Now serving India's leading defence, banking, and critical infrastructure organizations. Request a Demo

Security & Compliance

Security Is Not a Feature. It's the Architecture.

Critical Range is built from the ground up for sovereign, air-gapped, and classified deployments. Every layer is designed to meet the most demanding security requirements.

Security Architecture

Defence in depth across every layer of the platform — from network isolation to encrypted secrets.

On-Premises Deployment

Sovereign

Deploy Critical Range entirely within your own infrastructure. No external cloud dependencies, no data leaving your perimeter.

Encryption Everywhere

AES-256 encryption at rest, TLS 1.3 in transit, and Fernet-encrypted secrets. Every credential, every flag, every data store.

Network Isolation

Each exercise runs in fully isolated VXLAN networks. Multi-tenant architecture ensures zero cross-tenant data leakage.

Role-Based Access Control

Granular RBAC with tenant-scoped permissions. Platform Admin, Tenant Admin, Trainer, and Trainee roles with least-privilege enforcement.

Multi-Tenant Data Isolation

Separate database partitions, OpenStack projects, and Keycloak realms per tenant. Complete data isolation by design.

Audit Logging

Comprehensive audit trail for all administrative actions, user activity, and system events. Exportable for compliance review.

Certifications & Recognition

Recognised by industry bodies and government agencies.

DPIIT Recognised Startup

Recognition No. DIPP125318

ISO 27001 Aligned

ISMS control objectives implemented

DSCI Member

Data Security Council of India

Compliance Frameworks

Exercises and platform operations mapped to international and national compliance standards.

IEC 62443

Industrial Automation and Control System security standard. Our OT/ICS modules map directly to IEC 62443 competency requirements.

NERC CIP

North American Electric Reliability Corporation Critical Infrastructure Protection. Training scenarios aligned with CIP-004 personnel training requirements.

NICE Framework

NIST National Initiative for Cybersecurity Education. All exercises are mapped to NICE work roles, competency areas, and KSAs.

MITRE ATT&CK

Full ATT&CK Enterprise and ICS matrix mapping. Every exercise technique is tagged and tracked for comprehensive skills coverage analysis.

ISO 27001

Information Security Management System alignment. Our platform architecture and operational procedures follow ISO 27001 control objectives.

DPDP Act 2023

Fully compliant with India's Digital Personal Data Protection Act including data principal rights, consent management, and grievance redressal.

Responsible Disclosure

Vulnerability Disclosure

We take the security of our platform seriously. If you discover a vulnerability in Critical Range, we encourage responsible disclosure through our dedicated security channel.

We acknowledge reports within 48 hours
We provide status updates every 7 days until resolution
We will not pursue legal action against good-faith researchers

CERT Audit Ready

Prepared for national audit requirements

  • Source code audit access for sovereign tier customers
  • Architecture documentation for CERT-In review
  • Penetration test reports available under NDA
  • NCIIPC compliance documentation on request
  • Air-gap deployment verification procedures
  • Resident engineering support for audit periods

Need a Security Deep-Dive?

Our team can provide a classified security briefing tailored to your compliance requirements.