TECHNICAL OVERVIEW FEDRAMP HIGH BASELINE 421 NIST 800-53 CONTROLS AI INCLUDED — NO ADD-ON FEES

Platform Architecture.
Built for the mission.

A technical overview of SecureWatch's SIEM, XDR & EDR platform for federal IT decision-makers, security engineers, and ISSOs. Understand what's under the hood and why it matters for your environment.

FIPS 140-2 VALIDATED
AWS GOVCLOUD (US)
DOD IL4/IL5 READY
CMMC READY
BEDROCK / CLAUDE AI
WAZUH + VELOCIRAPTOR

One platform replaces your
entire security tool stack.

SecureWatch consolidates capabilities that typically require 4–6 separate vendor contracts into a single subscription. All AI features included at every tier.

Capability What It Replaces How SecureWatch Delivers It
SIEM / Log CorrelationSplunk, Sentinel, ElasticWazuh engine · 4,000+ MITRE ATT&CK rules · real-time correlation
Endpoint Detection & ResponseCrowdStrike Falcon, Carbon BlackVelociraptor EDR · process chains · memory forensics · fleet YARA · remote quarantine
File Integrity MonitoringTripwire, OSSEC (separate)Built into agent · inotify/NTFS · SHA-256 baselines · sub-second alerts
Vulnerability DetectionTenable Nessus, QualysContinuous CVE enrichment from NVD + CISA KEV · agent & agentless
Configuration AssessmentSCAP tools, manual STIG checksAutomated DISA STIG + CIS Benchmark assessment · drift detection
Compliance ReportingManual evidence gatheringContinuous monitoring · NIST 800-53, FISMA, CMMC, DFARS, HIPAA · exportable evidence
AI Threat HuntingSplunk AI Asst ($$), Copilot ($$)Natural language queries → forensic investigations across all storage tiers · included, not an add-on
Log OnboardingWeeks of professional servicesAI Auto-Decoder generates validated parsers in minutes for any source
Continuous AuthorizationMonthly manual ConMonReal-time OSCAL/KSI artifact generation for FedRAMP 20x
30-Month Log RetentionPer-GB storage chargesIncluded · 90-day sub-second analytics via rollups + 30-day raw drill-down · tiered warm/cold · M-21-31 + CMMC L2
Bottom line: SecureWatch consolidates capabilities that typically require 4–6 separate vendor contracts into a single platform with a single per-agent price. All AI features are included at every tier — no add-on fees, no per-query charges.

Every analyst becomes a
threat hunter.

Powered by AWS Bedrock & Anthropic's Claude within the GovCloud boundary. Competitors charge premium add-on fees for AI. SecureWatch includes it in every subscription.

⚙ Auto-Decoder Generation

The Problem
Onboarding a new log source — mainframes, SCADA/ICS, bespoke agency apps — requires 2–4 weeks of professional services to develop custom parsers.
What SecureWatch Does
Feed in raw sample log output from any source. The AI generates validated Wazuh decoder XML and correlation rules in minutes. Every decoder is regression-tested against 50,000+ known-good samples before production deployment. Failures trigger automatic retry; after three attempts, escalation to engineering.
✓ New log sources searchable in minutes, not weeks. No professional services required.

🔍 Natural Language Threat Hunting

The Problem
Proactive threat hunting requires deep expertise in query languages (SPL, KQL, OpenSearch DSL) that most Tier 1 analysts don't have. The federal cybersecurity talent gap means agencies can't hire enough senior investigators.
What SecureWatch Does
Analysts ask questions in plain English: "Show all lateral movement from compromised credentials in the past 72 hours." The AI translates to optimized queries for both historical log data (OpenSearch DSL) and live endpoint state (Velociraptor VQL), correlates MITRE ATT&CK tactics, and builds kill-chain visualizations. Queries against recent data return in seconds; queries reaching deeper into warm-tier archives execute asynchronously in the background with a real-time progress indicator — no timeouts, no failed searches, regardless of time range. For investigations requiring archived data beyond 18 months, the AI generates SQL queries that run directly against restored archives via Amazon Athena, keeping your active SIEM unaffected. Full query provenance logged for chain-of-custody compliance.
✓ Tier 1 analysts execute Tier 3 forensic investigations across any time range. No other platform queries logs + live endpoints simultaneously.

📋 Automated KSI / OSCAL Reporting

The Problem
FedRAMP continuous monitoring requires monthly documentation updates and evidence gathering that consumes significant compliance staff time. GSA's FedRAMP 20x initiative transitions to machine-readable KSIs, but most platforms lack automated OSCAL artifact generation.
What SecureWatch Does
Live telemetry maps continuously to NIST 800-53 control families and FedRAMP 20x KSIs. When telemetry confirms a control's operational status, the AI generates a timestamped, digitally signed OSCAL JSON artifact and delivers it to your GRC pipeline (eMASS, GovCloud S3, or FedRAMP PMO). Drift detection alerts fire within 15 minutes.
✓ Continuous authorization without manual documentation cycles. Your compliance team focuses on remediation, not paperwork.
AI Data Security: All inference runs within GovCloud via AWS Bedrock. Tenant data is never commingled in model context windows. Inference results are not persisted beyond the session. No tenant data is used for model training. Full prompt injection defenses on all inputs.

One installer. Full SIEM + EDR.

A unified package containing both Wazuh (SIEM/XDR) and Velociraptor (EDR). One service, one console — the combined power of a full SIEM platform and a dedicated EDR solution.

Wazuh Agent

SIEM / XDR ENGINE
  • 4,000+ detection rules mapped to MITRE ATT&CK
  • File integrity monitoring with SHA-256 baselines
  • Vulnerability detection via NVD + CISA KEV
  • Compliance mapping: NIST 800-53, CMMC, HIPAA
  • Active response: firewall injection, process kill, lockout

Velociraptor Client

EDR / DFIR ENGINE
  • Process chains, loaded DLLs, network connections
  • Fleet-wide YARA scanning and memory analysis
  • Live forensic artifact collection via VQL
  • Remote endpoint quarantine and remediation
  • Kernel-level event tracing and IOC sweeps
~85 MB memory footprint
Windows MSI
Debian/Ubuntu DEB
RHEL/CentOS RPM
Deploys via SCCM, Ansible, GPO, BigFix
Unified Telemetry: All Velociraptor artifacts and Wazuh events flow into the same data store. Your analysts — and the AI threat hunting pipeline — query across both SIEM and EDR telemetry from a single interface. When you ask "Show all lateral movement in the past 72 hours," the AI searches historical logs and interrogates live endpoints simultaneously.

The Collector solves
your firewall problem.

A lightweight appliance inside your network perimeter. All agent traffic aggregates through one encrypted tunnel. Your endpoints never need internet access.

Strict outbound firewall

One IPsec tunnel from one IP. Your firewall requires only standard IPsec rules (UDP 500/4500) from the Collector's IP to a single SecureWatch endpoint.

No endpoint internet access

Individual endpoints communicate only with the Collector on the LAN. No outbound internet required on any monitored machine — critical for air-gapped environments.

Connectivity interruptions

Local encrypted buffer (default 10 GB / ~72 hours for 250 agents) queues events during outages. Automatic forwarding on reconnection. Zero event loss.

UDP-restricted networks

TLS 1.3 fallback over TCP 443 with equivalent FIPS 140-2 validated cryptographic assurance for environments that block outbound UDP traffic.

Tunnel Specification

AWS GovCloud exclusive.
FIPS 140-2 everywhere.

No tenant data traverses commercial AWS regions or third-party networks. Enforced by architecture — VPC design, PrivateLink, and Security Groups — not just policy.

Log Retention: 30 Months Included

TierTechnologyRetentionAccessM-21-31
HotOpenSearch + gp3 EBS0–90 daysSub-second queryTier 1 (immediate)
WarmUltraWarm + S390 days – 18 monthsMinutesTier 2 (72-hour)
ColdS3 Glacier Deep Archive18 months – 7 years12-hour retrievalTier 3 (archival)
94% cost reduction vs. all-hot storage — which is why 30 months is included in the base price. Need longer? Extended Archive: $1/agent/month per 6-month block, up to 7 years. All archived data is WORM-compliant (S3 Object Lock) — cannot be deleted even with admin credentials.

What This Means for Your Analysts

To keep query performance fast across the full 90-day hot window, SecureWatch automatically generates compressed statistical summaries (Index Rollups) of routine log data before it migrates to warm storage. Your analysts — and the AI threat hunting pipeline — get sub-second trend analysis and baseline anomaly detection over a full 90-day horizon without waiting for warm-tier retrieval. Only when raw event-level drill-down is needed for older data does the system reach into warm storage, and even then queries execute asynchronously with a progress indicator rather than timing out.

Deep-Time Investigations: If your team needs to investigate archived data beyond 18 months — for APT forensics, audit compliance, or incident reconstruction — SecureWatch provides an automated Cold Tier Recovery Pipeline. Rather than rehydrating archived logs into the active SIEM (which would degrade live monitoring), the platform restores targeted archives and queries them directly via Amazon Athena. The AI pipeline generates the SQL automatically, and you receive a notification when results are ready. Your active SIEM performance is never affected.

Service Level Agreements

Platform Availability
99.9% monthly uptime
Log Ingestion Latency
< 5 minutes to searchable
Alert Delivery
< 2 min from detection
AI Query Response (Hot Tier)
< 30 seconds
AI Query Response (Deep-Time)
< 5 min (warm-tier async)
Decoder Generation
< 5 min per new source
KSI/OSCAL Update
< 15 min from telemetry
Standard Support
4-hr Crit / 8-hr High (8×5)
Premium Support (24×7)
1-hr Crit / 4-hr High
Incident Notification
< 1 hour confirmed incident
DR Recovery
RTO: 4 hrs / RPO: 15 min

Cryptographic isolation.
Not just policy.

Cross-tenant data access is architecturally impossible without the correct key material. Five layers of enforceable isolation.

LayerMechanismWhat It Prevents
EncryptionDedicated KMS CMK per tenant — no key sharingAnother tenant reading your data even with storage access
StorageDedicated OpenSearch index pattern per tenantQuery results crossing into another tenant's namespace
AuthenticationPer-tenant Cognito user pools; STS tokens scoped to your ARNsCross-tenant API calls even with valid credentials
NetworkPer-tenant Security Groups + Kubernetes Network PoliciesLateral movement between tenant workloads
AI BoundaryNo cross-tenant model context; no inference persistenceYour data appearing in another tenant's AI results

Authentication: Two Models

DEFAULT

Login.gov

BEST FOR: TIER 1 / 2 CUSTOMERS

FedRAMP High authorized by GSA. Identity-proofed (IAL2) and phishing-resistant MFA (AAL2). Supports FIDO2/WebAuthn, PIV/CAC, and login.gov app. SecureWatch doesn't manage your passwords — login.gov handles the full credential lifecycle.

ENTERPRISE

SAML / OIDC Federation

BEST FOR: TIER 3 / 4 CUSTOMERS

Federate from Microsoft Entra ID, AD FS, Okta, Ping, or DoD ICAM providers. PIV/CAC supported via upstream IdP. Just-in-time provisioning on first login. When a user is removed at your IdP, access revokes automatically.

Role-Based Access Control

Tenant AdministratorUser management, IdP configuration, role assignment, agent enrollment, platform configuration
Security AnalystFull threat hunting (NL + DSL), alert triage, Velociraptor artifacts, incident investigation. Read-only compliance.
Compliance OfficerFull compliance dashboards, OSCAL artifacts, evidence packages, ConMon reports. Read-only security alerts.
Incident ResponderAnalyst permissions + Velociraptor remote response: endpoint quarantine, remediation commands, active response playbooks.
Read-Only ViewerDashboard and report viewing only. No queries, no configuration changes, no response actions. For executives and auditors.

421 controls.
You inherit the hard ones.

Most competing SIEMs hold only FedRAMP Moderate. SecureWatch targets the High baseline — required for DoD and high-impact civilian systems.

Control FamilyKey ControlsSecureWatch Implementation
AC – Access ControlAC-2, AC-3, AC-17Cognito + login.gov or federated IdP; IAM least-privilege; five-role RBAC; mandatory MFA
AU – AuditAU-2, AU-3, AU-9, AU-12CloudTrail (all events), AI provenance engine, WORM audit log, DynamoDB immutable trail
CA – AssessmentCA-2, CA-7Automated KSI/OSCAL pipeline; continuous ConMon; annual 3PAO
CM – ConfigurationCM-2, CM-6, CM-7, CM-8Terraform IaC; DISA STIG automation; Bottlerocket immutable OS; Inspector inventory
IA – AuthenticationIA-2, IA-5Login.gov (IAL2/AAL2) or SAML/OIDC; PIV/CAC; per-tenant CA; FIPS credential storage
IR – Incident ResponseIR-4, IR-5, IR-6Automated alert routing; GuardDuty threat intel; response playbooks; 1-hour notification SLA
SC – ProtectionSC-8, SC-12, SC-13, SC-28mTLS everywhere; FIPS TLS; per-tenant KMS CMKs; PrivateLink; no internet egress
SI – IntegritySI-2, SI-3, SI-7Automated patching; Inspector scanning; Wazuh FIM with SHA-256 baselines

Frameworks Supported

NIST 800-53 Rev 5 (High) — 421 controls FISMA High DoD IL4/IL5 CMMC Level 2/3 DFARS 252.204-7012 HIPAA FedRAMP 20x (OSCAL/KSI)
CRM & Inheritance Documentation: A complete Customer Responsibility Matrix and FedRAMP High control inheritance package is available ($7,500 one-time) for organizations building their own authorization packages. Documents every inheritable control from our High authorization to accelerate your ATO.

Onboarding is fast.
AI makes it faster.

From discovery to go-live in weeks — with the AI layer accelerating what used to take months of professional services.

01

Discovery & Scoping

1–2 meetings

We map your environment: agent count, OS mix, network topology, classification levels, compliance requirements, and legacy log sources. For DoD customers, we coordinate connection approval and CDS requirements.

02

Tenant Provisioning

2–3 business days

We provision your isolated GovCloud environment: dedicated encryption keys, micro-segmented networking, tenant authentication (login.gov or your agency IdP), configured dashboards, compliance policy mappings, and AI features enabled.

03

Agent Deployment + AI Log Onboarding

Your deployment timeline

Deploy the SecureWatch agent package via SCCM, Ansible, GPO, or BigFix. For air-gapped networks, deploy the Collector appliance. For legacy log sources, the AI Auto-Decoder generates validated parsers in minutes — what used to take weeks of professional services happens automatically.

04

Tuning & Go-Live

2–4 weeks

We tune detection rules, configure compliance policies against applicable STIGs and CIS benchmarks, and validate alerting workflows. Your analysts can begin using natural language threat hunting immediately. OSCAL/KSI reporting starts generating artifacts on day one.

What You Get From Day One

All SIEM, XDR, and EDR capabilities active
AI threat hunting + auto-decoder available
Compliance dashboards populated
OSCAL/KSI artifacts flowing to GRC
30-month log retention accumulating
Dedicated onboarding engineer
Quarterly business reviews
Full query provenance + audit trail

Ready to see it in action?

Schedule a live demo with our team. We'll walk through your environment, show real-time threat hunting, and provide a tailored cost comparison.