Security Is Not a Feature. It's the Architecture.
Critical Range is built from the ground up for sovereign, air-gapped, and classified deployments. Every layer is designed to meet the most demanding security requirements.
Security Architecture
Defence in depth across every layer of the platform — from network isolation to encrypted secrets.
On-Premises Deployment
SovereignDeploy Critical Range entirely within your own infrastructure. No external cloud dependencies, no data leaving your perimeter.
Encryption Everywhere
AES-256 encryption at rest, TLS 1.3 in transit, and Fernet-encrypted secrets. Every credential, every flag, every data store.
Network Isolation
Each exercise runs in fully isolated VXLAN networks. Multi-tenant architecture ensures zero cross-tenant data leakage.
Role-Based Access Control
Granular RBAC with tenant-scoped permissions. Platform Admin, Tenant Admin, Trainer, and Trainee roles with least-privilege enforcement.
Multi-Tenant Data Isolation
Separate database partitions, OpenStack projects, and Keycloak realms per tenant. Complete data isolation by design.
Audit Logging
Comprehensive audit trail for all administrative actions, user activity, and system events. Exportable for compliance review.
Certifications & Recognition
Recognised by industry bodies and government agencies.
DPIIT Recognised Startup
Recognition No. DIPP125318
ISO 27001 Aligned
ISMS control objectives implemented
DSCI Member
Data Security Council of India
Compliance Frameworks
Exercises and platform operations mapped to international and national compliance standards.
IEC 62443
Industrial Automation and Control System security standard. Our OT/ICS modules map directly to IEC 62443 competency requirements.
NERC CIP
North American Electric Reliability Corporation Critical Infrastructure Protection. Training scenarios aligned with CIP-004 personnel training requirements.
NICE Framework
NIST National Initiative for Cybersecurity Education. All exercises are mapped to NICE work roles, competency areas, and KSAs.
MITRE ATT&CK
Full ATT&CK Enterprise and ICS matrix mapping. Every exercise technique is tagged and tracked for comprehensive skills coverage analysis.
ISO 27001
Information Security Management System alignment. Our platform architecture and operational procedures follow ISO 27001 control objectives.
DPDP Act 2023
Fully compliant with India's Digital Personal Data Protection Act including data principal rights, consent management, and grievance redressal.
Vulnerability Disclosure
We take the security of our platform seriously. If you discover a vulnerability in Critical Range, we encourage responsible disclosure through our dedicated security channel.
CERT Audit Ready
Prepared for national audit requirements
- Source code audit access for sovereign tier customers
- Architecture documentation for CERT-In review
- Penetration test reports available under NDA
- NCIIPC compliance documentation on request
- Air-gap deployment verification procedures
- Resident engineering support for audit periods
Need a Security Deep-Dive?
Our team can provide a classified security briefing tailored to your compliance requirements.