{"id":9184,"date":"2023-06-13T15:43:00","date_gmt":"2023-06-13T20:43:00","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=9184"},"modified":"2025-04-03T11:33:27","modified_gmt":"2025-04-03T16:33:27","slug":"palantir-meeting-il6-security-requirements-with-apollo-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/palantir-meeting-il6-security-requirements-with-apollo-blog-2023\/","title":{"rendered":"How Palantir Meets IL6 Security Requirements with Apollo"},"content":{"rendered":"\n

Building secure software requires robust delivery and management processes, with the ability to quickly detect and fix issues, discover new vulnerabilities, and deploy patches. This is especially difficult when services are run in restricted, air-gapped environments or remote locations, and was the main reason we built Palantir Apollo.<\/p>\n\n\n\n

With Apollo, we are able to patch, update, or make changes to a service in 3.5 minutes on average<\/a> and have significantly reduced the time required to remediate production issues, from hours to under 5 minutes.<\/p>\n\n\n\n

For 20 years, Palantir has worked alongside partners in the defense and intelligence spaces. We have encoded our learnings for managing software in national security contexts. In October 2022, Palantir received an Impact Level 6 (IL6) provisional authorization (PA)<\/a> from the Defense Information Systems Agency (DISA) for our federal cloud service offering.<\/p>\n\n\n\n

IL6 accreditation is a powerful endorsement, recognizing that Palantir has met DISA\u2019s rigorous security and compliance standards and making it easier for U.S. Government entities to use Palantir products for some of their most sensitive work.<\/p>\n\n\n\n

The road to IL6 accreditation can be challenging and costly. In this blog post, we share how we designed a consistent, cross-network deployment model using Palantir Apollo\u2019s built-in features and controls in order to satisfy the requirements for operating in IL6 environments.<\/p>\n\n\n\n

What are FedRAMP, IL5, and IL6?<\/h2>\n\n\n\n

With the rise of cloud computing in the government, DISA defined the operating standards for software providers seeking to offer their services in government cloud environments. These standards are meant to ensure that providers demonstrate best practices when securing the sensitive work happening in their products.<\/p>\n\n\n\n

DISA\u2019s standards are based on a framework that measures risk in a provider\u2019s holistic cloud offering. Providers must demonstrate both their products and their operating strategy are deployed with safety controls aligned to various levels of data sensitivity. In general, more controls mean less risk in a provider\u2019s offering, making it eligible to handle data at higher sensitivity levels.<\/p>\n\n\n

\n
\"Palantir<\/figure><\/div>\n\n\n

Impact Levels (ILs) are defined in DISA\u2019s Cloud Computing SRG<\/a> as Department of Defense (DoD)-developed categories for leveraging cloud computing based on the \u201cpotential impact should the confidentiality or the integrity of the information be compromised.\u201d There are currently four defined ILs (2, 4, 5, and 6), with IL6 being the highest and the only IL covering potentially classified data that \u201ccould be expected to have a serious adverse effect on organizational operations\u201d (the SRG is available for download as a .zip from here).<\/p>\n\n\n\n

Defining these standards allows DISA to enable a \u201cDo Once, Use Many\u201d approach<\/a> to software accreditation that was pioneered with the FedRAMP program. For commercial providers, IL6 authorization means government agencies can fast track use of their services in place of having to run lengthy and bespoke audit and accreditation processes. The DoD maintains a Cloud Service Catalog that lists offerings that have already been granted PAs, making it easy for potential user groups to pick vetted products.<\/p>\n\n\n\n

NIST and the Risk Management Framework<\/h2>\n\n\n\n

The DoD bases its security evaluations on the National Institute of Standards and Technology\u2019s (NIST) Risk Management Framework (RMF),<\/a> which outlines a generic process used widely across the U.S. Government to evaluate IT systems.<\/p>\n\n\n\n

The RMF provides guidance for identifying which security controls exist in a system so that the RMF user can assess the system and determine if it meets the users\u2019 needs, like the set of requirements DISA established for IL6.<\/p>\n\n\n\n

Controls are descriptive and focus on whole system characteristics, including those of the organization that created and operates the system. For example, the Remote Access (AC-17) control is defined as:<\/p>\n\n\n\n

The organization:<\/p>\n\n\n\n