// Security Documentation
Security Policy
EFFECTIVE DATE: JANUARY 1, 2025 • LAST UPDATED: 2025
⚠️ IMPORTANT NOTE
Security implementations are customized based on each client's specific requirements, project scope, and budget. The security controls and compliance frameworks listed below represent our capabilities and the standards we can align with — not a guarantee that every project includes all listed controls. Each engagement is scoped individually, and security measures are priced according to the level of implementation required. We work with clients to determine the appropriate security posture for their unique needs, threat model, and compliance obligations.
Darkbloom Industries™ is committed to delivering software and systems built to the highest security standards available in the commercial and defense sectors. This Security Policy describes the frameworks, standards, and practices we are capable of implementing across client engagements, as well as the security posture of our own infrastructure.
Note: Darkbloom Industries™ delivers audit-ready, standard-aligned implementations. We are not a certified CMMC assessment organization (C3PAO) and do not perform official third-party certification assessments. Our deliverables are designed to satisfy the requirements of each listed standard, enabling your organization to pass certification audits when those standards are scoped into your project.
1. Compliance Framework Alignment (Capabilities)
The following frameworks represent the standards we can align with. The specific controls implemented for any given project are determined by client requirements, project scope, and budget. Not all projects require or include every framework listed below.
| Standard / Framework | Scope | Availability |
| NIST SP 800-171 | CUI Protection / 110 Controls | ● AVAILABLE UPON SCOPE |
| CMMC Level 2 | DoD Supply Chain / 110 Practices | ● AVAILABLE UPON SCOPE |
| NIST SP 800-218 (SSDF) | Secure Software Development | ● AVAILABLE UPON SCOPE |
| NIST SP 800-207 | Zero-Trust Architecture | ● AVAILABLE UPON SCOPE |
| FIPS 140-3 | Cryptographic Module Validation | ● AVAILABLE UPON SCOPE |
| OWASP Top 10 | Web Application Security | ● AVAILABLE UPON SCOPE |
| OWASP MASVS | Mobile Application Security | ● AVAILABLE UPON SCOPE |
| SOC 2 Trust Principles | Availability, Confidentiality, Security | ● AVAILABLE UPON SCOPE |
| DISA STIGs | System Hardening Baselines | ● AVAILABLE UPON SCOPE |
2. Cryptography Standards (Optional)
When cryptographic implementations are required and scoped into a project, we utilize FIPS 140-3 validated modules and algorithms:
- AES-256 for symmetric encryption of data at rest
- RSA-4096 / ECDSA P-384 for asymmetric operations and digital signatures
- TLS 1.3 for all data in transit — TLS 1.0 and 1.1 explicitly disabled
- Argon2id / bcrypt for password hashing — no plaintext storage under any circumstance
- Hardware Security Module (HSM) or cloud KMS for key storage and rotation (where scoped)
Note: The level of cryptographic implementation is determined by project requirements and budget. Not all projects require FIPS-validated cryptography.
3. Access Control & Identity (Configurable)
All systems and applications can be designed with a least-privilege, identity-centric access model. The specific controls implemented are based on client needs:
- Role-Based Access Control (RBAC) enforced at the architecture level (available upon scope)
- Multi-Factor Authentication (MFA) required for all administrative and remote access (available upon scope)
- Privileged Access Management (PAM) for all system-level credentials (available upon scope)
- NIST SP 800-207 Zero-Trust architecture — no implicit trust based on network location (available upon scope)
- Regular access reviews with automatic deprovisioning of inactive accounts (available upon scope)
4. Secure Development Lifecycle (SDLC)
We follow NIST SP 800-218 (SSDF) practices across all development engagements. The depth of implementation varies based on project scale and security requirements:
- Threat modeling performed at the architecture phase before code is written (available upon scope)
- Static Application Security Testing (SAST) integrated into every build pipeline (available upon scope)
- Dependency vulnerability scanning (CVE-based) on all third-party libraries (available upon scope)
- Software Bill of Materials (SBOM) generated for every deliverable (available upon scope)
- Peer code review with security checklist for all production-bound code (standard practice)
- Penetration testing available as an independent third-party service (available at additional cost)
5. Monitoring & Incident Response (Optional)
The following monitoring and response capabilities can be implemented based on project requirements and budget:
- Immutable audit logs retained for a minimum of 365 days (available upon scope)
- Real-time intrusion detection system (IDS) deployment available (available upon scope)
- Endpoint Detection & Response (EDR) integration on supported environments (available upon scope)
- SIEM integration for centralized log aggregation and anomaly alerting (available upon scope)
- Documented Incident Response Plan (IRP) provided with all security engagements (available upon scope)
- Security incident notification to client within 24 hours of confirmed breach detection (available upon scope)
6. Supply Chain Security (Optional)
- SBOM generated and delivered with all software projects (available upon scope)
- All third-party dependencies vetted for known CVEs prior to integration (available upon scope)
- No foreign-controlled or unsourced components introduced without client approval (standard practice)
- Vendor security assessments conducted for any tools introduced to client environments (available upon scope)
7. Website Security (This Site)
The Darkbloom Industries™ website itself is secured with:
- Content Security Policy (CSP) — blocking unauthorized scripts and resources
- X-Frame-Options: DENY — preventing clickjacking via iframe embedding
- X-Content-Type-Options: nosniff — preventing MIME-type sniffing attacks
- Referrer-Policy: strict-origin-when-cross-origin
- Permissions-Policy: camera, microphone, and geolocation disabled
- Honeypot field and rate limiting (3 submissions / 10 minutes) on contact form
- All form inputs sanitized server-side and client-side before processing
- No tracking cookies, no advertising networks, no analytics third parties
8. Vulnerability Disclosure
If you discover a security vulnerability in our website or any Darkbloom Industries™ deliverable, we encourage responsible disclosure:
- Email: DarkbloomIndustries@outlook.com
- Subject line: "Security Disclosure — [Brief Description]"
- We will acknowledge receipt within 48 hours and respond with a remediation timeline
- We request that you do not publicly disclose the vulnerability until a fix has been deployed
9. Scope & Pricing Considerations
Security is not a one-size-fits-all solution. Each project is unique, and security controls are implemented based on:
- Project Scale: Larger, enterprise-level projects require more comprehensive security controls than smaller engagements
- Compliance Requirements: Specific regulatory frameworks (NIST, CMMC, SOC 2, etc.) dictate required controls
- Budget: Security implementation costs scale with the complexity and depth of controls required
- Threat Model: Projects handling sensitive data or operating in high-risk environments require enhanced protections
- Client Preferences: We work with each client to determine the appropriate security posture for their specific needs
We provide transparent, itemized security options during the scoping phase so clients can select the level of security that aligns with their requirements and budget. No security features are implemented without client approval and clear scope definition.
10. Limitations
Darkbloom Industries™ does not currently hold a Facility Clearance (FCL) or operate a SCIF. We do not accept classified work under SAP/SAR programs at this time. For CUI-level (Controlled Unclassified Information) work under NIST 800-171 / CMMC Level 2, we can operate as a compliant subcontractor under a cleared prime contractor's security umbrella when that scope is contracted.
We will always be transparent about our current capabilities and will never overstate our credentials or compliance status.
11. Contact
For security inquiries, compliance consultations, or to request a Capabilities Statement: