CMMC Score
92%
↑ 4pts · last C3PAO review
CMMC CONTROLS →
Controls Passing
101
101 controls · 7 gaps · 2 critical
VIEW CONTROLS →
Active Findings
47
47 open · 18 resolved this week
OPEN INCIDENTS →
Pipelines Scanned
1,847
1,847 scanned · 99.1% pass rate
SCAN HISTORY →
ATO Packages
22
22 ATO packages · 28 evidence files
ATO PACKAGES →
Needs Attention — 4 items require action
DISMISS ✕
CRITICAL
CUI emailed to personal Gmail — F-35 maint schedule
INC-4201 · WARDEN · WKSTN-APX-214
CRITICAL
JTAC config file with CUI on unencrypted USB
INC-4200 · WARDEN · WKSTN-APX-338
CRITICAL
DoD contract number hardcoded in GitLab pipeline
INC-4199 · Code Auditor · GITLAB-PROD-01
CRITICAL
Former contractor SSO active 14 days post-termination
INC-4198 · Agent 004 · APEX-IAM-PROD
Live Agent Feed
STREAMING
09:14:33LOWAgent 001 — AC.1.001 evidence snapshot · 847 endpoints compliant
09:14:31HIGHWARDEN — CUI email quarantined: F35_MAINT_SCHED_Q1_2026.xlsx → personal Gmail
09:08:12INFOAgent 006 — Pipeline pass: backend-api PR #1,247 · 0 critical · 2 medium
08:47:12CRITWARDEN — USB blocked: SN:SB4F2A9E1 on WKSTN-APX-338 · JTAC config CUI
08:14:22LOWAgent 001 — MP.2.120 evidence generated: USB event logged · 0 bytes transferred
08:00:11MEDAgent 004 — Anomalous: vendor-csc@csci.com SSO active 14d post-termination
07:44:09INFOAgent 002 — SAST: f35-logistics-api PR #892 · 0 critical · RA.3.077 logged
07:30:00LOWAgent 005 — Policy-as-code update: ITAR data classification rule v2.4
07:15:44HIGHAgent 006 — Terraform: port 22 open to 0.0.0.0/0 · deployment blocked
07:00:00INFOAgent 007 — NIST AI RMF: JTAC ML module Phase 4 complete · 87% ready
Pipeline Gate Status
4 BLOCKED →
CRITICALDoD contract # hardcoded in GitLab pipeline
GITLAB-PROD-01 · CM.3.068
Block PR · rotate credentials
HIGHDocker container runs as root in production
APEX-K8S-PROD-01 · CM.2.061
Rebuild with non-root USER
HIGHTerraform port 22 open to 0.0.0.0/0
AWS-GOVCLOUD-VPC · SC.1.175
Restrict security group ingress
MEDIUMDependency confusion in requirements.txt
f35-logistics-api · SR.3.169
Remove from PyPI · use internal registry
1,847
Scanned
4
Blocked
99.1%
Pass Rate
Agent Health
ALL AGENTS →
Compliance Scanner
AC.1.001 evidence snapshot · 847 endpoints · 2m ago
2,847
Code Auditor
SAST: f35-logistics PR #892 · 0 critical · 8m ago
1,847
WARDEN / Guardian
CUI email blocked: F35_MAINT_SCHED.xlsx · 14m ago
614
Access Controller
SSO revoked: vendor-csc@csci.com · 4h ago
389
Policy Engine
Policy update: ITAR rule v2.4 deployed · 6h ago
124
Pipeline Orchestrator
Pipeline blocked: Docker USER root · 1d ago
1,847
ATO Streamliner
ATO package ready: JTAC v3.1 · 87% · 3d ago
22
Recent Findings — click any row to investigate
VIEW ALL IN WARDEN →
| ID | Agent | Finding | CMMC Control | Sev | Status |
|---|---|---|---|---|---|
| INC-4201 | WARDEN | CUI emailed to personal Gmail — F-35 maint schedule | SC.3.177 · MP.2.120 | CRITICAL | OPEN |
| INC-4200 | WARDEN | JTAC config file with CUI on unencrypted USB | MP.2.120 · AC.1.001 | CRITICAL | INVESTIGATING |
| INC-4199 | Code Auditor | DoD contract # hardcoded in GitLab pipeline | CM.3.068 · IA.3.083 | CRITICAL | OPEN |
| INC-4198 | Agent 004 | Former contractor SSO active 14 days post-termination | AC.2.006 · PS.3.114 | CRITICAL | OPEN |
| INC-4197 | WARDEN | SSH private key hardcoded in deployment script | IA.3.083 · CM.3.068 | HIGH | RESOLVED |
| INC-4196 | Agent 006 | Docker container runs as root in production | CM.2.061 · SI.1.210 | HIGH | OPEN |
| INC-4195 | Agent 006 | Terraform port 22 open to 0.0.0.0/0 | SC.1.175 · CM.3.068 | HIGH | ACKNOWLEDGED |
| INC-4194 | WARDEN | Bulk download — 1,240 files before resignation date | AU.2.042 · AC.2.007 | HIGH | RESOLVED |
Pipeline Security Gate Simulator
Configure a build and watch TrustNovaOps agents inspect it in real time
FROM python:3.11-slim
ENV AWS_SECRET_ACCESS_KEY=AKIAIOSFODNN7EXAMPLE
ENV DATABASE_URL=postgres://admin:P@ssword123@prod-db.internal/
EXPOSE 22 80 443 8080
RUN pip install --no-cache-dir -r requirements.txt
COPY . /app
USER root
↑ Sample Dockerfile — contains intentional issues for demo
Initializing agents…
0%
AGENT
CHECK DETAIL
RESULT
RISK
12 findings
PII Findings
2,847
↑ 34 since last scan
PHI / ePHI
341
HIPAA scope — 8 high risk
PCI Data
89
3 files in open storage
Secrets/Credentials
23
4 critical — API keys in repos
CUI Assets
1,204
CMMC scope — tracked
Sensitive Data Findings
Initializing WARDEN…
0%
File / Location
Type
Count
Risk
Action
Policy Violations
AGENT 007
ATO STREAMLINER
Authority to Operate package generator — NIST RMF 2.0 · NIST AI RMF 1.0
▲ CLASSIFIED CAPABILITY
System Configuration
CMMC Level 2 Compliance Posture
110 NIST SP 800-171 controls across 14 domains. Agent 001 (Compliance Scanner) monitors all controls continuously — evidence is captured automatically for each passing control.
101
Passing
7
Review
2
Critical
94%
Evidence Complete
Click any domain to expand controls
24 packages
🔒
MP.2.120 — CUI USB event: WKSTN-APX-338
CMMC 2.0
09:14 today · 1.2 MB
📊
AU.2.042 — Audit log snapshot · 847 endpoints
NIST
Today 06:08 · 14.2 MB
✅
CA-7 — ConMon package: week 47
FedRAMP
Today 08:00 · 28.4 MB
Compliance Score
92%
▲ +4% this month
Open Findings
47
▼ down 23 from last week
Blocked Deployments
8
This month · 4 require CISO
Evidence Generated
847
Packages · Last 30 days
CMMC Score Trend (30d)
92%
▲ +4pts since last C3PAO review
Findings by Severity
Critical
4
High
11
Medium
23
Low
9
Blocked Deployments (30d)
11
5 CISO-approved · 4 remediated · 2 pending
Agent Activity (30d)
21.4K
Events processed · 99.8% accuracy
ATO Readiness
CMMC Level 2
READY
FedRAMP Moderate
83%
NIST AI RMF 1.0
91%
DFARS 7012
READY
Cost Avoidance
$420K
vs. manual consulting + C3PAO overruns (est.)
Hours saved / year
2,140 hrs
C3PAO prep time
↓ 78%
Consultant fees
↓ 80%