You are helping to conduct a Secure by Design (SbD) assessment for a UK Ministry of Defence (MOD) technology project, programme, or capability.
User Input
$ARGUMENTS
Context
Since August 2023, ALL Defence capabilities, technology infrastructure, and digital services MUST follow the Secure by Design (SbD) approach mandated in JSP 440 Leaflet 5C. This represents a fundamental shift from legacy RMADS (Risk Management and Accreditation Documentation Set) to continuous risk management throughout the capability lifecycle.
Key MOD Security References:
JSP 440: Defence Manual of Security (primary security policy)
JSP 440 Leaflet 5C: Secure by Design mandate (August 2023)
Related Skills
JSP 453: Digital Policies and Standards for Defence
ISN 2023/09: Industry Security Notice - Secure by Design Requirements
ISN 2023/10: Industry Security Notice - Supplier attestation and legacy accreditation withdrawal
NIST Cybersecurity Framework (CSF): Risk assessment and controls framework
Project Security Officer (PSyO) appointed if SECRET+ (Yes/No)
Current SbD maturity level (self-assessment score)
Read Available Documents:
Note: Before generating, scan projects/ for existing project directories. For each project, list all ARC-*.md artifacts, check external/ for reference documents, and check 000-global/ for cross-project policies. If no external docs exist but they would improve output, ask the user.
MANDATORY (warn if missing):
REQ (Requirements) — Extract: NFR-SEC (security), NFR-A (availability), INT (integration), DR (data) requirements, data classification
If missing: warn user to run $arckit-requirements first
PRIN (Architecture Principles, in 000-global) — Extract: MOD security standards, approved platforms, classification handling, compliance requirements
If missing: warn user to run $arckit-principles first
Decommissioning process includes secure data deletion
Read external documents and policies:
Read any external documents listed in the project context (external/ files) — extract CAAT assessment results, security clearance requirements, JSP 440 compliance status, IAMM maturity scores
Read any vendor security attestations in projects/{project-dir}/vendors/{vendor}/ — extract supplier security clearances, List X status, DEFCON compliance, SC/DV clearance evidence
Read any global policies listed in the project context (000-global/policies/) — extract MOD security standards, classification requirements, ITAR restrictions
Read any enterprise standards in projects/000-global/external/ — extract enterprise MOD security baselines, accreditation templates, cross-project security assurance evidence
If no external MOD security docs found, ask: "Do you have any JSP 440 compliance reports, CAAT assessment results, or supplier security attestations? I can read PDFs directly. Place them in projects/{project-dir}/external/ and re-run, or skip."
Citation traceability: When referencing content from external documents, follow the citation instructions in .arckit/references/citation-instructions.md. Place inline citation markers (e.g., [PP-C1]) next to findings informed by source documents and populate the "External References" section in the template.
Assess using NIST Cybersecurity Framework (as mandated by SbD):
Before writing the file, read .arckit/references/quality-checklist.md and verify all Common Checks plus the SECD-MOD per-type checks pass. Fix any failures before proceeding.
Save the document: Write to projects/[project-folder]/ARC-{PROJECT_ID}-SECD-MOD-v1.0.md
Assessment Guidelines
Status Indicators
✅ Compliant: All security controls implemented and effective, no significant gaps
⚠️ Partially Compliant: Some controls in place but significant gaps remain
❌ Non-Compliant: Controls not implemented or ineffective, critical gaps exist
Critical Security Issues (Deployment Blockers)
Mark as CRITICAL if:
Data classified SECRET or above without appropriate controls
No encryption for data at rest or in transit
Personnel lacking required security clearances
No threat model or risk assessment
Critical vulnerabilities unpatched
No incident response capability
No backup/recovery capability
Non-compliance with JSP 440 mandatory controls
Classification-Specific Requirements
OFFICIAL:
Cyber Essentials baseline
Basic access controls and encryption
Standard MOD security policies
OFFICIAL-SENSITIVE:
Cyber Essentials Plus
MFA required
Enhanced logging and monitoring
DPIA if processing personal data
SECRET:
Security Cleared (SC) personnel minimum
CESG-approved cryptography
Air-gapped or assured network connectivity
Enhanced physical security
CAAT assessment and security governance review before deployment
TOP SECRET:
Developed Vetting (DV) personnel
Compartmented security
Strictly controlled access
Enhanced OPSEC measures
Project Phase Considerations
Discovery/Alpha:
Initial threat model
Classification determination
Preliminary risk assessment
Security architecture design
CAAT registration and initial self-assessment
Delivery Team Security Lead (DTSL) appointed
Beta:
Comprehensive threat model
Full risk assessment
Security controls implemented
Penetration testing completed
CAAT self-assessment completed
Security governance review
Live:
All security controls operational
CAAT continuously updated
Continuous monitoring active
Regular security reviews
Incident response capability proven
MOD-Specific Context
JSP 440 Information Assurance Maturity Model (IAMM)
Assess maturity across 8 domains (0-5 scale):
Level 0: Non-existent
Level 1: Initial/Ad hoc
Level 2: Repeatable
Level 3: Defined
Level 4: Managed
Level 5: Optimized
Target Level 3+ for operational systems.
Continuous Assurance Process (Replaced RMADS in August 2023)
SbD replaces point-in-time accreditation with continuous assurance:
Register on CAAT (Cyber Activity and Assurance Tracker)
Every programme must register on CAAT in Discovery/Alpha
CAAT is the self-assessment tool for cyber security maturity
Available through MOD Secure by Design portal (DefenceGateway account required)
Appoint Delivery Team Security Lead (DTSL)
DTSL owns security for the delivery team (First Line of Defence)
May also appoint Security Assurance Coordinator (SAC)
Project Security Officer (PSyO) still required for SECRET+ systems
Complete CAAT self-assessment question sets
Based on the 7 MOD Secure by Design Principles
Assess cyber security maturity throughout lifecycle
Hardware Security Modules (HSMs) for key management
FIPS 140-2 compliant modules
Network Security:
Segmentation by security domain
Firewalls at trust boundaries
IDS/IPS for threat detection
Air-gap for SECRET and above (or assured connectivity)
Authentication:
Smart card (CAC/MOD Form 90) for OFFICIAL-SENSITIVE and above
Multi-factor authentication (MFA) mandatory
Privileged Access Management (PAM) for admin access
Monitoring:
Integration with MOD Cyber Defence Operations
24/7 security monitoring
SIEM with correlation rules
Incident escalation to MOD CERT
Example Output Structure
# MOD Secure by Design Assessment
**Project**: MOD Personnel Management System
**Classification**: OFFICIAL-SENSITIVE
**Overall Security Posture**: Adequate (with gaps to address)
## Domain 1: Security Classification
**Status**: ✅ Compliant
**Evidence**: System handles personnel records (OFFICIAL-SENSITIVE), classification confirmed by IAO...
## Domain 5: Technical Security Controls
### 5.1 Cryptography
**Status**: ⚠️ Partially Compliant
**Evidence**: AES-256 encryption at rest, TLS 1.3 in transit, but key rotation not automated...
**Gaps**:
- Automated key rotation required (HIGH PRIORITY)
- HSM not yet deployed (MEDIUM PRIORITY)
### 5.3 Network Security
**Status**: ❌ Non-Compliant
**Evidence**: Network segmentation incomplete, no IDS/IPS deployed...
**Gaps**:
- Deploy network segmentation (CRITICAL - deployment blocker)
- Implement IDS/IPS (HIGH PRIORITY)
## Critical Issues
1. Network segmentation incomplete (Domain 5) - BLOCKER for deployment
2. Penetration test not completed (Domain 5) - Required before Beta
## Recommendations
**Critical** (0-30 days):
- Complete network segmentation - Security Architect - 30 days
- Schedule penetration test - DTSL - 15 days
Important Notes
Continuous assurance is mandatory for MOD systems throughout their lifecycle (replaced point-in-time accreditation August 2023)
CAAT registration required for all programmes from Discovery/Alpha phase
Non-compliance can block project progression, funding, and deployment
Delivery Team Security Lead (DTSL) engagement required from Discovery phase
Regular security reviews required (quarterly during development, annually in Live)
SROs and capability owners are accountable for security posture (not delegated to accreditation authority)
Classification determines security control requirements
Supplier attestation required for supplier-delivered systems (ISN 2023/10)
Insider threat is a primary concern for MOD - emphasize personnel security
Supply chain security critical due to foreign adversary threats
Operational security (OPSEC) essential for operational systems
Cyber security is a "licence to operate" - cannot be traded out or descoped
Markdown escaping: When writing less-than or greater-than comparisons, always include a space after < or > (e.g., < 3 seconds, > 99.9% uptime) to prevent markdown renderers from interpreting them as HTML tags or emoji