bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,281 @@
|
|
|
1
|
+
# NIST SP 800-53 Rev 5 Control Families — FedRAMP Deep Dive
|
|
2
|
+
|
|
3
|
+
All 20 control families are required by FedRAMP. This guide covers each family's
|
|
4
|
+
FedRAMP-specific requirements, common findings, and implementation notes.
|
|
5
|
+
|
|
6
|
+
FedRAMP baselines (Rev 5): Low ≈ 156 | Moderate = 323 | High = 421 controls and control enhancements.
|
|
7
|
+
|
|
8
|
+
---
|
|
9
|
+
|
|
10
|
+
## AC — Access Control
|
|
11
|
+
|
|
12
|
+
**Key FedRAMP requirements:**
|
|
13
|
+
- **AC-2**: Account management — must document account types, provisioning/de-provisioning process, periodic review (at minimum annually for privileged accounts)
|
|
14
|
+
- **AC-3**: Access enforcement — RBAC required; document roles and associated privileges
|
|
15
|
+
- **AC-6**: Least privilege — document how least privilege is enforced; privileged access must be explicitly justified
|
|
16
|
+
- **AC-17**: Remote access — MFA required on all remote access; document all remote access methods
|
|
17
|
+
- **AC-20**: Use of external systems — document all external connections; must be FedRAMP-authorized or have compensating controls
|
|
18
|
+
|
|
19
|
+
**FedRAMP parameter overrides:** AC-2 requires account reviews at specific FedRAMP-defined frequencies (more stringent than base NIST). Review the FedRAMP parameter values workbook for your baseline.
|
|
20
|
+
|
|
21
|
+
**Common findings:** Shared accounts not documented or controlled; no evidence of periodic access reviews; remote access methods not fully documented; excessive admin privileges.
|
|
22
|
+
|
|
23
|
+
---
|
|
24
|
+
|
|
25
|
+
## AT — Awareness & Training
|
|
26
|
+
|
|
27
|
+
**Key FedRAMP requirements:**
|
|
28
|
+
- **AT-2**: Literacy training and awareness — annual security awareness training for all users; includes privacy training (Rev 5)
|
|
29
|
+
- **AT-3**: Role-based training — additional training for personnel with security responsibilities; includes privacy-role training (Rev 5)
|
|
30
|
+
- **AT-4**: Training records — maintain records of completion; auditors will request training logs
|
|
31
|
+
|
|
32
|
+
**Common findings:** Training completion rate below 100%; no records of role-based training for ISSOs/security engineers; privacy training not included in AT-3 curriculum.
|
|
33
|
+
|
|
34
|
+
---
|
|
35
|
+
|
|
36
|
+
## AU — Audit & Accountability
|
|
37
|
+
|
|
38
|
+
**Key FedRAMP requirements:**
|
|
39
|
+
- **AU-2**: Event logging — document which events are logged across all boundary components
|
|
40
|
+
- **AU-3**: Content of audit records — logs must include: timestamp, source, event type, outcome, user/process identity
|
|
41
|
+
- **AU-9**: Protection of audit information — log integrity; logs must be protected from tampering
|
|
42
|
+
- **AU-11**: Audit record retention — **90 days online (hot storage); 1 year total** (FedRAMP-defined)
|
|
43
|
+
- **AU-12**: Audit record generation — 100% of in-boundary components must generate logs
|
|
44
|
+
|
|
45
|
+
**Common findings:** Not all boundary components sending logs to SIEM; log retention shorter than 90 days online; logs not protected from deletion by admins; no log review/alerting process documented.
|
|
46
|
+
|
|
47
|
+
---
|
|
48
|
+
|
|
49
|
+
## CA — Assessment, Authorization & Monitoring
|
|
50
|
+
|
|
51
|
+
**Key FedRAMP requirements:**
|
|
52
|
+
- **CA-2**: Control assessments — 3PAO annual assessment required
|
|
53
|
+
- **CA-5**: Plan of action and milestones — POA&M maintained and updated monthly
|
|
54
|
+
- **CA-7**: Continuous monitoring — ConMon program documented and executed (see ConMon Monthly requirements)
|
|
55
|
+
- **CA-8**: Penetration testing — required annually for High baseline; recommended for Moderate
|
|
56
|
+
- **CA-9**: Internal system connections — all internal connections documented with ISAs/MOUs
|
|
57
|
+
|
|
58
|
+
**Common findings:** ConMon activities not documented; POA&M items stale with no milestone updates; penetration testing not performed at required frequency.
|
|
59
|
+
|
|
60
|
+
---
|
|
61
|
+
|
|
62
|
+
## CM — Configuration Management
|
|
63
|
+
|
|
64
|
+
**Key FedRAMP requirements:**
|
|
65
|
+
- **CM-2**: Baseline configuration — secure baselines defined for all component types; CIS Benchmarks or DISA STIGs recommended
|
|
66
|
+
- **CM-3**: Configuration change control — formal CCB process with documented approval chain
|
|
67
|
+
- **CM-6**: Configuration settings — FedRAMP-defined configuration settings must be implemented; deviations documented
|
|
68
|
+
- **CM-7**: Least functionality — disable/remove unused functions, ports, protocols, services; document all allowed ports/protocols/services (PPS table in SSP Section 7)
|
|
69
|
+
- **CM-8**: System component inventory — IIW maintained and current; covers all in-boundary assets
|
|
70
|
+
|
|
71
|
+
**Common findings:** Configuration baselines not formally documented; deviations from baselines not tracked; PPS table incomplete or inconsistent with network diagrams; IIW not updated when new assets are added.
|
|
72
|
+
|
|
73
|
+
---
|
|
74
|
+
|
|
75
|
+
## CP — Contingency Planning
|
|
76
|
+
|
|
77
|
+
**Key FedRAMP requirements:**
|
|
78
|
+
- **CP-2**: Contingency plan — documented ISCP using FedRAMP template; includes RTO/RPO
|
|
79
|
+
- **CP-4**: Contingency plan testing — tested at least annually; tabletop minimum, functional preferred for High
|
|
80
|
+
- **CP-6**: Alternate storage site — required for Moderate and High; geographically separated
|
|
81
|
+
- **CP-9**: System backup — backup frequency, testing, and off-site storage documented
|
|
82
|
+
|
|
83
|
+
**Common findings:** CP tested with tabletop only for High baseline (functional test required); RTO/RPO not validated through testing; alternate site not configured or tested; backup restoration not verified.
|
|
84
|
+
|
|
85
|
+
---
|
|
86
|
+
|
|
87
|
+
## IA — Identification & Authentication
|
|
88
|
+
|
|
89
|
+
**Key FedRAMP requirements:**
|
|
90
|
+
- **IA-2**: Identification and authentication — MFA required for **all** accounts accessing federal systems; no exceptions for privileged accounts
|
|
91
|
+
- **IA-2(1)**: MFA for privileged accounts — phishing-resistant MFA strongly preferred for High
|
|
92
|
+
- **IA-5**: Authenticator management — NIST SP 800-63B alignment: no forced rotation schedules; require compromised-password lists and password strength meters
|
|
93
|
+
- **IA-8**: Non-organizational users — PIV/CAC required or justified alternative for agency users on High baseline
|
|
94
|
+
- **IA-12**: Identity proofing — required for Rev 5; document identity proofing process for privileged users
|
|
95
|
+
|
|
96
|
+
**FedRAMP encryption requirement:** All authenticator storage must use FIPS 140-2/3 validated cryptographic modules.
|
|
97
|
+
|
|
98
|
+
**Common findings:** MFA not enforced on all remote access; legacy password rotation policies inconsistent with NIST 800-63B; PIV/CAC not supported on High baseline without documented compensating controls.
|
|
99
|
+
|
|
100
|
+
---
|
|
101
|
+
|
|
102
|
+
## IR — Incident Response
|
|
103
|
+
|
|
104
|
+
**Key FedRAMP requirements:**
|
|
105
|
+
- **IR-3**: Incident response testing — tested at least annually (tabletop minimum)
|
|
106
|
+
- **IR-5**: Incident monitoring — automated alerting from SIEM required
|
|
107
|
+
- **IR-6**: Incident reporting — **report to US-CERT/CISA within 1 hour of discovery** for high-priority incidents; report to agency AO within 1 hour for incidents affecting federal data; notify FedRAMP PMO Security Inbox
|
|
108
|
+
- **IR-8**: Incident response plan — must be current, tested, and include FedRAMP-specific contacts and reporting SLAs
|
|
109
|
+
|
|
110
|
+
**Common findings:** IRP does not include FedRAMP PMO Security Inbox in notification chain; 1-hour reporting SLA not documented; IRP not tested annually; no documented evidence of past incident handling.
|
|
111
|
+
|
|
112
|
+
---
|
|
113
|
+
|
|
114
|
+
## MA — Maintenance
|
|
115
|
+
|
|
116
|
+
**Key FedRAMP requirements:**
|
|
117
|
+
- **MA-4**: Non-local maintenance — remote maintenance sessions must be documented, monitored, and terminated when complete; MFA required for remote maintenance
|
|
118
|
+
- **MA-5**: Maintenance personnel — screening requirements for maintenance personnel who access the system
|
|
119
|
+
|
|
120
|
+
**Common findings:** Remote maintenance not logged or monitored; maintenance personnel without appropriate clearances accessing federal data.
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
## MP — Media Protection
|
|
125
|
+
|
|
126
|
+
**Key FedRAMP requirements:**
|
|
127
|
+
- **MP-5**: Media transport — encryption required for media containing federal data in transit
|
|
128
|
+
- **MP-6**: Media sanitization — NIST SP 800-88 compliant sanitization procedures for media disposal; document and retain sanitization records
|
|
129
|
+
- **MP-7**: Media use — restrict or prohibit use of portable media (USB drives) within boundary
|
|
130
|
+
|
|
131
|
+
**Common findings:** No documented media sanitization procedures; portable media not restricted; cloud-native CSPs often need to document how MP controls apply to logical media (disk images, snapshots).
|
|
132
|
+
|
|
133
|
+
---
|
|
134
|
+
|
|
135
|
+
## PE — Physical & Environmental Protection
|
|
136
|
+
|
|
137
|
+
**Key FedRAMP requirements:**
|
|
138
|
+
- PE controls are typically **fully inherited** from IaaS/PaaS providers (AWS GovCloud, Azure Government, GCP)
|
|
139
|
+
- Document inherited PE controls in CIS/CRM workbook; customer-responsible PE controls (e.g., workstation access at CSP offices) must still be addressed
|
|
140
|
+
- **PE-3**: Physical access control — must document physical access controls for any CSP-operated facilities within scope
|
|
141
|
+
|
|
142
|
+
**Common findings:** PE controls marked as inherited without documenting which IaaS controls cover them; CSP office physical access not addressed even when within boundary scope.
|
|
143
|
+
|
|
144
|
+
---
|
|
145
|
+
|
|
146
|
+
## PL — Planning
|
|
147
|
+
|
|
148
|
+
**Key FedRAMP requirements:**
|
|
149
|
+
- **PL-2**: System security and privacy plans — the SSP itself; must be complete, current, and approved
|
|
150
|
+
- **PL-4**: Rules of behavior — SSP Appendix E; must be signed by all users
|
|
151
|
+
- **PL-10**: Baseline selection — document the FedRAMP baseline selected and rationale
|
|
152
|
+
|
|
153
|
+
**Common findings:** SSP not updated to reflect system changes; RoB signatures not maintained; baseline selection not formally documented.
|
|
154
|
+
|
|
155
|
+
---
|
|
156
|
+
|
|
157
|
+
## PM — Program Management
|
|
158
|
+
|
|
159
|
+
**Key FedRAMP requirements:**
|
|
160
|
+
- PM controls are **enterprise-level** — they describe the organizational security program, not individual system controls
|
|
161
|
+
- **PM-9**: Risk management strategy — enterprise risk management framework documented
|
|
162
|
+
- **PM-28**: Risk framing — new in Rev 5; document how risk is framed at organizational level
|
|
163
|
+
- PM controls are often addressed organizationally and referenced in the SSP
|
|
164
|
+
|
|
165
|
+
**Common findings:** PM controls addressed for the system without organizational context; PM-28 (new Rev 5) missing from newer SSPs.
|
|
166
|
+
|
|
167
|
+
---
|
|
168
|
+
|
|
169
|
+
## PS — Personnel Security
|
|
170
|
+
|
|
171
|
+
**Key FedRAMP requirements:**
|
|
172
|
+
- **PS-3**: Personnel screening — background checks for all personnel with access to federal data; document screening criteria
|
|
173
|
+
- **PS-4**: Personnel termination — immediate access revocation upon termination; documented process required
|
|
174
|
+
- **PS-5**: Personnel transfer — access review and adjustment upon role changes
|
|
175
|
+
- **PS-6**: Access agreements — non-disclosure agreements and access agreements documented and signed
|
|
176
|
+
|
|
177
|
+
**Common findings:** Termination process not documented or not consistently followed; contractors not covered by screening requirements; NDA records not maintained.
|
|
178
|
+
|
|
179
|
+
---
|
|
180
|
+
|
|
181
|
+
## PT — PII Processing & Transparency (New in Rev 5)
|
|
182
|
+
|
|
183
|
+
**Key FedRAMP requirements:**
|
|
184
|
+
- **PT-1**: Policy and procedures — PII processing and transparency policy required
|
|
185
|
+
- **PT-2**: Authority to process PII — legal authority for each PII type documented
|
|
186
|
+
- **PT-3**: Personally identifiable information processing purposes — document why each PII element is collected
|
|
187
|
+
- **PT-5**: Privacy notice — users informed of PII collection and use
|
|
188
|
+
- **PT-6**: System of records notice — required if system is a Privacy Act System of Records
|
|
189
|
+
|
|
190
|
+
**Note:** PT controls apply whenever the system collects, processes, stores, or transmits PII. If the system handles no PII, PT controls may be marked Not Applicable — but this determination must be documented and supported by the FIPS 199 categorization.
|
|
191
|
+
|
|
192
|
+
**Common findings:** PT control family entirely missing from Rev 4 → Rev 5 transitioned SSPs; PII inventory not documented; Privacy Act System of Records determination not made.
|
|
193
|
+
|
|
194
|
+
---
|
|
195
|
+
|
|
196
|
+
## RA — Risk Assessment
|
|
197
|
+
|
|
198
|
+
**Key FedRAMP requirements:**
|
|
199
|
+
- **RA-3**: Risk assessment — system-level risk assessment completed and updated
|
|
200
|
+
- **RA-5**: Vulnerability monitoring and scanning — automated scanning required:
|
|
201
|
+
- OS/infrastructure: **monthly minimum**
|
|
202
|
+
- Web application: **monthly minimum**
|
|
203
|
+
- Database: **monthly minimum**
|
|
204
|
+
- Container images: per CI/CD pipeline and prior to deployment
|
|
205
|
+
- 100% coverage of in-boundary assets required
|
|
206
|
+
- **RA-5(11)**: Public disclosure program — FedRAMP encourages CSPs to have a vulnerability disclosure policy (VDP)
|
|
207
|
+
- **RA-7**: Risk response — document how scan findings are triaged and remediation prioritized
|
|
208
|
+
|
|
209
|
+
**Common findings:** Scan coverage gaps (e.g., database servers not scanned, containers not included); scan frequency below monthly; no documented remediation SLA tracking.
|
|
210
|
+
|
|
211
|
+
---
|
|
212
|
+
|
|
213
|
+
## SA — System & Services Acquisition
|
|
214
|
+
|
|
215
|
+
**Key FedRAMP requirements:**
|
|
216
|
+
- **SA-4**: Acquisition process — security requirements included in procurement contracts
|
|
217
|
+
- **SA-9**: External system services — all external services documented; FedRAMP-authorized where applicable
|
|
218
|
+
- **SA-11**: Developer testing and evaluation — secure development practices documented (SDLC)
|
|
219
|
+
- **SA-15**: Development process, standards, and tools — SDLC security requirements
|
|
220
|
+
|
|
221
|
+
**Common findings:** External SaaS tools used by CSP admins not in the external services table; no documented SDLC security requirements; third-party libraries not tracked.
|
|
222
|
+
|
|
223
|
+
---
|
|
224
|
+
|
|
225
|
+
## SC — System & Communications Protection
|
|
226
|
+
|
|
227
|
+
**Key FedRAMP requirements:**
|
|
228
|
+
- **SC-5**: Denial of service protection — DDoS protection documented (often via IaaS/CDN)
|
|
229
|
+
- **SC-7**: Boundary protection — firewall/WAF rules documented; all ingress/egress controlled
|
|
230
|
+
- **SC-8**: Transmission confidentiality and integrity — **TLS 1.2 minimum; TLS 1.3 preferred** for all data in transit
|
|
231
|
+
- **SC-12**: Cryptographic key establishment and management — key management procedures documented
|
|
232
|
+
- **SC-28**: Protection of information at rest — encryption at rest with FIPS 140-2/3 validated modules
|
|
233
|
+
- **SC-39**: Process isolation — application processes isolated from each other
|
|
234
|
+
|
|
235
|
+
**Common findings:** TLS 1.0/1.1 still enabled on endpoints; key management undocumented; network segmentation not depicted in architecture diagrams; boundary not fully enforced (undocumented egress paths).
|
|
236
|
+
|
|
237
|
+
---
|
|
238
|
+
|
|
239
|
+
## SI — System & Information Integrity
|
|
240
|
+
|
|
241
|
+
**Key FedRAMP requirements:**
|
|
242
|
+
- **SI-2**: Flaw remediation — patch management SLAs: Critical 30d / High 90d / Moderate 180d / Low 365d
|
|
243
|
+
- **SI-3**: Malicious code protection — endpoint protection on all applicable components; real-time scanning
|
|
244
|
+
- **SI-4**: System monitoring — SIEM with alerting; anomaly detection documented
|
|
245
|
+
- **SI-7**: Software, firmware, and information integrity — file integrity monitoring (FIM) on critical system files
|
|
246
|
+
- **SI-10**: Information input validation — input validation for all public-facing applications (ties to web app scanning)
|
|
247
|
+
|
|
248
|
+
**Common findings:** Patch SLAs not tracked or enforced; FIM not deployed on critical servers; SIEM alerts not reviewed or tuned; malware protection not on all applicable endpoints (e.g., Linux servers overlooked).
|
|
249
|
+
|
|
250
|
+
---
|
|
251
|
+
|
|
252
|
+
## SR — Supply Chain Risk Management (New in Rev 5)
|
|
253
|
+
|
|
254
|
+
**Key FedRAMP requirements:**
|
|
255
|
+
- **SR-1**: Policy and procedures — SCRM policy required (SSP Appendix P)
|
|
256
|
+
- **SR-2**: Supply chain risk management plan — documented in Appendix P
|
|
257
|
+
- **SR-3**: Supply chain controls and processes — supplier assessment process defined
|
|
258
|
+
- **SR-4**: Provenance — track origin and custody of hardware and software components
|
|
259
|
+
- **SR-5**: Acquisition strategies, tools, and methods — preferred suppliers and vetting criteria documented
|
|
260
|
+
- **SR-8**: Notification agreements — notification from suppliers of security incidents or product changes
|
|
261
|
+
- **SR-11**: Component authenticity — anti-counterfeit measures for hardware
|
|
262
|
+
- **SR-12**: Component disposal — secure disposal of hardware and software components
|
|
263
|
+
|
|
264
|
+
**Note:** SR is the newest family and frequently has gaps in SSPs transitioned from Rev 4. Prioritize SR-1, SR-2, and SR-3 for initial authorization; remaining controls can be phased in via POA&M with AO agreement.
|
|
265
|
+
|
|
266
|
+
**Common findings:** Appendix P (SCRM Plan) is a template placeholder with no CSP-specific content; no SBOM process; critical software components (open source libraries) not tracked for vulnerabilities; SR controls entirely absent from Rev 4-era SSPs.
|
|
267
|
+
|
|
268
|
+
---
|
|
269
|
+
|
|
270
|
+
## Summary: Control Count by Baseline (Rev 5)
|
|
271
|
+
|
|
272
|
+
| Baseline | Controls & Enhancements | Primary Use |
|
|
273
|
+
|----------|------------------------|-------------|
|
|
274
|
+
| LI-SaaS | Subset of Low (~54 controls) | Low-impact SaaS with no PII, no sensitive federal data |
|
|
275
|
+
| Low | ~156 | Limited adverse effect on federal mission/assets |
|
|
276
|
+
| Moderate | 323 | Serious adverse effect — most common baseline |
|
|
277
|
+
| High | 421 | Severe or catastrophic effect (law enforcement, health, financial) |
|
|
278
|
+
|
|
279
|
+
> Control counts include base controls and all required control enhancements at each baseline.
|
|
280
|
+
> FedRAMP parameter values (FedRAMP-defined values) may be stricter than base NIST requirements —
|
|
281
|
+
> always check the FedRAMP parameter values workbook for your baseline.
|
|
@@ -0,0 +1,93 @@
|
|
|
1
|
+
# POA&M Guide
|
|
2
|
+
|
|
3
|
+
The Plan of Action & Milestones (POA&M) is SSP Appendix O. It documents all known
|
|
4
|
+
security weaknesses and the CSP's plan to remediate them. The POA&M is a living
|
|
5
|
+
document — updated monthly during continuous monitoring.
|
|
6
|
+
|
|
7
|
+
> Always use the official FedRAMP POA&M template.
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## POA&M Row Fields (Required)
|
|
12
|
+
|
|
13
|
+
| Field | Description |
|
|
14
|
+
|---|---|
|
|
15
|
+
| POA&M Item ID | Unique identifier (e.g., V-001, F-001) |
|
|
16
|
+
| Controls | NIST 800-53 Rev 5 control ID(s) affected |
|
|
17
|
+
| Weakness Name | Brief name of the finding |
|
|
18
|
+
| Weakness Description | Detailed description of the gap or vulnerability |
|
|
19
|
+
| Point of Contact | Person/team responsible for remediation |
|
|
20
|
+
| Resources Required | Tools, budget, staff needed |
|
|
21
|
+
| Overall Remediation Plan | How the weakness will be fixed |
|
|
22
|
+
| Original Detection Date | When was this first identified? |
|
|
23
|
+
| Scheduled Completion Date | Target remediation date (must meet SLA) |
|
|
24
|
+
| Milestone Changes | Track date/description changes |
|
|
25
|
+
| Status | Open / Closed / Risk Adjusted / Vendor Dependency |
|
|
26
|
+
| Comments | Additional context |
|
|
27
|
+
| Auto-Approve | Flag for auto-closures by 3PAO |
|
|
28
|
+
| Deviation Request Approved | Yes/No — for DRs approved by AO |
|
|
29
|
+
| Risk Rating (Original) | Critical / High / Moderate / Low |
|
|
30
|
+
| Risk Adjustment | If risk-adjusted, new risk level and justification |
|
|
31
|
+
| False Positive | Yes/No |
|
|
32
|
+
| Operational Requirement | Yes/No (if deviation is operational necessity) |
|
|
33
|
+
|
|
34
|
+
---
|
|
35
|
+
|
|
36
|
+
## FedRAMP Remediation SLAs
|
|
37
|
+
|
|
38
|
+
| Risk Rating | Remediation Deadline |
|
|
39
|
+
|---|---|
|
|
40
|
+
| Critical | 30 calendar days |
|
|
41
|
+
| High | 90 calendar days |
|
|
42
|
+
| Moderate | 180 calendar days |
|
|
43
|
+
| Low | 365 calendar days |
|
|
44
|
+
|
|
45
|
+
Missing SLAs is one of the most common ConMon findings. Track carefully.
|
|
46
|
+
|
|
47
|
+
---
|
|
48
|
+
|
|
49
|
+
## POA&M Item Types
|
|
50
|
+
|
|
51
|
+
### Standard Finding (F-)
|
|
52
|
+
- Identified by 3PAO during assessment or annual assessment
|
|
53
|
+
- Must be remediated within SLA
|
|
54
|
+
|
|
55
|
+
### Vendor Dependency (VD-)
|
|
56
|
+
- Remediation depends on a third-party (OS vendor, SaaS tool, IaaS provider)
|
|
57
|
+
- Must document: vendor name, tracking ID (CVE or vendor ticket), expected fix date
|
|
58
|
+
- 3PAO validates VDs during annual assessment
|
|
59
|
+
- AO must agree to accept the VD; CSP must have compensating controls
|
|
60
|
+
|
|
61
|
+
### Deviation Request (DR-)
|
|
62
|
+
Three subtypes:
|
|
63
|
+
1. **False Positive (FP)**: Finding is not actually a vulnerability — provide evidence
|
|
64
|
+
2. **Risk Adjustment (RA)**: Vulnerability exists but risk is lower due to mitigating factors — must quantify
|
|
65
|
+
3. **Operational Requirement (OR)**: Vulnerability cannot be fixed without breaking functionality — must document business justification and compensating controls
|
|
66
|
+
|
|
67
|
+
All DRs require agency AO approval before being marked as such in the POA&M.
|
|
68
|
+
|
|
69
|
+
---
|
|
70
|
+
|
|
71
|
+
## POA&M Writing Tips
|
|
72
|
+
|
|
73
|
+
1. **One finding, one row** — Do not bundle multiple vulnerabilities into a single POA&M item
|
|
74
|
+
2. **Be specific about CVEs** — For vulnerability scan findings, always include CVE IDs
|
|
75
|
+
3. **Milestone dates must be realistic** — Overpromising and missing milestones is a finding in itself
|
|
76
|
+
4. **Closed items need evidence** — When closing an item, document the evidence of remediation (scan result, configuration screenshot, date)
|
|
77
|
+
5. **Inventory sheet is required** — The POA&M template includes an inventory tab; keep it current
|
|
78
|
+
6. **Match to SAR findings** — Every finding in the SAR must appear in the POA&M; reviewers cross-reference these
|
|
79
|
+
|
|
80
|
+
---
|
|
81
|
+
|
|
82
|
+
## POA&M During Initial Authorization vs. ConMon
|
|
83
|
+
|
|
84
|
+
**Initial Authorization:**
|
|
85
|
+
- POA&M documents residual risks from the 3PAO assessment (SAR findings not remediated before ATO)
|
|
86
|
+
- Agency AO reviews and accepts residual risk as part of granting ATO
|
|
87
|
+
- Moderate/High risk items may block ATO if not remediated or deviation-approved
|
|
88
|
+
|
|
89
|
+
**Continuous Monitoring:**
|
|
90
|
+
- POA&M updated monthly
|
|
91
|
+
- Submitted to agency AO(s) monthly
|
|
92
|
+
- Open items must show active progress (milestone updates)
|
|
93
|
+
- Stale POA&M items (no updates, missed milestones) can trigger suspension of ATO
|
|
@@ -0,0 +1,134 @@
|
|
|
1
|
+
# FedRAMP Readiness Checklist
|
|
2
|
+
|
|
3
|
+
Use this checklist when doing a readiness or gap assessment. Organize findings
|
|
4
|
+
by category and flag each item as: ✅ Met | ⚠️ Partial | ❌ Not Met | N/A
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## 1. Boundary & System Documentation
|
|
9
|
+
|
|
10
|
+
- [ ] Authorization boundary is formally defined and documented
|
|
11
|
+
- [ ] Network architecture diagram exists and is current
|
|
12
|
+
- [ ] Data flow diagrams show all data entering/leaving the boundary
|
|
13
|
+
- [ ] System inventory (hardware, software, virtual assets) is complete
|
|
14
|
+
- [ ] All external connections and services are documented
|
|
15
|
+
- [ ] External services outside boundary are FedRAMP-authorized OR have documented compensating controls
|
|
16
|
+
- [ ] System categorization (FIPS 199) is complete with Low/Moderate/High determination
|
|
17
|
+
- [ ] Interconnection agreements (ISAs/MOUs) exist for all external connections
|
|
18
|
+
|
|
19
|
+
## 2. Policies & Procedures
|
|
20
|
+
|
|
21
|
+
- [ ] Information Security Policy exists and is approved
|
|
22
|
+
- [ ] Acceptable Use Policy (Rules of Behavior) is documented and signed by users
|
|
23
|
+
- [ ] Access Control Policy
|
|
24
|
+
- [ ] Configuration Management Policy & Plan
|
|
25
|
+
- [ ] Contingency Plan (CP) — written and tested within last 12 months
|
|
26
|
+
- [ ] Incident Response Plan (IRP) — written and tested within last 12 months
|
|
27
|
+
- [ ] Media Protection Policy
|
|
28
|
+
- [ ] Personnel Security Policy
|
|
29
|
+
- [ ] Physical Security Policy (or inherited from IaaS provider)
|
|
30
|
+
- [ ] Privacy policy and PII handling procedures (Rev 5 requirement)
|
|
31
|
+
- [ ] Supply Chain Risk Management policy (Rev 5 requirement)
|
|
32
|
+
|
|
33
|
+
## 3. Access Control & Identity
|
|
34
|
+
|
|
35
|
+
- [ ] Multi-factor authentication (MFA) enforced on all privileged accounts
|
|
36
|
+
- [ ] MFA enforced on all remote access
|
|
37
|
+
- [ ] Role-based access control (RBAC) implemented with documented roles
|
|
38
|
+
- [ ] Least privilege principle applied and documented
|
|
39
|
+
- [ ] Privileged access reviews performed at least annually
|
|
40
|
+
- [ ] Account provisioning/de-provisioning process is defined and followed
|
|
41
|
+
- [ ] Shared/service accounts are documented and controlled
|
|
42
|
+
- [ ] PIV/CAC support in place or plan documented (for High baseline)
|
|
43
|
+
- [ ] FIPS 140-2 or 140-3 validated authentication mechanisms in use
|
|
44
|
+
|
|
45
|
+
## 4. Encryption
|
|
46
|
+
|
|
47
|
+
- [ ] All federal data encrypted at rest using FIPS 140-2/3 validated modules
|
|
48
|
+
- [ ] All federal data encrypted in transit (TLS 1.2+ minimum; 1.3 preferred)
|
|
49
|
+
- [ ] Key management procedures documented
|
|
50
|
+
- [ ] Non-FIPS algorithms (e.g., MD5, SHA-1, DES, RC4) eliminated from boundary
|
|
51
|
+
- [ ] Cryptographic modules table (required SSP appendix) is complete
|
|
52
|
+
|
|
53
|
+
## 5. Vulnerability Management
|
|
54
|
+
|
|
55
|
+
- [ ] Automated vulnerability scanning in place (OS-level)
|
|
56
|
+
- [ ] Web application scanning in place
|
|
57
|
+
- [ ] Database scanning in place
|
|
58
|
+
- [ ] Container image scanning in place (if containers are used)
|
|
59
|
+
- [ ] Scan coverage includes 100% of in-boundary assets
|
|
60
|
+
- [ ] Scan frequency meets FedRAMP requirements (OS: monthly; web app: monthly)
|
|
61
|
+
- [ ] Remediation SLAs are defined and tracked: Critical 30d / High 90d / Moderate 180d / Low 365d
|
|
62
|
+
- [ ] False positives have a documented deviation request (DR) process
|
|
63
|
+
|
|
64
|
+
## 6. Audit & Logging
|
|
65
|
+
|
|
66
|
+
- [ ] Centralized log aggregation in place (SIEM or equivalent)
|
|
67
|
+
- [ ] Audit log retention meets FedRAMP requirement (90 days online; 1 year total)
|
|
68
|
+
- [ ] All boundary components (servers, network devices, apps) sending logs
|
|
69
|
+
- [ ] Log integrity protection in place
|
|
70
|
+
- [ ] Log review process and alerting defined
|
|
71
|
+
- [ ] Privileged user activity is logged and monitored
|
|
72
|
+
|
|
73
|
+
## 7. Configuration Management
|
|
74
|
+
|
|
75
|
+
- [ ] Secure baseline configurations defined for all component types
|
|
76
|
+
- [ ] Configuration deviations documented and approved
|
|
77
|
+
- [ ] Change management process is formal and documented
|
|
78
|
+
- [ ] System and software inventory is maintained and current (CMDB or equivalent)
|
|
79
|
+
- [ ] Patch management process defined with documented SLAs
|
|
80
|
+
- [ ] CIS Benchmarks or DISA STIGs used as configuration baselines (recommended)
|
|
81
|
+
|
|
82
|
+
## 8. Incident Response
|
|
83
|
+
|
|
84
|
+
- [ ] IRP covers detection, analysis, containment, eradication, recovery
|
|
85
|
+
- [ ] Incident reporting SLAs meet FedRAMP: US-CERT reporting within 1 hour of discovery
|
|
86
|
+
- [ ] IRP tested (tabletop or functional exercise) within last 12 months
|
|
87
|
+
- [ ] IR roles and contacts documented (including agency AO contacts)
|
|
88
|
+
- [ ] Security Inbox maintained for urgent government directives (required Jan 5, 2026+)
|
|
89
|
+
|
|
90
|
+
## 9. Contingency Planning
|
|
91
|
+
|
|
92
|
+
- [ ] Business Continuity Plan (BCP) and/or Disaster Recovery Plan (DRP) documented
|
|
93
|
+
- [ ] Recovery Time Objective (RTO) and Recovery Point Objective (RPO) defined
|
|
94
|
+
- [ ] CP tested within last 12 months
|
|
95
|
+
- [ ] Backup and restore procedures tested
|
|
96
|
+
- [ ] Alternate processing site identified (for Moderate and High)
|
|
97
|
+
|
|
98
|
+
## 10. Personnel Security
|
|
99
|
+
|
|
100
|
+
- [ ] Background check process defined for personnel with access to federal data
|
|
101
|
+
- [ ] Onboarding security training documented
|
|
102
|
+
- [ ] Annual security awareness training tracked and documented
|
|
103
|
+
- [ ] Privacy training included in annual training (Rev 5)
|
|
104
|
+
- [ ] Termination procedures include immediate access revocation
|
|
105
|
+
- [ ] Contractor/third-party personnel screening requirements defined
|
|
106
|
+
|
|
107
|
+
## 11. Third-Party / Supply Chain (Rev 5)
|
|
108
|
+
|
|
109
|
+
- [ ] Inventory of third-party software and services is maintained
|
|
110
|
+
- [ ] Critical suppliers identified and assessed
|
|
111
|
+
- [ ] Software Bill of Materials (SBOM) process in place or planned
|
|
112
|
+
- [ ] Open source components tracked for known vulnerabilities
|
|
113
|
+
- [ ] SR control family (Supply Chain Risk Management) requirements reviewed
|
|
114
|
+
|
|
115
|
+
## 12. Privacy (Rev 5)
|
|
116
|
+
|
|
117
|
+
- [ ] PII inventory documented (what PII is collected/processed/stored)
|
|
118
|
+
- [ ] Privacy Impact Assessment (PIA) completed if PII is in scope
|
|
119
|
+
- [ ] Privacy training included in AT-3 training program
|
|
120
|
+
- [ ] PT control family requirements reviewed and mapped
|
|
121
|
+
|
|
122
|
+
## 13. 3PAO Readiness
|
|
123
|
+
|
|
124
|
+
- [ ] Selected a FedRAMP-recognized 3PAO (check FedRAMP Marketplace)
|
|
125
|
+
- [ ] If 3PAO helped write SSP, a *different* 3PAO must do the assessment (A2LA R311)
|
|
126
|
+
- [ ] Authorization boundary agreed upon with 3PAO before assessment begins
|
|
127
|
+
- [ ] CSO is "frozen" from changes during assessment window
|
|
128
|
+
- [ ] Evidence repository (e.g., GRC tool or SharePoint) organized and accessible to 3PAO
|
|
129
|
+
|
|
130
|
+
## 14. OSCAL / Automation (Forward-Looking)
|
|
131
|
+
|
|
132
|
+
- [ ] Aware of OSCAL mandate (September 2026 deadline)
|
|
133
|
+
- [ ] Evaluated OSCAL-capable GRC tools or the FedRAMP automation GitHub repo
|
|
134
|
+
- [ ] SSP data structured to facilitate OSCAL export
|
|
@@ -0,0 +1,86 @@
|
|
|
1
|
+
# SAP & SAR Guide
|
|
2
|
+
|
|
3
|
+
The Security Assessment Plan (SAP) and Security Assessment Report (SAR) are prepared
|
|
4
|
+
by the Third-Party Assessment Organization (3PAO), not the CSP. However, CSPs are
|
|
5
|
+
responsible for reviewing and approving both documents before submission.
|
|
6
|
+
|
|
7
|
+
> SAP and SAR templates updated December 2024. Always use current templates.
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## Security Assessment Plan (SAP)
|
|
12
|
+
|
|
13
|
+
The SAP defines the planned scope, methodology, and testing approach.
|
|
14
|
+
|
|
15
|
+
### Key SAP Sections
|
|
16
|
+
|
|
17
|
+
1. **System Overview** — Brief description of the CSO and authorization boundary
|
|
18
|
+
2. **Assessment Scope** — Which controls will be tested and why (based on Control Selection Worksheet)
|
|
19
|
+
3. **Assessment Team** — 3PAO lead assessor, team members, roles
|
|
20
|
+
4. **Assessment Methods** — Interview, examine, test (per NIST 800-53A)
|
|
21
|
+
5. **Test Case Procedures** — Detailed test steps for each in-scope control (uses FedRAMP test case workbook)
|
|
22
|
+
6. **Schedule** — Assessment timeline, including freeze date for CSO changes
|
|
23
|
+
7. **Reporting** — Expected SAR format and delivery timeline
|
|
24
|
+
|
|
25
|
+
### Control Selection Process (CSP + 3PAO Joint)
|
|
26
|
+
Controls selected for assessment are determined using the **Annual Assessment Controls Selection Worksheet**, which has four tabs:
|
|
27
|
+
- **Rev 5 List of Controls** — All controls in the applicable baseline
|
|
28
|
+
- **Conditional Controls** — Controls that apply based on specific implementations
|
|
29
|
+
- **CSP-Specific Controls** — Selected by CSP based on system changes and ConMon activities
|
|
30
|
+
- **Inherited Controls** — Controls inherited from leveraged FedRAMP systems
|
|
31
|
+
|
|
32
|
+
All new or modified Rev 5 requirements must be tested. Other controls are selected based on:
|
|
33
|
+
- System changes since last assessment
|
|
34
|
+
- Open POA&M items
|
|
35
|
+
- ConMon activities and anomalies
|
|
36
|
+
- Three-year periodicity requirement (no control can go untested for 3+ years)
|
|
37
|
+
|
|
38
|
+
### CSP Review Tips for the SAP
|
|
39
|
+
- Verify the boundary described matches the SSP
|
|
40
|
+
- Confirm control selection is complete — missing required controls will cause delays
|
|
41
|
+
- Ensure test methods are appropriate for your environment
|
|
42
|
+
- Review schedule and confirm CSO can be frozen during testing window
|
|
43
|
+
- Confirm all CSP staff interviews are scheduled (ISSOs, engineers, ops)
|
|
44
|
+
|
|
45
|
+
---
|
|
46
|
+
|
|
47
|
+
## Security Assessment Report (SAR)
|
|
48
|
+
|
|
49
|
+
The SAR documents what the 3PAO actually found during testing.
|
|
50
|
+
|
|
51
|
+
### Key SAR Sections
|
|
52
|
+
|
|
53
|
+
1. **Executive Summary** — Overall risk posture, total findings by risk level
|
|
54
|
+
2. **System Description** — Confirmed boundary and architecture
|
|
55
|
+
3. **Assessment Results** — Per-control test results (Pass / Fail / Other than Satisfied)
|
|
56
|
+
4. **Findings** — Detailed description of each identified weakness
|
|
57
|
+
5. **Risk Exposure Table** — Aggregated risk view (recommended for agency customer review)
|
|
58
|
+
6. **3PAO Recommendation** — Authorization recommended / not recommended
|
|
59
|
+
|
|
60
|
+
### SAR Appendices
|
|
61
|
+
|
|
62
|
+
| Appendix | Content |
|
|
63
|
+
|---|---|
|
|
64
|
+
| A | Infrastructure Scan Results |
|
|
65
|
+
| B | Security Requirements Traceability Matrix (SRTM) — required for Low, Moderate, High |
|
|
66
|
+
| C | Web Application Scan Results |
|
|
67
|
+
| D | Database Scan Results |
|
|
68
|
+
| E | Risk Exposure Table (RET) |
|
|
69
|
+
| F | Penetration Test Results (for High; recommended for Moderate) |
|
|
70
|
+
|
|
71
|
+
### CSP Review Tips for the SAR
|
|
72
|
+
- **Cross-reference every finding with your SSP** — If a finding says a control is not implemented but your SSP describes an implementation, challenge the finding with evidence
|
|
73
|
+
- **Review risk ratings** — If you believe a finding's risk level is too high given mitigating factors, discuss with 3PAO (supports a future DR/RA)
|
|
74
|
+
- **Verify inherited control findings** — Gaps attributed to inherited controls may actually be the IaaS/PaaS provider's responsibility
|
|
75
|
+
- **Debrief presentation** — CSP and 3PAO prepare and upload a SAR debrief for agency AO review before the debrief meeting
|
|
76
|
+
- **Every SAR finding → POA&M row** — Begin building POA&M while reviewing SAR
|
|
77
|
+
|
|
78
|
+
---
|
|
79
|
+
|
|
80
|
+
## 3PAO Selection Guidance
|
|
81
|
+
|
|
82
|
+
- 3PAOs must be recognized by FedRAMP — check the FedRAMP Marketplace
|
|
83
|
+
- **A2LA R311 restriction**: A 3PAO that provided advisory services (e.g., helped write the SSP) cannot perform the assessment for that same CSO for 2 years
|
|
84
|
+
- Select a 3PAO with experience at your impact level (High is more specialized)
|
|
85
|
+
- Request references from other CSPs at similar baseline levels
|
|
86
|
+
- Clarify roles in writing: what does the CSP provide vs. what does the 3PAO produce?
|