Built from the ground up with security at its core. Sovana HQ meets the most stringent security requirements for government, defense, and enterprise deployments.
Veteran-Owned Business
Multiple layers of protection to safeguard your critical security operations
Designed to support zero-trust security principles
Always authenticate and authorize based on all available data points including user identity, location, device health, service or workload, data classification, and anomalies.
Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection to secure both data and productivity.
Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to gain visibility, drive threat detection, and improve defenses.
Meeting rigorous government and industry security requirements
Sovana HQ implements controls aligned with NIST SP 800-53 Rev. 5, the security and privacy controls framework for federal information systems and organizations.
Key Control Families Supported:
Designed to support CMMC Level 2 and Level 3 requirements for defense contractors and organizations handling Controlled Unclassified Information (CUI).
CMMC Capabilities:
Sovana HQ is on the roadmap for FedRAMP authorization, implementing security controls required for cloud service providers serving federal agencies.
FedRAMP Alignment:
FISMA-ready architecture providing the security controls and processes required for federal information systems across all impact levels.
FISMA Compliance Features:
Full functionality in completely isolated, classified environments
Government and defense organizations often operate in classified environments that require complete network isolation. Sovana HQ is designed to function fully in these air-gapped environments without requiring internet connectivity.
Our air-gap deployment package includes everything needed for completely offline installation and operation. Contact our team for specific air-gap deployment requirements and procedures.
Request Air-Gap ConsultationRecommendations for maximizing security in your Sovana HQ deployment
Essential security practices for production environments
The frontend includes security hardening measures such as CSP headers, input validation, and bot detection. However, production deployment requires critical backend implementations including:
5 requests per minute per IP to prevent abuse
Server-side token generation and validation
All API endpoints must validate origin headers
Use environment variables for SMTP and API keys
See security-notes.md
in the deployment package for complete backend implementation requirements.
Our security team is ready to discuss your specific requirements and answer questions about compliance, certifications, and deployment options.