Security & Deployment

Designed for secure deployment paths.

TASC is built to be evaluated and deployed responsibly. Where compliance, accreditation, or operational status is not yet earned, this page makes that explicit.

Data handling boundariesPOSTURE · DRAFT

Evaluate first with unclassified, approved, synthetic, exercise, or public data. CUI, ITAR, export-control, and classified handling are scoped with the mission owner before any operational use.

Data boundary
[Unclassified prototype / CUI plan / classified plan]
Storage
[Define with mission owner]
Retention
[Define with mission owner]
Human-in-the-loop reviewPOSTURE · DRAFT

Human review, source visibility, and uncertainty labels remain central. TASC outputs are decision support, not decisions.

Review surface
Source chips · confidence · uncertainty
Override
Operator can dismiss, escalate, or annotate
Auditability and evidence tracePOSTURE · DRAFT

Every presented conclusion links back to its underlying sources. Audit logs capture ingestion, suppression, and presentation.

Evidence chain
Per-event source attribution
Audit log
[Define retention with mission owner]
Integration strategyPOSTURE · DRAFT

Designed to integrate before replacing. Real integrations are listed only when validated.

Integrations
[TAK] · [C2] · [chat/report source] · [data lake] · [API]
Deployment model
[Local / edge / cloud / secure enclave]
Accreditation roadmapPOSTURE · DRAFT

Accreditation status is not claimed until granted in writing.

CMMC
[Insert status]
SOC 2
[Insert status]
DFARS
[Insert status]
ATO / RMF
[Insert path]
Export and control considerationsPOSTURE · DRAFT

Export and end-use restrictions are reviewed per engagement.

ITAR / EAR
[Insert determination]
End-use review
[Define per engagement]
Evaluation before operational usePOSTURE · DRAFT

Evaluation precedes operational use. Initial metrics include time-to-understanding, duplicate suppression, traceability, workload, latency, and user trust.

Evaluation data
Unclassified / synthetic / exercise
Metrics
TTU · suppression · traceability · workload · latency · trust
Notice

TASC does not currently claim CMMC, SOC 2, ATO, classified-network support, or operational fielding. Any such status will appear here only when granted in writing and approved for public reference.

Engage

Scope an evaluation plan with your team.

Request briefing