UIAO SCuBA Value Proposition — Two-Way Governance

Two-way governance architecture for SCuBA and BOD 25-01

Author

Michael Stratton

Published

April 1, 2026

CONTROLLED

UIAO-core Value Proposition

Two-Way Governance Architecture for SCuBA and BOD 25-01

Classification: Controlled

Author: Michal Doroszewski

Date: April 2026

Audience: CISOs · Federal Modernization Leads · Venture Capital · Analysts · Agency Security Architects

1. Executive Summary

Binding Operational Directive 25-01 mandates automated, continuous cloud security assessments across all Federal Civilian Executive Branch agencies. CISA's Secure Cloud Business Applications (SCuBA) program provides the assessment logic through ScubaGear (for Microsoft 365) and ScubaGoggles (for Google Workspace). ScubaConnect automates the execution — replacing interactive, human-dependent runs with non-interactive, certificate-authenticated workflows orchestrated through GitHub Actions. But neither SCuBA nor ScubaConnect provides governance. They produce data, not meaning. They assess posture; they do not govern it.

UIAO-core fills the missing half. It wraps around the entire SCuBA data path as a governance envelope — not inline, but as a two-way prompt-and-conversion mediator. Outbound (Leg 1), UIAO-core captures assessment results in parallel with CISA's official CDM feed, normalizes them into canonical governance artifacts, detects drift against prior baselines, and routes violations to remediation pipelines. Inbound (Leg 2), UIAO-core monitors CISA's upstream policy releases on the cisagov/ScubaGear GitHub repository, detects new baselines and Rego rule changes, generates governance events, and triggers assessment recalibration — closing the loop. No other component in the SCuBA ecosystem watches both directions.

The result is a deterministic governance feedback system that transforms SCuBA from a compliance assessment tool into a continuously governed, audit-ready compliance pipeline. SCuBA assesses. ScubaConnect automates. UIAO governs.

2. The Problem: Why SCuBA Alone Cannot Satisfy BOD 25-01

BOD 25-01 imposes two non-negotiable requirements on FCEB agencies. First, agencies must deploy SCuBA automated assessment tools by April 25, 2025. Second, agencies must implement all future updates to mandatory SCuBA policies — a standing obligation that persists indefinitely.

The legacy model for SCuBA compliance is manual, point-in-time, and human-dependent. A system administrator downloads ScubaGear from the cisagov/ScubaGear GitHub repository, opens a PowerShell session, logs in via an interactive browser pop-up (OAuth device-code flow or interactive MFA), runs the assessment script locally on a workstation, generates static HTML/JSON/CSV reports, and manually uploads the results to CISA's CyberScope reporting portal on a quarterly basis. This model is the status quo at most agencies that adopted SCuBA prior to ScubaConnect.

This model has five critical weaknesses that BOD 25-01 explicitly requires agencies to eliminate:

  1. Human-dependent trigger. An administrator must remember to initiate the assessment. There is no automated schedule, no cron, no event-driven trigger. If the administrator is on leave, reassigned, or simply forgets, the assessment does not run.

  2. Interactive authentication. ScubaGear's default authentication model requires a browser pop-up login — an interactive OAuth flow that cannot be automated. This hard-couples the assessment to a human sitting at a keyboard.

  3. Local execution. The script runs on a single workstation, bound to that machine's CPU, RAM, and network connectivity. If the workstation is powered off, reimaged, or disconnected from the network, the assessment fails.

  4. Quarterly frequency. The manual model produces point-in-time snapshots at best quarterly — and often less frequently. Between runs, the agency has zero visibility into configuration drift. BOD 25-01 requires continuous monitoring, not periodic snapshots.

  5. Manual reporting. Results must be manually formatted and uploaded to CyberScope by a human. There is no automated pipeline from assessment output to CISA's CDM Dashboard.

BOD 25-01 explicitly requires eliminating this model. The directive mandates automated, non-interactive, continuously running assessment tools that feed results directly to CISA — without human intermediaries in the data path.

Table 1: Manual vs. Automated Assessment Models

Dimension Manual Model (Pre-ScubaConnect) Automated Model (ScubaConnect + UIAO)
Trigger Admin manually types a command GitHub Actions timer (Cron schedule)
Authentication Browser pop-up login (interactive OAuth) Service Principal with certificate-based auth
Execution Local PC CPU/RAM Cloud-native GitHub Actions Runners
Frequency Quarterly (Point-in-Time) Daily (Continuous)
Delivery Manual upload to CyberScope Automated feed to CDM Dashboard

3. The Solution: UIAO-core as the Governance Envelope

UIAO-core does not sit inline between ScubaConnect and CISA's CDM Dashboard. That data path is sacrosanct. CISA owns it. Agencies cannot inject middleware into it, nor should they. The official assessment results must flow, unaltered and unmediated, from ScubaConnect through the CLAW/TALON integration layer to CISA's CDM Dashboard. Any attempt to intercept, modify, or delay that path would violate the architectural contract that BOD 25-01 establishes.

UIAO-core wraps around the entire SCuBA data path as a governance envelope. It operates on two legs simultaneously, creating a closed-loop feedback system:

The combination of prompt and conversion on two legs creates a two-way governance architecture that no other component in the SCuBA ecosystem provides. SCuBA assesses configuration state. ScubaConnect automates that assessment. UIAO-core governs the entire lifecycle — from assessment execution through policy absorption — as a continuous, deterministic feedback loop.

Diagram Reference

Diagram 1 illustrates the complete two-way governance architecture. The PlantUML source is provided as a companion artifact (uiao-scuba-two-way-governance.puml).

ID: DIAG-001-TWO-WAY-ARCH

Diagram 1: UIAO Two-Way Governance Architecture for SCuBA

A PlantUML component diagram showing three bounded contexts:

CISA Domain (Red): CDM Dashboard, cisagov/ScubaGear GitHub repository, SCuBA Baselines publications, BOD 25-01 Implementation Guidance.

Agency Cloud Environment (Blue): GitHub Actions orchestrator, ScubaConnect runtime, Service Principal authentication, M365/GWS tenant APIs.

UIAO Governance Envelope (Green): Governance Event Engine, Canonical Artifact Repository, Drift Detection Engine, Upstream Policy Watcher, Agency Dashboard.

Leg 1 (Outbound): GitHub Actions triggers ScubaConnect → authenticates via Service Principal to M365 → pulls config data → sends official results to CDM Dashboard (sacrosanct path, red) → in parallel sends results to UIAO-core → Governance Event Engine converts to canonical artifacts → stored in Canonical Artifact Repository → Drift Detection compares against prior runs → alerts routed to Agency Dashboard.

Leg 2 (Inbound): CISA publishes updated Rego rules and new Shall controls to cisagov/ScubaGear GitHub → UIAO Upstream Policy Watcher detects release (webhook/poll) → Governance Event Engine generates governance event → prompts Agency Security Team via dashboard/alert → triggers ScubaGear update workflow via GitHub Actions → re-runs assessment → closes loop back to Leg 1.

Callout Note: "UIAO-core is not inline. It wraps around the entire SCuBA data path as a governance envelope."

Legend: CISA-managed paths (red solid) · Agency cloud operations (blue solid) · Governance envelope flows (green solid) · Alert/advisory signals (yellow dashed).

Dimensions: Full page width · ~600×800px · PlantUML source: uiao-scuba-two-way-governance.puml

4. Leg 1 — Outbound: Assessment to Governance to Reporting

The outbound leg is the path most agencies already understand: assessment results flow from the M365 tenant toward CISA. What agencies typically do not have is a governance layer that intercepts those results — in parallel, never inline — and converts them into governed, versioned, actionable compliance artifacts.

4.1 Step-by-Step Data Flow

The outbound leg proceeds through the following stages:

  1. Step 1a — Orchestration Trigger. The GitHub Actions orchestrator fires on a daily cron schedule (e.g., 0 6 * * * UTC). No human initiates the run. The trigger is deterministic and time-based.

  2. Step 1b — Non-Interactive Authentication. ScubaConnect authenticates to the M365 tenant via a Service Principal with certificate-based authentication. No browser pop-up. No interactive MFA. No human in the loop. The certificate is stored as a GitHub Actions secret, rotated on a defined cadence.

  3. Step 1c — Configuration Pull. ScubaConnect calls M365 APIs — Microsoft Graph, Exchange Online PowerShell, SharePoint Online Management Shell — to pull the current configuration settings for all SCuBA-covered products (Exchange Online, SharePoint Online, Microsoft Teams, OneDrive for Business, Microsoft Defender, Entra ID, Power Platform).

  4. Step 1d — Data Return. M365 returns configuration data and audit logs. ScubaGear evaluates these against the current Rego policy baselines and produces assessment results in JSON, CSV, and HTML formats.

  5. Step 1e — Sacrosanct Path to CISA. ScubaConnect pushes official results directly to CISA's CDM Dashboard via the CLAW/TALON integration layer. This is the sacrosanct path. UIAO-core does not touch, intercept, modify, or delay this data flow. CISA owns it.

  6. Step 1f — Parallel Feed to UIAO. In parallel with Step 1e, ScubaConnect sends the same assessment results to UIAO-core. This is a read-only, non-blocking copy of the data.

  7. Step 1g — Governance Event Conversion. UIAO-core's Governance Event Engine receives the raw JSON/CSV output and converts it into a structured governance event — a typed, timestamped, machine-trackable object that captures what was assessed, what passed, what failed, and against which policy baseline version.

  8. Step 1h — Canonical Storage. The governance event is stored in the Canonical Artifact Repository as a versioned, immutable artifact. Each run produces exactly one artifact. Artifacts are never overwritten — they accumulate as a complete compliance history.

  9. Step 1i — Drift Detection. The Drift Detection Engine compares the current run's results against prior runs. It identifies configuration changes — both improvements (newly compliant settings) and regressions (newly non-compliant settings) — and flags delta items for review.

  10. Step 1j — Alerting and Remediation. If a mandatory "Shall" policy violation is detected, an alert is routed to the Agency Dashboard and a remediation ticket is generated in the agency's ticketing system. The ticket includes the specific control, the non-compliant setting, the expected value, and the baseline version that defines the requirement.

4.2 Key Architectural Insight

Architectural Principle — Leg 1

UIAO's role on the outbound leg is conversion. It takes raw SCuBA output — machine-generated JSON and CSV — and converts it into governed, versioned, actionable compliance artifacts. SCuBA produces data. UIAO produces meaning.

Table 2: Outbound Data Transformation Pipeline

Stage Data Format Owner
Raw Assessment JSON / CSV / HTML ScubaConnect
Governance Event Structured event object (typed, timestamped) UIAO-core
Canonical Artifact Versioned immutable record UIAO-core
Drift Report Delta comparison (current vs. prior runs) UIAO-core
Alert / Ticket Remediation routing (control + setting + expected value) Agency Security Team

5. Leg 2 — Inbound: Policy Updates to Governance to Recalibration

The inbound leg is the leg that does not exist without UIAO-core. It addresses the second, often overlooked requirement of BOD 25-01: agencies "shall implement all future updates to mandatory SCuBA policies." This is not a one-time event. It is a standing obligation that persists for the life of the directive.

5.1 How CISA Publishes Policy Updates

CISA does not push policy updates to agencies through a live channel. There is no webhook, no pub/sub topic, no push notification. Instead, CISA publishes updates through three surfaces:

  1. cisagov/ScubaGear GitHub Releases. New Rego rules, updated baseline versions, removed or deprecated policies, and structural changes to the assessment logic are published as tagged releases on the cisagov/ScubaGear GitHub repository.

  2. CISA's SCuBA Baselines Page. Updated Secure Configuration Baseline documents — the human-readable policy specifications that define "Shall," "Should," and "May" controls — are published on CISA's SCuBA web page.

  3. BOD 25-01 Implementation Guidance. Updated mandatory configuration lists and implementation timelines are published as amendments or supplements to the original directive.

Without UIAO-core, the inbound signal is invisible. A human must notice the GitHub release, read the changelog, understand which Rego rules changed, determine whether new "Shall" controls were added, manually update ScubaGear to the new version, and hope the next assessment run picks up the changes. If the human is on leave, or if the release falls during a sprint cycle, the agency runs assessments against stale baselines — potentially for weeks or months — while believing it is compliant.

5.2 Step-by-Step Inbound Flow

With UIAO-core, the inbound leg becomes governed:

  1. Step 2a — Upstream Policy Watch. UIAO-core's Upstream Policy Watcher monitors the cisagov/ScubaGear GitHub repository for new releases. Detection occurs via GitHub webhook (real-time) or scheduled poll (e.g., every 6 hours). The watcher tracks release tags, Rego file diffs, and baseline version increments.

  2. Step 2b — Governance Event Generation. On detection of a new release, the Governance Event Engine generates a structured governance event: "New Baseline v1.x released: N new Shall controls added to [product]. M existing controls modified. K controls deprecated." The event includes the full diff of Rego changes, mapped to human-readable control descriptions.

  3. Step 2c — Agency Prompt. The governance event prompts the agency security team via dashboard flag, email alert, or ticketing system integration. The prompt includes the release summary, the list of affected controls, and a recommended action (update ScubaGear, re-run assessment, review new Shall controls).

  4. Step 2d — Update Trigger. The Governance Event Engine triggers a ScubaGear/ScubaConnect update workflow via GitHub Actions. This can be configured as automatic (update immediately on detection) or gated (update after human approval). The update workflow pulls the new ScubaGear release, updates the Rego rules, and validates the installation.

  5. Step 2e — Recalibrated Assessment. The updated ScubaConnect instance re-runs the assessment against the new policy baseline. Results flow through Leg 1 — closing the loop. The agency's compliance posture is now evaluated against the latest mandatory controls, and any new Shall violations are immediately surfaced.

5.3 Key Architectural Insight

Architectural Principle — Leg 2

UIAO's role on the inbound leg is prompt. It detects upstream changes — new baselines, new Shall controls, deprecated policies — and prompts the appropriate governance response, ensuring agencies absorb new mandatory controls without relying on human vigilance.

Table 3: Two-Way Architecture Summary

Direction What Flows UIAO-core's Role
Outbound (Leg 1) SCuBA assessment results flowing from Agency toward CISA Conversion: Raw results → governed artifacts, drift detection, violation alerting, remediation routing
Inbound (Leg 2) CISA policy updates flowing from cisagov/ScubaGear toward Agency Prompt: Detect upstream changes → generate governance event → prompt security team → trigger recalibration

6. The Six Value Pillars

6.1 Continuous Compliance Instead of Point-in-Time Checks

SCuBA alone produces quarterly snapshots. UIAO-core produces continuous compliance visibility.

Why it matters: BOD 25-01 requires continuous monitoring, not quarterly snapshots. Agencies that rely on point-in-time assessments are non-compliant with the directive's intent and exposed to configuration drift between runs.

6.2 Deterministic, Zero-Touch Execution

SCuBA alone requires a human at a keyboard. UIAO-core requires nothing but a clock.

Why it matters: The April 25, 2025 automation mandate in BOD 25-01 requires exactly this model. Interactive authentication is explicitly incompatible with the directive's requirements for automated assessment tools.

6.3 Closed-Loop Governance Feedback System

SCuBA alone watches one direction. UIAO-core watches both.

Why it matters: No other component in the SCuBA ecosystem watches both directions. Without UIAO-core, the inbound leg is invisible — agencies must rely on human vigilance to notice and absorb new mandatory controls.

6.4 Drift-Resistant Canonical Repository

SCuBA alone produces ephemeral reports. UIAO-core produces a permanent compliance record.

Why it matters: Agencies need a single source of truth for configuration compliance history. Auditors need an immutable record. Inspector General reviews require traceability. Ephemeral reports that exist only on an administrator's workstation satisfy none of these requirements.

6.5 Agency-Side Visibility Before CISA Sees the Data

SCuBA alone sends results to CISA. UIAO-core lets agencies see their own posture first.

Why it matters: Federal-grade visibility without federal-grade latency. Agencies should not learn about their own compliance failures from a CISA dashboard notification. UIAO-core ensures they see the data first.

6.6 Future-Proof Compliance Architecture

SCuBA alone is a tool. UIAO-core is a governance platform.

Why it matters: UIAO-core is not a SCuBA integration. It is a governance platform that happens to integrate with SCuBA today. When CISA releases the next tool, the next baseline, or the next directive, UIAO-core absorbs it through the same two-way architecture.

7. Positioning Statement

"SCuBA assesses. ScubaConnect automates. UIAO governs."

UIAO-core transforms SCuBA from a manual assessment tool into a continuous, governed, automated compliance pipeline that satisfies BOD 25-01, eliminates human-dependent workflows, and provides agencies with a deterministic, audit-ready governance substrate. It is the only component in the SCuBA ecosystem that creates a two-way governance loop — converting assessment results into actionable artifacts on the outbound leg, and prompting recalibration from upstream policy changes on the inbound leg. UIAO-core is not middleware. It is not a SCuBA plugin. It is the governance envelope that turns a compliance pipeline into a governance feedback system.

8. Audience-Ready Formats

The following subsections provide condensed, drop-in-ready versions of the UIAO-core value proposition, formatted for specific audiences and delivery contexts.

8.1 One-Page Executive Summary

For leadership briefings, board presentations, and executive decision memos.

UIAO-core: Two-Way Governance for SCuBA and BOD 25-01

The Problem. BOD 25-01 mandates automated, continuous cloud security assessments. CISA's SCuBA program provides the assessment logic; ScubaConnect automates execution. But neither component provides governance. They produce data — not meaning. The manual model (interactive login, local execution, quarterly snapshots, manual reporting) is explicitly incompatible with BOD 25-01.

The Solution. UIAO-core wraps around the entire SCuBA data path as a governance envelope — not inline, but as a two-way prompt-and-conversion mediator. Outbound: assessment results are converted into governed, versioned artifacts with drift detection. Inbound: upstream policy changes are detected and assessment recalibration is triggered automatically.

Six Capabilities. (1) Continuous compliance, not point-in-time. (2) Deterministic, zero-touch execution. (3) Closed-loop governance feedback. (4) Drift-resistant canonical repository. (5) Agency-side visibility before CISA. (6) Future-proof governance platform.

Outcome. SCuBA assesses. ScubaConnect automates. UIAO governs.

8.2 Pitch-Deck Slide

Single-slide format for investor, analyst, and partner decks.

UIAO-core — The Governance Layer for Federal Cloud Compliance

Why It Matters: BOD 25-01 mandates automated cloud security for all federal civilian agencies. CISA provides the tools. No one provides the governance. UIAO-core fills the gap.

Continuous Compliance — Daily automated runs replace quarterly manual snapshots

Zero-Touch Execution — Service Principal + certificate auth, no human trigger

Two-Way Governance Loop — Outbound: results → artifacts. Inbound: policy updates → recalibration

Canonical Repository — Versioned, immutable, audit-ready compliance history

Agency-First Visibility — See posture before CISA dashboards update

Platform Architecture — Extends beyond SCuBA to future tools, clouds, and directives

"SCuBA assesses. ScubaConnect automates. UIAO governs."

8.3 GitHub README Section

For the uiao-core repository README.md.

Why UIAO-core Exists

BOD 25-01 mandates automated, continuous cloud security assessments. CISA's SCuBA tools (ScubaGear, ScubaGoggles, ScubaConnect) provide assessment and automation. UIAO-core provides the missing governance layer.

What It Provides

Outbound Governance (Leg 1): UIAO-core captures SCuBA assessment results in parallel with CISA's CDM feed, converts raw JSON/CSV into versioned governance artifacts, runs drift detection against prior baselines, and routes Shall violations to remediation pipelines.

Inbound Governance (Leg 2): UIAO-core monitors cisagov/ScubaGear for new releases, detects updated Rego rules and new Shall controls, generates governance events, and triggers assessment recalibration — closing the loop.

Canonical Repository: Every assessment run produces a versioned, immutable artifact. Full provenance from raw output to governance event to drift report to remediation ticket.

Outcome: SCuBA assesses. ScubaConnect automates. UIAO governs.

8.4 Federal CIO/CISO Narrative

For DHS, civilian agency, and interagency briefings.

UIAO-core: Closing the Governance Gap in BOD 25-01 Compliance

Context. BOD 25-01 requires FCEB agencies to deploy automated SCuBA assessment tools and implement all future updates to mandatory SCuBA policies. CISA provides the assessment logic (ScubaGear) and the automation framework (ScubaConnect). What CISA does not provide — and what no existing tool addresses — is governance: the continuous, two-way process of converting assessment data into actionable compliance artifacts and absorbing upstream policy changes into the assessment cycle.

The Gap. Without a governance layer, agencies produce assessment data but not compliance intelligence. Results are generated but not governed. Policy updates are published but not absorbed. Configuration drift occurs but is not detected until the next manual review.

The UIAO-core Advantage:

1. Continuous Monitoring. Daily automated assessments replace quarterly manual snapshots, satisfying BOD 25-01's continuous monitoring requirement.

2. Two-Way Governance. Outbound leg converts assessment results into governed artifacts. Inbound leg detects policy changes and triggers recalibration. No other component watches both directions.

3. Audit-Ready Repository. Every run produces a versioned, immutable artifact with full provenance — from raw output to governance event to drift report to remediation ticket.

4. Agency-First Visibility. Agencies see their compliance posture through internal dashboards before CISA's CDM Dashboard updates, enabling proactive remediation.

5. Future-Proof Architecture. The governance envelope pattern is reusable across future CISA tools, future directives, and future cloud platforms — reducing marginal compliance cost for each new mandate.

Strategic Outcome. UIAO-core transforms SCuBA compliance from a manual, point-in-time assessment exercise into a continuous, governed, automated compliance pipeline. It closes the governance gap that BOD 25-01 creates but does not fill.

Appendix A: PlantUML Diagram Source Reference

The complete PlantUML source for Diagram 1 (DIAG-001-TWO-WAY-ARCH) is provided as a companion file:

Filename: uiao-scuba-two-way-governance.puml

The diagram can be rendered using any PlantUML-compatible tool, including:

The PlantUML source defines three bounded contexts (CISA Domain, Agency Cloud Environment, UIAO Governance Envelope), both legs of the two-way architecture, the sacrosanct CDM data path, and the color-coded legend. The source is version-controlled alongside this document and should be updated whenever the architecture evolves.

Note

The PlantUML diagram source is a companion artifact to this document and is maintained separately. Refer to the project repository for the latest version.

UIAO-core Value Proposition · Controlled · Michal Doroszewski · April 2026

CONTROLLED

Back to top