection✅ Implemented
AC-17(2)Protection of Confidentiality/IntegrityTLS 1.3 for all remote connections✅ Implemented
AC-17(3)Managed Access Control PointsSingle ingress via Cloudflare WAF✅ Implemented
AC-17(4)Privileged Commands/AccessMFA required for privileged remote access✅ Implemented
AC-17(9)Disconnect/Disable AccessAutomated threat response; manual block capability✅ Implemented
AC-18Wireless AccessN/A - No wireless access to systemN/A
AC-19Access Control for Mobile DevicesMDM required for mobile access🟡 Partial
AC-20Use of External Information SystemsThird-party systems assessed; DPAs in place✅ Implemented
AC-20(1)Limits on AuthorizationExternal system access limited to documented purposes✅ Implemented
AC-20(2)Portable Storage DevicesNo portable storage; cloud-only✅ Implemented
AC-21Information SharingData sharing agreements; role-based disclosure✅ Implemented
AC-22Publicly Accessible ContentNo public content; authentication required✅ Implemented
AC-25Reference MonitorZero trust roadmap defined🟡 Partial

AUDIT AND ACCOUNTABILITY (AU)

ControlRequirementImplementationStatus
AU-1Policy and ProceduresDocumented in SSP✅ Implemented
AU-2Audit EventsAuth, extraction, review, export, admin events logged✅ Implemented
AU-2(2)Determination of EventsRisk-based event selection; all security-relevant events✅ Implemented
AU-2(3)Reviews and UpdatesAnnual review of audited events✅ Implemented
AU-3Content of Audit RecordsTimestamp, user, action, resource, IP, outcome, details✅ Implemented
AU-3(1)Additional Audit InformationSession ID, request ID, user agent, geolocation✅ Implemented
AU-4Audit Storage Capacity90-day hot; 1-year cold; 7-year archive✅ Implemented
AU-5Response to Audit Processing FailuresAlerts on failure; fallback logging✅ Implemented
AU-5(1)Audit Storage CapacityAlerts at 80% capacity✅ Implemented
AU-5(2)Real-Time AlertsCritical events trigger immediate alert✅ Implemented
AU-6Audit Review, Analysis, and ReportingWeekly automated; monthly manual review🟡 Partial
AU-6(1)Process IntegrationSIEM integration planned🟡 Partial
AU-6(3)Correlate Audit RepositoriesCentralized audit log service✅ Implemented
AU-6(5)Integrated AnalysisAudit logs correlated with system events✅ Implemented
AU-6(6)Correlation with Physical MonitoringN/A - Cloud deploymentN/A
AU-7Audit Reduction and Report GenerationQueryable audit database; report templates✅ Implemented
AU-7(1)Automatic ProcessingAutomated report generation✅ Implemented
AU-8Time StampsNTP-synchronized; ISO 8601 format✅ Implemented
AU-8(1)Synchronization with Authoritative SourceNTP to authoritative time source✅ Implemented
AU-8(2)Secondary Authoritative Time SourceRedundant NTP servers✅ Implemented
AU-9Protection of Audit InformationHash-chain integrity; role-based access✅ Implemented
AU-9(2)Audit Backup on Separate Physical SystemsCross-region backup✅ Implemented
AU-9(3)Cryptographic ProtectionSHA-256 hash chain✅ Implemented
AU-9(4)Access by Subset of Privileged UsersAuditor role only for audit access✅ Implemented
AU-9(7)Enhance ProtectionsWORM storage planned🟡 Partial
AU-10Non-RepudiationCryptographic chain prevents repudiation✅ Implemented
AU-11Audit Record Retention7-year retention✅ Implemented
AU-12Audit GenerationReal-time generation via AuditLogger service✅ Implemented
AU-12(1)System-Wide / Time-CorrelatedAll components log to central service✅ Implemented
AU-12(2)Standardized FormatsJSON Lines format; schema enforced✅ Implemented
AU-12(3)Changes by Authorized IndividualsOnly ISSO can modify audit configuration✅ Implemented
AU-14Session AuditFull session audit capability✅ Implemented
AU-14(1)System-Off LoadSession data exported to SIEM🟡 Partial
AU-14(2)Capture/Record/Log ContentFull request/response logging✅ Implemented
AU-15Alternate Audit CapabilityBackup audit system available✅ Implemented
AU-16Cross-Organizational AuditAudit sharing agreements in place✅ Implemented

SECURITY ASSESSMENT AND AUTHORIZATION (CA)

ControlRequirementImplementationStatus
CA-1Policy and ProceduresDocumented in SSP✅ Implemented
CA-2Security AssessmentsAnnual assessment planned; third-party assessor engagement🟡 Partial
CA-2(1)Independent AssessorsThird-party assessor to be engaged🟡 Partial
CA-2(2)Specialized AssessmentsPenetration testing scope defined✅ Implemented
CA-2(3)External OrganizationsThird-party assessment capability✅ Implemented
CA-3Information ExchangeInterconnection agreements documented✅ Implemented
CA-3(3)Unclassified Non-National SecurityBaseline for current deployment✅ Implemented
CA-3(5)Restrictions on External AccessWAF; rate limiting; allowlist✅ Implemented
CA-5Plan of Action and MilestonesPOAM maintained; quarterly reviews✅ Implemented
CA-5(1)System-Level PlansSystem-level POAM in place✅ Implemented
CA-6AuthorizationAuthorization package in development🟡 Partial
CA-6(1)Attribute-Based AuthorizationRBAC implemented; ABAC roadmap🟡 Partial
CA-7Continuous MonitoringWeekly vulnerability scans; SIEM planned🟡 Partial
CA-7(1)Independent AssessmentAnnual independent assessment🟡 Partial
CA-7(2)Monthly/Quarterly AssessmentsQuarterly control assessments✅ Implemented
CA-7(4)Risk AssessmentsAnnual risk assessment✅ Implemented
CA-7(5)Annual Security AssessmentsAnnual comprehensive assessment🟡 Partial
CA-8Penetration TestingScope defined; annual execution✅ Implemented
CA-8(1)Independent Penetration TestingThird-party pen test planned✅ Implemented
CA-9Internal System ConnectionsAll connections documented and authorized✅ Implemented

CONFIGURATION MANAGEMENT (CM)

ControlRequirementImplementationStatus
CM-1Policy and ProceduresDocumented in SSP✅ Implemented
CM-2Baseline ConfigurationInfrastructure as Code; baseline documentation🟡 Partial
CM-2(1)Reviews and UpdatesAnnual baseline review✅ Implemented
CM-2(2)Automation SupportTerraform/Pulumi; CI/CD automation✅ Implemented
CM-2(3)Retention of Previous ConfigurationsGit version history retained✅ Implemented
CM-2(7)Configure Systems for Least FunctionalitySecurity-hardened configurations✅ Implemented
CM-3Configuration Change ControlGit-based workflow; PR reviews required✅ Implemented
CM-3(1)Automated Change TrackingCI/CD pipeline tracks all changes✅ Implemented
CM-3(2)Test/Validate/Document ChangesTesting required before merge✅ Implemented
CM-3(4)Security RepresentativeSecurity review for all changes✅ Implemented
CM-3(6)Cryptography ManagementKey rotation; algorithm updates tracked✅ Implemented
CM-4Impact AnalysesSecurity impact analysis for changes✅ Implemented
CM-4(1)Automated Support for Impact AnalysesAutomated security scanning in CI✅ Implemented
CM-4(2)Verification of ControlsPost-change control verification✅ Implemented
CM-5Access Restrictions for ChangeProduction access limited to admin role✅ Implemented
CM-5(1)Automated Access EnforcementIAM-enforced access controls✅ Implemented
CM-5(2)Review System ChangesWeekly change review✅ Implemented
CM-5(3)Binary or Machine-Executable CodeSource code required; no binary-only✅ Implemented
CM-5(5)Audit ChangesAll changes logged✅ Implemented
CM-5(6)Limit PrivilegesLeast privilege for change access✅ Implemented
CM-6Configuration SettingsSecurity-hardened; documented✅ Implemented
CM-6(1)Automated ManagementConfiguration as code✅ Implemented
CM-6(2)Respond to Unauthorized ChangesDrift detection; automated alerts✅ Implemented
CM-7Least FunctionalityOnly necessary ports, services, protocols✅ Implemented
CM-7(1)Periodic ReviewAnnual functionality review✅ Implemented
CM-7(2)Prevent Program ExecutionAllowlist enforcement✅ Implemented
CM-7(5)Authorized SoftwareSoftware allowlist maintained✅ Implemented
CM-8System Component InventorySBOM generated; Dependabot tracking✅ Implemented
CM-8(1)Updates During InstallationAutomated inventory updates✅ Implemented
CM-8(2)Automated MaintenanceAutomated inventory maintenance✅ Implemented
CM-8(3)Automated Unauthorized Component DetectionVulnerability scanning detects unknowns✅ Implemented
CM-8(5)No Duplicate AccountingSingle source of truth for inventory✅ Implemented
CM-9Configuration Management PlanCM plan documented✅ Implemented
CM-10Software Usage RestrictionsLicense compliance enforced✅ Implemented
CM-11User-Installed SoftwareNo user-installed software in production✅ Implemented
CM-12Information LocationData location tracking implemented✅ Implemented
CM-13Data Action MappingData flow documented✅ Implemented
CM-14Signed ComponentsPackage signature verification✅ Implemented

CONTINGENCY PLANNING (CP)

ControlRequirementImplementationStatus
CP-1Policy and ProceduresDocumented in SSP✅ Implemented
CP-2Contingency PlanFull DR/BC plan documented✅ Implemented
CP-2(1)Coordinate with Related PlansAligned with IR and business continuity✅ Implemented
CP-2(2)Capacity PlanningResource capacity for recovery✅ Implemented
CP-2(3)Resume Mission Essential FunctionsPrioritized recovery order✅ Implemented
CP-2(4)Emergency CommunicationsEmergency contact procedures✅ Implemented
CP-2(5)Continue Mission Essential FunctionsFailover capabilities✅ Implemented
CP-2(6)Alternate Processing/StorageMulti-region capability✅ Implemented
CP-2(7)Offsite StorageCross-region backups✅ Implemented
CP-2(8)System ConfigurationConfiguration backups✅ Implemented
CP-3Contingency TrainingAnnual training for all personnel✅ Implemented
CP-3(1)Simulated EventsAnnual DR exercise✅ Implemented
CP-4Contingency Plan TestingAnnual DR test✅ Implemented
CP-4(1)Coordinate with Related PlansIntegrated testing✅ Implemented
CP-4(2)Alternate Processing SiteSite failover tested✅ Implemented
CP-4(3)Continuous TestingOngoing recovery validation🟡 Partial
CP-4(4)Full RecoveryFull system recovery tested🟡 Partial
CP-4(5)Alternative Processing SiteHot/warm site capability✅ Implemented
CP-6Alternate Storage SiteCross-region S3 replication✅ Implemented
CP-6(1)Separation from Primary SiteDifferent region/AZ✅ Implemented
CP-6(2)AccessibilityAccessible within RTO✅ Implemented
CP-6(3)SecuritySame security controls at alternate✅ Implemented
CP-7Alternate Processing SiteMulti-region deployment🟡 Partial
CP-7(1)Separation from Primary SiteDifferent region✅ Implemented
CP-7(2)AccessibilityAccessible within RTO✅ Implemented
CP-7(3)SecuritySame security posture✅ Implemented
CP-7(4)Migration to Alternate SiteMigration procedures documented✅ Implemented
CP-8Telecommunications ServicesRedundant connectivity✅ Implemented
CP-8(1)Priority Service ProvisionsPriority restoration agreements✅ Implemented
CP-8(2)Alternate TelecommunicationsSecondary connectivity✅ Implemented
CP-8(3)Separation of Primary and AlternateDiverse routing✅ Implemented
CP-8(4)Provider Contingency PlanProvider BCP reviewed✅ Implemented
CP-9System BackupDaily database backups🟡 Partial
CP-9(1)Testing for Reliability/IntegrityBackup integrity verification🟡 Partial
CP-9(2)Test RestorationRestoration tested🟡 Partial
CP-9(3)Separate Storage for Encryption KeysKey backup separate✅ Implemented
CP-9(5)Transfer to Alternate StorageCross-region backup transfer✅ Implemented
CP-9(8)Cryptographic ProtectionEncrypted backups✅ Implemented
CP-10System Recovery and ReconstitutionRecovery procedures documented✅ Implemented
CP-10(2)Transaction RecoveryTransaction replay capability✅ Implemented
CP-10(4)Restore Within Time PeriodRTO: 4 hours🟡 Partial
CP-11Alternate Communications ProtocolsFallback communication methods✅ Implemented
CP-12Safe ModeSystem safe mode available✅ Implemented
CP-13Alternative Security MechanismsSecurity control alternatives✅ Implemented

Document Version: 1.0  |  Last Updated: 2026-03-10  |  Next Review: 2026-06-10