Built for csmv4 compliance.

ready for defence delivery.

If your organisation is working towards, or already operating under Def Stan 05-138, DISX provides a proven, ready-to-use environment aligned to all the CSMv4 technical requirements – simplifying compliance and strengthening assurance from day one.

Whether you’re preparing for your first MOD contract or managing multiple CRP-level projects, DISX removes barriers by giving you a secure cloud-based solution that evidences compliance and supports delivery at pace.


DOWNLOAD THE GUIDE TO GET STARTED

DISX Brochure

This field is for validation purposes and should be left unchanged.

Compliance Without the Complexity

DISX is a secure managed workspace designed for projects handling MOD or other Official-Sensitive information. It integrates the technical controls required under Defence Standard 05-138 and CSMv4, including:

  • Identity and access management
  • Encryption at rest and in transit
  • Continuous monitoring and patching
  • Data segregation and endpoint protection
  • Secure collaboration and file transfer

Aligned to MOD Expectations

DISX supports assurance at the highest cyber risk levels (CRP3) and underpins evidence for Defence Cyber Certification (DCC).

It provides the secure infrastructure, auditability and documentation trail needed to demonstrate your adherence to Def Stan 05-138 – ensuring your compliance posture stands up to scrutiny.

Defence suppliers can confidently respond to SAQs and audits knowing that the underlying environment has been built to meet the MOD’s own standards of protection and control.

SECURE MANAGED SERVICE WITH A DIFFERENCE

Unrivalled secure cloud service for all organisations subject to stringent regulations

  • Relied upon and trusted by the MOD and Government
  • Accredited cloud-based system that allows the secure storage and transfer of OFFICIAL-SENSITIVE data
  • Compliant with Cyber Essentials and DCPP
  • CSMv4 and Secure by Design aligned
  • Sovereign cloud service, delivered by security cleared staff
  • Full service support, including support desk provision and security management

Zero trust architecture and multi-layered, robust security controls, including:

  • Secure Internet Gateway
  • Intrusion Detection and Prevention
  • Security Incident and Event Management
  • Vulnerability Assessment
  • Denial of Service Protection
  • Malware, Phishing and Firewall Protection

Rapidly deployable, scalable and built around M365 for maximum productivity

  • Microsoft 365 desktop and web applications providing secure email, office productivity and collaboration tools
  • Range of device access methods including: desktop, laptop or cloud hosted machine
  • Internet browsing, printing, document Storage, PDF viewer
  • Optional AI functionality (Microsoft 365 Copilot)