// Security Documentation

Security Policy

EFFECTIVE DATE: JANUARY 1, 2025  •  LAST UPDATED: 2025

⚠️ IMPORTANT NOTE

Security implementations are customized based on each client's specific requirements, project scope, and budget. The security controls and compliance frameworks listed below represent our capabilities and the standards we can align with — not a guarantee that every project includes all listed controls. Each engagement is scoped individually, and security measures are priced according to the level of implementation required. We work with clients to determine the appropriate security posture for their unique needs, threat model, and compliance obligations.

Darkbloom Industries™ is committed to delivering software and systems built to the highest security standards available in the commercial and defense sectors. This Security Policy describes the frameworks, standards, and practices we are capable of implementing across client engagements, as well as the security posture of our own infrastructure.

Note: Darkbloom Industries™ delivers audit-ready, standard-aligned implementations. We are not a certified CMMC assessment organization (C3PAO) and do not perform official third-party certification assessments. Our deliverables are designed to satisfy the requirements of each listed standard, enabling your organization to pass certification audits when those standards are scoped into your project.

1. Compliance Framework Alignment (Capabilities)

The following frameworks represent the standards we can align with. The specific controls implemented for any given project are determined by client requirements, project scope, and budget. Not all projects require or include every framework listed below.

Standard / FrameworkScopeAvailability
NIST SP 800-171CUI Protection / 110 Controls● AVAILABLE UPON SCOPE
CMMC Level 2DoD Supply Chain / 110 Practices● AVAILABLE UPON SCOPE
NIST SP 800-218 (SSDF)Secure Software Development● AVAILABLE UPON SCOPE
NIST SP 800-207Zero-Trust Architecture● AVAILABLE UPON SCOPE
FIPS 140-3Cryptographic Module Validation● AVAILABLE UPON SCOPE
OWASP Top 10Web Application Security● AVAILABLE UPON SCOPE
OWASP MASVSMobile Application Security● AVAILABLE UPON SCOPE
SOC 2 Trust PrinciplesAvailability, Confidentiality, Security● AVAILABLE UPON SCOPE
DISA STIGsSystem Hardening Baselines● AVAILABLE UPON SCOPE

2. Cryptography Standards (Optional)

When cryptographic implementations are required and scoped into a project, we utilize FIPS 140-3 validated modules and algorithms:

Note: The level of cryptographic implementation is determined by project requirements and budget. Not all projects require FIPS-validated cryptography.

3. Access Control & Identity (Configurable)

All systems and applications can be designed with a least-privilege, identity-centric access model. The specific controls implemented are based on client needs:

4. Secure Development Lifecycle (SDLC)

We follow NIST SP 800-218 (SSDF) practices across all development engagements. The depth of implementation varies based on project scale and security requirements:

5. Monitoring & Incident Response (Optional)

The following monitoring and response capabilities can be implemented based on project requirements and budget:

6. Supply Chain Security (Optional)

7. Website Security (This Site)

The Darkbloom Industries™ website itself is secured with:

8. Vulnerability Disclosure

If you discover a security vulnerability in our website or any Darkbloom Industries™ deliverable, we encourage responsible disclosure:

9. Scope & Pricing Considerations

Security is not a one-size-fits-all solution. Each project is unique, and security controls are implemented based on:

We provide transparent, itemized security options during the scoping phase so clients can select the level of security that aligns with their requirements and budget. No security features are implemented without client approval and clear scope definition.

10. Limitations

Darkbloom Industries™ does not currently hold a Facility Clearance (FCL) or operate a SCIF. We do not accept classified work under SAP/SAR programs at this time. For CUI-level (Controlled Unclassified Information) work under NIST 800-171 / CMMC Level 2, we can operate as a compliant subcontractor under a cleared prime contractor's security umbrella when that scope is contracted.

We will always be transparent about our current capabilities and will never overstate our credentials or compliance status.

11. Contact

For security inquiries, compliance consultations, or to request a Capabilities Statement: