Six Core Modules
The security-compliance directory is organized into six self-contained modules. Each one implements a specific domain of federal security requirements with production-ready code, configuration, and tests.
Multi-Classification Framework
Bell-LaPadula enforcement across NIPR, SIPR, and JWICS networks. ML-based content classification at <50ms latency with intelligent caching and real-time data spillage detection. Cross-domain guard simulation for development environments.
35ms avg · 98.5% SLA · 87% cache hit rateCAC/PIV + OAuth 2.0 Authentication
Chained smart card authentication to OAuth PKCE across Advana, Databricks, Qlik, and Navy Jupiter. PKCS#11 middleware abstraction supporting ActivClient, OpenSC, CoolKey, and CACKey. AES-256-GCM token encryption at rest.
84 files · 4 platform adaptersRBAC + ABAC Access Control
Combined MAC, DAC, RBAC, and ABAC with DENY-first logic. PostgreSQL-backed with <100ms decisions at 1,000+ authorizations per second. JSON policy language for attribute-based rules with emergency access override procedures.
<100ms decisions · 1000+ authz/secAutomated Compliance Documentation
Generates System Security Plans (SSP), Security Assessment Reports (SAR), and Risk Assessment Reports (RAR) from live system data. Jinja2 templating with multi-format output: HTML, PDF, DOCX, and Markdown.
NIST 800-53 · FISMA · DoD 8500.01ETamper-Proof Audit System
Blockchain-inspired hash chaining with SHA-256, Merkle tree verification, and RSA-4096 digital signatures. WORM-compliant storage with 7-year retention. MITRE ATT&CK framework integration for threat detection.
100K events/sec · 7-year retentionSecurity Testing Pipeline
SAST across 8 languages, DAST for web applications and APIs. CVSS 3.1 + EPSS vulnerability scoring with CI/CD quality gates and automated remediation planning.
8 languages · CVSS 3.1 + EPSSStandards Compliance
Each module maps directly to one or more federal security standards. The table below shows which standards each module implements.
| Module | NIST 800-53 | FedRAMP | FISMA | DoD 8500 | STIG | FIPS 140-2 |
|---|---|---|---|---|---|---|
| Multi-Classification | AC-3, AC-4 | ✓ | ✓ | ✓ | ✓ | — |
| CAC/PIV + OAuth | IA-2, IA-5 | ✓ | ✓ | ✓ | ✓ | ✓ |
| RBAC + ABAC | AC-2, AC-6 | ✓ | ✓ | ✓ | ✓ | — |
| Compliance Docs | CA-2, CA-7 | ✓ | ✓ | ✓ | — | — |
| Audit System | AU-2, AU-12 | ✓ | ✓ | ✓ | ✓ | ✓ |
| Security Testing | SA-11, RA-5 | ✓ | ✓ | ✓ | ✓ | — |
How It Connects
The six modules form a pipeline. A user authenticates via CAC/PIV, receives an encrypted OAuth token, and every subsequent request passes through RBAC/ABAC authorization. Data access is gated by the multi-classification framework, and every decision is recorded in the tamper-proof audit trail.
End-to-end security pipeline. Authentication feeds authorization, which gates classified data access. Every decision is audited and feeds compliance reporting.
Explore the Code
Performance benchmarks: Classification at 35ms average (50ms SLA), RBAC decisions under 100ms at 1,000+ authorizations per second, audit ingestion at 100,000 events per second with sub-50ms write latency. All figures from the validation suites included in each module.
The full implementation is open source. Each module includes its own README, configuration examples, test suites, and deployment instructions.
Explore on GitHub →