bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,281 @@
1
+ # NIST SP 800-53 Rev 5 Control Families — FedRAMP Deep Dive
2
+
3
+ All 20 control families are required by FedRAMP. This guide covers each family's
4
+ FedRAMP-specific requirements, common findings, and implementation notes.
5
+
6
+ FedRAMP baselines (Rev 5): Low ≈ 156 | Moderate = 323 | High = 421 controls and control enhancements.
7
+
8
+ ---
9
+
10
+ ## AC — Access Control
11
+
12
+ **Key FedRAMP requirements:**
13
+ - **AC-2**: Account management — must document account types, provisioning/de-provisioning process, periodic review (at minimum annually for privileged accounts)
14
+ - **AC-3**: Access enforcement — RBAC required; document roles and associated privileges
15
+ - **AC-6**: Least privilege — document how least privilege is enforced; privileged access must be explicitly justified
16
+ - **AC-17**: Remote access — MFA required on all remote access; document all remote access methods
17
+ - **AC-20**: Use of external systems — document all external connections; must be FedRAMP-authorized or have compensating controls
18
+
19
+ **FedRAMP parameter overrides:** AC-2 requires account reviews at specific FedRAMP-defined frequencies (more stringent than base NIST). Review the FedRAMP parameter values workbook for your baseline.
20
+
21
+ **Common findings:** Shared accounts not documented or controlled; no evidence of periodic access reviews; remote access methods not fully documented; excessive admin privileges.
22
+
23
+ ---
24
+
25
+ ## AT — Awareness & Training
26
+
27
+ **Key FedRAMP requirements:**
28
+ - **AT-2**: Literacy training and awareness — annual security awareness training for all users; includes privacy training (Rev 5)
29
+ - **AT-3**: Role-based training — additional training for personnel with security responsibilities; includes privacy-role training (Rev 5)
30
+ - **AT-4**: Training records — maintain records of completion; auditors will request training logs
31
+
32
+ **Common findings:** Training completion rate below 100%; no records of role-based training for ISSOs/security engineers; privacy training not included in AT-3 curriculum.
33
+
34
+ ---
35
+
36
+ ## AU — Audit & Accountability
37
+
38
+ **Key FedRAMP requirements:**
39
+ - **AU-2**: Event logging — document which events are logged across all boundary components
40
+ - **AU-3**: Content of audit records — logs must include: timestamp, source, event type, outcome, user/process identity
41
+ - **AU-9**: Protection of audit information — log integrity; logs must be protected from tampering
42
+ - **AU-11**: Audit record retention — **90 days online (hot storage); 1 year total** (FedRAMP-defined)
43
+ - **AU-12**: Audit record generation — 100% of in-boundary components must generate logs
44
+
45
+ **Common findings:** Not all boundary components sending logs to SIEM; log retention shorter than 90 days online; logs not protected from deletion by admins; no log review/alerting process documented.
46
+
47
+ ---
48
+
49
+ ## CA — Assessment, Authorization & Monitoring
50
+
51
+ **Key FedRAMP requirements:**
52
+ - **CA-2**: Control assessments — 3PAO annual assessment required
53
+ - **CA-5**: Plan of action and milestones — POA&M maintained and updated monthly
54
+ - **CA-7**: Continuous monitoring — ConMon program documented and executed (see ConMon Monthly requirements)
55
+ - **CA-8**: Penetration testing — required annually for High baseline; recommended for Moderate
56
+ - **CA-9**: Internal system connections — all internal connections documented with ISAs/MOUs
57
+
58
+ **Common findings:** ConMon activities not documented; POA&M items stale with no milestone updates; penetration testing not performed at required frequency.
59
+
60
+ ---
61
+
62
+ ## CM — Configuration Management
63
+
64
+ **Key FedRAMP requirements:**
65
+ - **CM-2**: Baseline configuration — secure baselines defined for all component types; CIS Benchmarks or DISA STIGs recommended
66
+ - **CM-3**: Configuration change control — formal CCB process with documented approval chain
67
+ - **CM-6**: Configuration settings — FedRAMP-defined configuration settings must be implemented; deviations documented
68
+ - **CM-7**: Least functionality — disable/remove unused functions, ports, protocols, services; document all allowed ports/protocols/services (PPS table in SSP Section 7)
69
+ - **CM-8**: System component inventory — IIW maintained and current; covers all in-boundary assets
70
+
71
+ **Common findings:** Configuration baselines not formally documented; deviations from baselines not tracked; PPS table incomplete or inconsistent with network diagrams; IIW not updated when new assets are added.
72
+
73
+ ---
74
+
75
+ ## CP — Contingency Planning
76
+
77
+ **Key FedRAMP requirements:**
78
+ - **CP-2**: Contingency plan — documented ISCP using FedRAMP template; includes RTO/RPO
79
+ - **CP-4**: Contingency plan testing — tested at least annually; tabletop minimum, functional preferred for High
80
+ - **CP-6**: Alternate storage site — required for Moderate and High; geographically separated
81
+ - **CP-9**: System backup — backup frequency, testing, and off-site storage documented
82
+
83
+ **Common findings:** CP tested with tabletop only for High baseline (functional test required); RTO/RPO not validated through testing; alternate site not configured or tested; backup restoration not verified.
84
+
85
+ ---
86
+
87
+ ## IA — Identification & Authentication
88
+
89
+ **Key FedRAMP requirements:**
90
+ - **IA-2**: Identification and authentication — MFA required for **all** accounts accessing federal systems; no exceptions for privileged accounts
91
+ - **IA-2(1)**: MFA for privileged accounts — phishing-resistant MFA strongly preferred for High
92
+ - **IA-5**: Authenticator management — NIST SP 800-63B alignment: no forced rotation schedules; require compromised-password lists and password strength meters
93
+ - **IA-8**: Non-organizational users — PIV/CAC required or justified alternative for agency users on High baseline
94
+ - **IA-12**: Identity proofing — required for Rev 5; document identity proofing process for privileged users
95
+
96
+ **FedRAMP encryption requirement:** All authenticator storage must use FIPS 140-2/3 validated cryptographic modules.
97
+
98
+ **Common findings:** MFA not enforced on all remote access; legacy password rotation policies inconsistent with NIST 800-63B; PIV/CAC not supported on High baseline without documented compensating controls.
99
+
100
+ ---
101
+
102
+ ## IR — Incident Response
103
+
104
+ **Key FedRAMP requirements:**
105
+ - **IR-3**: Incident response testing — tested at least annually (tabletop minimum)
106
+ - **IR-5**: Incident monitoring — automated alerting from SIEM required
107
+ - **IR-6**: Incident reporting — **report to US-CERT/CISA within 1 hour of discovery** for high-priority incidents; report to agency AO within 1 hour for incidents affecting federal data; notify FedRAMP PMO Security Inbox
108
+ - **IR-8**: Incident response plan — must be current, tested, and include FedRAMP-specific contacts and reporting SLAs
109
+
110
+ **Common findings:** IRP does not include FedRAMP PMO Security Inbox in notification chain; 1-hour reporting SLA not documented; IRP not tested annually; no documented evidence of past incident handling.
111
+
112
+ ---
113
+
114
+ ## MA — Maintenance
115
+
116
+ **Key FedRAMP requirements:**
117
+ - **MA-4**: Non-local maintenance — remote maintenance sessions must be documented, monitored, and terminated when complete; MFA required for remote maintenance
118
+ - **MA-5**: Maintenance personnel — screening requirements for maintenance personnel who access the system
119
+
120
+ **Common findings:** Remote maintenance not logged or monitored; maintenance personnel without appropriate clearances accessing federal data.
121
+
122
+ ---
123
+
124
+ ## MP — Media Protection
125
+
126
+ **Key FedRAMP requirements:**
127
+ - **MP-5**: Media transport — encryption required for media containing federal data in transit
128
+ - **MP-6**: Media sanitization — NIST SP 800-88 compliant sanitization procedures for media disposal; document and retain sanitization records
129
+ - **MP-7**: Media use — restrict or prohibit use of portable media (USB drives) within boundary
130
+
131
+ **Common findings:** No documented media sanitization procedures; portable media not restricted; cloud-native CSPs often need to document how MP controls apply to logical media (disk images, snapshots).
132
+
133
+ ---
134
+
135
+ ## PE — Physical & Environmental Protection
136
+
137
+ **Key FedRAMP requirements:**
138
+ - PE controls are typically **fully inherited** from IaaS/PaaS providers (AWS GovCloud, Azure Government, GCP)
139
+ - Document inherited PE controls in CIS/CRM workbook; customer-responsible PE controls (e.g., workstation access at CSP offices) must still be addressed
140
+ - **PE-3**: Physical access control — must document physical access controls for any CSP-operated facilities within scope
141
+
142
+ **Common findings:** PE controls marked as inherited without documenting which IaaS controls cover them; CSP office physical access not addressed even when within boundary scope.
143
+
144
+ ---
145
+
146
+ ## PL — Planning
147
+
148
+ **Key FedRAMP requirements:**
149
+ - **PL-2**: System security and privacy plans — the SSP itself; must be complete, current, and approved
150
+ - **PL-4**: Rules of behavior — SSP Appendix E; must be signed by all users
151
+ - **PL-10**: Baseline selection — document the FedRAMP baseline selected and rationale
152
+
153
+ **Common findings:** SSP not updated to reflect system changes; RoB signatures not maintained; baseline selection not formally documented.
154
+
155
+ ---
156
+
157
+ ## PM — Program Management
158
+
159
+ **Key FedRAMP requirements:**
160
+ - PM controls are **enterprise-level** — they describe the organizational security program, not individual system controls
161
+ - **PM-9**: Risk management strategy — enterprise risk management framework documented
162
+ - **PM-28**: Risk framing — new in Rev 5; document how risk is framed at organizational level
163
+ - PM controls are often addressed organizationally and referenced in the SSP
164
+
165
+ **Common findings:** PM controls addressed for the system without organizational context; PM-28 (new Rev 5) missing from newer SSPs.
166
+
167
+ ---
168
+
169
+ ## PS — Personnel Security
170
+
171
+ **Key FedRAMP requirements:**
172
+ - **PS-3**: Personnel screening — background checks for all personnel with access to federal data; document screening criteria
173
+ - **PS-4**: Personnel termination — immediate access revocation upon termination; documented process required
174
+ - **PS-5**: Personnel transfer — access review and adjustment upon role changes
175
+ - **PS-6**: Access agreements — non-disclosure agreements and access agreements documented and signed
176
+
177
+ **Common findings:** Termination process not documented or not consistently followed; contractors not covered by screening requirements; NDA records not maintained.
178
+
179
+ ---
180
+
181
+ ## PT — PII Processing & Transparency (New in Rev 5)
182
+
183
+ **Key FedRAMP requirements:**
184
+ - **PT-1**: Policy and procedures — PII processing and transparency policy required
185
+ - **PT-2**: Authority to process PII — legal authority for each PII type documented
186
+ - **PT-3**: Personally identifiable information processing purposes — document why each PII element is collected
187
+ - **PT-5**: Privacy notice — users informed of PII collection and use
188
+ - **PT-6**: System of records notice — required if system is a Privacy Act System of Records
189
+
190
+ **Note:** PT controls apply whenever the system collects, processes, stores, or transmits PII. If the system handles no PII, PT controls may be marked Not Applicable — but this determination must be documented and supported by the FIPS 199 categorization.
191
+
192
+ **Common findings:** PT control family entirely missing from Rev 4 → Rev 5 transitioned SSPs; PII inventory not documented; Privacy Act System of Records determination not made.
193
+
194
+ ---
195
+
196
+ ## RA — Risk Assessment
197
+
198
+ **Key FedRAMP requirements:**
199
+ - **RA-3**: Risk assessment — system-level risk assessment completed and updated
200
+ - **RA-5**: Vulnerability monitoring and scanning — automated scanning required:
201
+ - OS/infrastructure: **monthly minimum**
202
+ - Web application: **monthly minimum**
203
+ - Database: **monthly minimum**
204
+ - Container images: per CI/CD pipeline and prior to deployment
205
+ - 100% coverage of in-boundary assets required
206
+ - **RA-5(11)**: Public disclosure program — FedRAMP encourages CSPs to have a vulnerability disclosure policy (VDP)
207
+ - **RA-7**: Risk response — document how scan findings are triaged and remediation prioritized
208
+
209
+ **Common findings:** Scan coverage gaps (e.g., database servers not scanned, containers not included); scan frequency below monthly; no documented remediation SLA tracking.
210
+
211
+ ---
212
+
213
+ ## SA — System & Services Acquisition
214
+
215
+ **Key FedRAMP requirements:**
216
+ - **SA-4**: Acquisition process — security requirements included in procurement contracts
217
+ - **SA-9**: External system services — all external services documented; FedRAMP-authorized where applicable
218
+ - **SA-11**: Developer testing and evaluation — secure development practices documented (SDLC)
219
+ - **SA-15**: Development process, standards, and tools — SDLC security requirements
220
+
221
+ **Common findings:** External SaaS tools used by CSP admins not in the external services table; no documented SDLC security requirements; third-party libraries not tracked.
222
+
223
+ ---
224
+
225
+ ## SC — System & Communications Protection
226
+
227
+ **Key FedRAMP requirements:**
228
+ - **SC-5**: Denial of service protection — DDoS protection documented (often via IaaS/CDN)
229
+ - **SC-7**: Boundary protection — firewall/WAF rules documented; all ingress/egress controlled
230
+ - **SC-8**: Transmission confidentiality and integrity — **TLS 1.2 minimum; TLS 1.3 preferred** for all data in transit
231
+ - **SC-12**: Cryptographic key establishment and management — key management procedures documented
232
+ - **SC-28**: Protection of information at rest — encryption at rest with FIPS 140-2/3 validated modules
233
+ - **SC-39**: Process isolation — application processes isolated from each other
234
+
235
+ **Common findings:** TLS 1.0/1.1 still enabled on endpoints; key management undocumented; network segmentation not depicted in architecture diagrams; boundary not fully enforced (undocumented egress paths).
236
+
237
+ ---
238
+
239
+ ## SI — System & Information Integrity
240
+
241
+ **Key FedRAMP requirements:**
242
+ - **SI-2**: Flaw remediation — patch management SLAs: Critical 30d / High 90d / Moderate 180d / Low 365d
243
+ - **SI-3**: Malicious code protection — endpoint protection on all applicable components; real-time scanning
244
+ - **SI-4**: System monitoring — SIEM with alerting; anomaly detection documented
245
+ - **SI-7**: Software, firmware, and information integrity — file integrity monitoring (FIM) on critical system files
246
+ - **SI-10**: Information input validation — input validation for all public-facing applications (ties to web app scanning)
247
+
248
+ **Common findings:** Patch SLAs not tracked or enforced; FIM not deployed on critical servers; SIEM alerts not reviewed or tuned; malware protection not on all applicable endpoints (e.g., Linux servers overlooked).
249
+
250
+ ---
251
+
252
+ ## SR — Supply Chain Risk Management (New in Rev 5)
253
+
254
+ **Key FedRAMP requirements:**
255
+ - **SR-1**: Policy and procedures — SCRM policy required (SSP Appendix P)
256
+ - **SR-2**: Supply chain risk management plan — documented in Appendix P
257
+ - **SR-3**: Supply chain controls and processes — supplier assessment process defined
258
+ - **SR-4**: Provenance — track origin and custody of hardware and software components
259
+ - **SR-5**: Acquisition strategies, tools, and methods — preferred suppliers and vetting criteria documented
260
+ - **SR-8**: Notification agreements — notification from suppliers of security incidents or product changes
261
+ - **SR-11**: Component authenticity — anti-counterfeit measures for hardware
262
+ - **SR-12**: Component disposal — secure disposal of hardware and software components
263
+
264
+ **Note:** SR is the newest family and frequently has gaps in SSPs transitioned from Rev 4. Prioritize SR-1, SR-2, and SR-3 for initial authorization; remaining controls can be phased in via POA&M with AO agreement.
265
+
266
+ **Common findings:** Appendix P (SCRM Plan) is a template placeholder with no CSP-specific content; no SBOM process; critical software components (open source libraries) not tracked for vulnerabilities; SR controls entirely absent from Rev 4-era SSPs.
267
+
268
+ ---
269
+
270
+ ## Summary: Control Count by Baseline (Rev 5)
271
+
272
+ | Baseline | Controls & Enhancements | Primary Use |
273
+ |----------|------------------------|-------------|
274
+ | LI-SaaS | Subset of Low (~54 controls) | Low-impact SaaS with no PII, no sensitive federal data |
275
+ | Low | ~156 | Limited adverse effect on federal mission/assets |
276
+ | Moderate | 323 | Serious adverse effect — most common baseline |
277
+ | High | 421 | Severe or catastrophic effect (law enforcement, health, financial) |
278
+
279
+ > Control counts include base controls and all required control enhancements at each baseline.
280
+ > FedRAMP parameter values (FedRAMP-defined values) may be stricter than base NIST requirements —
281
+ > always check the FedRAMP parameter values workbook for your baseline.
@@ -0,0 +1,93 @@
1
+ # POA&M Guide
2
+
3
+ The Plan of Action & Milestones (POA&M) is SSP Appendix O. It documents all known
4
+ security weaknesses and the CSP's plan to remediate them. The POA&M is a living
5
+ document — updated monthly during continuous monitoring.
6
+
7
+ > Always use the official FedRAMP POA&M template.
8
+
9
+ ---
10
+
11
+ ## POA&M Row Fields (Required)
12
+
13
+ | Field | Description |
14
+ |---|---|
15
+ | POA&M Item ID | Unique identifier (e.g., V-001, F-001) |
16
+ | Controls | NIST 800-53 Rev 5 control ID(s) affected |
17
+ | Weakness Name | Brief name of the finding |
18
+ | Weakness Description | Detailed description of the gap or vulnerability |
19
+ | Point of Contact | Person/team responsible for remediation |
20
+ | Resources Required | Tools, budget, staff needed |
21
+ | Overall Remediation Plan | How the weakness will be fixed |
22
+ | Original Detection Date | When was this first identified? |
23
+ | Scheduled Completion Date | Target remediation date (must meet SLA) |
24
+ | Milestone Changes | Track date/description changes |
25
+ | Status | Open / Closed / Risk Adjusted / Vendor Dependency |
26
+ | Comments | Additional context |
27
+ | Auto-Approve | Flag for auto-closures by 3PAO |
28
+ | Deviation Request Approved | Yes/No — for DRs approved by AO |
29
+ | Risk Rating (Original) | Critical / High / Moderate / Low |
30
+ | Risk Adjustment | If risk-adjusted, new risk level and justification |
31
+ | False Positive | Yes/No |
32
+ | Operational Requirement | Yes/No (if deviation is operational necessity) |
33
+
34
+ ---
35
+
36
+ ## FedRAMP Remediation SLAs
37
+
38
+ | Risk Rating | Remediation Deadline |
39
+ |---|---|
40
+ | Critical | 30 calendar days |
41
+ | High | 90 calendar days |
42
+ | Moderate | 180 calendar days |
43
+ | Low | 365 calendar days |
44
+
45
+ Missing SLAs is one of the most common ConMon findings. Track carefully.
46
+
47
+ ---
48
+
49
+ ## POA&M Item Types
50
+
51
+ ### Standard Finding (F-)
52
+ - Identified by 3PAO during assessment or annual assessment
53
+ - Must be remediated within SLA
54
+
55
+ ### Vendor Dependency (VD-)
56
+ - Remediation depends on a third-party (OS vendor, SaaS tool, IaaS provider)
57
+ - Must document: vendor name, tracking ID (CVE or vendor ticket), expected fix date
58
+ - 3PAO validates VDs during annual assessment
59
+ - AO must agree to accept the VD; CSP must have compensating controls
60
+
61
+ ### Deviation Request (DR-)
62
+ Three subtypes:
63
+ 1. **False Positive (FP)**: Finding is not actually a vulnerability — provide evidence
64
+ 2. **Risk Adjustment (RA)**: Vulnerability exists but risk is lower due to mitigating factors — must quantify
65
+ 3. **Operational Requirement (OR)**: Vulnerability cannot be fixed without breaking functionality — must document business justification and compensating controls
66
+
67
+ All DRs require agency AO approval before being marked as such in the POA&M.
68
+
69
+ ---
70
+
71
+ ## POA&M Writing Tips
72
+
73
+ 1. **One finding, one row** — Do not bundle multiple vulnerabilities into a single POA&M item
74
+ 2. **Be specific about CVEs** — For vulnerability scan findings, always include CVE IDs
75
+ 3. **Milestone dates must be realistic** — Overpromising and missing milestones is a finding in itself
76
+ 4. **Closed items need evidence** — When closing an item, document the evidence of remediation (scan result, configuration screenshot, date)
77
+ 5. **Inventory sheet is required** — The POA&M template includes an inventory tab; keep it current
78
+ 6. **Match to SAR findings** — Every finding in the SAR must appear in the POA&M; reviewers cross-reference these
79
+
80
+ ---
81
+
82
+ ## POA&M During Initial Authorization vs. ConMon
83
+
84
+ **Initial Authorization:**
85
+ - POA&M documents residual risks from the 3PAO assessment (SAR findings not remediated before ATO)
86
+ - Agency AO reviews and accepts residual risk as part of granting ATO
87
+ - Moderate/High risk items may block ATO if not remediated or deviation-approved
88
+
89
+ **Continuous Monitoring:**
90
+ - POA&M updated monthly
91
+ - Submitted to agency AO(s) monthly
92
+ - Open items must show active progress (milestone updates)
93
+ - Stale POA&M items (no updates, missed milestones) can trigger suspension of ATO
@@ -0,0 +1,134 @@
1
+ # FedRAMP Readiness Checklist
2
+
3
+ Use this checklist when doing a readiness or gap assessment. Organize findings
4
+ by category and flag each item as: ✅ Met | ⚠️ Partial | ❌ Not Met | N/A
5
+
6
+ ---
7
+
8
+ ## 1. Boundary & System Documentation
9
+
10
+ - [ ] Authorization boundary is formally defined and documented
11
+ - [ ] Network architecture diagram exists and is current
12
+ - [ ] Data flow diagrams show all data entering/leaving the boundary
13
+ - [ ] System inventory (hardware, software, virtual assets) is complete
14
+ - [ ] All external connections and services are documented
15
+ - [ ] External services outside boundary are FedRAMP-authorized OR have documented compensating controls
16
+ - [ ] System categorization (FIPS 199) is complete with Low/Moderate/High determination
17
+ - [ ] Interconnection agreements (ISAs/MOUs) exist for all external connections
18
+
19
+ ## 2. Policies & Procedures
20
+
21
+ - [ ] Information Security Policy exists and is approved
22
+ - [ ] Acceptable Use Policy (Rules of Behavior) is documented and signed by users
23
+ - [ ] Access Control Policy
24
+ - [ ] Configuration Management Policy & Plan
25
+ - [ ] Contingency Plan (CP) — written and tested within last 12 months
26
+ - [ ] Incident Response Plan (IRP) — written and tested within last 12 months
27
+ - [ ] Media Protection Policy
28
+ - [ ] Personnel Security Policy
29
+ - [ ] Physical Security Policy (or inherited from IaaS provider)
30
+ - [ ] Privacy policy and PII handling procedures (Rev 5 requirement)
31
+ - [ ] Supply Chain Risk Management policy (Rev 5 requirement)
32
+
33
+ ## 3. Access Control & Identity
34
+
35
+ - [ ] Multi-factor authentication (MFA) enforced on all privileged accounts
36
+ - [ ] MFA enforced on all remote access
37
+ - [ ] Role-based access control (RBAC) implemented with documented roles
38
+ - [ ] Least privilege principle applied and documented
39
+ - [ ] Privileged access reviews performed at least annually
40
+ - [ ] Account provisioning/de-provisioning process is defined and followed
41
+ - [ ] Shared/service accounts are documented and controlled
42
+ - [ ] PIV/CAC support in place or plan documented (for High baseline)
43
+ - [ ] FIPS 140-2 or 140-3 validated authentication mechanisms in use
44
+
45
+ ## 4. Encryption
46
+
47
+ - [ ] All federal data encrypted at rest using FIPS 140-2/3 validated modules
48
+ - [ ] All federal data encrypted in transit (TLS 1.2+ minimum; 1.3 preferred)
49
+ - [ ] Key management procedures documented
50
+ - [ ] Non-FIPS algorithms (e.g., MD5, SHA-1, DES, RC4) eliminated from boundary
51
+ - [ ] Cryptographic modules table (required SSP appendix) is complete
52
+
53
+ ## 5. Vulnerability Management
54
+
55
+ - [ ] Automated vulnerability scanning in place (OS-level)
56
+ - [ ] Web application scanning in place
57
+ - [ ] Database scanning in place
58
+ - [ ] Container image scanning in place (if containers are used)
59
+ - [ ] Scan coverage includes 100% of in-boundary assets
60
+ - [ ] Scan frequency meets FedRAMP requirements (OS: monthly; web app: monthly)
61
+ - [ ] Remediation SLAs are defined and tracked: Critical 30d / High 90d / Moderate 180d / Low 365d
62
+ - [ ] False positives have a documented deviation request (DR) process
63
+
64
+ ## 6. Audit & Logging
65
+
66
+ - [ ] Centralized log aggregation in place (SIEM or equivalent)
67
+ - [ ] Audit log retention meets FedRAMP requirement (90 days online; 1 year total)
68
+ - [ ] All boundary components (servers, network devices, apps) sending logs
69
+ - [ ] Log integrity protection in place
70
+ - [ ] Log review process and alerting defined
71
+ - [ ] Privileged user activity is logged and monitored
72
+
73
+ ## 7. Configuration Management
74
+
75
+ - [ ] Secure baseline configurations defined for all component types
76
+ - [ ] Configuration deviations documented and approved
77
+ - [ ] Change management process is formal and documented
78
+ - [ ] System and software inventory is maintained and current (CMDB or equivalent)
79
+ - [ ] Patch management process defined with documented SLAs
80
+ - [ ] CIS Benchmarks or DISA STIGs used as configuration baselines (recommended)
81
+
82
+ ## 8. Incident Response
83
+
84
+ - [ ] IRP covers detection, analysis, containment, eradication, recovery
85
+ - [ ] Incident reporting SLAs meet FedRAMP: US-CERT reporting within 1 hour of discovery
86
+ - [ ] IRP tested (tabletop or functional exercise) within last 12 months
87
+ - [ ] IR roles and contacts documented (including agency AO contacts)
88
+ - [ ] Security Inbox maintained for urgent government directives (required Jan 5, 2026+)
89
+
90
+ ## 9. Contingency Planning
91
+
92
+ - [ ] Business Continuity Plan (BCP) and/or Disaster Recovery Plan (DRP) documented
93
+ - [ ] Recovery Time Objective (RTO) and Recovery Point Objective (RPO) defined
94
+ - [ ] CP tested within last 12 months
95
+ - [ ] Backup and restore procedures tested
96
+ - [ ] Alternate processing site identified (for Moderate and High)
97
+
98
+ ## 10. Personnel Security
99
+
100
+ - [ ] Background check process defined for personnel with access to federal data
101
+ - [ ] Onboarding security training documented
102
+ - [ ] Annual security awareness training tracked and documented
103
+ - [ ] Privacy training included in annual training (Rev 5)
104
+ - [ ] Termination procedures include immediate access revocation
105
+ - [ ] Contractor/third-party personnel screening requirements defined
106
+
107
+ ## 11. Third-Party / Supply Chain (Rev 5)
108
+
109
+ - [ ] Inventory of third-party software and services is maintained
110
+ - [ ] Critical suppliers identified and assessed
111
+ - [ ] Software Bill of Materials (SBOM) process in place or planned
112
+ - [ ] Open source components tracked for known vulnerabilities
113
+ - [ ] SR control family (Supply Chain Risk Management) requirements reviewed
114
+
115
+ ## 12. Privacy (Rev 5)
116
+
117
+ - [ ] PII inventory documented (what PII is collected/processed/stored)
118
+ - [ ] Privacy Impact Assessment (PIA) completed if PII is in scope
119
+ - [ ] Privacy training included in AT-3 training program
120
+ - [ ] PT control family requirements reviewed and mapped
121
+
122
+ ## 13. 3PAO Readiness
123
+
124
+ - [ ] Selected a FedRAMP-recognized 3PAO (check FedRAMP Marketplace)
125
+ - [ ] If 3PAO helped write SSP, a *different* 3PAO must do the assessment (A2LA R311)
126
+ - [ ] Authorization boundary agreed upon with 3PAO before assessment begins
127
+ - [ ] CSO is "frozen" from changes during assessment window
128
+ - [ ] Evidence repository (e.g., GRC tool or SharePoint) organized and accessible to 3PAO
129
+
130
+ ## 14. OSCAL / Automation (Forward-Looking)
131
+
132
+ - [ ] Aware of OSCAL mandate (September 2026 deadline)
133
+ - [ ] Evaluated OSCAL-capable GRC tools or the FedRAMP automation GitHub repo
134
+ - [ ] SSP data structured to facilitate OSCAL export
@@ -0,0 +1,86 @@
1
+ # SAP & SAR Guide
2
+
3
+ The Security Assessment Plan (SAP) and Security Assessment Report (SAR) are prepared
4
+ by the Third-Party Assessment Organization (3PAO), not the CSP. However, CSPs are
5
+ responsible for reviewing and approving both documents before submission.
6
+
7
+ > SAP and SAR templates updated December 2024. Always use current templates.
8
+
9
+ ---
10
+
11
+ ## Security Assessment Plan (SAP)
12
+
13
+ The SAP defines the planned scope, methodology, and testing approach.
14
+
15
+ ### Key SAP Sections
16
+
17
+ 1. **System Overview** — Brief description of the CSO and authorization boundary
18
+ 2. **Assessment Scope** — Which controls will be tested and why (based on Control Selection Worksheet)
19
+ 3. **Assessment Team** — 3PAO lead assessor, team members, roles
20
+ 4. **Assessment Methods** — Interview, examine, test (per NIST 800-53A)
21
+ 5. **Test Case Procedures** — Detailed test steps for each in-scope control (uses FedRAMP test case workbook)
22
+ 6. **Schedule** — Assessment timeline, including freeze date for CSO changes
23
+ 7. **Reporting** — Expected SAR format and delivery timeline
24
+
25
+ ### Control Selection Process (CSP + 3PAO Joint)
26
+ Controls selected for assessment are determined using the **Annual Assessment Controls Selection Worksheet**, which has four tabs:
27
+ - **Rev 5 List of Controls** — All controls in the applicable baseline
28
+ - **Conditional Controls** — Controls that apply based on specific implementations
29
+ - **CSP-Specific Controls** — Selected by CSP based on system changes and ConMon activities
30
+ - **Inherited Controls** — Controls inherited from leveraged FedRAMP systems
31
+
32
+ All new or modified Rev 5 requirements must be tested. Other controls are selected based on:
33
+ - System changes since last assessment
34
+ - Open POA&M items
35
+ - ConMon activities and anomalies
36
+ - Three-year periodicity requirement (no control can go untested for 3+ years)
37
+
38
+ ### CSP Review Tips for the SAP
39
+ - Verify the boundary described matches the SSP
40
+ - Confirm control selection is complete — missing required controls will cause delays
41
+ - Ensure test methods are appropriate for your environment
42
+ - Review schedule and confirm CSO can be frozen during testing window
43
+ - Confirm all CSP staff interviews are scheduled (ISSOs, engineers, ops)
44
+
45
+ ---
46
+
47
+ ## Security Assessment Report (SAR)
48
+
49
+ The SAR documents what the 3PAO actually found during testing.
50
+
51
+ ### Key SAR Sections
52
+
53
+ 1. **Executive Summary** — Overall risk posture, total findings by risk level
54
+ 2. **System Description** — Confirmed boundary and architecture
55
+ 3. **Assessment Results** — Per-control test results (Pass / Fail / Other than Satisfied)
56
+ 4. **Findings** — Detailed description of each identified weakness
57
+ 5. **Risk Exposure Table** — Aggregated risk view (recommended for agency customer review)
58
+ 6. **3PAO Recommendation** — Authorization recommended / not recommended
59
+
60
+ ### SAR Appendices
61
+
62
+ | Appendix | Content |
63
+ |---|---|
64
+ | A | Infrastructure Scan Results |
65
+ | B | Security Requirements Traceability Matrix (SRTM) — required for Low, Moderate, High |
66
+ | C | Web Application Scan Results |
67
+ | D | Database Scan Results |
68
+ | E | Risk Exposure Table (RET) |
69
+ | F | Penetration Test Results (for High; recommended for Moderate) |
70
+
71
+ ### CSP Review Tips for the SAR
72
+ - **Cross-reference every finding with your SSP** — If a finding says a control is not implemented but your SSP describes an implementation, challenge the finding with evidence
73
+ - **Review risk ratings** — If you believe a finding's risk level is too high given mitigating factors, discuss with 3PAO (supports a future DR/RA)
74
+ - **Verify inherited control findings** — Gaps attributed to inherited controls may actually be the IaaS/PaaS provider's responsibility
75
+ - **Debrief presentation** — CSP and 3PAO prepare and upload a SAR debrief for agency AO review before the debrief meeting
76
+ - **Every SAR finding → POA&M row** — Begin building POA&M while reviewing SAR
77
+
78
+ ---
79
+
80
+ ## 3PAO Selection Guidance
81
+
82
+ - 3PAOs must be recognized by FedRAMP — check the FedRAMP Marketplace
83
+ - **A2LA R311 restriction**: A 3PAO that provided advisory services (e.g., helped write the SSP) cannot perform the assessment for that same CSO for 2 years
84
+ - Select a 3PAO with experience at your impact level (High is more specialized)
85
+ - Request references from other CSPs at similar baseline levels
86
+ - Clarify roles in writing: what does the CSP provide vs. what does the 3PAO produce?