ITAR. Defense Article Controls Mapped to Security Posture.

ITAR Compliance Overlay

The International Traffic in Arms Regulations govern the export and temporary import of defense articles and defense services on the United States Munitions List. US Person access enforcement, Technology Control Plans, deemed export controls, and licensing agreements. Continuous evidence from connected infrastructure. Overlay maps ITAR obligations to NIST 800-53 controls across Access Control, Audit and Accountability, and Physical and Environmental Protection families.

Defense articles require controls that go beyond standard cybersecurity frameworks.

ITAR is not a cybersecurity regulation. It is an export control regime administered by the Department of State. But the obligations it imposes on defense contractors are deeply technical: restricting access to US Persons, controlling the physical and logical boundaries where technical data resides, preventing deemed exports through visual or verbal disclosure, and maintaining auditable proof of compliance across every requirement. Organizations that handle ITAR-controlled articles need security controls that satisfy both ITAR and the underlying cybersecurity frameworks their contracts require. This overlay maps those obligations to enforceable, evidence-backed controls.

01
What Is ITAR
Department of State Export Controls for Defense Articles, Services, and Technical Data.

The International Traffic in Arms Regulations (ITAR) implement the Arms Export Control Act (AECA) of 1976. ITAR is administered by the Directorate of Defense Trade Controls (DDTC) within the U.S. Department of State. The regulations govern the manufacture, export, temporary import, brokering, and transfer of defense articles, defense services, and related technical data listed on the United States Munitions List (USML). Unlike cybersecurity frameworks that focus on protecting information systems, ITAR focuses on controlling access to specific categories of items and information that the U.S. government has determined are critical to national defense. The scope extends beyond physical weapons systems to include blueprints, design specifications, manufacturing processes, test data, software source code, and any technical information required for the development, production, or use of a defense article.

ITAR registration is mandatory for any person or entity that manufactures, exports, or temporarily imports defense articles or furnishes defense services. Registration with DDTC does not grant authorization to export. It establishes the legal relationship between the registrant and the Department of State and is a prerequisite for obtaining export licenses. The registration process requires disclosure of the organization's officers, directors, and key management personnel; any debarred parties associated with the organization; foreign ownership, control, or influence (FOCI); and the specific USML categories relevant to the organization's activities. Registration must be renewed annually. Failure to register when required is an independent violation of the AECA, separate from any unauthorized export that may occur. Organizations that handle ITAR-controlled technical data in the course of defense contracts are subject to these requirements even if they never physically ship a defense article across a border.

The distinction between ITAR and the Export Administration Regulations (EAR) is fundamental to compliance. ITAR covers items on the USML: articles specifically designed, developed, configured, adapted, or modified for a military application. EAR covers items on the Commerce Control List (CCL): commercial and dual-use items that have both civilian and military applications. The jurisdictional determination of whether an item falls under ITAR or EAR is called a commodity jurisdiction (CJ) determination. This classification decision has cascading consequences for every subsequent compliance obligation. ITAR items are subject to stricter controls, more limited license exceptions, and more severe penalties than EAR items. An incorrect CJ determination can result in years of unauthorized exports without the organization's knowledge. The classification is not always obvious: items that were originally designed for military use but have been adapted for commercial applications may still fall under ITAR jurisdiction. The DDTC, not the exporter, makes the final jurisdictional determination when there is ambiguity, through a formal CJ request process.

02
The Problem
Accidental Exports, Criminal Penalties, and the Collapse of Manual Controls.

ITAR violations carry penalties that dwarf those of most regulatory regimes. Criminal penalties include fines up to $1 million per violation and imprisonment up to 20 years. Civil penalties reach $500,000 per violation under the current penalty schedule, with no maximum aggregate cap. Beyond financial penalties, the Department of State can impose statutory debarment: a prohibition on participating in any export or import of defense articles or services. For a defense contractor, debarment is an existential threat. It removes the organization's ability to perform on existing contracts, bid on new contracts, and participate in the defense industrial base. Voluntary disclosure of violations to DDTC is strongly incentivized by the penalty guidelines, but disclosure does not eliminate liability. It is a mitigating factor in the penalty calculation, not an immunity provision. Organizations that discover violations and fail to disclose them face enhanced penalties when the violation is eventually discovered through other means.

The most common ITAR violations are not deliberate acts of espionage. They are accidental exports caused by inadequate access controls, poor data classification, and the inherent difficulty of controlling technical data in modern collaborative environments. An engineer shares a design file with a foreign national colleague on the same team without recognizing it as ITAR-controlled technical data. A cloud storage bucket containing ITAR data is configured with permissions that allow access from foreign IP addresses. A video conference discussing ITAR-controlled manufacturing processes includes a participant who is not a US Person. An email thread containing controlled technical data is forwarded to a distribution list that includes foreign person recipients. Each of these events constitutes an unauthorized export. The export occurs at the moment the foreign person gains access to the controlled information, regardless of whether they actually review, download, or use it. The intent of the person sharing the information is irrelevant to the legal analysis. The question is whether an unauthorized export occurred, not whether anyone intended it to occur.

Manual compliance processes fail because ITAR obligations are continuous, not periodic. Access to ITAR-controlled data must be restricted to US Persons at all times, not just during quarterly access reviews. Physical and logical boundaries must be maintained continuously, not verified during annual audits. The combination of cloud infrastructure, distributed teams, collaboration platforms, and contractor networks creates a surface area that is impossible to control through periodic manual verification. Organizations that rely on annual training, quarterly access reviews, and self-certification by individual employees discover violations months or years after they occur, during government audits, whistleblower complaints, or voluntary self-assessment exercises. By then, the accumulated exposure may span thousands of individual violation events across multiple USML categories, each carrying its own penalty exposure. The gap between the continuous nature of ITAR obligations and the periodic nature of manual compliance processes is where violations accumulate.

03
USML Categories
21 Categories of Defense Articles. Classification Determines Every Downstream Obligation.

The United States Munitions List comprises 21 categories of defense articles, from Category I (Firearms, Close Assault Weapons, and Combat Shotguns) through Category XXI (Articles, Technical Data, and Defense Services Not Otherwise Enumerated). Each category contains specific subcategories that define the controlled items with increasing precision. Category IV covers Launch Vehicles, Guided Missiles, Ballistic Missiles, Rockets, Torpedoes, Bombs, and Mines. Category XI covers Military Electronics. Category XII covers Fire Control, Laser, Imaging, and Guidance Equipment. Category XV covers Spacecraft and Related Articles. The technical data and defense services associated with each category are controlled under the same category as the underlying defense article. This means that design specifications for a Category IV item are themselves Category IV controlled technical data, subject to the same export restrictions as the physical article.

The classification determination process begins with identifying whether an item is specifically designed, developed, configured, adapted, or modified for a military application. Items with predominantly military applications are presumed to be USML items unless they have been specifically moved to the CCL through an Export Control Reform (ECR) reclassification. The ECR initiative, which began in 2013, systematically reviewed each USML category and moved items with predominantly commercial applications to the CCL under EAR jurisdiction. This created a "positive list" approach where the USML now enumerates specific items rather than using broad catch-all language. However, Category XXI still functions as a residual category for defense articles that do not fall neatly into Categories I through XX. Classification is not a one-time exercise. Design changes, technology upgrades, integration of new components, and changes in intended end-use can all affect an item's jurisdictional status. Organizations must maintain classification records for every controlled item and review those classifications when the item undergoes material changes.

The distinction between what falls under ITAR and what falls under EAR has direct consequences for the stringency of compliance obligations. ITAR items cannot be exported to most destinations without a specific license from DDTC. EAR items may be exported under license exceptions that significantly reduce the administrative burden. ITAR has no de minimis exception: even a small percentage of ITAR-controlled content in an otherwise commercial item subjects the entire item to ITAR jurisdiction. EAR has a de minimis rule that allows items with less than 25% controlled U.S.-origin content (10% for certain destinations) to be exported without a license in many cases. ITAR has no concept of "publicly available" information as an exemption for technical data in the same way that EAR treats "published" information. While the 2015 ITAR amendments created a narrow exclusion for fundamental research and certain public domain information, the scope of that exclusion is limited and frequently misunderstood. Organizations that assume their technical data is exempt because it was presented at a conference or published in a journal may be operating on an incorrect legal interpretation that constitutes an ongoing violation.

04
US Person Access
Who Qualifies. Foreign Person Restrictions. Background Investigation Requirements.

ITAR restricts access to defense articles, defense services, and technical data to US Persons. The definition of US Person under ITAR includes U.S. citizens regardless of their location, lawful permanent residents (green card holders), protected individuals under 8 U.S.C. 1324b(a)(3), and any entity incorporated in the United States. The definition does not include foreign nationals on temporary work visas (H-1B, L-1, O-1, or any other nonimmigrant visa category), foreign nationals with pending permanent residency applications, dual nationals of the United States and a proscribed country, or foreign-owned subsidiaries of U.S. companies unless the subsidiary itself is incorporated in the United States. This definition is narrower than many organizations assume. A senior engineer on an H-1B visa who has worked at the company for ten years and holds a security clearance from another program is not a US Person under ITAR. Granting that engineer access to ITAR-controlled technical data constitutes a deemed export requiring a license from DDTC.

Enforcing the US Person access requirement across an organization's workforce is operationally challenging. Human resources systems track citizenship status and visa type for employment eligibility purposes, but that information must be connected to the access control systems that govern who can reach ITAR-controlled data repositories, collaboration spaces, file shares, source code repositories, and physical facilities. The connection between HR citizenship data and technical access controls is rarely automated in most organizations. When an employee's visa status changes, when a contractor is onboarded, when a visitor is granted temporary facility access, the ITAR access control implications of each event must be evaluated. Background investigations add another dimension. While ITAR does not mandate a specific background investigation standard in the same way that classified programs require security clearances, organizations handling sensitive ITAR programs often implement investigations to verify citizenship claims, identify undisclosed foreign affiliations, and satisfy customer contract requirements. The depth of investigation varies by program sensitivity, from basic employment verification to comprehensive background checks.

The consequences of US Person access failures extend beyond the individual violation event. When a foreign person gains unauthorized access to ITAR-controlled technical data, the organization must assess the full scope of the exposure: what data was accessible, what data was actually accessed, what duration the access window was open, and what foreign government interests are implicated by the foreign person's nationality. This assessment often requires forensic analysis of access logs, email systems, collaboration platform records, and physical access control systems. The assessment results feed the mandatory violation analysis that determines whether voluntary disclosure to DDTC is appropriate. If the foreign person is a national of a proscribed country (currently including China, Russia, Iran, North Korea, Syria, Cuba, and others), the violation severity increases substantially. The organization must also assess whether the unauthorized access triggers notification obligations to the contracting agency, the Defense Counterintelligence and Security Agency (DCSA), or other government entities depending on the program and contract requirements.

05
Technology Control Plans
TCPs for ITAR Facilities. Physical and Logical Controls. Visitor Management.

A Technology Control Plan (TCP) is the operational document that defines how an organization prevents unauthorized access to ITAR-controlled technical data and defense articles within its facilities. TCPs are required when foreign persons are present in facilities where ITAR-controlled items are stored, processed, or discussed. This includes organizations with foreign national employees on non-ITAR programs who share physical space with ITAR program personnel, organizations that host foreign visitors, and organizations operating under a Special Security Agreement (SSA) or Proxy Agreement due to foreign ownership, control, or influence. The TCP must address physical security controls (locked areas, restricted access zones, badge requirements), logical security controls (network segmentation, access control lists, data classification markers), personnel controls (US Person verification procedures, escort requirements for visitors), and procedural controls (clean desk policies, secure communication requirements, meeting room protocols).

Physical controls in a TCP define the boundaries where ITAR-controlled work occurs and the mechanisms that enforce those boundaries. Restricted areas must be physically separated from unrestricted areas with access controlled by badge readers, cipher locks, or other authentication mechanisms that log every entry and exit. Visitor management procedures must require advance authorization, US Person escort for foreign visitors in restricted areas, sign-in/sign-out logs, and restrictions on electronic devices (cameras, phones, laptops) that could capture or transmit controlled technical data. Workstations processing ITAR-controlled data must be positioned to prevent visual access from unrestricted areas or must be equipped with privacy screens. Printers and copiers used for ITAR-controlled documents must be located within the restricted area. Whiteboards and shared displays used during ITAR-controlled discussions must be erased or powered down before the restricted area is opened to unrestricted personnel. These physical controls are auditable: badge reader logs, visitor logs, and area access records all produce evidence that the TCP is operating as documented.

Logical controls in a TCP address the digital boundaries that are equally critical in modern work environments. Network segmentation must isolate systems processing ITAR-controlled data from systems accessible to foreign persons. This includes separate network segments, VLANs, or entirely separate physical networks depending on the sensitivity of the program and the organization's risk assessment. Access control lists on file servers, source code repositories, collaboration platforms, and email distribution groups must enforce the US Person restriction. Cloud infrastructure hosting ITAR-controlled data must be configured to prevent access from foreign IP address ranges and must use authentication mechanisms that enforce the US Person requirement at the identity provider level. Encryption of ITAR-controlled data at rest and in transit is a baseline requirement, but encryption alone does not satisfy the access control obligation. An encrypted file accessible to a foreign person through valid credentials is still an unauthorized export if the foreign person can decrypt it. The TCP must document the complete control chain: from physical facility boundaries through network segmentation through application-level access controls through data-level encryption, with no gap at any layer.

06
Deemed Exports
Release to Foreign Nationals Within the United States. Visual and Verbal Disclosure.

A deemed export occurs when ITAR-controlled technical data or defense services are released to a foreign person within the United States. The "export" does not cross a physical border. It crosses a jurisdictional boundary defined by the citizenship status of the person receiving the information. The deemed export rule means that sharing a controlled design document with a foreign national colleague sitting in the next cubicle is legally equivalent to mailing that document to a foreign government. The same licensing requirements apply. The same penalties apply. The same violation analysis and disclosure obligations apply. This concept is one of the most frequently misunderstood aspects of ITAR compliance, because the intuitive understanding of "export" as a physical border crossing does not match the legal definition. Organizations that manage multinational workforces must internalize that every information-sharing event involving ITAR-controlled data and a non-US Person participant is a potential deemed export event.

The scope of what constitutes a "release" under the deemed export rule extends beyond deliberate document sharing. Visual disclosure occurs when a foreign person can see ITAR-controlled information displayed on a screen, whiteboard, printed document, or physical prototype. Verbal disclosure occurs when a foreign person hears a discussion of ITAR-controlled technical data, whether in a formal meeting, a hallway conversation, or a phone call. Application-based disclosure occurs when a foreign person uses software that embodies ITAR-controlled technology or when software functionality reveals controlled design parameters, algorithms, or performance characteristics. The breadth of these disclosure vectors creates a compliance challenge that is fundamentally different from protecting classified information, where physical and procedural controls are well-established. ITAR-controlled technical data often exists in unclassified environments where the physical security infrastructure is not designed to prevent visual or verbal access by co-located personnel who happen to be foreign nationals.

Classification challenges compound the deemed export problem. Not every technical discussion about a defense article constitutes a release of controlled technical data. General system descriptions, information available in published marketing materials, and information that falls within the fundamental research exclusion are not controlled. But the line between a general discussion and a controlled technical exchange is often unclear in practice. An engineer explaining the general operating principles of a system may inadvertently cross into controlled territory when they discuss specific performance parameters, design trade-offs, or manufacturing tolerances. The determination of whether a specific piece of information is controlled technical data requires classification analysis by someone with both the technical expertise to understand the information and the regulatory expertise to apply ITAR classification criteria. Most engineers have the former but not the latter. Most compliance officers have the latter but not the former. This expertise gap is where deemed export violations originate. Organizations need both classification guidance that is specific enough to be actionable and access controls that prevent exposure before classification analysis can occur.

07
Licensing and Agreements
DSP-5 Licenses, Technical Assistance Agreements, Manufacturing License Agreements, and Exemptions.

When an export or deemed export of ITAR-controlled items is necessary, authorization must be obtained from DDTC through one of several mechanisms. A DSP-5 is an application for a permanent export license, used when defense articles or technical data will be permanently transferred to a foreign person or entity. A Technical Assistance Agreement (TAA) authorizes the furnishing of defense services or the disclosure of technical data to foreign persons, typically in the context of collaborative programs, training, or technical support. A Manufacturing License Agreement (MLA) authorizes a foreign person to manufacture defense articles using U.S.-origin technical data. Each agreement type has specific content requirements, end-use restrictions, retransfer prohibitions, and reporting obligations. The application process involves DDTC review, potential interagency review by the Department of Defense and intelligence community, and congressional notification for significant agreements.

License processing times vary significantly based on the complexity of the transaction, the sensitivity of the items, the destination country, and the current DDTC workload. Simple DSP-5 applications for non-sensitive items to close ally countries may be processed in weeks. Complex TAAs involving sensitive technology and multiple foreign parties may take six months or longer. Congressional notification requirements for agreements exceeding certain dollar thresholds add additional time. Organizations must factor these timelines into program planning. A contract that requires technical data exchange with a foreign partner cannot begin that exchange until the authorizing agreement is approved, and the approval timeline is not within the organization's control. Provisional or interim authorizations are not available under ITAR in the way they exist in some other regulatory regimes. The export is either authorized or it is not, and proceeding without authorization is a violation regardless of the business urgency.

ITAR provides limited exemptions that authorize certain exports without a specific license. These exemptions are narrowly defined and carry their own compliance obligations. The Canadian exemption (ITAR 126.5) permits certain exports to Canada for Canadian government end-use without a license, subject to specific conditions and exclusions for certain USML categories. Exemptions for temporary exports of unclassified defense articles for personal use (ITAR 123.17), for certain exhibitions and demonstrations (ITAR 123.16), and for articles returning to the United States after temporary export each have specific conditions that must be satisfied. Reliance on an exemption without satisfying all conditions converts the exempt export into an unauthorized export. Organizations must document the specific exemption relied upon, verify that all conditions are met, and maintain records demonstrating compliance with each condition for every exempt transaction. The record-keeping obligation for exempt transactions is five years from the date of the export, identical to the retention period for licensed exports.

08
Scanning and Evidence
Continuous Verification of ITAR Controls Through Connected Infrastructure.

Sentinel monitors the controls that enforce ITAR compliance continuously. Access control configurations are verified against the US Person requirement by correlating identity provider attributes with resource-level permissions. When a new user is provisioned, Sentinel evaluates whether the user's citizenship status permits access to ITAR-restricted resources and flags any configuration that would grant a non-US Person access to controlled data stores, repositories, or collaboration spaces. Network segmentation boundaries that enforce Technology Control Plan requirements are monitored for drift: if a firewall rule is modified, a VLAN configuration is changed, or a routing table is updated in a way that could expose ITAR-controlled network segments to unrestricted segments, Sentinel detects the change and generates an evidence event documenting the deviation. Physical access control system integrations verify that badge reader configurations, restricted area designations, and visitor management procedures produce the audit trail required by the TCP.

Vanguard scans application code and infrastructure configurations for ITAR-relevant security findings. Source code repositories are analyzed for hardcoded credentials, insecure data handling patterns, and configuration weaknesses that could expose controlled technical data. Container images are scanned for vulnerabilities that could be exploited to bypass access controls. Infrastructure-as-code templates are evaluated against the ITAR overlay requirements before deployment, catching misconfigurations in the definition phase rather than after resources are provisioned. Garrison maintains a passive inventory of every resource in the connected estate, providing the complete asset picture that ITAR compliance requires. Every compute instance, storage volume, database, network interface, and identity principal is cataloged with its configuration state, access permissions, and relationship to other resources. This inventory is the foundation for verifying that the authorization boundary documented in the TCP matches the actual infrastructure deployed.

Rampart maps the evidence collected by Sentinel, the scan results from Vanguard, and the inventory from Garrison to the specific ITAR overlay controls. Each control carries a current compliance status derived from live evidence, not from a point-in-time assessment that decays between reviews. Artificer generates control narratives and implementation descriptions that explain how each ITAR obligation is satisfied, referencing the specific evidence artifacts that demonstrate compliance. When DDTC conducts a compliance review, when a prime contractor requires ITAR compliance verification, or when the organization performs its own internal assessment, the evidence package is already assembled: current, complete, and traceable to the running infrastructure. Citadel provides the aggregated view across all ITAR controls, showing compliance status, evidence freshness, and any controls that have degraded since the last review.

09
Cross-Framework Mapping
Maps to DFARS, EAR, and NIST 800-53 AC/AU/PE Control Families.

ITAR compliance does not exist in isolation. Defense contractors handling ITAR-controlled technical data on DoD contracts are simultaneously subject to DFARS 252.204-7012, which requires adequate security for Controlled Unclassified Information per NIST 800-171. ITAR-controlled technical data that is also CUI must satisfy both ITAR access control requirements and NIST 800-171 security requirements. The NIST 800-53 control families most directly relevant to ITAR obligations are Access Control (AC), which maps to US Person access enforcement and Technology Control Plan logical controls; Audit and Accountability (AU), which maps to the logging and evidence requirements for demonstrating continuous compliance; and Physical and Environmental Protection (PE), which maps to TCP physical controls, restricted areas, and visitor management. Organizations that have implemented NIST 800-53 controls for CMMC or FedRAMP already have infrastructure-level controls that partially satisfy ITAR requirements. The ITAR overlay adds the US Person dimension that generic cybersecurity frameworks do not address.

The relationship between ITAR and EAR creates a jurisdictional boundary that organizations must navigate carefully. Items that have been moved from the USML to the CCL through Export Control Reform are no longer subject to ITAR but are subject to EAR controls that may still be significant depending on the item's Export Control Classification Number (ECCN), the destination country, the end-user, and the end-use. Organizations that handle both ITAR and EAR items must maintain separate compliance programs with distinct classification procedures, different licensing authorities (DDTC for ITAR, Bureau of Industry and Security for EAR), and different record-keeping requirements. However, the underlying security controls overlap substantially. Access controls, network segmentation, audit logging, and physical security measures serve both regimes. The overlay approach allows organizations to implement a unified security infrastructure that satisfies both ITAR and EAR requirements while maintaining the distinct compliance documentation and authorization procedures that each regime demands.

Cross-framework leverage compounds for organizations that hold multiple compliance obligations simultaneously. A defense contractor pursuing CMMC Level 2 certification while maintaining ITAR compliance and preparing for FedRAMP authorization is implementing controls from the same NIST 800-53 catalog through three different lenses. The access control infrastructure that enforces US Person restrictions for ITAR also satisfies AC-2 (Account Management) for CMMC and FedRAMP. The audit logging pipeline that records access to ITAR-controlled data also satisfies AU-2 (Event Logging) and AU-3 (Content of Audit Records) across all three frameworks. The physical security controls in the TCP also satisfy PE-2 (Physical Access Authorizations), PE-3 (Physical Access Control), and PE-8 (Visitor Access Records) for CMMC and FedRAMP. Each framework adds specific parameter requirements and evidence expectations, but the underlying security infrastructure is shared. Work done to satisfy ITAR controls advances CMMC, FedRAMP, DFARS, and NIST 800-171 simultaneously. The overlay model captures these relationships explicitly, ensuring that evidence collected for one obligation is automatically applied to every other obligation it satisfies.

Something is being forged.

The full platform is under active development. Reach out to learn more or get early access.