A Cloud-Native Product's Guide to IL2, IL4, IL5, IL6, and Top Secret Authorization
Ryan Gutwein
622+ controls. 20 families. 5 impact levels. 11 steps to Provisional Authorization.
622+ controls. 20 families. 5 impact levels. From FedRAMP baseline to Provisional Authorization. The visual guide.
The DoW CC SRG Rev 5 layers DoW-specific requirements on FedRAMP baselines across IL2, IL4, IL5, IL6, and Top Secret (JWICS).
IL5 now mandates NSS controls from CNSSI 1253 per CNSSP-32. A 37% increase over IL4 High. FedRAMP High is the mandatory floor. There is no longer a path to IL5 using FedRAMP Moderate.
Source: CC SRG v1r6, Section 5.1The CC SRG formally defines IL2 through IL6. However, Top Secret / SCI workloads operate on JWICS (Joint Worldwide Intelligence Communications System) under IC-directed authorization, applying IL6 controls plus a classified overlay. JWICS environments require SCIF-grade facilities, TS/SCI-cleared personnel, and physical separation from all unclassified and non-federal infrastructure.
Your DevSecOps pipeline lives in a separate CSP-owned cloud account. Signed artifacts deploy into agency-owned accounts (USAF, Army, DISA, Navy). Same architecture, any IL.
DISA-operated boundary. Plan for East + West redundancy. Circuit provisioning takes months. Start early.
Non-negotiable at IL4+. Log replication, real-time streaming, and SOC coordination with JFHQ-DoWIN. Start MOU 6 months out.
Government-appointed by the Mission Owner's AO. Manages root credentials and privileged access. Not your cloud admin.
This architecture applies across any FedRAMP-authorized CSP. Terminology maps to equivalent services on each platform.
Per DoW Cloud Connection Process Guide v3 (December 2025). PA is granted to the CSO, not the CSP.
SSP, SSP Addendum, SAP, Architecture Diagram, Onboarding Questionnaire, SNAP/PPSM Registration
Not all families scale equally. Some nearly double from IL4 High to IL5.
| Control Family | Total | IL2 | IL4M | IL4H | IL5 | IL6 |
|---|---|---|---|---|---|---|
| Access Control | 65 | 43 | 43 | 50 | 61 | 65 |
| Sys & Comms Protection | 67 | 33 | 33 | 38 | 59 | 67 |
| Sys & Services Acquisition | 70 | 26 | 26 | 29 | 69 | 70 |
| Sys & Info Integrity | 54 | 24 | 24 | 35 | 52 | 54 |
| Config Management | 43 | 27 | 27 | 34 | 43 | 43 |
| Audit & Accountability | 37 | 17 | 17 | 27 | 35 | 37 |
| Identification & Auth | 37 | 27 | 27 | 30 | 37 | 37 |
| Contingency Planning | 35 | 23 | 23 | 35 | 35 | 35 |
| Incident Response | 33 | 17 | 17 | 24 | 33 | 33 |
| Physical & Environmental | 33 | 19 | 19 | 26 | 28 | 33 |
| Supply Chain Risk Mgmt | 22 | 12 | 12 | 14 | 22 | 22 |
| Maintenance | 23 | 11 | 11 | 13 | 20 | 23 |
| Risk Assessment | 18 | 11 | 11 | 13 | 17 | 18 |
| Security Assessment & Auth | 20 | 14 | 14 | 16 | 20 | 20 |
| Personnel Security | 16 | 11 | 11 | 12 | 14 | 16 |
| Media Protection | 15 | 7 | 7 | 10 | 10 | 15 |
| Awareness & Training | 12 | 6 | 6 | 6 | 12 | 12 |
| Planning | 11 | 7 | 7 | 7 | 11 | 11 |
| DoW General Readiness | 10 | 10 | 10 | 10 | 10 | 6 |
CNSSI 1253 overlays add controls based on the data your system processes. These are additive to your IL baseline.
An IL5 system processing CUI + PHI could face 588 baseline controls plus overlay deltas. Your SSP must document which overlays apply.
Personnel investigation requirements escalate sharply by Impact Level. Source: CC SRG v1r6, Table 5-1.
| Requirement | IL2 | IL4 | IL5 | IL6 | Top Secret |
|---|---|---|---|---|---|
| Privileged Access | Tier 1 / NACI | Tier 3 / MBI | Tier 3 / Secret | Tier 5 / TS/SCI | Tier 5 / TS/SCI + NDA |
| Non-Privileged | N/A | Tier 1 | Tier 3 / Secret | Tier 5 / TS/SCI | Tier 5 / TS/SCI + NDA |
| Citizenship | No requirement | U.S. Citizens | U.S. Citizens | U.S. Citizens | U.S. Citizens |
| Data Location | Any | CONUS | CONUS | CONUS | SCIF / Cleared facility |
Binary requirements. You pass or you don't. Evaluated before a single control is assessed.
DoW cloud authorization is a product architecture decision, not a compliance checkbox.
Data sourced from NIST 800-53 Rev 5 · DoW CC SRG v1r6 (Dec 2025) · Cloud CPG v3 (Dec 2025) · CNSSI 1253

A framework mapping 5 ATO pathways x 9 readiness levels for dual-use companies navigating FedRAMP, DoW RMF, Impact Level, cATO, and CMMC authorization.
Read blog >>The ATO process was designed to manage risk. Instead, it has become the risk. Delaying deployments by 12 to 18 months.
Read blog >>A practical guide to architecting a CI/CD pipeline across the authorization boundary for FedRAMP, DoW IL, and agency ATO environments.
Read blog >>See how Optimal can accelerate your path to ATO while strengthening your security posture.