Last revised: January 2026

FAR 52.204-21 Compliance Statement

Basic Safeguarding of Covered Contractor Information Systems

DataPeak’s SaaS architecture, operational controls, and security governance are designed to align with the safeguarding requirements defined in FAR 52.204-21, which establishes minimum security standards for protecting Federal Contract Information (FCI).

While FAR 52.204-21 does not provide a formal certification mechanism, this page outlines how DataPeak supports federal contractors by aligning with the 15 mandatory safeguarding requirements and enabling customers to meet their contractual obligations.

1. Scope & Applicability

FAR 52.204-21 applies to contractor information systems that process, store, or transmit Federal Contract Information (FCI).

DataPeak supports alignment by providing a secure, multi-tenant SaaS platform with strong technical, administrative, and operational controls.

This alignment applies to:

  • DataPeak systems that may process or store FCI

  • Underlying cloud infrastructure and inherited security controls

  • Operational processes that protect confidentiality and integrity

  • Customer-configurable security features and access controls

Customers remain responsible for:

  • Proper data classification

  • Configuration of identity providers and access policies

  • Appropriate use of DataPeak’s security features

2. Summary of Alignment with FAR 52.204-21 Safeguarding Requirements

FAR 52.204-21 Requirement

1. Limit access to authorized users

2. Limit access to authorized devices

3. Verify controls for internal users

4. Protect information during transmission

5. Protect information at rest

6. Identify and authenticate users

7. Monitor and control connections

8. Implement boundary protections

9. Control public information posting

10. Perform system monitoring

11. Identify unauthorized use

12. Update malicious code protections

13. Patch and update systems

14. Restrict physical access

15. Monitor physical access

3. Detailed Alignment with FAR 52.204-21 Requirements

3.1 Access Control & Authorization

DataPeak enforces strict access controls to protect systems that may contain FCI:

  • SSO via SAML and OIDC

  • Mandatory MFA for privileged and administrative roles

  • Role-based access control (RBAC)

  • Least-privilege access defaults

  • Automated user provisioning and offboarding

  • Optional IP allowlisting and device trust enforcement

Outcome: Only authorized users and devices can access systems containing FCI.

3.2 Encryption & Data Protection

DataPeak protects FCI using industry-standard encryption:

  • Encryption in transit using TLS 1.2+/1.3

  • Encryption at rest using AES-256

  • Cloud-native key management services (KMS) with rotation

  • Secure APIs using OAuth2, signed tokens, and rate limiting

Outcome: FCI remains protected from interception or unauthorized disclosure.

3.3 Network & Boundary Security

Boundary protections include:

  • Virtual private cloud (VPC) isolation

  • Cloud-native firewalls and security groups

  • Web application firewalls (WAF) and DDoS protection

  • Zero-trust service-to-service authentication

  • Network segmentation for sensitive components

Outcome: Unauthorized network access is prevented and continuously monitored.

3.4 Monitoring, Logging & Detection

DataPeak maintains continuous monitoring through:

  • Centralized audit logging

  • Immutable log storage with retention controls

  • SIEM integration for correlation and alerting

  • Automated anomaly detection

  • Alerts for unauthorized access attempts

Outcome: Suspicious activity is detected and investigated promptly.

3.5 Malware Protection & Patching

System integrity is maintained through:

  • Malware scanning for uploads and containers

  • Software composition analysis (SCA)

  • Runtime security monitoring

  • Automated patching pipelines

  • Regular vulnerability scanning and remediation

Outcome: Systems are protected against malicious code and known vulnerabilities.

3.6 Physical Security (Inherited Controls)

DataPeak leverages hyperscale cloud providers that maintain:

  • FedRAMP Moderate or High data centers

  • 24/7 surveillance and access monitoring

  • Multi-factor physical access controls

  • Redundant power, cooling, and fire suppression

Outcome: Physical access to systems storing FCI is tightly controlled.

4. Shared Responsibility Model

Area

Platform security

Infrastructure security

Identity provider configuration

Data classification

Access policies

Logging & monitoring

Incident response

DataPeak Alignment Summary

SSO, MFA, RBAC, least-privilege defaults

Device-based trust, IP allowlisting, conditional access

Privileged access reviews, automated offboarding

TLS 1.2+/1.3, encrypted APIs

AES-256 encryption, KMS-managed keys

SSO, MFA, OAuth2, API key rotation

Network segmentation, WAF, rate limiting

Cloud firewalls, VPC isolation, zero-trust patterns

No public exposure of customer data

SIEM integration, audit logging, anomaly detection

Behavioral analytics, alerting, log correlation

Malware scanning, container/runtime security

Automated patching, vulnerability scanning

Inherited cloud provider physical controls

Cloud provider surveillance and access logging

DataPeak Responsibility

Shared

Shared

✔ (inherited)

Customer Responsibility

Shared

Shared

5. Continuous Improvement

DataPeak continuously improves its security posture through:

  • Regular control reviews

  • Threat intelligence integration

  • Annual penetration testing

  • Continuous monitoring and assessment

  • Alignment with NIST SP 800-171, NIST CSF, and FedRAMP baselines

6. Documentation & Support

Customers may request additional documentation, including:

  • Security whitepapers

  • Architecture and data flow diagrams

  • Penetration test summaries

  • Shared responsibility guidance

Requests can be made through your account representative.

Official Regulation Reference

Federal Acquisition Regulation (FAR) 52.204-21 – Basic Safeguarding of Covered Contractor Information Systems
https://www.acquisition.gov/far/52.204-21

For questions, contact info@factr.me.

You may also view FactR Limited’s Privacy Policy and Terms & Conditions