DoD IL6: What It Is and Why It Matters
Published: Mar 26, 2025
As more government agencies move sensitive data to the cloud, ensuring security and compliance is of paramount importance. As such, the FedRAMP (Federal Risk and Authorization Management Program) assessment and authorization process is a critical framework to ensure that cloud environments meet federal security standards.
The Defense Information Systems Agency (DISA), an agency of the US Department of Defense (DoD), has developed a set of controls and requirements for cloud services that build upon the FedRAMP standards. DoD Impact Level 6 (IL6) represents the most stringent of these requirements. IL6 was developed specifically for cloud services supporting the DoD that handle classified information at the Secret level.
In this blog, we’ll break down what DoD IL6 entails, how it compares to other FedRAMP and DoD impact levels, and why it is crucial for cloud providers targeting the defense and national security sectors.
What Is DoD IL6?
DoD IL6 is the highest level of authorization within the FedRAMP and DoD assessment program as it is designed specifically for cloud environments managing classified data at the Secret level. Achieving IL6 authorization demonstrates a commitment to protecting sensitive government information that has a direct impact on national security.
DoD IL6 authorization is not only a compliance requirement for those handling secret level information, but it also serves as an indicator of the provider’s ability to safeguard critical data in environments where access needs to be tightly controlled. To meet the IL6 requirements, cloud environments must adhere to some of the most stringent cybersecurity practices and controls in the industry.
Comparing DoD Impact Levels: What Sets IL6 Apart
DoD defines different impact levels based on the sensitivity of the data being processed. These levels represent how much security control is required depending on the type of data:
- IL2 (Noncontrolled Unclassified Information):
Pertains to publicly available information or nonpublic unclassified information with a limited impact on an organization, requiring fewer protective measures.
- IL4 (Controlled Unclassified Information):
Suitable for handling information with higher sensitivity, such as Controlled Unclassified Information (CUI) or information that could have a serious adverse effect on an organization.
- IL5 (CUI and Unclassified National Security System Information):
Designed for systems that handle unclassified mission-critical data and CUI related to national security that could have a serious adverse effect on an organization.
- IL6 (Classified Information up to Secret):
The most stringent level, used for cloud services managing nonpublic, classified Secret data or nonpublic, unclassified data where the unauthorized disclosure of information could have a serious adverse effect on an organization.
What makes IL6 distinct from the other levels is its focus on classified data and the intense security protocols needed to protect such information. The current version (Version 1, Release 2) of the DoD Cloud Security Requirements Guide (CC SRG) encompasses 618 controls that make up the IL6 baseline—this represents a significant increase in controls when compared to the IL2, IL4, and IL5 baselines.
Who Needs DoD IL6?
DoD IL6 is an essential component that allows the adoption of the cloud computing model amongst DoD stakeholders processing, storing, and transmitting classified information.
Specifically, IL6 is required for:
- DoD Mission Owners: DoD Mission Owners must use IL6-authorized cloud environments for mission-critical systems that involve Secret level classified data.
- Cloud Service Providers (CSPs): CSPs seeking to expand their portfolio by offering services that align with DoD Mission owner needs in the classified space.
Without IL6, cloud providers cannot engage in contracts or support projects that require handling highly sensitive government data, effectively limiting their access to classified defense sector opportunities.
Why DoD IL6 Matters
For CSPs looking to serve the government in the classified national security and defense sectors, achieving DoD IL6 authorization is non-negotiable.
Below are several key reasons why IL6 is a critical milestone for any CSP in this space:
- Competitive Edge:
By obtaining IL6, CSPs can differentiate themselves as trusted providers for DoD Mission Owners with high-security requirements. Only CSPs that achieve IL6 can participate in federal contracts involving classified information as part of a government community or a DoD-only community cloud service model.
- Reinforced Security Measures:
An IL6 authorization demonstrates the provider has robust security processes in place to protect classified data.
- Clear Path to Market:
The structured FedRAMP and DoD authorization process streamlines access to government contracts by providing a standardized and recognized program.
As the DoD continues to increasingly rely on the cloud for secure data storage and processing, the demand for IL6-authorized cloud solutions will only continue to rise. Providers who can demonstrate compliance with IL6 requirements are positioned to handle the most sensitive and mission-critical workloads, giving them a significant edge in the federal and DoD contracting space.
Achieving DoD IL6: A Critical Step for Robust Cloud Security
DoD IL6 is the highest authorization available within the FedRAMP and DoD assessment and authorization framework, specifically for cloud environments managing classified data at the Secret level. For cloud providers aiming to secure government contracts and protect highly sensitive information, achieving DoD IL6 is an essential step in establishing credibility and trust with the DoD community.
If you have additional questions about DoD IL6 or other aspects of the FedRAMP Assessment process, Schellman can help. Contact us today and we’ll get back to you shortly.
About Nick Rundhaug
Nick Rundhaug is a Managing Director and Federal Practice Leader with Schellman. Nick has over 20 years of experience in the information technology field with 15 years’ experience in Federal frameworks for information technology. With a background as a network engineer and assessor, Nick specializes in the areas of cryptography, networking, and security mechanisms in cloud environments.