Deep Dive | March 2026

Navigating DoW Impact Level Authorization

A Cloud-Native Product's Guide to IL2, IL4, IL5, IL6, and Top Secret Authorization

Ryan Gutwein

622+ controls. 20 families. 5 impact levels. 11 steps to Provisional Authorization.

CC SRG v1r6 + NIST 800-53 + CNSSI 1253 + SCCA + Cloud CPG v3
Deep Dive

Navigating DoW Impact Level Authorization as a Cloud-Native Product

622+ controls. 20 families. 5 impact levels. From FedRAMP baseline to Provisional Authorization. The visual guide.

Ryan Gutwein Optimal Labs / Iron Echelon CC SRG v1r6 (Dec 2025) · Cloud CPG v3 · CNSSI 1253
622+Controls
20Families
5Impact Levels
11Steps to PA

622+ Controls. Five Impact Levels. One Framework.

The DoW CC SRG Rev 5 layers DoW-specific requirements on FedRAMP baselines across IL2, IL4, IL5, IL6, and Top Secret (JWICS).

IL2
FedRAMP Moderate
345
IL4 Mod
FedRAMP Moderate
345
IL4 High
FedRAMP High + DoW
429 +84
IL5 NSS
CNSSI 1253 + NSS
588 +159
IL6 NSS
Classified + TEMPEST
618 +30
Top Secret
IL6 + Classified Overlay + JWICS
618+ +TS overlay
CC SRG v1r6. December 2025

IL5 now mandates NSS controls from CNSSI 1253 per CNSSP-32. A 37% increase over IL4 High. FedRAMP High is the mandatory floor. There is no longer a path to IL5 using FedRAMP Moderate.

Source: CC SRG v1r6, Section 5.1
Beyond IL6. Top Secret / JWICS

The CC SRG formally defines IL2 through IL6. However, Top Secret / SCI workloads operate on JWICS (Joint Worldwide Intelligence Communications System) under IC-directed authorization, applying IL6 controls plus a classified overlay. JWICS environments require SCIF-grade facilities, TS/SCI-cleared personnel, and physical separation from all unclassified and non-federal infrastructure.

Which Impact Level Do You Need?

What data will your product handle? CUI (Public-facing) CUI (Mission) CUI / NSS Classified SECRET Classified TS/SCI IL2 345 controls FedRAMP Moderate Multi-tenant OK IL4 429 controls FedRAMP High + DoW CAP + DoW PKI IL5 588 controls CNSSI 1253 NSS Dedicated infra IL6 618 controls CNSSI 1253 + TEMPEST SIPRNet classified Top Secret 618+ controls IL6 + Classified Overlay JWICS · TS/SCI +84 +159 +30 +overlay The IL4 to IL5 jump is not incremental. It's a fundamentally different posture.
IL2
IL4
IL5
IL6
Top Secret
Controls
345
429
588
618
618+
Baseline
FedRAMP Mod
FedRAMP High
CNSSI 1253
CNSSI 1253+
Level 6 + Classified Overlay
Separation
Multi-tenant
Logical
Physical
Physical
Physical + Air-gapped
Network
Internet
NIPRNet via CAP
NIPRNet via CAP
SIPRNet
JWICS
Location
Any
CONUS / DoW on-prem
CONUS / DoW on-prem
CONUS / DoW on-prem
Cleared / SCIF
Personnel
N/A
U.S. Citizens
Tier 3 / Secret
Tier 5 / TS/SCI
TS/SCI + NDA

SCCA: What Your Product Plugs Into

CSP DEVSECOPS ENVIRONMENT Separate IL-authorized cloud account. Owned by CSP Continuous Authority to Operate (cATO) · FIPS 140-2/3 · STIG-hardened runners Source Repo SAST / DAST Container Scan IaC Validation Image Builder Artifact Registry Hardened images · STIG baselines · Signed artifacts DEPLOYS TO: USAF Army DISA Navy Any IL2–TS env deploy signed artifacts TCCM GOVERNANCE BOUNDARY Gov-appointed privileged access & root credential management AGENCY-OWNED CLOUD ACCOUNT IL-authorized region · CONUS · DoW IP space · FIPS 140-2/3 validated · Any FedRAMP-authorized CSP VDSS Virtual Datacenter Security Stack Firewall L3–L7 WAF Web App FW IDS / IPS Detection Reverse Proxy TLS term. VPC Flow Logs Packet capture · NetFlow → CSSP DDoS mitigation · GeoIP · ACLs YOUR PRODUCT. MISSION OWNER VPC Cloud Service Offering (CSO) Compute VMs / Containers Database Relational / NoSQL Object Storage FIPS endpoint Auth / IdP DoW PKI · CAC Message Bus Queue / Stream Secrets Mgmt KMS · HSM Load Balancer Internal · TLS 1.2+ only VPN / Transit Gateway Cross-network peering · IPSec DoW IP space · CONUS only · FedRAMP High+ baseline · AES-256 at rest · FIPS endpoints inspected VDMS Virtual Datacenter Managed Services ACAS Vuln scanning HBSS Host security STIG Audit Compliance Patch Mgmt Automated SIEM Log agg. Correlation Alerting Config Management · IaC enforcement · Golden image compliance CSSP VPC Cybersecurity Service Provider Log Replication Cross-account sync Stream Ingest Real-time feeds Monitoring Metrics & alarms CSSP Agents Endpoint telemetry 24/7 SOC · IR coordination · JFHQ-DoWIN situational awareness CLOUD-NATIVE SECURITY SERVICES Continuous monitoring & compliance. CSP-agnostic equivalents CSPM Threat Intel Audit Logs Config Inspector IAM Data Class. audit logs VPC flow logs feeds mgmt findings DoW Users CAC / PKI auth NIPRNet Unclassified DoW CAP Cloud Access Point DISA-operated Internet Commercial (IL2) SIPRNet Classified (IL6) JWICS Top Secret / SCI Client VPN / ZTNA IPSec · OIDC · MFA DoW IL2 IL6 classified TCCM. Trusted Cloud Credential Manager Government-appointed · Root credentials · Privileged access · Not your cloud admin DoW network Inspected Audit feeds Deploy / user CI/CD Classified Internal CSO boundary
CSP vs Agency

Your DevSecOps pipeline lives in a separate CSP-owned cloud account. Signed artifacts deploy into agency-owned accounts (USAF, Army, DISA, Navy). Same architecture, any IL.

CAP

DISA-operated boundary. Plan for East + West redundancy. Circuit provisioning takes months. Start early.

CSSP VPC

Non-negotiable at IL4+. Log replication, real-time streaming, and SOC coordination with JFHQ-DoWIN. Start MOU 6 months out.

TCCM

Government-appointed by the Mission Owner's AO. Manages root credentials and privileged access. Not your cloud admin.

CSP-Agnostic

This architecture applies across any FedRAMP-authorized CSP. Terminology maps to equivalent services on each platform.

11 Steps from Contact to Connection

Per DoW Cloud Connection Process Guide v3 (December 2025). PA is granted to the CSO, not the CSP.

CSP / CSO Journey. Steps 1-9
01
Submit Initial Contact Form
Via DCAS portal to initiate DoW cloud registration
02
DoW Cloud Kickoff Meeting
Technical Exchange Meeting (TEM) with all stakeholders
03
JVT Reviews Artifacts & 3PAO Assessment
SSP, SAR, architecture diagram review
04
Initial Risk Review → IATT & CATC
Interim Authorization to Test and Cloud Authority to Connect issued
05
JVT Artifact Validation
Runs concurrent with Step 6
06
SCCA Connects CSO to CAP
Network connectivity established
07
DSAWG Review & Recommendation
Cross-service board reviews authorization package
08
DISA AO Issues PA
Provisional Authorization granted to the CSO
09
Sustainment & ConMon
Continuous monitoring, USCYBERCOM OPORD compliance begins
Mission Owner. Steps 10-11
10
C-ITP Registration
Mission Owner registers Cloud IT Project via SNAP
11
Mission Owner ATO
Authority to Operate. Mission system goes live
Required Artifacts

SSP, SSP Addendum, SAP, Architecture Diagram, Onboarding Questionnaire, SNAP/PPSM Registration

Where the Weight Falls

Not all families scale equally. Some nearly double from IL4 High to IL5.

Control Family Total IL2 IL4M IL4H IL5 IL6
Access Control654343506165
Sys & Comms Protection673333385967
Sys & Services Acquisition702626296970
Sys & Info Integrity542424355254
Config Management432727344343
Audit & Accountability371717273537
Identification & Auth372727303737
Contingency Planning352323353535
Incident Response331717243333
Physical & Environmental331919262833
Supply Chain Risk Mgmt221212142222
Maintenance231111132023
Risk Assessment181111131718
Security Assessment & Auth201414162020
Personnel Security161111121416
Media Protection1577101015
Awareness & Training126661212
Planning117771111
DoW General Readiness10101010106

Biggest Jumps: IL4 High → IL5

Sys & Services Acquisition (SA)
29 → 69
+138%
Sys & Comms Protection (SC)
38 → 59
+55%
Sys & Info Integrity (SI)
35 → 52
+49%

Controls Stack by Data Type

CNSSI 1253 overlays add controls based on the data your system processes. These are additive to your IL baseline.

303 NSS Overlay
249 CUI Overlay
212 Classified
138 PHI / HIPAA
108 Export Control
58 PII / Privacy
Cumulative Impact

An IL5 system processing CUI + PHI could face 588 baseline controls plus overlay deltas. Your SSP must document which overlays apply.

Who Can Touch Your System

Personnel investigation requirements escalate sharply by Impact Level. Source: CC SRG v1r6, Table 5-1.

Requirement IL2 IL4 IL5 IL6 Top Secret
Privileged Access Tier 1 / NACI Tier 3 / MBI Tier 3 / Secret Tier 5 / TS/SCI Tier 5 / TS/SCI + NDA
Non-Privileged N/A Tier 1 Tier 3 / Secret Tier 5 / TS/SCI Tier 5 / TS/SCI + NDA
Citizenship No requirement U.S. Citizens U.S. Citizens U.S. Citizens U.S. Citizens
Data Location Any CONUS CONUS CONUS SCIF / Cleared facility

10 Pass/Fail Gates Before Assessment

Binary requirements. You pass or you don't. Evaluated before a single control is assessed.

01
DoW PKI / CAC Authentication
02
DoW IP Addressing (DISA NIC)
03
U.S. Data Residency (CONUS)
04
Mgmt Plane Segregation
05
Personnel Requirements Met
06
CAP Private Connections
07
Internet Dependencies Documented
08
NIPRNet Portal Access
09
Backdoor Prevention
10
Defense in Depth

What This Means for Your Product

Targeting IL4

  • Start with FedRAMP High (429 controls)
  • Architect for CAP + DoW PKI from day one
  • Budget for CSSP engagement
  • Circuit provisioning takes months. Start early

Targeting IL5

  • Everything above + physically separated infrastructure
  • Full CNSSI 1253 NSS overlay (588 controls)
  • 24/7 SOC with CSSP coordination
  • Supply chain controls across vendor ecosystem

Targeting IL6

  • SIPRNet classified enclave
  • TEMPEST/EMSEC + continuous physical guards
  • 618 controls with classified data handling
  • DISA retains pen testing rights

Targeting Top Secret

  • Everything IL6 + JWICS network (not SIPRNet)
  • Level 6 + Classified overlay controls
  • SCIF-grade facilities. Physically separate from unclassified
  • All personnel require favorably adjudicated TS/SCI + NDA
  • IC-directed authorization. Separate from standard PA pathway

DoW cloud authorization is a product architecture decision, not a compliance checkbox.

Data sourced from NIST 800-53 Rev 5 · DoW CC SRG v1r6 (Dec 2025) · Cloud CPG v3 (Dec 2025) · CNSSI 1253

Continue Reading

Ready to Secure Your
Software Delivery?

See how Optimal can accelerate your path to ATO while strengthening your security posture.