fedramp-20x-mcp 0.4.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. fedramp_20x_mcp/__init__.py +14 -0
  2. fedramp_20x_mcp/__main__.py +12 -0
  3. fedramp_20x_mcp/data_loader.py +673 -0
  4. fedramp_20x_mcp/prompts/__init__.py +62 -0
  5. fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
  6. fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
  7. fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
  8. fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
  9. fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
  10. fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
  11. fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
  12. fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
  13. fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
  14. fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
  15. fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
  16. fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
  17. fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
  18. fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
  19. fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
  20. fedramp_20x_mcp/server.py +270 -0
  21. fedramp_20x_mcp/templates/__init__.py +75 -0
  22. fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
  23. fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
  24. fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
  25. fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
  26. fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
  27. fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
  28. fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
  29. fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
  30. fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
  31. fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
  32. fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
  33. fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
  34. fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
  35. fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
  36. fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
  37. fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
  38. fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
  39. fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
  40. fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
  41. fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
  42. fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
  43. fedramp_20x_mcp/tools/__init__.py +167 -0
  44. fedramp_20x_mcp/tools/definitions.py +154 -0
  45. fedramp_20x_mcp/tools/documentation.py +155 -0
  46. fedramp_20x_mcp/tools/enhancements.py +2256 -0
  47. fedramp_20x_mcp/tools/evidence.py +701 -0
  48. fedramp_20x_mcp/tools/export.py +753 -0
  49. fedramp_20x_mcp/tools/ksi.py +90 -0
  50. fedramp_20x_mcp/tools/requirements.py +163 -0
  51. fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
  52. fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
  53. fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
  54. fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
  55. fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
@@ -0,0 +1,592 @@
1
+ I'll help you prepare for your FedRAMP 20x assessment and audit.
2
+
3
+ # FedRAMP 20x Audit Preparation Guide
4
+
5
+ ## Pre-Assessment Preparation (8-12 Weeks Before)
6
+
7
+ ### Week -12 to -8: Documentation Review
8
+
9
+ **Complete Documentation Checklist:**
10
+
11
+ **Required Core Documents:**
12
+ - [ ] System Security Plan (machine-readable format: JSON/XML)
13
+ - [ ] FRR-ADS: Authorization Data Sharing API Documentation
14
+ - [ ] FRR-VDR: Vulnerability Disclosure & Remediation Procedures
15
+ - [ ] FRR-ICP: Incident Communication Plan
16
+ - [ ] FRR-SCN: Significant Change Notification Procedures
17
+ - [ ] FRR-CCM: Continuous Compliance Monitoring Plan
18
+ - [ ] FRR-CCM-QR: Quarterly Review Procedures
19
+ - [ ] FRR-PVA: Persistent Validation Procedures
20
+ - [ ] FRR-MAS: Modernized Assessment Strategy
21
+ - [ ] FRR-FSI: FedRAMP Security Inbox Procedures
22
+ - [ ] FRR-RSC: Re-Authorization Service Continuity Plan
23
+
24
+ **KSI Implementation Documents (72 total):**
25
+ - [ ] All 72 KSI implementation procedures
26
+ - [ ] Evidence collection methods for each KSI
27
+ - [ ] Metrics and target values
28
+ - [ ] Validation procedures
29
+
30
+ **Supporting Documents:**
31
+ - [ ] System architecture diagrams
32
+ - [ ] Data flow diagrams
33
+ - [ ] Network diagrams
34
+ - [ ] Authorization boundary documentation
35
+ - [ ] Interconnection agreements
36
+ - [ ] POA&M (current)
37
+ - [ ] Incident response plan
38
+ - [ ] Business continuity/disaster recovery plans
39
+ - [ ] Configuration management plan
40
+ - [ ] Change management procedures
41
+ - [ ] User guide / admin guide
42
+
43
+ **Use documentation_generator prompt for templates.**
44
+
45
+ ### Week -8 to -6: Evidence Gathering
46
+
47
+ **Organize Evidence by KSI Family:**
48
+
49
+ **KSI-IAM (Identity & Access Management):**
50
+ - [ ] MFA enrollment reports (phishing-resistant)
51
+ - [ ] Access review logs (quarterly minimum)
52
+ - [ ] Privileged access audit logs
53
+ - [ ] Account lifecycle documentation
54
+ - [ ] Screenshots of IAM configuration
55
+
56
+ **KSI-MLA (Monitoring, Logging & Analysis):**
57
+ - [ ] SIEM configuration screenshots
58
+ - [ ] Sample log entries (system, application, security)
59
+ - [ ] Log retention configuration
60
+ - [ ] Automated alerting rules
61
+ - [ ] Log analysis procedures
62
+
63
+ **KSI-AFR (Automated Findings & Remediation):**
64
+ - [ ] Vulnerability scan results (last 3 months)
65
+ - [ ] Remediation tracking reports
66
+ - [ ] Patch management logs
67
+ - [ ] Evidence of automated scanning
68
+
69
+ **KSI-CMT (Change Management & Testing):**
70
+ - [ ] Change tickets (last 3 months)
71
+ - [ ] CI/CD pipeline configuration
72
+ - [ ] Automated testing results
73
+ - [ ] Rollback procedures documentation
74
+
75
+ **KSI-INR (Incident Notification & Response):**
76
+ - [ ] Incident logs (last 12 months)
77
+ - [ ] Incident response test results
78
+ - [ ] Notification procedures
79
+ - [ ] Post-incident reviews
80
+
81
+ **KSI-RPL (Recovery Planning):**
82
+ - [ ] Backup configuration
83
+ - [ ] Backup test results (last 6 months)
84
+ - [ ] Disaster recovery plan
85
+ - [ ] DR test results (annual)
86
+
87
+ **KSI-CNA (Cloud-Native Architecture):**
88
+ - [ ] Infrastructure as Code (IaC) templates
89
+ - [ ] Container scanning results
90
+ - [ ] Immutable infrastructure evidence
91
+ - [ ] Auto-scaling configurations
92
+
93
+ **KSI-SVC (Service Management & Delivery):**
94
+ - [ ] Service-level agreements
95
+ - [ ] Uptime reports
96
+ - [ ] Performance monitoring dashboards
97
+ - [ ] Capacity management reports
98
+
99
+ **Use get_implementation_examples tool for specific KSI evidence examples.**
100
+
101
+ ### Week -6 to -4: Technical Testing
102
+
103
+ **Authorization Data Sharing API Testing:**
104
+
105
+ **Functionality Tests:**
106
+ - [ ] All 6 required endpoints operational
107
+ - [ ] Machine-readable format validates
108
+ - [ ] Authentication working (OAuth 2.0 or mTLS)
109
+ - [ ] Rate limiting configured properly
110
+ - [ ] Error handling returns proper codes
111
+
112
+ **Performance Tests:**
113
+ - [ ] Response times < 2 seconds
114
+ - [ ] Can handle concurrent requests
115
+ - [ ] No timeout errors
116
+
117
+ **Security Tests:**
118
+ - [ ] Authentication required on all endpoints
119
+ - [ ] Authorization validates properly
120
+ - [ ] No sensitive data leakage
121
+ - [ ] TLS 1.2+ required
122
+ - [ ] API keys/tokens properly secured
123
+
124
+ **Data Accuracy Tests:**
125
+ - [ ] System info matches SSP
126
+ - [ ] Vulnerability data current (< 24 hours old)
127
+ - [ ] KSI metrics accurate
128
+ - [ ] Incident data complete
129
+ - [ ] Change data accurate
130
+
131
+ **Use validate_architecture tool to check your API implementation.**
132
+
133
+ **KSI Validation Testing:**
134
+
135
+ **For Each of 72 KSIs:**
136
+ - [ ] Evidence collection automated (where applicable)
137
+ - [ ] Metrics accurate and current
138
+ - [ ] Target values being met
139
+ - [ ] Alerting working for out-of-compliance
140
+
141
+ **Priority KSIs to Test Thoroughly:**
142
+ - KSI-IAM-01: MFA phishing-resistant
143
+ - KSI-MLA-01: Centralized logging
144
+ - KSI-MLA-05: Infrastructure as Code
145
+ - KSI-AFR-01: Vulnerability scanning
146
+ - KSI-CMT-03: Automated testing
147
+ - KSI-CNA-04: Immutable infrastructure
148
+
149
+ ### Week -4 to -2: Process Validation
150
+
151
+ **Continuous Monitoring Procedures:**
152
+ - [ ] Run full monthly continuous monitoring cycle
153
+ - [ ] Verify all data collected automatically
154
+ - [ ] Validate Authorization Data Sharing API updated
155
+ - [ ] Test quarterly review process
156
+
157
+ **Vulnerability Management:**
158
+ - [ ] Test vulnerability discovery process
159
+ - [ ] Verify remediation tracking
160
+ - [ ] Validate timeframe compliance
161
+ - [ ] Test exception process (if applicable)
162
+
163
+ **Incident Response:**
164
+ - [ ] Conduct tabletop exercise
165
+ - [ ] Test notification procedures
166
+ - [ ] Validate logging and documentation
167
+ - [ ] Verify agency notification process
168
+
169
+ **Change Management:**
170
+ - [ ] Review recent changes
171
+ - [ ] Validate categorization (FRR-SCN)
172
+ - [ ] Verify approval process
173
+ - [ ] Test rollback procedures
174
+
175
+ ### Week -2 to Assessment: Final Preparation
176
+
177
+ **Team Readiness:**
178
+ - [ ] Identify key personnel for interviews
179
+ - [ ] Prepare staff for questions
180
+ - [ ] Schedule availability for assessment period
181
+ - [ ] Create contact list for 3PAO
182
+
183
+ **Technical Access:**
184
+ - [ ] Provide 3PAO read-only access to systems
185
+ - [ ] Provide API test credentials
186
+ - [ ] Set up screen-sharing capabilities
187
+ - [ ] Prepare demo environment (if needed)
188
+
189
+ **Documentation Finalization:**
190
+ - [ ] All documents version-controlled
191
+ - [ ] All documents dated properly
192
+ - [ ] All references consistent
193
+ - [ ] All diagrams current
194
+
195
+ ## During Assessment (2-4 Weeks)
196
+
197
+ ### Week 1: Kickoff & Documentation Review
198
+
199
+ **Day 1: Kickoff Meeting**
200
+ - System overview presentation
201
+ - Tour of Authorization Data Sharing API
202
+ - Review assessment schedule
203
+ - Address 3PAO questions
204
+
205
+ **Days 2-5: Documentation Review**
206
+ - 3PAO reviews all documentation
207
+ - Answer clarifying questions promptly
208
+ - Provide additional evidence as requested
209
+ - Track all requests in spreadsheet
210
+
211
+ **Tips:**
212
+ - Respond to requests within 24 hours
213
+ - Keep communications professional
214
+ - Document all conversations
215
+ - Assign one person as 3PAO liaison
216
+
217
+ ### Week 2: Technical Testing
218
+
219
+ **Authorization Data Sharing API Testing:**
220
+ - 3PAO will query all endpoints
221
+ - Validate OSCAL format
222
+ - Test authentication/authorization
223
+ - Verify data accuracy
224
+
225
+ **Infrastructure Testing:**
226
+ - Network scans
227
+ - Configuration reviews
228
+ - Access control testing
229
+ - Log analysis
230
+
231
+ **Application Testing:**
232
+ - Authentication testing
233
+ - Authorization testing
234
+ - Input validation
235
+ - Session management
236
+
237
+ **Be Prepared For:**
238
+ - Requests to demonstrate functionality
239
+ - Questions about configurations
240
+ - Requests for additional evidence
241
+ - Clarifications on procedures
242
+
243
+ ### Week 3-4: Interviews & Validation
244
+
245
+ **Common Interview Topics:**
246
+
247
+ **System Owner/ISSO:**
248
+ - Overall system architecture
249
+ - Security controls implementation
250
+ - Continuous monitoring approach
251
+ - Incident response procedures
252
+
253
+ **Development Team:**
254
+ - Secure development practices
255
+ - CI/CD pipeline security
256
+ - Code review processes
257
+ - Testing procedures
258
+
259
+ **Operations Team:**
260
+ - Configuration management
261
+ - Patch management
262
+ - Backup/recovery procedures
263
+ - Monitoring and alerting
264
+
265
+ **Security Team:**
266
+ - Vulnerability management
267
+ - Log analysis procedures
268
+ - Incident response
269
+ - Security testing
270
+
271
+ **Tips for Interviews:**
272
+ - Answer questions honestly
273
+ - Say "I don't know" if unsure (don't guess)
274
+ - Provide evidence when possible
275
+ - Keep answers concise
276
+
277
+ ### Handling Findings
278
+
279
+ **If 3PAO Identifies Issues:**
280
+
281
+ **During Assessment:**
282
+ - Acknowledge the finding
283
+ - Don't be defensive
284
+ - Ask clarifying questions
285
+ - Determine severity
286
+
287
+ **Types of Findings:**
288
+
289
+ **Critical Findings:**
290
+ - Must remediate before authorization
291
+ - Examples: No MFA, unpatched critical vulns, no logging
292
+
293
+ **High Findings:**
294
+ - Should remediate quickly
295
+ - May require POA&M
296
+ - Examples: Delayed patching, incomplete procedures
297
+
298
+ **Moderate/Low Findings:**
299
+ - Document in POA&M
300
+ - Plan remediation
301
+ - Examples: Documentation gaps, process improvements
302
+
303
+ **Response Strategy:**
304
+ - Quick fixes: Remediate immediately
305
+ - Longer fixes: Document in POA&M with timeline
306
+ - Process issues: Update procedures, retrain staff
307
+
308
+ ## Post-Assessment Activities
309
+
310
+ ### Immediate Actions (Week After Assessment)
311
+
312
+ **Debrief Meeting:**
313
+ - Review all findings
314
+ - Understand 3PAO recommendations
315
+ - Prioritize remediation
316
+
317
+ **Remediation Planning:**
318
+ - Create action plan for critical/high findings
319
+ - Assign owners for each finding
320
+ - Set deadlines
321
+ - Allocate resources
322
+
323
+ ### Security Assessment Report (SAR) Review
324
+
325
+ **When 3PAO Delivers SAR:**
326
+ - [ ] Review for accuracy
327
+ - [ ] Verify all findings documented correctly
328
+ - [ ] Check that evidence referenced properly
329
+ - [ ] Validate recommendations
330
+
331
+ **Respond to SAR:**
332
+ - [ ] Create POA&M for all findings
333
+ - [ ] Provide remediation timelines
334
+ - [ ] Document compensating controls (if applicable)
335
+ - [ ] Submit POA&M to 3PAO and FedRAMP
336
+
337
+ ### Authorization Package Submission
338
+
339
+ **Package Contents:**
340
+ - [ ] Security Assessment Report (SAR)
341
+ - [ ] Plan of Action & Milestones (POA&M)
342
+ - [ ] System Security Plan (OSCAL)
343
+ - [ ] All 11 FedRAMP 20x standard documents
344
+ - [ ] All 72 KSI implementation documents
345
+ - [ ] Authorization Data Sharing API documentation
346
+ - [ ] Any additional evidence requested
347
+
348
+ **Submission Process:**
349
+ - [ ] Upload to FedRAMP portal
350
+ - [ ] Notify authorizing agency
351
+ - [ ] Provide API test credentials to FedRAMP
352
+ - [ ] Address any FedRAMP questions
353
+
354
+ ## Common Audit Findings (FedRAMP 20x)
355
+
356
+ ### Top 10 Most Common Findings
357
+
358
+ **1. Authorization Data Sharing API Issues**
359
+ - API not fully operational
360
+ - OSCAL format validation errors
361
+ - Stale data (> 24 hours old)
362
+ - Missing required endpoints
363
+ - Authentication issues
364
+
365
+ **Prevention:**
366
+ - Test API thoroughly before assessment
367
+ - Use OSCAL validators
368
+ - Set up automated data refresh
369
+ - Test all 6 required endpoints
370
+
371
+ **2. KSI Evidence Not Automated**
372
+ - Manual evidence collection
373
+ - Evidence not current
374
+ - No automated metrics
375
+
376
+ **Prevention:**
377
+ - Automate top 20 KSIs minimum
378
+ - Set up dashboards for all KSIs
379
+ - Test evidence collection process
380
+
381
+ **3. MFA Not Phishing-Resistant (KSI-IAM-01)**
382
+ - Using SMS or TOTP (not acceptable)
383
+ - No FIDO2/WebAuthn implementation
384
+ - Incomplete MFA coverage
385
+
386
+ **Prevention:**
387
+ - Implement FIDO2/WebAuthn or PIV/CAC
388
+ - Enforce for all users (no exceptions)
389
+ - Document implementation thoroughly
390
+
391
+ **4. Incomplete Logging (KSI-MLA-01)**
392
+ - Not all log sources captured
393
+ - Logs not centralized
394
+ - Log retention insufficient
395
+
396
+ **Prevention:**
397
+ - Inventory all log sources
398
+ - Implement centralized SIEM
399
+ - Configure 1-year retention minimum
400
+
401
+ **5. Vulnerability Remediation Delays (FRR-VDR)**
402
+ - Critical/High vulns not remediated in timeframe
403
+ - No tracking process
404
+ - Missing evidence
405
+
406
+ **Prevention:**
407
+ - Implement automated vulnerability management
408
+ - Set up alerts for overdue vulns
409
+ - Document remediation timelines
410
+
411
+ **6. Infrastructure Not as Code (KSI-MLA-05)**
412
+ - Manual infrastructure provisioning
413
+ - No IaC templates
414
+ - Configuration drift
415
+
416
+ **Prevention:**
417
+ - Migrate to Bicep/Terraform/ARM templates
418
+ - Store IaC in version control
419
+ - Use IaC for all infrastructure changes
420
+
421
+ **7. Inadequate Testing (KSI-CMT-03)**
422
+ - No automated testing in CI/CD
423
+ - Security tests not automated
424
+ - Test coverage insufficient
425
+
426
+ **Prevention:**
427
+ - Implement automated unit/integration tests
428
+ - Add security tests (SAST/DAST)
429
+ - Measure and improve coverage
430
+
431
+ **8. Incomplete System Boundary (SSP)**
432
+ - Boundary not clearly defined
433
+ - Missing interconnections
434
+ - Inaccurate architecture diagrams
435
+
436
+ **Prevention:**
437
+ - Document all system components
438
+ - List all interconnections
439
+ - Keep diagrams current
440
+
441
+ **9. Inadequate Continuous Monitoring (FRR-CCM)**
442
+ - Not truly continuous
443
+ - Manual processes dominate
444
+ - Data not real-time
445
+
446
+ **Prevention:**
447
+ - Automate as much as possible
448
+ - Implement real-time monitoring
449
+ - Update Authorization Data Sharing API daily
450
+
451
+ **10. Incomplete Documentation (General)**
452
+ - Procedures not documented
453
+ - Documentation out of date
454
+ - Missing required documents
455
+
456
+ **Prevention:**
457
+ - Use documentation_generator prompt for templates
458
+ - Keep docs in version control
459
+ - Review quarterly
460
+
461
+ ### KSI-Specific Common Findings
462
+
463
+ **KSI-IAM (Identity & Access):**
464
+ - Access reviews not quarterly
465
+ - Privileged access not monitored
466
+ - Service accounts not inventoried
467
+
468
+ **KSI-MLA (Monitoring & Logging):**
469
+ - Alert rules not tuned
470
+ - No log analysis procedures
471
+ - SIEM not configured properly
472
+
473
+ **KSI-AFR (Findings & Remediation):**
474
+ - Scan coverage incomplete
475
+ - False positives not managed
476
+ - No continuous scanning
477
+
478
+ **KSI-CMT (Change & Testing):**
479
+ - Changes not approved properly
480
+ - No rollback procedures
481
+ - Testing not adequate
482
+
483
+ **KSI-INR (Incident Response):**
484
+ - No incident response tests
485
+ - Notification procedures unclear
486
+ - Post-incident reviews not conducted
487
+
488
+ **KSI-RPL (Recovery Planning):**
489
+ - Backup tests not regular
490
+ - DR plan not tested
491
+ - Recovery objectives not met
492
+
493
+ **KSI-CNA (Cloud-Native):**
494
+ - Not using cloud-native services
495
+ - No immutable infrastructure
496
+ - Container security inadequate
497
+
498
+ **KSI-SVC (Service Management):**
499
+ - SLAs not defined
500
+ - Uptime not measured
501
+ - Capacity planning inadequate
502
+
503
+ ## Audit Preparation Checklist
504
+
505
+ ### 12 Weeks Before Assessment
506
+
507
+ - [ ] Review all FedRAMP 20x requirements
508
+ - [ ] Identify gaps in current implementation
509
+ - [ ] Create remediation plan
510
+ - [ ] Begin documentation updates
511
+
512
+ ### 8 Weeks Before Assessment
513
+
514
+ - [ ] Complete all required documentation
515
+ - [ ] Implement missing KSIs
516
+ - [ ] Set up Authorization Data Sharing API
517
+ - [ ] Begin evidence collection
518
+
519
+ ### 6 Weeks Before Assessment
520
+
521
+ - [ ] Complete all KSI implementations
522
+ - [ ] Finalize Authorization Data Sharing API
523
+ - [ ] Test all procedures
524
+ - [ ] Conduct internal audit
525
+
526
+ ### 4 Weeks Before Assessment
527
+
528
+ - [ ] Address internal audit findings
529
+ - [ ] Complete evidence gathering
530
+ - [ ] Test Authorization Data Sharing API
531
+ - [ ] Prepare team for interviews
532
+
533
+ ### 2 Weeks Before Assessment
534
+
535
+ - [ ] Final documentation review
536
+ - [ ] Provide 3PAO access
537
+ - [ ] Confirm team availability
538
+ - [ ] Prepare demo environment
539
+
540
+ ### Week of Assessment
541
+
542
+ - [ ] Daily check-ins with 3PAO
543
+ - [ ] Respond to requests promptly
544
+ - [ ] Document all conversations
545
+ - [ ] Address issues immediately
546
+
547
+ ### After Assessment
548
+
549
+ - [ ] Debrief with team
550
+ - [ ] Review SAR for accuracy
551
+ - [ ] Create remediation plan
552
+ - [ ] Submit authorization package
553
+
554
+ ## Resources and Tools
555
+
556
+ **Use These MCP Tools:**
557
+ - `get_control(requirement_id)` - Get specific requirement details
558
+ - `search_requirements(keywords)` - Find relevant requirements
559
+ - `get_ksi(ksi_id)` - Get KSI implementation guidance
560
+ - `get_implementation_examples(requirement_id)` - See code examples
561
+ - `validate_architecture(description)` - Validate your architecture
562
+ - `check_requirement_dependencies(requirement_id)` - Understand dependencies
563
+ - `estimate_implementation_effort(requirement_id)` - Plan remediation time
564
+
565
+ **Use These MCP Prompts:**
566
+ - `initial_assessment_roadmap` - Overall project planning
567
+ - `quarterly_review_checklist` - Continuous monitoring procedures
568
+ - `api_design_guide` - Authorization Data Sharing API design
569
+ - `ksi_implementation_priorities` - KSI implementation order
570
+ - `documentation_generator` - Documentation templates
571
+ - `migration_from_rev5` - If transitioning from Rev 5
572
+
573
+ ## Success Factors
574
+
575
+ **What Makes a Successful Assessment:**
576
+ ✓ Complete, accurate documentation
577
+ ✓ Fully operational Authorization Data Sharing API
578
+ ✓ Automated evidence collection for KSIs
579
+ ✓ Well-prepared, knowledgeable team
580
+ ✓ Responsive to 3PAO requests
581
+ ✓ Honest communication about any gaps
582
+ ✓ Quick remediation of identified issues
583
+
584
+ **Red Flags to Avoid:**
585
+ ✗ Incomplete documentation
586
+ ✗ API not working during assessment
587
+ ✗ Team unfamiliar with procedures
588
+ ✗ Evidence not available
589
+ ✗ Defensive attitude toward findings
590
+ ✗ Lack of preparation
591
+
592
+ Remember: The 3PAO is not your adversary. They want you to succeed. Be honest, prepared, and responsive, and you'll have a successful assessment.
@@ -0,0 +1,76 @@
1
+ I'll help you review your FedRAMP authorization boundary for completeness.
2
+
3
+ **Minimum Assessment Scope (MAS) Boundary Review**:
4
+
5
+ **1. Information Resources Inventory**
6
+
7
+ Must include ALL information resources that are **likely to handle federal customer data** or **likely to impact information handling**:
8
+
9
+ **Machine-Based Information Resources**:
10
+ - [ ] Application servers
11
+ - [ ] Database servers
12
+ - [ ] Web servers
13
+ - [ ] Load balancers
14
+ - [ ] Storage systems
15
+ - [ ] Network devices
16
+ - [ ] Security appliances
17
+ - [ ] Monitoring systems
18
+ - [ ] Backup systems
19
+ - [ ] Development/staging environments (if they handle customer data)
20
+
21
+ **Non-Machine-Based Information Resources**:
22
+ - [ ] Organizational policies
23
+ - [ ] Security procedures
24
+ - [ ] Employees with system access
25
+ - [ ] Training programs
26
+ - [ ] Incident response processes
27
+ - [ ] Change management procedures
28
+
29
+ **2. Third-Party Information Resources**
30
+
31
+ Document ALL third-party services:
32
+ - [ ] Cloud infrastructure providers
33
+ - [ ] SaaS tools and services
34
+ - [ ] Development tools
35
+ - [ ] Monitoring/logging services
36
+ - [ ] Identity providers
37
+ - [ ] Payment processors
38
+ - [ ] CDN providers
39
+
40
+ **3. Federal Customer Data Flow**
41
+
42
+ Trace data flow through your system:
43
+ - Where does federal customer data enter?
44
+ - What systems process or store it?
45
+ - How is it transmitted?
46
+ - Where is it backed up?
47
+ - How is it deleted/archived?
48
+
49
+ **4. Boundary Exclusions**
50
+
51
+ FedRAMP explicitly excludes certain categories (per OMB direction):
52
+ - Identify any excluded services
53
+ - Document why they're out of scope
54
+ - Verify exclusions are valid
55
+
56
+ **5. Assessment Scope Validation**
57
+
58
+ For each component, verify:
59
+ - [ ] Is it documented in the system inventory?
60
+ - [ ] Is its function clearly described?
61
+ - [ ] Are security controls identified?
62
+ - [ ] Is it included in the assessment scope?
63
+ - [ ] Are interconnections documented?
64
+
65
+ **Common Boundary Gaps**:
66
+ ❌ Missing development/staging environments that process customer data
67
+ ❌ Undocumented third-party services
68
+ ❌ Forgotten monitoring or logging systems
69
+ ❌ Backup systems not included
70
+ ❌ Non-machine resources (policies, procedures, people) omitted
71
+
72
+ **Next Steps**:
73
+ 1. Use search_requirements with "minimum assessment scope" or "information resource"
74
+ 2. Use list_family_controls with "MAS" for detailed requirements
75
+ 3. Review get_definition for "Information Resource" and "Cloud Service Offering"
76
+ 4. Document any boundary additions or clarifications needed