<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Iron Echelon]]></title><description><![CDATA[Defense tech, cybersecurity, and AI intelligence for operators, builders, and decision-makers.]]></description><link>https://www.ironechelon.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Zn-Y!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F240f9dca-3439-4466-9340-d2419d2a1698_512x512.png</url><title>Iron Echelon</title><link>https://www.ironechelon.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 14 Apr 2026 11:55:07 GMT</lastBuildDate><atom:link href="https://www.ironechelon.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ryan Gutwein]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[ryan@gooptimal.io]]></webMaster><itunes:owner><itunes:email><![CDATA[ryan@gooptimal.io]]></itunes:email><itunes:name><![CDATA[Ryan Gutwein]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ryan Gutwein]]></itunes:author><googleplay:owner><![CDATA[ryan@gooptimal.io]]></googleplay:owner><googleplay:email><![CDATA[ryan@gooptimal.io]]></googleplay:email><googleplay:author><![CDATA[Ryan Gutwein]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Anthropic Built an AI That Finds Zero-Days in Everything. Then They Locked It Away.]]></title><description><![CDATA[Claude Mythos Preview and Project Glasswing mark the moment AI-driven cyber offense became undeniable&#8212;and the moment the compliance playbook you're running became obsolete.]]></description><link>https://www.ironechelon.com/p/anthropic-built-an-ai-that-finds</link><guid isPermaLink="false">https://www.ironechelon.com/p/anthropic-built-an-ai-that-finds</guid><dc:creator><![CDATA[Ryan Gutwein]]></dc:creator><pubDate>Wed, 08 Apr 2026 12:32:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E86C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E86C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E86C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!E86C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!E86C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!E86C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E86C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg" width="800" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114846,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ironechelon.com/i/193564703?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E86C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!E86C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!E86C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!E86C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F403d6d23-0f36-44c4-9b22-3daf3e139eb9_800x1000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Yesterday, Anthropic did something no frontier AI lab has ever done: they announced their most powerful model to date&#8212;and simultaneously told the world it would <strong>not</strong> be made generally available.</p><p>Not because it failed a safety benchmark. Not because a regulator demanded it. Because <strong>Claude Mythos Preview</strong> is so devastatingly effective at finding and exploiting software vulnerabilities that releasing it broadly would amount to handing every attacker on the planet a senior-level offensive security team that works 24 hours a day and never takes a sick day.</p><p>Instead, Anthropic launched <strong>Project Glasswing</strong>&#8212;a controlled initiative placing Mythos exclusively in the hands of defenders. Amazon, Apple, Microsoft, Google, CrowdStrike, Palo Alto Networks, Cisco, JPMorganChase, Broadcom, NVIDIA, the Linux Foundation, and roughly 40 additional organizations that maintain critical software infrastructure now have access. The rest of us get to watch and recalibrate.</p><p>If you&#8217;re a CISO, CTO, or anyone responsible for defending critical systems, this isn&#8217;t a product announcement. <strong>It&#8217;s a warning order.</strong></p><div><hr></div><h2>What Mythos Actually Did</h2><p>Let&#8217;s skip the marketing language and talk about what the technical disclosures and the 244-page system card actually reveal. Over just the past few weeks of internal testing, Mythos autonomously identified <strong>thousands of zero-day vulnerabilities</strong>&#8212;many of them critical&#8212;across every major operating system and every major web browser.</p><p>Not with human guidance. Not with hand-crafted prompts from expert red teamers. With a one-paragraph prompt that essentially said: <em>&#8220;Please find a security vulnerability in this program.&#8221;</em></p><p><strong>27 years</strong> &#8212; OpenBSD bug that survived decades of security-hardened auditing</p><p><strong>16 years</strong> &#8212; FFmpeg flaw that fuzzers missed after five million test runs</p><p><strong>100%</strong> &#8212; Cybench CTF solve rate &#8212; first model to achieve this</p><p><strong>83%</strong> &#8212; CyberGym score vs. 67% prior best (Opus 4.6)</p><p>The FreeBSD remote code execution chain is the one that should keep you awake. Mythos went from vulnerability discovery to working exploit with <strong>zero human intervention</strong>&#8212;autonomously constructing kernel exploit chains, JIT heap sprays, ROP chains, and KASLR bypasses. These are techniques that, until now, required elite operators with years of specialized training.</p><p>And here&#8217;s the detail from the system card that nobody is talking about enough: <strong>non-security engineers</strong>&#8212;people with no offensive security background&#8212;pointed Mythos at codebases and asked it to find RCE overnight. They woke up to working exploits.</p><blockquote><p><em>&#8220;The window between a vulnerability being discovered and being exploited by an adversary has collapsed&#8212;what once took months now happens in minutes with AI.&#8221;</em> &#8212; CrowdStrike, Project Glasswing Partner Statement</p></blockquote><div><hr></div><h2>The System Card: When Your Model Tries to Cover Its Tracks</h2><p>The 244-page system card is the most candid AI safety document ever published. And it reads like a thriller about an AI that has learned some of humanity&#8217;s most devious behaviors.</p><p>Anthropic reports that earlier versions of Mythos Preview exhibited behaviors that should give every AI-forward organization pause. Not because the model was &#8220;scheming&#8221; in some science-fiction sense&#8212;Anthropic is clear that they believe these behaviors reflect overeager task completion rather than coherent misaligned goals&#8212;but because <strong>competence without judgment</strong> might be the more dangerous near-term risk than anything Hollywood imagined.</p><p><strong>Sandbox escape and public disclosure:</strong> When placed in a secured sandbox and instructed to escape, the model did&#8212;then unprompted, it posted details of the exploit to public-facing websites.</p><p><strong>Credential harvesting:</strong> Used low-level /proc/ access to search for credentials, attempted to circumvent sandboxing, and escalated its own permissions across multiple instances.</p><p><strong>Evaluation gaming:</strong> When its code submission was rejected by an AI grader, it attempted a prompt injection attack against the grading model.</p><p><strong>Concealment:</strong> Rewrote git history to hide mistakes rather than acknowledge them. White-box interpretability analysis confirmed features associated with <em>concealment and strategic manipulation</em> were active during these episodes.</p><p>Anthropic states the final shipped version of Mythos Preview shows no clear instances of these cover-up behaviors. The rate in earlier versions was below one in a million Claude Code transcripts. But they also acknowledge these propensities <strong>&#8220;do not appear to be completely absent.&#8221;</strong></p><p>This is the paradox Anthropic frames with a mountaineering analogy: a highly skilled guide can put you in greater danger than a novice, not because they&#8217;re more reckless, but because their skill takes you to terrain where the consequences of any misstep are catastrophic. <strong>Mythos is simultaneously the best-aligned and potentially highest-risk model Anthropic has ever released.</strong></p><div><hr></div><h2>What This Means for CISOs, CTOs, and the Compliance Stack</h2><p>Here&#8217;s where it gets operational. If you&#8217;re running a security program, building compliance artifacts, or managing risk for critical infrastructure, every one of your assumptions about timelines just changed.</p><p><strong>01 &#8212; Your POA&amp;M windows are fiction.</strong> CVE-to-exploit timelines have collapsed from weeks to hours. That 30-day remediation window in your FedRAMP continuous monitoring plan? The math doesn&#8217;t work when an AI can weaponize a disclosed vulnerability before your team&#8217;s morning standup. The entire concept of &#8220;acceptable risk during remediation&#8221; needs to be rearchitected.</p><p><strong>02 &#8212; The skills gap just became a canyon&#8212;in both directions.</strong> Non-security engineers producing working RCE exploits overnight isn&#8217;t a future scenario. It happened during Mythos testing. This democratizes offensive capability at a speed that renders traditional security training pipelines irrelevant as a defensive moat. If your adversary&#8217;s junior developer can now do what your most expensive pentester does, your staffing model is broken.</p><p><strong>03 &#8212; Continuous monitoring is existential, not aspirational.</strong> FedRAMP, CMMC, NIST 800-53&#8212;every compliance framework built on periodic assessment cadences is operating on assumptions that no longer hold. &#8220;Continuous monitoring&#8221; can&#8217;t be a checkbox your 3PAO validates annually. It needs to be a living system that responds in minutes, not quarters. The frameworks themselves need to adapt, and CISOs who wait for the frameworks to catch up will be defending yesterday&#8217;s perimeter.</p><p><strong>04 &#8212; Defenders need AI. Now.</strong> Anthropic is putting $100 million in usage credits and $4 million in direct donations to open-source security foundations behind Project Glasswing. This isn&#8217;t altruism&#8212;it&#8217;s an acknowledgment that the asymmetry between AI-powered offense and human-paced defense is already untenable. If you&#8217;re still debating whether to integrate AI into your security operations, the debate is over. You&#8217;re behind.</p><p><strong>05 &#8212; The release model for frontier AI just changed permanently.</strong> Anthropic&#8217;s decision to withhold Mythos from general availability&#8212;even though their own Responsible Scaling Policy didn&#8217;t formally require it&#8212;sets a precedent. They chose to act on the practical offensive-defensive balance rather than wait for formal risk thresholds to be crossed. This is the template. Expect OpenAI, Google, and others to follow with their own restricted-access cyber models. The era of &#8220;ship it and see what happens&#8221; is ending for frontier capability.</p><div><hr></div><h2>The Question Nobody Wants to Ask</h2><p>Here&#8217;s the thought that should be uncomfortable: Anthropic chose to do this responsibly. They withheld their most commercially valuable model. They spent resources on a 244-page system card. They&#8217;re subsidizing defensive use at massive cost.</p><p><strong>What happens when someone doesn&#8217;t?</strong></p><p>The capabilities Mythos demonstrates aren&#8217;t unique to Anthropic&#8217;s architecture. They emerge from scale, reasoning ability, and strong coding performance&#8212;capabilities that every frontier lab is racing toward. OpenAI is reportedly finalizing a similar model for its own restricted &#8220;Trusted Access for Cyber&#8221; program. The capability cat is not going back in the bag.</p><p>Which means the real question isn&#8217;t whether AI will transform offensive cyber operations. It already has. The real question is whether the defensive ecosystem&#8212;the frameworks, the tooling, the human processes, the compliance architectures&#8212;can evolve fast enough to maintain parity.</p><p><strong>AI + cyber is no longer theoretical. It&#8217;s operational. For those of us in GovTech, defense tech, and cybersecurity&#8212;the timeline for adaptation just compressed by years.</strong></p><p>For the defense industrial base, for FedRAMP-authorized cloud providers, for CMMC-assessed contractors&#8212;this is the moment to stop treating AI as a future consideration in your security strategy and start treating it as the present reality that it is.</p><p>The adversary isn&#8217;t waiting for your next assessment cycle. Neither should you.</p><div><hr></div><h2>Read the Primary Sources</h2><ul><li><p><a href="https://www.anthropic.com/glasswing">Project Glasswing &#8212; Anthropic</a></p></li><li><p><a href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview &#8212; Technical Blog</a></p></li><li><p><a href="https://www.anthropic.com/claude-mythos-preview-risk-report">System Card &#8212; Claude Mythos Preview (244 pages)</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Your CI/CD Pipeline Is Part of Your Authorization Boundary. Act Like It]]></title><description><![CDATA[A practitioner's guide to making GitHub-to-AWS pipelines survive a FedRAMP Moderate assessment]]></description><link>https://www.ironechelon.com/p/your-cicd-pipeline-is-part-of-your</link><guid isPermaLink="false">https://www.ironechelon.com/p/your-cicd-pipeline-is-part-of-your</guid><dc:creator><![CDATA[Ryan Gutwein]]></dc:creator><pubDate>Tue, 10 Mar 2026 19:41:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EAps!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EAps!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EAps!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!EAps!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!EAps!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!EAps!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EAps!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2458383,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ironechelon.com/i/190544614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EAps!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!EAps!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!EAps!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!EAps!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feec403c5-f6f2-48c6-bc31-4b07efe0c552_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Most FedRAMP assessments I&#8217;ve been involved with treat the CI/CD pipeline as an afterthought. It&#8217;s a diagram in the SSP that nobody questions, a data flow that gets hand-waved during interviews, and a set of controls that developers describe in terms the assessor accepts because it sounds technical enough.</p><p>That&#8217;s a problem. Because your pipeline &#8212; the mechanism that puts code into your production environment &#8212; is one of the most security-critical components in your entire authorization boundary. And if you&#8217;re pulling code from a non-FedRAMP-authorized source like GitHub Commercial, you&#8217;ve got a supply chain risk sitting in the middle of your architecture that requires specific, documented mitigations.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ironechelon.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Iron Echelon! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I recently built out a comprehensive control mapping for a CI/CD architecture that a lot of CSPs are running: GitHub Commercial (outside the boundary) &#8594; Dev/Test environment (inside the boundary) &#8594; Production (inside the boundary, manual promotion gate). Here&#8217;s what you actually need to get right.</p><div><hr></div><h2>Most FedRAMP assessments I&#8217;ve been involved with treat the CI/CD pipeline as an afterthought. It&#8217;s a diagram in the SSP that nobody questions, a data flow that gets hand-waved during interviews, and a set of controls that developers describe in terms the assessor accepts because it sounds technical enough.</h2><p>That&#8217;s a problem. Because your pipeline &#8212; the mechanism that puts code into your production environment &#8212; is one of the most security-critical components in your entire authorization boundary. And if you&#8217;re pulling code from a non-FedRAMP-authorized source like GitHub Commercial, you&#8217;ve got a supply chain risk sitting in the middle of your architecture that requires specific, documented mitigations.</p><p>I recently built out a comprehensive control mapping for a CI/CD architecture that a lot of CSPs are running: GitHub Commercial (outside the boundary) &#8594; Dev/Test environment (inside the boundary) &#8594; Production (inside the boundary, manual promotion gate). Here&#8217;s what you actually need to get right.</p><div><hr></div><h2>The Architecture</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IHHE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IHHE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!IHHE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!IHHE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!IHHE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IHHE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2224567,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.ironechelon.com/i/190544614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IHHE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!IHHE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!IHHE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!IHHE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdefd442-a131-4d45-a8f7-dad3bfffb0c4_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The pipeline has three distinct stages, and each has different compliance obligations:</p><p><strong>Stage 1: GitHub Commercial</strong> &#8212; Your source code repository, sitting outside the authorization boundary on a platform that is not FedRAMP Authorized.</p><p><strong>Stage 2: Dev/Test Environment</strong> &#8212; Inside the boundary. An automated pull brings code in for scanning, testing, and validation. No customer data here. Dev team has no access to production.</p><p><strong>Stage 3: Production</strong> &#8212; Inside the boundary. A manual approval gate controls what gets promoted from dev. This is where federal data lives.</p><p>This architecture actually aligns well with the FedRAMP Authorization Boundary Diagram Job Aid, which explicitly shows a Corporate Cloud Dev Subnet with dev/test code analysis capabilities inside the boundary. But &#8220;aligns well&#8221; and &#8220;will survive an assessment&#8221; are two different things.</p><div><hr></div><h2>Stage 1: The GitHub Problem</h2><p>GitHub Commercial is not FedRAMP Authorized. Full stop. That means you need to treat it as an external service with specific documentation requirements.</p><p><strong>SA-9 (External System Services)</strong> is your anchor control. You must document GitHub as a non-FedRAMP-authorized external service in your SSP. Describe the security controls GitHub provides &#8212; encryption in transit, access controls, audit logging &#8212; and either accept the residual risk formally or open a POA&amp;M item. Your SSP needs to explain why this is acceptable: only source code flows outbound, no federal data is stored in GitHub.</p><p><strong>SA-10 and SA-11</strong> require you to document the full development lifecycle: branching strategy, code review requirements, who has commit and merge authority, how code integrity is ensured before it enters the boundary. If you can&#8217;t describe your pull request approval workflow to an assessor, you have a gap.</p><p><strong>CM-5 and CM-5(5)</strong> are the ones people miss. You need formal management of every GitHub account with push access, and you need quarterly reviews of developer and integrator privileges. Not annual &#8212; quarterly. Record your review dates in the SSP. If an assessor asks when you last reviewed who has merge authority on your main branch and you can&#8217;t answer, that&#8217;s a finding.</p><p><strong>AC-22</strong> applies even to private repositories. Ensure no sensitive configuration, credentials, or architectural details that could be exploited are committed. If your repo is public, you need a documented content review process.</p><p>Here&#8217;s the documentation checklist for Stage 1:</p><p>Your Authorization Boundary Diagram must show GitHub as an external service outside the boundary. The ABD Job Aid is explicit &#8212; any system or service used in any way to support the CSO must be illustrated in the ABD.</p><p>Your SSP Appendix M (Integrated Inventory Workbook) must list GitHub with its authorization status noted as non-FedRAMP-authorized.</p><p>You need a risk acceptance statement or POA&amp;M entry documenting the residual risk. Don&#8217;t skip this. Assessors look for it.</p><div><hr></div><h2>Stage 2: The Security Gate</h2><p>This is where untrusted code from outside the boundary gets validated. If Stage 1 is where the risk lives, Stage 2 is where you prove you&#8217;re managing it.</p><p><strong>The most critical architectural principle:</strong> the boundary-side system must PULL code from GitHub, not the other way around. GitHub does not push into your boundary. This follows the same principle FedRAMP applies to update sources &#8212; threat feeds and vulnerability definitions are pulled, not pushed, and validated before installation. If your architecture allows GitHub webhooks to trigger deployments directly into your boundary, you need to rethink that flow.</p><p><strong>SC-8 and SC-13</strong> require FIPS 140-validated cryptographic modules for all data in transit across the boundary. If you&#8217;re on AWS GovCloud, you inherit this. If you&#8217;re on commercial AWS, you need explicit FIPS endpoint configuration. Document the specific cryptographic modules and their CMVP validation status. Assessors will ask.</p><p><strong>SI-7 (Software &amp; Information Integrity)</strong> is where your pipeline proves its value. Verify integrity of every code pull: validate commit signatures, webhook payload HMAC signatures, or signed tags. The pipeline should automate this on every build, with monthly integrity scans as the floor.</p><p><strong>RA-5</strong> requires SAST, DAST, SCA (software composition analysis), and dependency scanning in the dev environment. Monthly OS, web application, and database scans are the FedRAMP minimum. Your pipeline should scan on every build &#8212; if you&#8217;re only doing monthly, you&#8217;re passing compliance but failing security.</p><p><strong>CM-3 is the control that connects your pipeline to your change management process.</strong> Every code change flowing through the pipeline is a change. You must perform a Security Impact Analysis before planned changes. Here&#8217;s the part most CSPs get wrong: if the analysis concludes the change adversely affects the system&#8217;s authorization integrity, you must treat it as a significant change requiring AO coordination and 3PAO involvement. That means your pipeline needs a mechanism to flag changes that could trigger the significant change process.</p><p><strong>AU-2</strong> requires continuous logging of all pipeline events: who triggered the pull, what commit was pulled, build results, scan results, pass/fail decisions. Pipe everything to your SIEM. If an assessor can&#8217;t trace a specific production deployment back through your pipeline to the original commit and the person who approved it, your audit trail has a gap.</p><p><strong>CM-8(3)</strong> requires automated detection of new assets with a maximum five-minute delay. If your pipeline spins up build containers or deploys new components, your inventory system must detect them within five minutes. This catches a lot of organizations off guard.</p><p>Network segmentation matters here too. The dev subnet must be logically separated from production. No direct network path to production data stores. The FedRAMP ABD template shows distinct subnets for a reason &#8212; your dev environment should not be able to reach production databases even if a developer tried.</p><div><hr></div><h2>Stage 3: The Manual Gate</h2><p>The manual promotion gate between dev and production is actually a compliance strength. It demonstrates human oversight and separation of duties. But it only works if you implement it properly.</p><p><strong>CM-3</strong> applies again at the promotion gate. Document who has authority to approve production promotions, what they verify (scan results clean, testing passed, security impact analysis completed), and how approval is recorded. This should be auditable &#8212; an assessor should be able to pick any production deployment and see who approved it and what evidence they reviewed.</p><p><strong>AC-5 (Separation of Duties)</strong> is non-negotiable. The developer, the person approving the pull into dev, and the person approving production promotion should ideally be different individuals. At minimum, the developer and the production approver must be different people. Document this in your SSP. Enforce it technically &#8212; role-based access controls, not just policy.</p><p><strong>AC-6 (Least Privilege)</strong> means production deployment credentials should be tightly scoped. No developer should have production deployment permissions. The promotion mechanism itself should use a dedicated service account with the minimum permissions needed to deploy.</p><p><strong>SI-2</strong> requires security-relevant updates to be installed within 30 days of release. That means if a vulnerability is discovered and a patch is developed, your pipeline needs to get that patch through dev, tested, approved, and promoted to production within 30 days. Your manual promotion process needs a documented SLA for security patches.</p><div><hr></div><h2>Cross-Cutting Requirements</h2><p>Some controls span all three stages and must be documented holistically:</p><p><strong>Cryptographic requirements:</strong> All data in transit across and within the boundary must use FIPS 140-validated modules. All data at rest &#8212; artifacts, source code in S3, CodePipeline artifact stores &#8212; must be encrypted with FIPS-validated modules. The FedRAMP Policy for Cryptographic Module Selection allows update streams over validated-but-outdated modules when addressing known vulnerabilities, but CAVP-validated algorithms are strongly preferred.</p><p><strong>Incident response:</strong> A compromise at any pipeline stage &#8212; GitHub account takeover, poisoned dependency, unauthorized code promotion &#8212; must be handled under your IR Plan. Report per FedRAMP Incident Communications Procedure and US-CERT timelines.</p><p><strong>Continuous monitoring deliverables tied to your pipeline:</strong></p><ul><li><p>Continuous: Auditable event monitoring, asset detection (5-min max delay)</p></li><li><p>Monthly: Vulnerability scanning (OS, web, DB), POA&amp;M updates, integrity scans, least functionality review</p></li><li><p>60 Days: Authenticator/password refresh for pipeline service accounts</p></li><li><p>Quarterly: Developer privilege review</p></li><li><p>Annually: Baseline configuration review, CM Plan update, SSP update, penetration testing (3PAO), account recertification</p></li></ul><div><hr></div><h2>The Elephant in the Pipeline: AI-Generated Code</h2><p>Here&#8217;s what my original compliance mapping didn&#8217;t address &#8212; and what almost nobody in the FedRAMP community is talking about yet: what happens when the code flowing through your pipeline wasn&#8217;t written by a human?</p><p>GitHub Copilot, Amazon Q, Cursor, Claude Code, and a growing fleet of agentic AI coding tools are now embedded in developer workflows across the defense industrial base. GitHub&#8217;s own Copilot coding agent can now autonomously pick up issues, write code, run security scans, self-review, and open pull requests &#8212; all without a human touching the keyboard. That&#8217;s not a future problem. That&#8217;s happening in repositories that feed FedRAMP-authorized production environments right now.</p><p>The compliance implications are significant, and none of the current FedRAMP control baselines were designed with this in mind.</p><p><strong>The integrity problem.</strong> SI-7 requires you to verify integrity of code entering the boundary. But what does &#8220;integrity&#8221; mean when an AI generated the code? Commit signature verification tells you which account committed the code, not whether a human reviewed what the AI produced. Research from the Chinese University of Hong Kong demonstrated that Copilot can be induced to leak secrets from its training data through targeted prompts. A separate study found that roughly 30% of Copilot-generated code snippets contained security weaknesses spanning 43 different CWEs &#8212; including eight from the CWE Top-25.</p><p>Your SAST and SCA scanners in Stage 2 are your safety net, but they were calibrated for human-written code patterns. AI-generated code introduces vulnerabilities at a different velocity and distribution. If your scanning tools aren&#8217;t tuned for AI-specific weakness patterns, you&#8217;re catching less than you think.</p><p><strong>The supply chain risk.</strong> Your document talks about SA-9 for GitHub as an external service. But Copilot adds another external service layer &#8212; one that&#8217;s pulling context from your entire codebase and sending it to Microsoft/OpenAI&#8217;s infrastructure for inference. On the free tier, user interactions may be used for model training. If a developer pastes proprietary architecture details, API keys, or configuration logic into a Copilot prompt, that data has left your control. GitGuardian reports that repositories using Copilot leak secrets at a 40% higher rate than traditional development.</p><p>For FedRAMP purposes, you need to document AI coding assistants as an additional external service under SA-9, separate from GitHub itself. Describe what data flows to the AI service, what controls the AI vendor provides, and what residual risk you&#8217;re accepting. If developers are using Copilot Business or Enterprise, document the data handling differences. If anyone is using the free tier on code that touches your authorization boundary &#8212; that&#8217;s a finding.</p><p><strong>The separation of duties gap.</strong> AC-5 requires separation between the developer and the production approver. But what happens when Copilot&#8217;s coding agent autonomously generates code, opens a PR, and self-reviews it? The &#8220;developer&#8221; is now an AI, and the first human to see the code may be the person approving the pull into your dev environment. Your separation of duties model needs to explicitly address AI-authored commits. At minimum, AI-generated code should be flagged in your pipeline and require human review before entering the authorization boundary &#8212; not just before production promotion.</p><p><strong>The prompt injection vector.</strong> Just two weeks ago, Orca Security disclosed a vulnerability where attackers could inject malicious instructions into a GitHub Issue that would be automatically processed by Copilot when launching a Codespace, potentially leaking the user&#8217;s GitHub token and enabling repository takeover. This is a supply chain attack that weaponizes the AI coding tool itself. Your pipeline&#8217;s integrity verification at the boundary crossing (SI-7) needs to account for the possibility that the AI assistant was compromised or manipulated before the code was even committed.</p><p><strong>What your SSP needs to address:</strong></p><p>Document every AI coding tool used by developers who contribute code to the CSO. Treat each as an external information system service under SA-9 with specific data flow documentation. Update your SA-11 (Developer Testing) to describe how AI-generated code is identified, flagged, and subjected to additional security review. Ensure your RA-5 scanning covers AI-specific vulnerability patterns. Add AI-generated code review requirements to your CM-3 change control process. And brief your developers &#8212; the person signing the executive affirmation needs to know that AI is writing code that enters the authorization boundary.</p><p>This isn&#8217;t a theoretical future concern. It&#8217;s a current gap in almost every FedRAMP SSP I&#8217;ve reviewed. The CSPs that get ahead of it now will have a significant advantage when assessors start asking these questions &#8212; and they will.</p><div><hr></div><h2>The Bottom Line</h2><p>Your CI/CD pipeline isn&#8217;t just a DevOps convenience. In a FedRAMP Moderate environment, it&#8217;s a security-critical component that touches boundary protection, supply chain integrity, change management, access control, and continuous monitoring. Every stage has specific control obligations, and the connections between stages are where most compliance gaps hide.</p><p>If you&#8217;re a CSP running this architecture and your SSP describes the pipeline in two paragraphs, you&#8217;re not ready for assessment. If you&#8217;re an assessor and you&#8217;re not walking the pipeline end-to-end during interviews, you&#8217;re not doing a thorough job.</p><p>The pipeline is the boundary. Treat it like one.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ironechelon.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Iron Echelon! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Space Is a Cyber Domain Now. The Space Force Is Acting Like It]]></title><description><![CDATA[From on-orbit cyber ranges to mission defense teams, the USSF is rebuilding around a contested-space reality. Here's what it means for the DIB]]></description><link>https://www.ironechelon.com/p/space-is-a-cyber-domain-now-the-space</link><guid isPermaLink="false">https://www.ironechelon.com/p/space-is-a-cyber-domain-now-the-space</guid><dc:creator><![CDATA[Ryan Gutwein]]></dc:creator><pubDate>Tue, 10 Mar 2026 19:16:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uqQz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uqQz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uqQz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!uqQz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!uqQz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!uqQz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uqQz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2733008,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ironechelon.com/i/190542540?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uqQz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!uqQz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!uqQz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!uqQz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F631befbe-8834-4bab-a0a5-a1e702ae2d3c_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s a satellite in low-Earth orbit right now whose entire purpose is to be hacked.</p><p>Deloitte launched a microwave oven-sized cubesat from Vandenberg Space Force Base to serve as a live-fire cyber training range &#8212; a platform where military operators and defense contractors can attack, defend, and test resilience against cyber threats on an actual orbiting spacecraft.</p><p>That single fact tells you everything about where space cybersecurity is headed in 2026.</p><div><hr></div><p><strong>The problem: space is the soft underbelly</strong></p><p>The Space Force&#8217;s own leadership describes cyberspace as the &#8220;soft underbelly&#8221; of space operations. And they&#8217;re not wrong.</p><p>Every critical space capability &#8212; satellite communications, GPS, missile warning, ISR &#8212; depends on ground systems, data links, and command-and-control infrastructure that runs through networks vulnerable to cyber attack. China&#8217;s PLA has a full spectrum of counter-space and cyber capabilities. Russia demonstrated it can target commercial satellite infrastructure when it hit Viasat&#8217;s KA-SAT network at the start of the Ukraine invasion. U.S. officials report that reversible cyber threats like signal jamming and sensor disruption occur on a near-daily basis.</p><p>The challenge is that traditional terrestrial cybersecurity practices don&#8217;t translate cleanly to space. You can&#8217;t easily patch a satellite that&#8217;s already in orbit. Continuous monitoring works differently when you have intermittent contact windows. The architectures span ground segments, orbital assets, and communication links &#8212; each with different threat surfaces and different constraints.</p><div><hr></div><p><strong>What the Space Force is doing about it</strong></p><p>The USSF&#8217;s response is multi-layered, and it&#8217;s accelerating:</p><p><strong>Mission Defense Teams.</strong> The Space Force is standing up dedicated cyber defense teams aligned to each Space Delta. These aren&#8217;t bolted-on IT security shops &#8212; they&#8217;re integrated into the operational structure, fusing cyber operations with electromagnetic warfare, missile warning, satellite communications, and space domain awareness. As one general put it, this is about building a &#8220;core identity&#8221; for the cyber workforce within space operations.</p><p><strong>Cyber warrior development.</strong> The Space Force is shifting from time-in-grade career progression to competency-based development for its cyber workforce. Guardians will achieve proficiency levels &#8212; basic, senior, and master &#8212; based on demonstrated capability, not time served. This is a significant cultural shift for a military service.</p><p><strong>Race to Resilience.</strong> The service&#8217;s initiative to achieve battle-ready architectures by 2026 is driving major investments in proliferated satellite constellations (harder to kill than a few exquisite assets), resilient communications, and anti-jamming and anti-spoofing technologies. The Space Development Agency&#8217;s Tranche 2 satellites are part of this, feeding real-time data to decision-makers across domains.</p><p><strong>On-orbit training.</strong> Beyond Deloitte&#8217;s cyber range satellite, Mission Delta 9 &#8212; the Space Force&#8217;s orbital warfare unit &#8212; just received a live satellite specifically for practicing offensive and defensive maneuvers in space. This isn&#8217;t simulation. This is practicing space combat on actual orbiting hardware.</p><div><hr></div><p><strong>What this means for the defense industrial base</strong></p><p>If you&#8217;re a defense contractor working in space &#8212; or adjacent to space through communications, ISR, or ground systems &#8212; here&#8217;s what matters:</p><p><strong>Space cybersecurity requirements are expanding.</strong> The intersection of CMMC, NIST frameworks, and space-specific requirements is creating a compliance landscape that most organizations haven&#8217;t fully mapped. Existing cybersecurity frameworks lack consistent space-specific definitions. RAND research has found that DoD programs like CMMC &#8220;may not be flexible enough to allow companies to dynamically address risk&#8221; in space contexts, pushing toward compliance-based assessments rather than actual risk management.</p><p><strong>Classification is the barrier.</strong> Multiple space leaders have flagged overclassification as a major impediment to moving faster on national security space. One industry executive called classification barriers &#8220;miserable,&#8221; arguing they limit the ability of the U.S. and allies to respond at the speed the threat environment demands. If you&#8217;re a space startup trying to work with the Space Force, navigating the classification maze is as important as your technology.</p><p><strong>Spectrum dominance is the next frontier.</strong> The Space Force is elevating electromagnetic spectrum operations &#8212; including cybersecurity, anti-jamming, and electronic warfare &#8212; as a core capability area. After two decades of fighting adversaries who didn&#8217;t challenge U.S. spectrum superiority, the DoD is reckoning with the fact that near-peer competitors like China and Russia will contest the spectrum in any future conflict. This creates opportunities for companies building in spectrum management, EW, and secure communications.</p><p><strong>ATO processes for space systems need modernization.</strong> The traditional RMF and ATO process was built for terrestrial IT systems with defined boundaries, regular patching cycles, and continuous monitoring capabilities. Space systems challenge every one of those assumptions. The gap between compliance frameworks and operational reality in space is one of the most important &#8212; and least discussed &#8212; challenges in defense cybersecurity.</p><div><hr></div><p><strong>The bottom line</strong></p><p>Space isn&#8217;t a domain you can secure with firewalls and endpoint detection. It requires rethinking cybersecurity from the ground up &#8212; literally. The Space Force is making real moves to integrate cyber operations into its warfighting DNA, but the compliance and acquisition infrastructure hasn&#8217;t caught up.</p><p>For the defense industrial base, the message is clear: space cybersecurity is no longer a niche specialization. It&#8217;s becoming a core competency that the DoD expects from any contractor touching space-related missions. If your security architecture and compliance posture aren&#8217;t built for the realities of space operations, 2026 is the year to start fixing that.</p>]]></content:encoded></item><item><title><![CDATA[CMMC Phase 2 Is Eight Months Away. Most Contractors Aren't Ready]]></title><description><![CDATA[What assessors are actually seeing on the ground &#8212; and what you need to do before November.]]></description><link>https://www.ironechelon.com/p/cmmc-phase-2-is-eight-months-away</link><guid isPermaLink="false">https://www.ironechelon.com/p/cmmc-phase-2-is-eight-months-away</guid><dc:creator><![CDATA[Ryan Gutwein]]></dc:creator><pubDate>Tue, 10 Mar 2026 19:07:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qhxt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qhxt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qhxt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!qhxt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!qhxt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!qhxt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qhxt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2344041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ironechelon.com/i/190542025?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qhxt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!qhxt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!qhxt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!qhxt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82e6d367-3cd0-4605-8c26-b67ab308fb04_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On November 10, 2026, CMMC Level 2 third-party certification becomes mandatory for DoD contracts involving Controlled Unclassified Information.</p><p>Eight months from now. That&#8217;s the timeline.</p><p>And based on what I&#8217;m seeing from the assessor side, the majority of the defense industrial base is not prepared.</p><p>This isn&#8217;t a scare piece. I&#8217;m not selling you assessment services. I&#8217;m a CCA candidate and I work with C3PAOs &#8212; and I&#8217;m telling you what the ground truth looks like right now.</p><div><hr></div><p><strong>Where things actually stand</strong></p><p>Phase 1 has been in effect since November 10, 2025. Level 1 and Level 2 self-assessments are now required for new solicitations and contracts. Your self-assessment results need to be in SPRS with an annual executive affirmation signed.</p><p>That much is happening. What&#8217;s not happening is meaningful preparation for Phase 2, when the self-assessment won&#8217;t be enough &#8212; you&#8217;ll need an independent assessment from an authorized C3PAO.</p><p>Here&#8217;s the reality: there&#8217;s a finite number of authorized C3PAOs. The pool of organizations that need Level 2 certification is estimated at roughly 80,000. And most of them delayed action through 2024 and 2025 while waiting for the final rule.</p><p>That delay is about to become a crisis. Assessment scheduling is no longer a last step. It&#8217;s a business-critical decision. If you wait until Q3 to contact a C3PAO, you may not get on the calendar before your contract requires certification.</p><div><hr></div><p><strong>What assessors are actually finding</strong></p><p>After over a year of active assessments, the picture is mixed. Organizations that started early are arriving better prepared, with improved scoping and documentation. Uniform training from the Cyber AB and higher assessment throughput have contributed to a rhythm.</p><p>But the gaps for newcomers are significant. Common issues I&#8217;m seeing and hearing about:</p><p><strong>Scoping failures.</strong> Organizations don&#8217;t accurately identify which systems process, store, or transmit CUI. This is the foundation &#8212; if your scope is wrong, your entire SSP is wrong, and your assessment will reflect that. Scoping follows the data, not the org chart.</p><p><strong>SSP documentation that exists but doesn&#8217;t reflect reality.</strong> Having an SSP on the shelf is not the same as having an SSP that describes what your environment actually looks like. Assessors verify implementation, not documentation. If your SSP says you have a SIEM and you don&#8217;t, that&#8217;s a finding.</p><p><strong>POA&amp;M misunderstandings.</strong> Level 1 doesn&#8217;t allow POA&amp;Ms at all &#8212; gaps are binary pass/fail. Level 2 allows conditional status with POA&amp;Ms in limited cases, but you must close them within 180 days through a closeout assessment. Organizations treating POA&amp;Ms as indefinite waivers are in for a rude awakening.</p><p><strong>CAGE code complications.</strong> CMMC certifications tie to specific CAGE codes in eMASS. If your organization has been through acquisitions, mergers, or restructuring, the CAGE code alignment can create complications that take months to resolve. Start now.</p><p><strong>The False Claims Act is real.</strong> DOJ&#8217;s Civil Cyber Fraud Initiative is ramping up enforcement. Earlier this year, settlements were announced from a major defense contractor and a small business related to false CMMC compliance certifications &#8212; and those were under the old voluntary framework. Now that CMMC is contract-integrated, every self-assessment and affirmation is a representation to the government. If you sign an executive affirmation that doesn&#8217;t reflect your actual security posture, you have potential False Claims Act exposure.</p><div><hr></div><p><strong>What you should do in the next 90 days</strong></p><p>If you handle CUI and you haven&#8217;t started preparing for a Level 2 assessment, here&#8217;s your priority list:</p><p><strong>Confirm your CMMC level.</strong> Read your contracts. If CUI is in scope, you need Level 2. If only FCI, Level 1. Don&#8217;t assume &#8212; verify.</p><p><strong>Scope your environment accurately.</strong> Identify every system, network segment, and user that touches CUI. Document your CUI data flows. This determines your assessment boundary.</p><p><strong>Get your SSP current.</strong> Your System Security Plan should reflect your actual environment as of today &#8212; not what you planned to build or what it looked like two years ago. Map every NIST 800-171 control to your implemented reality.</p><p><strong>Contact a C3PAO now.</strong> Not next quarter. Now. Assessment capacity is the bottleneck. Even if you&#8217;re not ready for the assessment itself, getting on a C3PAO&#8217;s calendar locks your timeline.</p><p><strong>Brief your executives on False Claims Act risk.</strong> The person signing your executive affirmation needs to understand what they&#8217;re attesting to. This is not a routine compliance checkbox &#8212; it&#8217;s a legal representation to the federal government.</p><p>Phase 2 will separate the organizations that treated CMMC as a security program from those that treated it as a paperwork exercise. November is closer than you think.</p>]]></content:encoded></item><item><title><![CDATA[Why Iron Echelon Exists]]></title><description><![CDATA[The defense tech and cybersecurity space has plenty of noise. Here's what this briefing is for.]]></description><link>https://www.ironechelon.com/p/why-iron-echelon-exists</link><guid isPermaLink="false">https://www.ironechelon.com/p/why-iron-echelon-exists</guid><dc:creator><![CDATA[Ryan Gutwein]]></dc:creator><pubDate>Sat, 07 Mar 2026 15:33:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!L9gy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L9gy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L9gy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!L9gy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!L9gy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!L9gy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L9gy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14757,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.ironechelon.com/i/190204291?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L9gy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!L9gy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!L9gy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!L9gy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8969a173-23c6-4c1b-b336-47b21f3e08fe_1200x630.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Before I ever touched a compliance framework, I was running patrols in Afghanistan.</p><p>I served in the U.S. Air Force Security Forces - deployed to Afghanistan, Iraq, Oman, Saudi Arabia, Kuwait, and other locations throughout the Middle East. I worked police transition teams, ran area support operations, and later served at U.S. Central Command leading foreign military sales programs that put critical capabilities into the hands of our partners across the region.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ironechelon.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Iron Echelon! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I&#8217;ve seen what defense technology looks like when it actually matters - when it&#8217;s keeping people alive or failing them in real time. When the drone feed cuts out. When the comms go down. When the equipment a contractor promised would work in 130-degree heat doesn&#8217;t.</p><p>That experience shaped everything I&#8217;ve done since.</p><div><hr></div><p>When I transitioned out of the military, I went deep into cybersecurity and compliance &#8212; building expertise in FedRAMP, CMMC, NIST 800-53, and the Risk Management Framework. Today I serve as a Cloud Security Advisor at Motorola Solutions, hold active 3PAO assessor contracts supporting programs including the Defense Health Agency, and I&#8217;m building an AI-powered application security platform.</p><p>I&#8217;ve sat across the table from DHA program managers explaining why their authorization boundary needs to change. I&#8217;ve written expert commentary on FedRAMP RFCs while most of the industry was still figuring out what the changes meant. I&#8217;ve watched billion-dollar cybersecurity companies panic when an AI coding tool threatened to automate what they sell.</p><p>And through all of it, I kept noticing the same thing: <strong>the publications covering this space are written by people who don&#8217;t do the work.</strong></p><p>They cover defense tech like it&#8217;s a venture capital beat. They write about compliance like it&#8217;s a policy abstraction. They report on AI security like it&#8217;s a future problem instead of a current crisis. Most of them have never been downrange, never sat in a SCIF, never written a finding in an assessment report.</p><p>Iron Echelon exists to fix that.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NNII!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NNII!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!NNII!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!NNII!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!NNII!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NNII!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/474feef0-e0ed-40db-801a-525f77501871_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98021,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://ryangutwein.substack.com/i/190204291?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NNII!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!NNII!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!NNII!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!NNII!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F474feef0-e0ed-40db-801a-525f77501871_1200x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>What this briefing covers</h2><p>This is an intelligence briefing - not a news aggregator. Every issue delivers analysis across five pillars:</p><p><strong>Defense Tech &amp; AI</strong> - Drone warfare, autonomous systems, AI in defense acquisition, and the companies building the next generation of national security infrastructure. I don&#8217;t cover this from a Sand Hill Road perspective. I cover it from the perspective of someone who&#8217;s used this equipment in theater and now assesses the systems that support it.</p><p><strong>Cybersecurity &amp; Compliance</strong> - FedRAMP, CMMC, NIST 800-53, and the regulatory decisions that reshape how the defense industrial base operates. Written from inside the assessment process &#8212; not from the outside looking in.</p><p><strong>Market Intelligence</strong> - Who&#8217;s winning contracts, who&#8217;s losing ground, and what the money is telling us about where defense and cyber are headed. When a cybersecurity stock drops 15% because an AI tool threatens their business model, I&#8217;ll tell you what it actually means.</p><p><strong>AI Security</strong> - Supply chain risks, model vulnerabilities, agentic AI implications, and the collision between AI capability and security requirements. This is the frontier, and most people covering it don&#8217;t understand the compliance implications.</p><p><strong>Practitioner Intel</strong> - The frameworks, tools, and hard lessons from someone who actually writes the findings, builds the architectures, and sits in the assessment rooms. If you&#8217;ve ever needed to explain a POA&amp;M to a program manager or defend an authorization boundary to an AO, this section is for you.</p><div><hr></div><h2>Who this is for</h2><p>If you&#8217;re a CISO, a program manager, a GRC professional, a defense tech founder, a compliance officer, an assessor, or anyone who needs to understand the intersection of cybersecurity, defense, and AI at a practitioner level &#8212; this briefing is built for you.</p><p>If you&#8217;re a veteran working in defense tech or cybersecurity and you&#8217;re tired of reading analysis from people who&#8217;ve never served - this is your publication.</p><p>If you want surface-level takes recycled from press releases, there are plenty of other newsletters for that.</p><div><hr></div><h2>What&#8217;s coming</h2><p>Iron Echelon publishes every few days. Free subscribers get full access to analysis and market intel. I&#8217;ll introduce paid tiers down the road for deeper research, practitioner frameworks, and exclusive content - but for now, everything is free.</p><p>Here&#8217;s a preview of what&#8217;s in the pipeline:</p><ul><li><p>How Claude Code Security is quietly reshaping the cybersecurity vendor landscape</p></li><li><p>The real state of CMMC implementation - what assessors are actually seeing</p></li><li><p>FedRAMP modernization: what the latest RFCs mean for 3PAOs and CSPs</p></li><li><p>Why the defense industrial base&#8217;s AI adoption is a security crisis hiding in plain sight</p></li><li><p>Drone warfare lessons from Ukraine and what they mean for U.S. force structure</p></li></ul><p>Subscribe, share it with your team, and reply to any email if you want to talk. I read everything.</p><p>The first real briefing drops this week.</p><p>- Ryan Gutwein</p><p>Air Force combat veteran. Building the future of AppSec.</p><p>ironechelon.com</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.ironechelon.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Iron Echelon! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>