Safeguard Documentation Center

Compliance

FedRAMP HIGH, IL7, EO 14028, and regulatory compliance

Compliance

Safeguard.sh is built for enterprise compliance requirements, with FedRAMP HIGH and IL7 certification and comprehensive regulatory support.

Certifications

FedRAMP HIGH

Safeguard.sh holds FedRAMP HIGH authorization:

  • Continuous monitoring
  • Annual assessments
  • Incident response procedures
  • Security control implementation

IL7 (Impact Level 7)

Approved for Department of Defense use:

  • Classified information handling
  • Enhanced security controls
  • DoD-specific requirements
  • Continuous authorization

SOC 2 Type II

Third-party audited controls for:

  • Security
  • Availability
  • Confidentiality
  • Processing Integrity

EO 14028 Support

Executive Order 14028 compliance features:

SBOM Requirements

  • NTIA minimum elements
  • SPDX and CycloneDX formats
  • Automated completeness checking
  • Compliance scoring

Software Security

  • Vulnerability disclosure
  • Secure development practices
  • Supply chain security
  • Artifact signing

Regulatory Frameworks

Safeguard.sh supports compliance with:

FrameworkSupport
NIST SP 800-53Control mapping and evidence
NIST CSFFramework alignment
ISO 27001Control mapping
PCI DSSSoftware security requirements
HIPAAHealthcare data protection
SOXFinancial controls

Compliance Reports

Generate compliance documentation:

Pre-Built Reports

  • FedRAMP POA&M support
  • EO 14028 compliance report
  • SBOM completeness audit
  • Vulnerability summary

Custom Reports

Create reports for specific requirements:

  1. Navigate to Reports
  2. Click Create Report
  3. Select compliance framework
  4. Configure scope and date range
  5. Generate and export

Data Residency

Deployment options for data residency:

  • US Cloud - US data centers only
  • EU Cloud - EU data centers only
  • On-Premises - Your infrastructure
  • Air-Gapped - Disconnected environments

Security Architecture

Multi-Tenant Isolation

  • Complete tenant separation
  • Dedicated encryption keys
  • Isolated compute resources
  • Network segmentation

Encryption

  • TLS 1.3 in transit
  • AES-256 at rest
  • Customer-managed keys option
  • Hardware security modules

Access Control

  • Role-based access (RBAC)
  • Single Sign-On (SSO)
  • Multi-factor authentication
  • API key management

Audit Support

Supporting your audits:

  • Complete audit trails
  • Evidence collection
  • Assessor access (read-only)
  • Documentation packages

On this page