Efficiency, Cost Savings, & Compliance with Cloud CMS & PKIaaS

Eliminate infrastructure costs and manual processes and meet security mandates with FedRAMP Moderate  Authorized phishing-resistant authentication, unified credential management, and automated federal Identity Credential Access Management (ICAM) compliance.

View Capability Statement

FedRAMP Moderate Axiad Conductor Accelerates Compliance 

Pre-Mapped Security Controls Built-in mapping to NIST SP 800-53 Rev.5 controls accelerates ATO processes and reduces documentation burden.

Inherited Compliance FedRAMP authorization provides 325+ inherited controls, reducing agency assessment scope and timeline.

Automated Audit Trails Comprehensive logging and compliance reporting supports continuous monitoring and audit requirements.

Boundary Documentation Complete system boundary documentation and data flow diagrams support rapid security assessment.

Meet Federal Requirements Head-On

Federal agencies face unprecedented efficiency and security mandates requiring rapid transformation of credential infrastructure. Axiad Conductor helps meet these mandates by eliminating infrastructure costs and automating processes for drastic improvements in speed of operations. It automates phishing-resistant authentication, credential management, and automated compliance with federal ICAM and Zero Trust requirements in a cloud-native FedRAMP Moderate Authorized solution.

OMB M-22-09: Phishing-Resistant MFA

Requirement

Agency-wide phishing-resistant authentication by end of FY25

Challenge

PIV programs don't cover contractors, temporary personnel, and devices

Axiad Solution

Unified credential management extending phishing-resistant authentication to every user and device through cloud-native PKI

Results

100% phishing-resistant coverage without PIV program expansion

CISA Zero Trust Maturity Model 2.0

Requirement

Advanced identity assurance and device trust capabilities

Challenge

Siloed authentication systems and manual certificate management 

Axiad Solution

Single platform managing PIV-Compatible, Derived PIV, FIDO2, and device certificates with automated lifecycle operations

Results

Accelerated Zero Trust maturity with measurable progress metrics

NIST SP 800-63-4 & FIPS 201-3

Requirement

Modern authenticator management and identity proofing 

Challenge

Legacy PKI systems can't support new standards efficiently 

Axiad Solution

Cloud-native PKIaaS and CMS with built-in support for emerging authentication standards and Post-Quantum Cryptography

Results

Future-ready authentication infrastructure without hardware refresh

Executive Order 14028

Requirement

Federal agencies must implement Zero Trust with phishing-resistant authentication for all users and modernize PKI by FY25

Challenge

Legacy credential systems cannot scale across diverse user populations or integrate with modern authentication standards with major infrastructure overhaul

Axiad Solution

Centralized control for every human and device credential with automated phishing-resistant credential management

Results

Agency-wide Zero Trust compliance with FedRAMP Moderate Authority to Operate (ATO) and 100% phishing resistant coverage without new infrastructure requirements

Meet ICAM Requirements from DAFMAN 17-1304

https://static.e-publishing.af.mil/production/1/saf_cn/publication/dafman17-1304/dafman17-1304.pdf

Mandate for Phishing-Resistant MFA (AAL2/AAL3)

DAFMAN 17-1304 aligns with OMB M-22-09, requiring phishing-resistant MFA (e.g., PIV, CAC, or FIPS 140-2 Level 2 hardware authenticators). Axiad supports Air Force and DoD ICAM mandates with phishing-resistant MFA across cloud, on-prem, and hybrid systems—leveraging PIV-Compatible, PIV Derived, security keys (IDEMIA ID-one, Thales eToken, Yubico YubiKeys, etc), smart cards, FIDO2 keys, and mobile authenticators.

Credential Lifecycle Management & Automation

DAFMAN 17-1304 mandates that all authentication integrate with Zero Trust principles, ensuring least privilege, continuous evaluation, and non-repudiation. Axiad automates credential lifecycle management personnel, contractors, and mission partners. Axiad delivers rapid issuance, revocation, and recovery at agency scale.

Zero Trust Alignment

DAFMAN 17-1304 mandates that all authentication integrate with Zero Trust principles, ensuring least privilege, continuous evaluation, and non-repudiation. Axiad’s architecture enforces strong authentication at every trust boundary, including for personnel working from untrusted environments. Axiad enables Zero Trust readiness for through identity-first access controls, context-based authentication, and visibility across all trust zones.

Hardware-Backed Identity Proofing

Air Force requirements favor hardware-backed credentials such as smart cards or security keys for both NPE (non-person entities) and PE (person entities). Axiad enables the rapid deployment of AAL3-level hardware authenticators for tactical edge, air-gapped, and classified environments—trusted by DoD agencies and aligned to DAFMAN 17-1304.

Mission Partner and 3rd Party ICAM Enablement

Air Force missions increasingly depend on joint partners and contractors. DAFMAN requires these identities be authenticated to the same standard as internal users. Axiad supports securing mission partners and 3rd parties via cross-organization credentialing, federation, and strong identity assurance.

Meet White House Policy Priorities

https://www.whitehouse.gov/presidential-actions/2025/04/ensuring-commercial-cost-effective-solutions-in-federal-contracts/

Commercial First Procurement Mandate

The EO establishes that agencies must prioritize commercially available products and services—and only pursue custom solutions when justified with market research and cost analysis. Axiad delivers a mature, off the shelf platform for credential management and strong authentication. With documented use across civilian and defense environments, agencies meet the commercial solution requirement without the need for custom development.

Contract Review & Reorientation

The EO requires agencies to review pending solicitations for non commercial solutions and pivot toward viable commercial alternatives before issuing new contracts. If you are already evaluating or planning custom credential solutions, Axiad can be proposed as a compliant alternative—minimizing risk of delay and aligning with the EO's intent to reduce custom development expenses.

FAR Simplification in Procurement Policy

A companion EO mandates streamlining the Federal Acquisition Regulation (FAR), reducing non essential provisions to speed up procurement cycles. With existing contract vehicles like GSA MAS, NASA SEWP, or Carahsoft/GSA partners, Axiad enables fast-track procurement in commercial one FAR frameworks and Other Transaction Agreements (OTAs) or Commercial Solutions Openings (CSOs).

Emphasis on Performance Based Contracting

Emerging federal procurement trends favor outcome driven contracts—where payments tie to well defined performance metrics (e.g. uptime, credential issuance speed, support SLA). Axiad can support performance based metrics around seamless credential delivery, rapid revocation, high availability, and audit ready reporting—making it an ideal commercial solution for agencies seeking contractual accountability and measurable ROI.

DoDI 8500.01 Insights & Axiad Alignment

https://www.esd.whs.mil/portals/54/documents/dd/issuances/dodi/850001_2014.pdf

Identity Assurance: Strong, Non Anonymous Authentication Required

DoDI 8500.01 mandates identity assurance across all DoD information systems, requiring strong identification and authentication and eliminating anonymity in access to IT resources. Axiad enforces strong, phishing-resistant authentication (CAC/PIV, FIDO2, biometric-backed hardware tokens) ensuring every user is non-anonymous and fully validated.

Public Key Enablement and Digital Credentials

The instruction requires DoD systems to be public key enabled, using vetted and cryptographically secure digital credentials to verify identity and support non-repudiation. Axiad integrates seamlessly with PKI environments and supports certificate-based identity issuance, revocation, and management—aligning with DoD’s PKI enablement requirements.

Structural Foundation for DoD Cybersecurity Program

DoDI 8500.01 establishes the DoD-wide cybersecurity program, linking identity assurance, access control, risk management, and continuous protection across enterprise, component, and system levels. Axiad’s credential lifecycle automation and access policy enforcement support the unified risk-management posture required by DoD across all levels.

Integration with RMF & NIST SP 800 39 Risk Levels

The directive ties identity control to risk tiers defined in DoDI 8510.01 and NIST SP 800 39: stronger identity proofing and authentication are required for higher-impact systems.
Axiad Conductor can support variable levels of confidence (ASSURANCE LEVELs) with scalable MFA, role-based access, and logging to meet different DoD system risk categories.

Bridging DoDI 8500.01 to Operational ICAM (via 8520.03)

While DoDI 8500.01 provides the cybersecurity framework, DoDI 8520.03 further defines identity authentication and credential strength aligned with NIST SP 800 63 3. Axiad supports full NIST SP 800 63 3 credential strength tiers (AAL2/AAL3), federation capabilities, and lifecycle automation that meet both DoDI guidelines.

Key Alignment of DoDI 8520.04

https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/852004p.pdf?ver=mIijIA0IrhHgbTDd7kVEXg==

Agency ICAM Integration

DoDI 8520.04 mandates the use of approved DoD enterprise ICAM solutions for authentication of both person entities and non person entities (NPEs) whenever applicable. Systems relying on local credential stores must migrate to enterprise solutions where possible. Axiad acts as a FedRAMP® ATO ICAM platform, capable of managing identity and access for both human users and machine or process accounts across DoD environments.

Support for Explicit and Dynamic Access Control

The instruction defines two access methods:

Explicit access: provisioned and de-provisioned based on defined authorization rules;

Dynamic access: decisions based on real-time evaluation of identity attributes from authoritative attribute services

Axiad enables both modes—automated access provisioning for explicit policies and integration with attribute services to support dynamic, attribute-based access (ABAC).

Attribute Governance & Least Privilege Enforcement

DoDI 8520.04 emphasizes governance of identity attributes, ensuring attribute integrity, provenance, regular updates, and enforcement of least privilege and separation of duties (SoD). Axiad provides attribute-aware governance, handles provenance and audit of identity attributes, and enforces RBAC/ABAC policies to minimize privilege creep and support SoD controls.

Comprehensive Access Auditing & Continuous Compliance

Robust auditing is required for all access attempts, not just privileged users. Organizations must also conduct periodic access reviews in compliance with DoDI policy. Axiad delivers audit grade logs, reporting dashboards, and automated review workflows—enabling DoD components to adhere to continuous monitoring and compliance checks.

Trusted by government agencies such as the DoD, CDC, and civilian agencies alike, Axiad is the mission-aligned ICAM platform built to meet evolving federal cybersecurity mandates.

Capability Statement