Cyber Compliance and Security Controls Built-In

Embed project accountability and responsibility at the infrastructure level.

Structsure Environments:
Standard Profile

The Standard compliance profile for a Structsure environment is based on best-practice configurations and policies developed through decades of cyber security experience working with with government agencies and Fortune 100 companies.

At a minimum, the Standard profile includes:

  • Mutual TLS between services
  • Multi-factor authentication
  • Central logging
  • Vulnerability scanning and mitigation
  • Tightly controlled network policies
Platform accessible through cloud - Structsure

Compliance In the Cloud

Structsure supports multiple cloud deployment configurations

Beyond the Standard profile, Structsure supports a wide-range of industry standards and configuration baselines for private, federal, state, and local government.

Supported regulatory compliance and industry standards:

  • PCI-DSS
  • HIPAA
  • ISO/IEC 27001:2013
  • DFARS 254 . 204 - 7008
  • FedRAMP Low Impact*
  • FedRAMP Moderate Impact*
  • FedRAMP High Impact*
  • DoD Cloud Computing SRG IL2, 4, and 5*

    *Based on organization or mission requirements.

Compliance-and-Reporting1x

Compliance and
Reporting

Structsure reduces both human and computing effort by wrangling all necessary information and reports by supporting and operating within federal, state, and regulatory compliance standards such as NIST 800-53r4, CNSSI 1253, PCI-DSS, ISO/IEC 27001:2013 and FedRAMP.,

Purchase1x

Purchase
Oversight

Structsure provides project managers with the necessary tools to carefully manage resource purchases and control their project’s budget. By embedding purchase approval mechanisms into Structsure, all purchases made through the App Catalog are reviewed and approved by a member of your team with budget authority.

Access

Access
Management

Structsure provides multi-factor authentication (MFA) and allows you to precisely control access to applications based on user role, user location, user device posture, and more. It supports LDAP and SAML 2.0 authentication mechanisms.

Different projects have different requirements.

We’ll take the time to learn about your unique project needs and provide a complete solution