Skip to main content
Govly’s Secure Enclave provides a CMMC Level 2 compliant environment for processing sensitive government contracting data, including Controlled Unclassified Information (CUI).

Security Controls

Network Security

  • Virtual Private Cloud (VPC) - All resources deployed within isolated VPCs
  • Security Groups - Explicit allow-list firewall rules between tiers
  • Access Control Lists (ACLs) - Network-level traffic filtering
  • Private Subnets - Database and processing tiers not directly accessible from internet

Data Encryption

Data StateEncryption Method
In TransitTLS 1.2+ (256-bit)
At RestAES-256
BackupsAES-256 with separate key management

Access Controls

  • Multi-Factor Authentication (MFA) - Required for all administrative access
  • Role-Based Access Control (RBAC) - Permissions based on job function
  • Just-In-Time Access - Temporary elevated privileges with automatic expiration
  • Audit Logging - All access attempts logged and monitored

Monitoring and Detection

  • Continuous Vulnerability Scanning - Automated security assessments
  • Intrusion Detection - Real-time threat monitoring
  • Log Aggregation - Centralized security event logging
  • Anomaly Detection - ML-based identification of unusual patterns

AWS Compliance

Govly’s infrastructure runs on AWS, which maintains compliance with:
  • ISO 27001
  • ISO 27017
  • SSAE-18 SOC 1 and SOC 2
  • FedRAMP Moderate

Data Residency

All Govly production systems are hosted in AWS US regions, ensuring:
  • Data remains within United States boundaries
  • Compliance with federal data residency requirements
  • Multi-availability zone redundancy for durability

Secure Enclave Services

The following services are available within the CMMC-compliant enclave:

Secure Email Ingestion

Process procurement emails containing CUI:
[organization]@secure.govly.com

Secure Web Automation

Monitor procurement portals with data processed entirely within the enclave boundary.

Secure API Access

Enterprise API endpoints for programmatic access to enclave-processed data.

Getting Access

To use Govly’s Secure Enclave services:
  1. Contact [email protected] to discuss your requirements
  2. Complete the customer security questionnaire
  3. Sign the appropriate data handling agreements
  4. Receive your organization’s secure endpoints and credentials

Compliance Questions

For questions about our secure enclave architecture or compliance documentation, contact [email protected].