What We Deliver

Four service pillars.
One complete journey.

Air-gapped sovereign architecture · Governance and audit · Local sovereign AI · Train the Trainers. Four phases. We design it, demonstrate it, prove it works, and credential your people to own it without us.

01
Design
Exposure map · DSMM score · Target architecture
02
Demonstrate
Deploy sovereign stack · No foreign vendor in critical path
03
Stress Test Google-grade
Prove it works · RTO certified · No one else does this
04
Train the Trainers
KAUST-certified · Self-replicating · We drive ourselves out
01 · Phases How We Deliver — Design · Demonstrate · Stress Test · Train
Deliverables at each phase

Four phases. Each builds on the last. The engagement ends when your people own a certified sovereign stack — and we have made ourselves redundant. No one in the sovereignty advisory space can credibly offer all four.

01
Design
Assess current exposure. Map every foreign dependency. Score against the DSMM. Design the sovereign target architecture — hardware, software, data, identity, comms, AI — across all six dimensions.
Deliverables
Exposure map · Kill-switch register · DSMM gap score · Target architecture · 90-day roadmap
02
Demonstrate
Build and deploy the designed system. Implement sovereign compute, data residency, identity, AI inference, and communications on your own hardware — with no foreign vendor in any critical path.
Deliverables
Deployed sovereign stack · Governance framework · Vendor contract revisions · NCA CCC-2 compliance package
03
Stress Test Google-grade
Prove the system works. Millions of simulated clients. Fault tolerance under national peak load. Geo-redundancy validated. 24×7 operational readiness confirmed. RTO under 4 hours certified. Declaration is not demonstration — we demonstrate.
Deliverables
Load test results · Failover certification · Observability dashboard · Geo-redundancy report · Signed RTO certificate
04
Train the Trainers
Credential your people. KAUST-certified Sovereign Infrastructure Analysts own, operate, and extend the system independently. TTT graduates become the next cohort's trainers. We drive ourselves out of business, deliberately.
Deliverables
KAUST credential · Certified analyst cohort · Self-replicating training programme · Regional centre of excellence
02 · Services Five Service Pillars
Architecture · Stress Test · Governance · AI · Train the Trainers
01 Air-gapped sovereign architecture
Your hardware. Your software. Your data. Your uptime — permanently.
L2L3
We design and validate infrastructure where no foreign vendor holds a remote kill switch. When there is no remote access path, there is no remote threat surface.
Hardware sovereignty: compute, storage, networking under national control — no vendor-managed firmware update paths
Software sovereignty: open-source or nationally licensed stacks validated against NCA CCC-2. No foreign activation keys
Data sovereignty: encryption keys in an in-country HSM. CLOUD Act orders cannot be satisfied
Identity sovereignty: Nafath-backed sovereign IdP. Zero-trust access with locally held cryptographic roots
Uptime sovereignty: Hexagon DC failover · RTO under 4 hours · 99.999% availability under 100,000-device load
02 Stress test & prove it
Millions of simulated clients. RTO certified. Declaration is not demonstration.
L2L3
Every Citadel-designed system is put through proof-of-operation before handover. We built the systems that validated public safety LTE at 100,000+ device scale at Motorola and petabyte-scale telemetry at Google.
Load simulation: millions of concurrent sessions validating throughput and latency at national peak demand
Fault tolerance: deliberate failure injection at every layer — compute, storage, network, identity — with automated recovery in real time
Geo-redundancy: cross-region failover exercised under load. RTO under 4 hours certified
24×7 observability: full metrics, logs, traces, alerting stack live before the system goes to production
Certification report: signed, submitted to NCA in CCC-2 compliant format
03 Governance and audit
Independent certification. Not sovereignty-washed.
L1L2L3L4
Sovereignty claims without independent verification are marketing. We have no hyperscaler partnership, no software to sell, and no conflict of interest. That independence is the value.
Annual DSMM audit: full six-dimension re-assessment, scored, documented, NCA CCC-2 compliant
Kill-switch register: quarterly refresh with new precedents, vendor structure changes, geopolitical vectors
NCA/SDAIA/PDPL compliance package: assessment findings formatted for regulatory submission
Third-party certification: co-signed with KAUST — converting consultant findings into academically validated conclusions
04 Local and on-premises AI
Inference that never leaves the country. Models you own.
L2L3
Every API call to OpenAI, Azure AI, or AWS Bedrock is a foreign dependency and a potential geopolitical leverage point. We architect and validate sovereign AI inference with no foreign endpoint in the path.
HUMAIN OS integration: architecture review, governance framework, ministry system integration
On-premises LLM: LLaMA, Mistral, and Arabic-tuned models on Hexagon DC or STC Cloud. No foreign API
Model governance: training data provenance, weight custody, inference audit trails, Arabic bias assessment
GPU supply chain: NVIDIA H100 advisory, export control compliance, supply disruption contingency architecture
AI kill-switch elimination: every foreign AI API mapped, risk-scored, replaced with validated local inference
05 Train the Trainers
KAUST-certified sovereign engineers. We drive ourselves out — deliberately.
L1L2L3
The goal of every Citadel engagement is to make itself unnecessary. We build national capacity, not consultant dependency. The TTT programme credentials Saudi professionals to assess, maintain, and extend sovereign infrastructure independently — anchored by a KAUST-issued qualification recognised by SDAIA, NCA, and government procurement.
Curriculum: DSMM scoring, kill-switch maintenance, NCA/PDPL compliance — co-developed with KAUST, accredited for CPE
Trainer certification: KAUST-issued Sovereign Infrastructure Analyst credential, recognised by Saudi government agencies
Cohort delivery: quarterly · 15–25 professionals · able to conduct L0–L1 assessments independently
Self-replication: cohort graduates become the next cohort's trainers. Saudi Arabia becomes the regional exporter of sovereign infrastructure expertise
Every phase begins with Design.

8 weeks. Fixed fee. Your complete exposure map and 90-day roadmap.

Commission an Assessment