Solution? Persistent Data Protection with Theodosian The Foundation of Your DCC Programme
Theodosian encrypts sensitive defence data at the file level and applies dynamic access controls that travel with the data across cloud storage, endpoints, email, and subcontractor networks. Instead of building a stronger perimeter around data that constantly moves, Theodosian protects the data itself.
Why Theodosian Is the Fastest, Most Affordable Path to Achieving DCC Compliance
CSM v4 Is Here, Are You Ready?
The MoD's Cyber Security Model version 4 makes DCC certification mandatory for defence suppliers. Required DCC levels are now being specified in tender documentation.
If you're bidding on MoD contracts involving sensitive information or critical services, you'll need DCC Level 3 or 4 certification. IASME assessors are booking months in advance - start preparing now to avoid contract delays or lost opportunities.
See How Theodosian Accelerates DCC Compliance
Book a 15-minute demo to see persistent data protection and IASME-ready evidence in action, or start a 2-week proof of concept in your own environment.
The required DCC level is specified in your MoD contract or tender documentation, based on the sensitivity of the work:
- Level 1: Cyber Essentials (basic cyber hygiene)
- Level 2: Cyber Essentials Plus (verified controls)
- Level 3: IASME Cyber Assurance (enhanced security for sensitive contracts)
- Level 4: Bespoke/highest sensitivity (custom requirements, often aligned with NCSC standards, ISO 27001, or NIST frameworks)
Theodosian is designed to support you in pursuing compliance with all levels, including Levels 3 and 4, where data protection, access control, and audit requirements are most stringent.
No. Cyber Essentials and Cyber Essentials Plus (DCC Levels 1 and 2) remain foundational requirements. Theodosian adds the data-centric protection layer needed for DCC Levels 3 and 4; persistent encryption, granular access controls, and comprehensive audit trails that go beyond what Cyber Essentials covers.
Yes. Theodosian can be deployed with UK-based data residency to meet MoD data sovereignty requirements and NCSC guidance for protecting sensitive government information. All deployments are also single-tenant by default.
Our zero-knowledge architecture ensures that no foreign entities (including Theodosian as the vendor) can access your protected defence data.
Yes. Many UK defence suppliers work with both the UK MoD and the US DoD. Theodosian's data-centric security approach satisfies requirements in both frameworks:
- DCC Levels 3/4 (UK MoD suppliers)
- CMMC Level 2/3 (US DoD contractors)
One platform, two compliance frameworks, reducing complexity, cost, and administrative burden. Learn more about Theodosian's CMMC-compliant solutions.