Serving federal / state / local government? Integrating with CJIS / IRS / DHS? GreatCTO auto-attaches gov-pack with FedRAMP authorization-boundary scoping, NIST 800-53 Rev 5 control mapping (325 Moderate controls), Privacy Impact Assessment, Section 508 VPAT 2.5, plus FIPS 140-3 crypto enforcement and CJIS multi-factor auth.
.gov · fedramp · nist-800-53 · cjis · fisma · 508 · piv · cac · aws-us-gov · govcloud · ATO
The pack rides on top of your base archetype (web-service, ai-system, fintech, …) — it doesn't replace it. Auto-injects reviewer agents into the pipeline + opens human gates listed below.
FedRAMP boundary scoping (Low / Moderate / High) · NIST 800-53 Rev 5 control mapping · PIA per E-Gov Act § 208 · CJIS § 5.6 (advanced auth) · 508 VPAT · FIPS 140-3 enforcement · StateRAMP for state
gate:plan + gate:ship.| Gate | Owner | Trigger |
|---|---|---|
gate:fedramp-boundary | ISSO + 3PAO | before SSP submission |
gate:pia | agency CPO | before any PII collection |
gate:508-conformance | a11y coordinator | before public release |
gate:cjis-audit | CSO of agency | if law-enforcement data is touched |
Each EVAL has ≥5 test cases, pass threshold, regression interpretation, cross-refs to TM + gates. Run via your existing test framework.
EVAL-gov-508-conformance.mdEVAL-gov-fips-140-3-enforcement.mdEVAL-gov-cjis-mfa.mdEVAL-gov-pia-completeness.mdEVAL-gov-il4-data-handling.mdpacks: in PROJECT.md./migrate to re-run detection with updated rules.$ npx great-cto init