fedramp-20x-mcp 0.4.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- fedramp_20x_mcp/__init__.py +14 -0
- fedramp_20x_mcp/__main__.py +12 -0
- fedramp_20x_mcp/data_loader.py +673 -0
- fedramp_20x_mcp/prompts/__init__.py +62 -0
- fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
- fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
- fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
- fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
- fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
- fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
- fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
- fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
- fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
- fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
- fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
- fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
- fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
- fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
- fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
- fedramp_20x_mcp/server.py +270 -0
- fedramp_20x_mcp/templates/__init__.py +75 -0
- fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
- fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
- fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
- fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
- fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
- fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
- fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
- fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
- fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
- fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
- fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
- fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
- fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
- fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
- fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
- fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
- fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
- fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
- fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
- fedramp_20x_mcp/tools/__init__.py +167 -0
- fedramp_20x_mcp/tools/definitions.py +154 -0
- fedramp_20x_mcp/tools/documentation.py +155 -0
- fedramp_20x_mcp/tools/enhancements.py +2256 -0
- fedramp_20x_mcp/tools/evidence.py +701 -0
- fedramp_20x_mcp/tools/export.py +753 -0
- fedramp_20x_mcp/tools/ksi.py +90 -0
- fedramp_20x_mcp/tools/requirements.py +163 -0
- fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
- fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
- fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
- fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
- fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
|
@@ -0,0 +1,592 @@
|
|
|
1
|
+
I'll help you prepare for your FedRAMP 20x assessment and audit.
|
|
2
|
+
|
|
3
|
+
# FedRAMP 20x Audit Preparation Guide
|
|
4
|
+
|
|
5
|
+
## Pre-Assessment Preparation (8-12 Weeks Before)
|
|
6
|
+
|
|
7
|
+
### Week -12 to -8: Documentation Review
|
|
8
|
+
|
|
9
|
+
**Complete Documentation Checklist:**
|
|
10
|
+
|
|
11
|
+
**Required Core Documents:**
|
|
12
|
+
- [ ] System Security Plan (machine-readable format: JSON/XML)
|
|
13
|
+
- [ ] FRR-ADS: Authorization Data Sharing API Documentation
|
|
14
|
+
- [ ] FRR-VDR: Vulnerability Disclosure & Remediation Procedures
|
|
15
|
+
- [ ] FRR-ICP: Incident Communication Plan
|
|
16
|
+
- [ ] FRR-SCN: Significant Change Notification Procedures
|
|
17
|
+
- [ ] FRR-CCM: Continuous Compliance Monitoring Plan
|
|
18
|
+
- [ ] FRR-CCM-QR: Quarterly Review Procedures
|
|
19
|
+
- [ ] FRR-PVA: Persistent Validation Procedures
|
|
20
|
+
- [ ] FRR-MAS: Modernized Assessment Strategy
|
|
21
|
+
- [ ] FRR-FSI: FedRAMP Security Inbox Procedures
|
|
22
|
+
- [ ] FRR-RSC: Re-Authorization Service Continuity Plan
|
|
23
|
+
|
|
24
|
+
**KSI Implementation Documents (72 total):**
|
|
25
|
+
- [ ] All 72 KSI implementation procedures
|
|
26
|
+
- [ ] Evidence collection methods for each KSI
|
|
27
|
+
- [ ] Metrics and target values
|
|
28
|
+
- [ ] Validation procedures
|
|
29
|
+
|
|
30
|
+
**Supporting Documents:**
|
|
31
|
+
- [ ] System architecture diagrams
|
|
32
|
+
- [ ] Data flow diagrams
|
|
33
|
+
- [ ] Network diagrams
|
|
34
|
+
- [ ] Authorization boundary documentation
|
|
35
|
+
- [ ] Interconnection agreements
|
|
36
|
+
- [ ] POA&M (current)
|
|
37
|
+
- [ ] Incident response plan
|
|
38
|
+
- [ ] Business continuity/disaster recovery plans
|
|
39
|
+
- [ ] Configuration management plan
|
|
40
|
+
- [ ] Change management procedures
|
|
41
|
+
- [ ] User guide / admin guide
|
|
42
|
+
|
|
43
|
+
**Use documentation_generator prompt for templates.**
|
|
44
|
+
|
|
45
|
+
### Week -8 to -6: Evidence Gathering
|
|
46
|
+
|
|
47
|
+
**Organize Evidence by KSI Family:**
|
|
48
|
+
|
|
49
|
+
**KSI-IAM (Identity & Access Management):**
|
|
50
|
+
- [ ] MFA enrollment reports (phishing-resistant)
|
|
51
|
+
- [ ] Access review logs (quarterly minimum)
|
|
52
|
+
- [ ] Privileged access audit logs
|
|
53
|
+
- [ ] Account lifecycle documentation
|
|
54
|
+
- [ ] Screenshots of IAM configuration
|
|
55
|
+
|
|
56
|
+
**KSI-MLA (Monitoring, Logging & Analysis):**
|
|
57
|
+
- [ ] SIEM configuration screenshots
|
|
58
|
+
- [ ] Sample log entries (system, application, security)
|
|
59
|
+
- [ ] Log retention configuration
|
|
60
|
+
- [ ] Automated alerting rules
|
|
61
|
+
- [ ] Log analysis procedures
|
|
62
|
+
|
|
63
|
+
**KSI-AFR (Automated Findings & Remediation):**
|
|
64
|
+
- [ ] Vulnerability scan results (last 3 months)
|
|
65
|
+
- [ ] Remediation tracking reports
|
|
66
|
+
- [ ] Patch management logs
|
|
67
|
+
- [ ] Evidence of automated scanning
|
|
68
|
+
|
|
69
|
+
**KSI-CMT (Change Management & Testing):**
|
|
70
|
+
- [ ] Change tickets (last 3 months)
|
|
71
|
+
- [ ] CI/CD pipeline configuration
|
|
72
|
+
- [ ] Automated testing results
|
|
73
|
+
- [ ] Rollback procedures documentation
|
|
74
|
+
|
|
75
|
+
**KSI-INR (Incident Notification & Response):**
|
|
76
|
+
- [ ] Incident logs (last 12 months)
|
|
77
|
+
- [ ] Incident response test results
|
|
78
|
+
- [ ] Notification procedures
|
|
79
|
+
- [ ] Post-incident reviews
|
|
80
|
+
|
|
81
|
+
**KSI-RPL (Recovery Planning):**
|
|
82
|
+
- [ ] Backup configuration
|
|
83
|
+
- [ ] Backup test results (last 6 months)
|
|
84
|
+
- [ ] Disaster recovery plan
|
|
85
|
+
- [ ] DR test results (annual)
|
|
86
|
+
|
|
87
|
+
**KSI-CNA (Cloud-Native Architecture):**
|
|
88
|
+
- [ ] Infrastructure as Code (IaC) templates
|
|
89
|
+
- [ ] Container scanning results
|
|
90
|
+
- [ ] Immutable infrastructure evidence
|
|
91
|
+
- [ ] Auto-scaling configurations
|
|
92
|
+
|
|
93
|
+
**KSI-SVC (Service Management & Delivery):**
|
|
94
|
+
- [ ] Service-level agreements
|
|
95
|
+
- [ ] Uptime reports
|
|
96
|
+
- [ ] Performance monitoring dashboards
|
|
97
|
+
- [ ] Capacity management reports
|
|
98
|
+
|
|
99
|
+
**Use get_implementation_examples tool for specific KSI evidence examples.**
|
|
100
|
+
|
|
101
|
+
### Week -6 to -4: Technical Testing
|
|
102
|
+
|
|
103
|
+
**Authorization Data Sharing API Testing:**
|
|
104
|
+
|
|
105
|
+
**Functionality Tests:**
|
|
106
|
+
- [ ] All 6 required endpoints operational
|
|
107
|
+
- [ ] Machine-readable format validates
|
|
108
|
+
- [ ] Authentication working (OAuth 2.0 or mTLS)
|
|
109
|
+
- [ ] Rate limiting configured properly
|
|
110
|
+
- [ ] Error handling returns proper codes
|
|
111
|
+
|
|
112
|
+
**Performance Tests:**
|
|
113
|
+
- [ ] Response times < 2 seconds
|
|
114
|
+
- [ ] Can handle concurrent requests
|
|
115
|
+
- [ ] No timeout errors
|
|
116
|
+
|
|
117
|
+
**Security Tests:**
|
|
118
|
+
- [ ] Authentication required on all endpoints
|
|
119
|
+
- [ ] Authorization validates properly
|
|
120
|
+
- [ ] No sensitive data leakage
|
|
121
|
+
- [ ] TLS 1.2+ required
|
|
122
|
+
- [ ] API keys/tokens properly secured
|
|
123
|
+
|
|
124
|
+
**Data Accuracy Tests:**
|
|
125
|
+
- [ ] System info matches SSP
|
|
126
|
+
- [ ] Vulnerability data current (< 24 hours old)
|
|
127
|
+
- [ ] KSI metrics accurate
|
|
128
|
+
- [ ] Incident data complete
|
|
129
|
+
- [ ] Change data accurate
|
|
130
|
+
|
|
131
|
+
**Use validate_architecture tool to check your API implementation.**
|
|
132
|
+
|
|
133
|
+
**KSI Validation Testing:**
|
|
134
|
+
|
|
135
|
+
**For Each of 72 KSIs:**
|
|
136
|
+
- [ ] Evidence collection automated (where applicable)
|
|
137
|
+
- [ ] Metrics accurate and current
|
|
138
|
+
- [ ] Target values being met
|
|
139
|
+
- [ ] Alerting working for out-of-compliance
|
|
140
|
+
|
|
141
|
+
**Priority KSIs to Test Thoroughly:**
|
|
142
|
+
- KSI-IAM-01: MFA phishing-resistant
|
|
143
|
+
- KSI-MLA-01: Centralized logging
|
|
144
|
+
- KSI-MLA-05: Infrastructure as Code
|
|
145
|
+
- KSI-AFR-01: Vulnerability scanning
|
|
146
|
+
- KSI-CMT-03: Automated testing
|
|
147
|
+
- KSI-CNA-04: Immutable infrastructure
|
|
148
|
+
|
|
149
|
+
### Week -4 to -2: Process Validation
|
|
150
|
+
|
|
151
|
+
**Continuous Monitoring Procedures:**
|
|
152
|
+
- [ ] Run full monthly continuous monitoring cycle
|
|
153
|
+
- [ ] Verify all data collected automatically
|
|
154
|
+
- [ ] Validate Authorization Data Sharing API updated
|
|
155
|
+
- [ ] Test quarterly review process
|
|
156
|
+
|
|
157
|
+
**Vulnerability Management:**
|
|
158
|
+
- [ ] Test vulnerability discovery process
|
|
159
|
+
- [ ] Verify remediation tracking
|
|
160
|
+
- [ ] Validate timeframe compliance
|
|
161
|
+
- [ ] Test exception process (if applicable)
|
|
162
|
+
|
|
163
|
+
**Incident Response:**
|
|
164
|
+
- [ ] Conduct tabletop exercise
|
|
165
|
+
- [ ] Test notification procedures
|
|
166
|
+
- [ ] Validate logging and documentation
|
|
167
|
+
- [ ] Verify agency notification process
|
|
168
|
+
|
|
169
|
+
**Change Management:**
|
|
170
|
+
- [ ] Review recent changes
|
|
171
|
+
- [ ] Validate categorization (FRR-SCN)
|
|
172
|
+
- [ ] Verify approval process
|
|
173
|
+
- [ ] Test rollback procedures
|
|
174
|
+
|
|
175
|
+
### Week -2 to Assessment: Final Preparation
|
|
176
|
+
|
|
177
|
+
**Team Readiness:**
|
|
178
|
+
- [ ] Identify key personnel for interviews
|
|
179
|
+
- [ ] Prepare staff for questions
|
|
180
|
+
- [ ] Schedule availability for assessment period
|
|
181
|
+
- [ ] Create contact list for 3PAO
|
|
182
|
+
|
|
183
|
+
**Technical Access:**
|
|
184
|
+
- [ ] Provide 3PAO read-only access to systems
|
|
185
|
+
- [ ] Provide API test credentials
|
|
186
|
+
- [ ] Set up screen-sharing capabilities
|
|
187
|
+
- [ ] Prepare demo environment (if needed)
|
|
188
|
+
|
|
189
|
+
**Documentation Finalization:**
|
|
190
|
+
- [ ] All documents version-controlled
|
|
191
|
+
- [ ] All documents dated properly
|
|
192
|
+
- [ ] All references consistent
|
|
193
|
+
- [ ] All diagrams current
|
|
194
|
+
|
|
195
|
+
## During Assessment (2-4 Weeks)
|
|
196
|
+
|
|
197
|
+
### Week 1: Kickoff & Documentation Review
|
|
198
|
+
|
|
199
|
+
**Day 1: Kickoff Meeting**
|
|
200
|
+
- System overview presentation
|
|
201
|
+
- Tour of Authorization Data Sharing API
|
|
202
|
+
- Review assessment schedule
|
|
203
|
+
- Address 3PAO questions
|
|
204
|
+
|
|
205
|
+
**Days 2-5: Documentation Review**
|
|
206
|
+
- 3PAO reviews all documentation
|
|
207
|
+
- Answer clarifying questions promptly
|
|
208
|
+
- Provide additional evidence as requested
|
|
209
|
+
- Track all requests in spreadsheet
|
|
210
|
+
|
|
211
|
+
**Tips:**
|
|
212
|
+
- Respond to requests within 24 hours
|
|
213
|
+
- Keep communications professional
|
|
214
|
+
- Document all conversations
|
|
215
|
+
- Assign one person as 3PAO liaison
|
|
216
|
+
|
|
217
|
+
### Week 2: Technical Testing
|
|
218
|
+
|
|
219
|
+
**Authorization Data Sharing API Testing:**
|
|
220
|
+
- 3PAO will query all endpoints
|
|
221
|
+
- Validate OSCAL format
|
|
222
|
+
- Test authentication/authorization
|
|
223
|
+
- Verify data accuracy
|
|
224
|
+
|
|
225
|
+
**Infrastructure Testing:**
|
|
226
|
+
- Network scans
|
|
227
|
+
- Configuration reviews
|
|
228
|
+
- Access control testing
|
|
229
|
+
- Log analysis
|
|
230
|
+
|
|
231
|
+
**Application Testing:**
|
|
232
|
+
- Authentication testing
|
|
233
|
+
- Authorization testing
|
|
234
|
+
- Input validation
|
|
235
|
+
- Session management
|
|
236
|
+
|
|
237
|
+
**Be Prepared For:**
|
|
238
|
+
- Requests to demonstrate functionality
|
|
239
|
+
- Questions about configurations
|
|
240
|
+
- Requests for additional evidence
|
|
241
|
+
- Clarifications on procedures
|
|
242
|
+
|
|
243
|
+
### Week 3-4: Interviews & Validation
|
|
244
|
+
|
|
245
|
+
**Common Interview Topics:**
|
|
246
|
+
|
|
247
|
+
**System Owner/ISSO:**
|
|
248
|
+
- Overall system architecture
|
|
249
|
+
- Security controls implementation
|
|
250
|
+
- Continuous monitoring approach
|
|
251
|
+
- Incident response procedures
|
|
252
|
+
|
|
253
|
+
**Development Team:**
|
|
254
|
+
- Secure development practices
|
|
255
|
+
- CI/CD pipeline security
|
|
256
|
+
- Code review processes
|
|
257
|
+
- Testing procedures
|
|
258
|
+
|
|
259
|
+
**Operations Team:**
|
|
260
|
+
- Configuration management
|
|
261
|
+
- Patch management
|
|
262
|
+
- Backup/recovery procedures
|
|
263
|
+
- Monitoring and alerting
|
|
264
|
+
|
|
265
|
+
**Security Team:**
|
|
266
|
+
- Vulnerability management
|
|
267
|
+
- Log analysis procedures
|
|
268
|
+
- Incident response
|
|
269
|
+
- Security testing
|
|
270
|
+
|
|
271
|
+
**Tips for Interviews:**
|
|
272
|
+
- Answer questions honestly
|
|
273
|
+
- Say "I don't know" if unsure (don't guess)
|
|
274
|
+
- Provide evidence when possible
|
|
275
|
+
- Keep answers concise
|
|
276
|
+
|
|
277
|
+
### Handling Findings
|
|
278
|
+
|
|
279
|
+
**If 3PAO Identifies Issues:**
|
|
280
|
+
|
|
281
|
+
**During Assessment:**
|
|
282
|
+
- Acknowledge the finding
|
|
283
|
+
- Don't be defensive
|
|
284
|
+
- Ask clarifying questions
|
|
285
|
+
- Determine severity
|
|
286
|
+
|
|
287
|
+
**Types of Findings:**
|
|
288
|
+
|
|
289
|
+
**Critical Findings:**
|
|
290
|
+
- Must remediate before authorization
|
|
291
|
+
- Examples: No MFA, unpatched critical vulns, no logging
|
|
292
|
+
|
|
293
|
+
**High Findings:**
|
|
294
|
+
- Should remediate quickly
|
|
295
|
+
- May require POA&M
|
|
296
|
+
- Examples: Delayed patching, incomplete procedures
|
|
297
|
+
|
|
298
|
+
**Moderate/Low Findings:**
|
|
299
|
+
- Document in POA&M
|
|
300
|
+
- Plan remediation
|
|
301
|
+
- Examples: Documentation gaps, process improvements
|
|
302
|
+
|
|
303
|
+
**Response Strategy:**
|
|
304
|
+
- Quick fixes: Remediate immediately
|
|
305
|
+
- Longer fixes: Document in POA&M with timeline
|
|
306
|
+
- Process issues: Update procedures, retrain staff
|
|
307
|
+
|
|
308
|
+
## Post-Assessment Activities
|
|
309
|
+
|
|
310
|
+
### Immediate Actions (Week After Assessment)
|
|
311
|
+
|
|
312
|
+
**Debrief Meeting:**
|
|
313
|
+
- Review all findings
|
|
314
|
+
- Understand 3PAO recommendations
|
|
315
|
+
- Prioritize remediation
|
|
316
|
+
|
|
317
|
+
**Remediation Planning:**
|
|
318
|
+
- Create action plan for critical/high findings
|
|
319
|
+
- Assign owners for each finding
|
|
320
|
+
- Set deadlines
|
|
321
|
+
- Allocate resources
|
|
322
|
+
|
|
323
|
+
### Security Assessment Report (SAR) Review
|
|
324
|
+
|
|
325
|
+
**When 3PAO Delivers SAR:**
|
|
326
|
+
- [ ] Review for accuracy
|
|
327
|
+
- [ ] Verify all findings documented correctly
|
|
328
|
+
- [ ] Check that evidence referenced properly
|
|
329
|
+
- [ ] Validate recommendations
|
|
330
|
+
|
|
331
|
+
**Respond to SAR:**
|
|
332
|
+
- [ ] Create POA&M for all findings
|
|
333
|
+
- [ ] Provide remediation timelines
|
|
334
|
+
- [ ] Document compensating controls (if applicable)
|
|
335
|
+
- [ ] Submit POA&M to 3PAO and FedRAMP
|
|
336
|
+
|
|
337
|
+
### Authorization Package Submission
|
|
338
|
+
|
|
339
|
+
**Package Contents:**
|
|
340
|
+
- [ ] Security Assessment Report (SAR)
|
|
341
|
+
- [ ] Plan of Action & Milestones (POA&M)
|
|
342
|
+
- [ ] System Security Plan (OSCAL)
|
|
343
|
+
- [ ] All 11 FedRAMP 20x standard documents
|
|
344
|
+
- [ ] All 72 KSI implementation documents
|
|
345
|
+
- [ ] Authorization Data Sharing API documentation
|
|
346
|
+
- [ ] Any additional evidence requested
|
|
347
|
+
|
|
348
|
+
**Submission Process:**
|
|
349
|
+
- [ ] Upload to FedRAMP portal
|
|
350
|
+
- [ ] Notify authorizing agency
|
|
351
|
+
- [ ] Provide API test credentials to FedRAMP
|
|
352
|
+
- [ ] Address any FedRAMP questions
|
|
353
|
+
|
|
354
|
+
## Common Audit Findings (FedRAMP 20x)
|
|
355
|
+
|
|
356
|
+
### Top 10 Most Common Findings
|
|
357
|
+
|
|
358
|
+
**1. Authorization Data Sharing API Issues**
|
|
359
|
+
- API not fully operational
|
|
360
|
+
- OSCAL format validation errors
|
|
361
|
+
- Stale data (> 24 hours old)
|
|
362
|
+
- Missing required endpoints
|
|
363
|
+
- Authentication issues
|
|
364
|
+
|
|
365
|
+
**Prevention:**
|
|
366
|
+
- Test API thoroughly before assessment
|
|
367
|
+
- Use OSCAL validators
|
|
368
|
+
- Set up automated data refresh
|
|
369
|
+
- Test all 6 required endpoints
|
|
370
|
+
|
|
371
|
+
**2. KSI Evidence Not Automated**
|
|
372
|
+
- Manual evidence collection
|
|
373
|
+
- Evidence not current
|
|
374
|
+
- No automated metrics
|
|
375
|
+
|
|
376
|
+
**Prevention:**
|
|
377
|
+
- Automate top 20 KSIs minimum
|
|
378
|
+
- Set up dashboards for all KSIs
|
|
379
|
+
- Test evidence collection process
|
|
380
|
+
|
|
381
|
+
**3. MFA Not Phishing-Resistant (KSI-IAM-01)**
|
|
382
|
+
- Using SMS or TOTP (not acceptable)
|
|
383
|
+
- No FIDO2/WebAuthn implementation
|
|
384
|
+
- Incomplete MFA coverage
|
|
385
|
+
|
|
386
|
+
**Prevention:**
|
|
387
|
+
- Implement FIDO2/WebAuthn or PIV/CAC
|
|
388
|
+
- Enforce for all users (no exceptions)
|
|
389
|
+
- Document implementation thoroughly
|
|
390
|
+
|
|
391
|
+
**4. Incomplete Logging (KSI-MLA-01)**
|
|
392
|
+
- Not all log sources captured
|
|
393
|
+
- Logs not centralized
|
|
394
|
+
- Log retention insufficient
|
|
395
|
+
|
|
396
|
+
**Prevention:**
|
|
397
|
+
- Inventory all log sources
|
|
398
|
+
- Implement centralized SIEM
|
|
399
|
+
- Configure 1-year retention minimum
|
|
400
|
+
|
|
401
|
+
**5. Vulnerability Remediation Delays (FRR-VDR)**
|
|
402
|
+
- Critical/High vulns not remediated in timeframe
|
|
403
|
+
- No tracking process
|
|
404
|
+
- Missing evidence
|
|
405
|
+
|
|
406
|
+
**Prevention:**
|
|
407
|
+
- Implement automated vulnerability management
|
|
408
|
+
- Set up alerts for overdue vulns
|
|
409
|
+
- Document remediation timelines
|
|
410
|
+
|
|
411
|
+
**6. Infrastructure Not as Code (KSI-MLA-05)**
|
|
412
|
+
- Manual infrastructure provisioning
|
|
413
|
+
- No IaC templates
|
|
414
|
+
- Configuration drift
|
|
415
|
+
|
|
416
|
+
**Prevention:**
|
|
417
|
+
- Migrate to Bicep/Terraform/ARM templates
|
|
418
|
+
- Store IaC in version control
|
|
419
|
+
- Use IaC for all infrastructure changes
|
|
420
|
+
|
|
421
|
+
**7. Inadequate Testing (KSI-CMT-03)**
|
|
422
|
+
- No automated testing in CI/CD
|
|
423
|
+
- Security tests not automated
|
|
424
|
+
- Test coverage insufficient
|
|
425
|
+
|
|
426
|
+
**Prevention:**
|
|
427
|
+
- Implement automated unit/integration tests
|
|
428
|
+
- Add security tests (SAST/DAST)
|
|
429
|
+
- Measure and improve coverage
|
|
430
|
+
|
|
431
|
+
**8. Incomplete System Boundary (SSP)**
|
|
432
|
+
- Boundary not clearly defined
|
|
433
|
+
- Missing interconnections
|
|
434
|
+
- Inaccurate architecture diagrams
|
|
435
|
+
|
|
436
|
+
**Prevention:**
|
|
437
|
+
- Document all system components
|
|
438
|
+
- List all interconnections
|
|
439
|
+
- Keep diagrams current
|
|
440
|
+
|
|
441
|
+
**9. Inadequate Continuous Monitoring (FRR-CCM)**
|
|
442
|
+
- Not truly continuous
|
|
443
|
+
- Manual processes dominate
|
|
444
|
+
- Data not real-time
|
|
445
|
+
|
|
446
|
+
**Prevention:**
|
|
447
|
+
- Automate as much as possible
|
|
448
|
+
- Implement real-time monitoring
|
|
449
|
+
- Update Authorization Data Sharing API daily
|
|
450
|
+
|
|
451
|
+
**10. Incomplete Documentation (General)**
|
|
452
|
+
- Procedures not documented
|
|
453
|
+
- Documentation out of date
|
|
454
|
+
- Missing required documents
|
|
455
|
+
|
|
456
|
+
**Prevention:**
|
|
457
|
+
- Use documentation_generator prompt for templates
|
|
458
|
+
- Keep docs in version control
|
|
459
|
+
- Review quarterly
|
|
460
|
+
|
|
461
|
+
### KSI-Specific Common Findings
|
|
462
|
+
|
|
463
|
+
**KSI-IAM (Identity & Access):**
|
|
464
|
+
- Access reviews not quarterly
|
|
465
|
+
- Privileged access not monitored
|
|
466
|
+
- Service accounts not inventoried
|
|
467
|
+
|
|
468
|
+
**KSI-MLA (Monitoring & Logging):**
|
|
469
|
+
- Alert rules not tuned
|
|
470
|
+
- No log analysis procedures
|
|
471
|
+
- SIEM not configured properly
|
|
472
|
+
|
|
473
|
+
**KSI-AFR (Findings & Remediation):**
|
|
474
|
+
- Scan coverage incomplete
|
|
475
|
+
- False positives not managed
|
|
476
|
+
- No continuous scanning
|
|
477
|
+
|
|
478
|
+
**KSI-CMT (Change & Testing):**
|
|
479
|
+
- Changes not approved properly
|
|
480
|
+
- No rollback procedures
|
|
481
|
+
- Testing not adequate
|
|
482
|
+
|
|
483
|
+
**KSI-INR (Incident Response):**
|
|
484
|
+
- No incident response tests
|
|
485
|
+
- Notification procedures unclear
|
|
486
|
+
- Post-incident reviews not conducted
|
|
487
|
+
|
|
488
|
+
**KSI-RPL (Recovery Planning):**
|
|
489
|
+
- Backup tests not regular
|
|
490
|
+
- DR plan not tested
|
|
491
|
+
- Recovery objectives not met
|
|
492
|
+
|
|
493
|
+
**KSI-CNA (Cloud-Native):**
|
|
494
|
+
- Not using cloud-native services
|
|
495
|
+
- No immutable infrastructure
|
|
496
|
+
- Container security inadequate
|
|
497
|
+
|
|
498
|
+
**KSI-SVC (Service Management):**
|
|
499
|
+
- SLAs not defined
|
|
500
|
+
- Uptime not measured
|
|
501
|
+
- Capacity planning inadequate
|
|
502
|
+
|
|
503
|
+
## Audit Preparation Checklist
|
|
504
|
+
|
|
505
|
+
### 12 Weeks Before Assessment
|
|
506
|
+
|
|
507
|
+
- [ ] Review all FedRAMP 20x requirements
|
|
508
|
+
- [ ] Identify gaps in current implementation
|
|
509
|
+
- [ ] Create remediation plan
|
|
510
|
+
- [ ] Begin documentation updates
|
|
511
|
+
|
|
512
|
+
### 8 Weeks Before Assessment
|
|
513
|
+
|
|
514
|
+
- [ ] Complete all required documentation
|
|
515
|
+
- [ ] Implement missing KSIs
|
|
516
|
+
- [ ] Set up Authorization Data Sharing API
|
|
517
|
+
- [ ] Begin evidence collection
|
|
518
|
+
|
|
519
|
+
### 6 Weeks Before Assessment
|
|
520
|
+
|
|
521
|
+
- [ ] Complete all KSI implementations
|
|
522
|
+
- [ ] Finalize Authorization Data Sharing API
|
|
523
|
+
- [ ] Test all procedures
|
|
524
|
+
- [ ] Conduct internal audit
|
|
525
|
+
|
|
526
|
+
### 4 Weeks Before Assessment
|
|
527
|
+
|
|
528
|
+
- [ ] Address internal audit findings
|
|
529
|
+
- [ ] Complete evidence gathering
|
|
530
|
+
- [ ] Test Authorization Data Sharing API
|
|
531
|
+
- [ ] Prepare team for interviews
|
|
532
|
+
|
|
533
|
+
### 2 Weeks Before Assessment
|
|
534
|
+
|
|
535
|
+
- [ ] Final documentation review
|
|
536
|
+
- [ ] Provide 3PAO access
|
|
537
|
+
- [ ] Confirm team availability
|
|
538
|
+
- [ ] Prepare demo environment
|
|
539
|
+
|
|
540
|
+
### Week of Assessment
|
|
541
|
+
|
|
542
|
+
- [ ] Daily check-ins with 3PAO
|
|
543
|
+
- [ ] Respond to requests promptly
|
|
544
|
+
- [ ] Document all conversations
|
|
545
|
+
- [ ] Address issues immediately
|
|
546
|
+
|
|
547
|
+
### After Assessment
|
|
548
|
+
|
|
549
|
+
- [ ] Debrief with team
|
|
550
|
+
- [ ] Review SAR for accuracy
|
|
551
|
+
- [ ] Create remediation plan
|
|
552
|
+
- [ ] Submit authorization package
|
|
553
|
+
|
|
554
|
+
## Resources and Tools
|
|
555
|
+
|
|
556
|
+
**Use These MCP Tools:**
|
|
557
|
+
- `get_control(requirement_id)` - Get specific requirement details
|
|
558
|
+
- `search_requirements(keywords)` - Find relevant requirements
|
|
559
|
+
- `get_ksi(ksi_id)` - Get KSI implementation guidance
|
|
560
|
+
- `get_implementation_examples(requirement_id)` - See code examples
|
|
561
|
+
- `validate_architecture(description)` - Validate your architecture
|
|
562
|
+
- `check_requirement_dependencies(requirement_id)` - Understand dependencies
|
|
563
|
+
- `estimate_implementation_effort(requirement_id)` - Plan remediation time
|
|
564
|
+
|
|
565
|
+
**Use These MCP Prompts:**
|
|
566
|
+
- `initial_assessment_roadmap` - Overall project planning
|
|
567
|
+
- `quarterly_review_checklist` - Continuous monitoring procedures
|
|
568
|
+
- `api_design_guide` - Authorization Data Sharing API design
|
|
569
|
+
- `ksi_implementation_priorities` - KSI implementation order
|
|
570
|
+
- `documentation_generator` - Documentation templates
|
|
571
|
+
- `migration_from_rev5` - If transitioning from Rev 5
|
|
572
|
+
|
|
573
|
+
## Success Factors
|
|
574
|
+
|
|
575
|
+
**What Makes a Successful Assessment:**
|
|
576
|
+
✓ Complete, accurate documentation
|
|
577
|
+
✓ Fully operational Authorization Data Sharing API
|
|
578
|
+
✓ Automated evidence collection for KSIs
|
|
579
|
+
✓ Well-prepared, knowledgeable team
|
|
580
|
+
✓ Responsive to 3PAO requests
|
|
581
|
+
✓ Honest communication about any gaps
|
|
582
|
+
✓ Quick remediation of identified issues
|
|
583
|
+
|
|
584
|
+
**Red Flags to Avoid:**
|
|
585
|
+
✗ Incomplete documentation
|
|
586
|
+
✗ API not working during assessment
|
|
587
|
+
✗ Team unfamiliar with procedures
|
|
588
|
+
✗ Evidence not available
|
|
589
|
+
✗ Defensive attitude toward findings
|
|
590
|
+
✗ Lack of preparation
|
|
591
|
+
|
|
592
|
+
Remember: The 3PAO is not your adversary. They want you to succeed. Be honest, prepared, and responsive, and you'll have a successful assessment.
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
I'll help you review your FedRAMP authorization boundary for completeness.
|
|
2
|
+
|
|
3
|
+
**Minimum Assessment Scope (MAS) Boundary Review**:
|
|
4
|
+
|
|
5
|
+
**1. Information Resources Inventory**
|
|
6
|
+
|
|
7
|
+
Must include ALL information resources that are **likely to handle federal customer data** or **likely to impact information handling**:
|
|
8
|
+
|
|
9
|
+
**Machine-Based Information Resources**:
|
|
10
|
+
- [ ] Application servers
|
|
11
|
+
- [ ] Database servers
|
|
12
|
+
- [ ] Web servers
|
|
13
|
+
- [ ] Load balancers
|
|
14
|
+
- [ ] Storage systems
|
|
15
|
+
- [ ] Network devices
|
|
16
|
+
- [ ] Security appliances
|
|
17
|
+
- [ ] Monitoring systems
|
|
18
|
+
- [ ] Backup systems
|
|
19
|
+
- [ ] Development/staging environments (if they handle customer data)
|
|
20
|
+
|
|
21
|
+
**Non-Machine-Based Information Resources**:
|
|
22
|
+
- [ ] Organizational policies
|
|
23
|
+
- [ ] Security procedures
|
|
24
|
+
- [ ] Employees with system access
|
|
25
|
+
- [ ] Training programs
|
|
26
|
+
- [ ] Incident response processes
|
|
27
|
+
- [ ] Change management procedures
|
|
28
|
+
|
|
29
|
+
**2. Third-Party Information Resources**
|
|
30
|
+
|
|
31
|
+
Document ALL third-party services:
|
|
32
|
+
- [ ] Cloud infrastructure providers
|
|
33
|
+
- [ ] SaaS tools and services
|
|
34
|
+
- [ ] Development tools
|
|
35
|
+
- [ ] Monitoring/logging services
|
|
36
|
+
- [ ] Identity providers
|
|
37
|
+
- [ ] Payment processors
|
|
38
|
+
- [ ] CDN providers
|
|
39
|
+
|
|
40
|
+
**3. Federal Customer Data Flow**
|
|
41
|
+
|
|
42
|
+
Trace data flow through your system:
|
|
43
|
+
- Where does federal customer data enter?
|
|
44
|
+
- What systems process or store it?
|
|
45
|
+
- How is it transmitted?
|
|
46
|
+
- Where is it backed up?
|
|
47
|
+
- How is it deleted/archived?
|
|
48
|
+
|
|
49
|
+
**4. Boundary Exclusions**
|
|
50
|
+
|
|
51
|
+
FedRAMP explicitly excludes certain categories (per OMB direction):
|
|
52
|
+
- Identify any excluded services
|
|
53
|
+
- Document why they're out of scope
|
|
54
|
+
- Verify exclusions are valid
|
|
55
|
+
|
|
56
|
+
**5. Assessment Scope Validation**
|
|
57
|
+
|
|
58
|
+
For each component, verify:
|
|
59
|
+
- [ ] Is it documented in the system inventory?
|
|
60
|
+
- [ ] Is its function clearly described?
|
|
61
|
+
- [ ] Are security controls identified?
|
|
62
|
+
- [ ] Is it included in the assessment scope?
|
|
63
|
+
- [ ] Are interconnections documented?
|
|
64
|
+
|
|
65
|
+
**Common Boundary Gaps**:
|
|
66
|
+
❌ Missing development/staging environments that process customer data
|
|
67
|
+
❌ Undocumented third-party services
|
|
68
|
+
❌ Forgotten monitoring or logging systems
|
|
69
|
+
❌ Backup systems not included
|
|
70
|
+
❌ Non-machine resources (policies, procedures, people) omitted
|
|
71
|
+
|
|
72
|
+
**Next Steps**:
|
|
73
|
+
1. Use search_requirements with "minimum assessment scope" or "information resource"
|
|
74
|
+
2. Use list_family_controls with "MAS" for detailed requirements
|
|
75
|
+
3. Review get_definition for "Information Resource" and "Cloud Service Offering"
|
|
76
|
+
4. Document any boundary additions or clarifications needed
|