Every finding has an action. Recall Agent (Claude Opus 4.7) drafts a plan against KEV-listed criticals and SLA breaches. Operator approves. Orchestration Engine executes against Hub, Spoke, and Edge Collectors.
Optimal hardens containers, host OS, and OT firmware against DISA STIG, CIS, and IEC 62443. Signs SBOM and MLBOM on every build. Watches every autonomous AI agent's identity, tools, data scope, and authority. Emits compliance evidence live, on every request. Runs in your Kubernetes cluster, never ours.
DISA STIG · SBOM · AI agents · Continuous evidence
The buttons below are the ones in the product today. The Recall Agent drafts, the Hardening Agent proposes, the artifacts ship signed. Operator approves. Audit trail records.
Every finding has an action. Recall Agent (Claude Opus 4.7) drafts a plan against KEV-listed criticals and SLA breaches. Operator approves. Orchestration Engine executes against Hub, Spoke, and Edge Collectors.
Failing DISA rule, Hardening Agent drafts a fix plan against the smallest possible change set. Dockerfile patch, Helm values delta, or host config diff. Fix text verbatim from DISA, plus operator actions inline.
Signed CycloneDX 1.6 for every container, and an MLBOM for every on-prem AI model. First-class artifacts, not a side report. Click the artifact, see the manifest, ship to the auditor.
Bundled XCCDF library, per-rule pass / fail / N-A from the Spoke scanner, fix text verbatim from DISA, plus operator actions inline. April 2026 release: Amazon Linux 2023, Kubernetes, Apache HTTPD 2.4 Unix, Microsoft Windows Server 2022. CIS and IEC 62443 ride the same channel.
Every autonomous agent's identity, tools, data scopes, memory scope, authority, and handoff edges. Full audit trail. Forensics on every action. Optimal already runs the model side (inventory, guardrails, MLBOM); Agents adds the orchestration layer above it. The category is forming around this; we ship it today.
Live HTML and JSON artifacts at compliance.gooptimal.io, re-emitted on every request from observed fleet state. Branded for the customer's audit. SOC 2, PCI DSS v4.0.1, HIPAA, ISO 27001, FedRAMP 20x KSI, IEC 62443. Not a quarterly export from a third-party SaaS.
The market is converging on a category sometimes called identity-aware agent harness, agent runtime security, AI control plane, agentic identity, or AI workflow governance. The label varies. The checklist doesn't.
Optimal already runs the model side: inventory, guardrails, MLBOM, prompt-injection and exfiltration screening. Agents adds the orchestration layer above it. The checklist below is what Optimal answers, per agent, today.
Your QSA arrives next quarter and asks for continuous evidence of CDE hardening. Your container scan reports are stale and live in three separate tools. Optimal ships the evidence as a product feature, refreshed on every request, branded for your audit. PCI DSS v4.0.1 ready out of the box.
OCR investigates a breach and your audit logs are scattered across CloudWatch, Splunk, and a screenshot folder. Optimal emits HIPAA Technical Safeguards evidence as a live feed your auditor reads directly, refreshed on every request. HITRUST and SOC 2 ride the same channel.
Your CJIS auditor reviews every system touching criminal-justice data and asks for continuous proof your vendors meet state policy. Optimal scans containers and cloud config against StateRAMP, CJIS v6.0, and FERPA-aligned access patterns. Evidence emits live, branded for your agency.
No SaaS data plane. No vendor cloud account holding your secrets. Commercial-cloud procurement, the way procurement actually buys.
$ helm install optimal/platform
Move at mission speed. Operate with evidence. Run the agents.