Managing Dual-Use Hardware Requirements: Commercial and Defense Variants on a Shared Platform
Hardware companies that develop a commercial product and a defense variant simultaneously are not running two programs—they are running three. There is the commercial program, the defense program, and the shared platform underneath both of them. Each has its own governance structure, its own standards environment, and its own audit trail. The difficulty is that the platform sitting under both programs has to behave as though it belongs to all three simultaneously, without allowing any one of them to contaminate the others.
This is not a theoretical problem. It occurs in avionics, in unmanned systems, in satellite hardware, in ground vehicle subsystems, and in power electronics. Companies that handle it well ship faster and audit cleaner. Companies that handle it poorly end up maintaining two completely separate requirement sets for the same physical hardware, duplicating engineering work, and facing certification findings when a defense-derived change touches a commercial baseline without documentation.
This guide covers the structural approach to managing shared-platform requirements across commercial and defense variants—specifically the standards environments involved, how to architect a common baseline, what ITAR and access control mean in practice for a requirements database, and how to structure traceability so that the benefits of shared development are preserved.
The Standards Environments Are Not Compatible by Default
The commercial and defense standards environments start from different premises, and those premises affect how requirements are written, verified, and traced.
On the commercial side, the FAA’s DO-178C (software), DO-254 (complex electronic hardware), and AS9100 quality management framework define what acceptable evidence looks like. Certification is a negotiation between the applicant and the authority. The FAA does not tell you how to write requirements—it tells you what properties your requirements must have (unambiguous, verifiable, traceable, consistent) and then evaluates your artifacts against those properties. A single unsupported requirement in your Hardware Design Lifecycle Data package is a finding. Certification evidence must be complete, standalone, and legible to a DER who has no access to anything outside the certification package.
On the defense side, MIL-STD-961 (defense specifications), MIL-STD-882 (system safety), MIL-STD-1553/ARINC interface standards where applicable, and the broader INCOSE-aligned systems engineering process that most defense primes expect all apply. Defense acquisition programs typically use a Statement of Work, a Contract Data Requirements List (CDRL), and a Systems Engineering Plan that specifies exactly which artifacts get delivered at which milestone. The government customer reviews deliverables at PDR, CDR, and subsequent reviews. The standard for “complete” is contractually defined, not negotiated with a regulator.
These two environments differ in one critical way for multi-program management: the FAA evaluates what you submit; the government owns what you submit. A certification package is yours until a DER signs off. A CDRL deliverable belongs to the government from the moment it is accepted. This distinction matters when you are deciding which requirements can be shared, which artifacts can be referenced, and which content must be kept out of the commercial package entirely.
Architecting the Common Platform Baseline
The architectural principle is straightforward to state and difficult to implement: separate inheritance from ownership.
The platform baseline contains requirements that are true of the hardware regardless of variant. These are structural, physical, electrical, thermal, and interface requirements that both the commercial and defense configurations must satisfy. They are written in variant-neutral language. They are owned by a platform chief engineer or systems architect who is accountable to both programs.
Above the platform baseline sit two variant configurations:
-
Commercial variant configuration: inherits all platform requirements by reference, adds commercial-specific requirements (certification basis, operational environment per TSO or type certificate, interface requirements to commercial avionics), and is the source of record for the DO-254/DO-178C artifacts submitted to the FAA.
-
Defense variant configuration: inherits all platform requirements by reference, adds defense-specific requirements (MIL-STD environmental qualification levels, TEMPEST or emissions controls, specific interface protocols, mission-specific performance requirements), and generates the CDRL deliverables submitted to the government customer.
The critical discipline is that neither variant configuration may modify a platform-level requirement—it may only add requirements or constrain parameters already defined at the platform level. If a variant needs the platform requirement to change, that change goes through a platform-level change process that is reviewed by both programs before it is approved.
This sounds obvious. In practice it fails because organizations do not enforce it tooling. An engineer working on the defense variant adds a tighter vibration requirement directly to the defense configuration document. That requirement should have been proposed as a platform-level change, evaluated for commercial impact, and either incorporated at the platform level or explicitly scoped to the defense variant with a documented rationale. Instead it lives in a Word document that the commercial program does not know about, and six months later the physical hardware that gets tested for commercial certification fails the defense vibration profile because nobody updated the test plan.
The fix is structural, not disciplinary. You need a requirements management architecture where the inheritance relationship between platform and variant is enforced by the system, not by people remembering to check.
ITAR and Access Control in a Requirements Database
ITAR (International Traffic in Arms Regulations) controls the export of defense articles, defense services, and related technical data. Requirements that describe the performance, interface, or design of a defense system—particularly military electronics, weapons systems, or dual-use items with military application—are frequently ITAR-controlled technical data. This is not optional and not a matter of interpretation: if the content is on the USML (United States Munitions List) or describes a defense article, the default assumption is that it requires export authorization to share with foreign nationals, including employees of your own company who are not U.S. persons.
For a requirements management system, this means:
Access control must be enforced at the artifact level, not just the document level. A requirements database that gives all engineers access to the full database with a folder-level permission structure is inadequate. A foreign national on the commercial program team should not be able to navigate to a requirements object describing a military-specific performance parameter, even accidentally. The system needs per-object visibility controls that are tied to user attributes (clearance level, U.S. person status, program assignment), not just folder permissions.
Platform requirements must be written to be export-clean. If a platform-level requirement references a military-specific standard, acronym, or performance level in its rationale or notes field, that requirement may now be ITAR-controlled even if the requirement statement itself is neutral. Platform-level requirements need to be written with the assumption that they will be visible to the full commercial team.
The commercial certification package must contain no ITAR-controlled content. FAA certification packages are submitted to the authority and may be reviewed by DERs, ODA unit members, and ultimately become part of the public record of type certificate data. An ITAR-controlled requirement appearing in a certification package is both a regulatory compliance failure and an export control violation. This is not a hypothetical risk—it has produced enforcement actions.
Audit trails for defense requirements need to be separated from audit trails submitted in certification evidence. The history of who modified a requirement, when, and why is part of your quality record. If your defense variant requirements and commercial variant requirements share a change history log, you cannot submit that log as part of the commercial certification package without potentially exposing ITAR-controlled content.
Structuring Traceability Across Programs
Traceability in a dual-use program has three layers, and each layer has different audiences and different audit requirements.
Layer 1: Platform-to-variant allocation traceability. Every variant-level requirement must trace to either a platform-level requirement it elaborates, or to a variant-specific stakeholder need that has no counterpart at the platform level. This traceability is internal governance—it proves that the variant configurations are not inventing requirements that should be platform-level, and it enables impact analysis when platform requirements change.
Layer 2: Commercial certification traceability. The DO-254 and DO-178C requirements traceability matrices trace from system requirements to hardware/software requirements to design to test. This chain must be self-contained within the commercial variant configuration. Every requirement in the chain must be present in the certification package. Any requirement that appears only in the defense configuration must be explicitly excluded from the commercial traceability chain—not ignored, explicitly excluded with a rationale.
Layer 3: Defense qualification traceability. The CDRL deliverables trace from the Statement of Work requirements through system requirements to subsystem requirements to design to test evidence. This chain must demonstrate that the defense-specific requirements—including the MIL-STD qualification levels that exceed commercial certification requirements—are fully covered. Platform-level requirements that are shared with the commercial program appear in this chain by reference, but the qualification evidence for those requirements must be generated from the defense test program, not borrowed from the commercial certification.
The last point is where programs consistently make mistakes: you cannot use FAA certification test results as qualification evidence for a defense program without explicit contractual authorization. The standards are different, the test conditions are different, and the government customer owns the qualification basis. Similarly, you cannot reference a defense qualification test result in a commercial certification package. The evidence chains must be independent even when the underlying hardware is identical.
How Modern Tools Handle This—and Where Legacy Tools Fail
Document-based requirements tools—Word documents, Excel RTMs, even first-generation tools like IBM DOORS in its traditional configuration—handle multi-program baseline management poorly for a structural reason: the document is the unit of configuration control, not the requirement.
When you need to branch a requirement—applying it to two programs with different verification methods—a document-based system forces you to either duplicate the requirement in two documents (creating a synchronization problem) or put both programs’ content in the same document (creating an access control problem). Neither option is acceptable for a dual-use program.
Graph-based requirements models treat each requirement as a node with typed relationships to other nodes—parent requirements, child requirements, derived requirements, verification methods, design artifacts, and test results. This means a single platform-level requirement node can have separate relationships to commercial verification artifacts and defense verification artifacts, with different access controls on each relationship type. When the requirement changes, the impact propagates through the graph to both programs’ verification chains simultaneously, and the system can flag which artifacts in each program require updates.
Flow Engineering is built on this graph-based model and designed specifically for multi-program hardware and systems development. Its visibility controls operate at the requirement and artifact level, not the document level, which means a platform requirement can be visible to all engineers while a defense-variant requirement with ITAR-controlled content is visible only to cleared, U.S.-person engineers on the defense program. The traceability chains for commercial certification and defense qualification are maintained as separate graphs that share platform nodes—so a change to a platform requirement propagates correctly to both chains without conflating them.
For teams managing dual-use programs, Flow Engineering’s architecture removes the structural problem that forces teams toward either duplication or contamination. The platform baseline, the commercial variant configuration, and the defense variant configuration each have their own configuration-controlled traceability graph, with explicit cross-program relationships at the platform boundary.
A Practical Approach for Teams Starting This Transition
If your team is currently managing a dual-use program with separate document sets and a manual RTM, here is a practical sequence for moving to a structured baseline:
Step 1: Identify the true platform requirements. Go through both programs’ current requirements and mark each one: platform (true of the hardware regardless of variant), commercial-specific (driven by certification basis), or defense-specific (driven by contract or MIL-STD). Expect roughly 50–70% to be platform-level. If you find fewer than 40%, the programs have already diverged more than is architecturally justified.
Step 2: Establish the platform baseline as a separate controlled artifact. The platform requirements baseline should have its own version control, its own change approval process with stakeholders from both programs, and its own owner. It is not owned by either program.
Step 3: Map ITAR boundaries before selecting or configuring tooling. Work with your export control officer to identify which requirements are ITAR-controlled and at what level of detail ITAR applies. This analysis drives the access control configuration required in your requirements management system.
Step 4: Define the traceability chain boundaries explicitly. Write a brief document (one to two pages) that specifies which artifacts are in scope for the commercial certification package, which are in scope for the defense qualification package, and how platform artifacts are referenced in each. Get sign-off from the DER (or ODA unit member) and the defense program manager before you build the traceability structure.
Step 5: Enforce inheritance in tooling, not in process. The platform-to-variant inheritance relationship needs to be enforced by the system you use to manage requirements. If your current tool cannot enforce it, that is a capability gap that will produce compliance findings.
The Honest Summary
Dual-use development is legitimate cost reduction—shared platform investment reduces non-recurring engineering for both programs. But it only produces that benefit if the requirements architecture is disciplined from the start. The failure modes are well-documented: requirements contamination that produces certification findings, ITAR violations from inadequate access control, and traceability gaps discovered during government review.
The standards environments—FAA certification and MIL-STD qualification—are not compatible by default, but they are compatible by design. The design work is the platform baseline architecture, the variant configuration structure, and the traceability chain boundaries. Do that work explicitly, enforce it in your tooling, and the shared platform delivers its intended value.