fedramp-20x-mcp 0.4.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. fedramp_20x_mcp/__init__.py +14 -0
  2. fedramp_20x_mcp/__main__.py +12 -0
  3. fedramp_20x_mcp/data_loader.py +673 -0
  4. fedramp_20x_mcp/prompts/__init__.py +62 -0
  5. fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
  6. fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
  7. fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
  8. fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
  9. fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
  10. fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
  11. fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
  12. fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
  13. fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
  14. fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
  15. fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
  16. fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
  17. fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
  18. fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
  19. fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
  20. fedramp_20x_mcp/server.py +270 -0
  21. fedramp_20x_mcp/templates/__init__.py +75 -0
  22. fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
  23. fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
  24. fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
  25. fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
  26. fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
  27. fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
  28. fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
  29. fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
  30. fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
  31. fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
  32. fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
  33. fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
  34. fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
  35. fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
  36. fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
  37. fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
  38. fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
  39. fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
  40. fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
  41. fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
  42. fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
  43. fedramp_20x_mcp/tools/__init__.py +167 -0
  44. fedramp_20x_mcp/tools/definitions.py +154 -0
  45. fedramp_20x_mcp/tools/documentation.py +155 -0
  46. fedramp_20x_mcp/tools/enhancements.py +2256 -0
  47. fedramp_20x_mcp/tools/evidence.py +701 -0
  48. fedramp_20x_mcp/tools/export.py +753 -0
  49. fedramp_20x_mcp/tools/ksi.py +90 -0
  50. fedramp_20x_mcp/tools/requirements.py +163 -0
  51. fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
  52. fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
  53. fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
  54. fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
  55. fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
@@ -0,0 +1,61 @@
1
+ I'll help you establish a FedRAMP-compliant continuous monitoring program.
2
+
3
+ **Continuous Monitoring Components**:
4
+
5
+ **1. Collaborative Continuous Monitoring (CCM)**
6
+ - Quarterly reviews with agencies
7
+ - Continuous authorization maintenance
8
+ - Agency-specific monitoring requirements
9
+
10
+ **2. Persistent Validation & Assessment (PVA)**
11
+ - Regular assessment schedules based on impact level
12
+ - Validation procedures
13
+ - Evidence collection and documentation
14
+
15
+ **3. Key Security Indicators (KSI) Tracking**
16
+ Track 72 indicators across 11 categories:
17
+ - Authorization & Accreditation metrics
18
+ - Cybersecurity Education completion
19
+ - Commitment to security practices
20
+ - Change Management effectiveness
21
+ - Identity & Access Management
22
+ - Information Resources management
23
+ - Monitoring, Logging & Analysis
24
+ - Privacy protection
25
+ - Reporting compliance
26
+ - Service Offerings documentation
27
+ - Third Party Resources management
28
+
29
+ **4. Monitoring Schedule**:
30
+
31
+ **Monthly Activities**:
32
+ - [ ] Vulnerability scanning
33
+ - [ ] Log review and analysis
34
+ - [ ] Incident tracking and reporting
35
+ - [ ] KSI metrics collection
36
+
37
+ **Quarterly Activities**:
38
+ - [ ] CCM reviews with agencies
39
+ - [ ] Security posture assessment
40
+ - [ ] Control effectiveness evaluation
41
+ - [ ] Significant change review
42
+
43
+ **Annual Activities**:
44
+ - [ ] Full security assessment (based on impact level)
45
+ - [ ] Authorization package update
46
+ - [ ] Third-party assessment coordination
47
+
48
+ **5. Reporting Requirements**:
49
+ - Monthly vulnerability reports
50
+ - Quarterly CCM deliverables
51
+ - Incident notifications (as they occur)
52
+ - Annual assessment reports
53
+
54
+ **Setup Steps**:
55
+ 1. Use list_ksi to review all 72 Key Security Indicators
56
+ 2. Use search_requirements with "monitoring" to find related requirements
57
+ 3. Use get_control for specific CCM and PVA requirements
58
+ 4. Document your monitoring procedures and schedules
59
+ 5. Establish automated collection where possible
60
+
61
+ **Next Steps**: Would you like detailed requirements for a specific monitoring component?
@@ -0,0 +1,499 @@
1
+ I'll help you generate documentation templates for FedRAMP 20x compliance.
2
+
3
+ # Documentation Generator for FedRAMP 20x
4
+
5
+ **Important Note on OSCAL:** FedRAMP 20x requires **machine-readable** formats (JSON/XML) for Authorization Data Sharing. **OSCAL is NOT mentioned in FedRAMP 20x** - it's a NIST standard shown below as one example implementation approach. Custom JSON/XML formats are equally valid.
6
+
7
+ ## OSCAL System Security Plan (SSP) Template
8
+
9
+ ### 1. Metadata Section
10
+ ```json
11
+ {
12
+ "system-security-plan": {
13
+ "uuid": "GENERATE-UUID-HERE",
14
+ "metadata": {
15
+ "title": "[Your System Name] System Security Plan",
16
+ "published": "YYYY-MM-DDTHH:MM:SSZ",
17
+ "last-modified": "YYYY-MM-DDTHH:MM:SSZ",
18
+ "version": "1.0.0",
19
+ "oscal-version": "1.1.2",
20
+ "roles": [
21
+ {
22
+ "id": "ciso",
23
+ "title": "Chief Information Security Officer"
24
+ },
25
+ {
26
+ "id": "system-owner",
27
+ "title": "System Owner"
28
+ },
29
+ {
30
+ "id": "authorizing-official",
31
+ "title": "Authorizing Official"
32
+ }
33
+ ],
34
+ "parties": [
35
+ {
36
+ "uuid": "GENERATE-UUID",
37
+ "type": "organization",
38
+ "name": "[Your Organization Name]",
39
+ "email-addresses": ["security@example.com"]
40
+ }
41
+ ],
42
+ "responsible-parties": [
43
+ {
44
+ "role-id": "ciso",
45
+ "party-uuids": ["PARTY-UUID"]
46
+ }
47
+ ]
48
+ }
49
+ }
50
+ }
51
+ ```
52
+
53
+ ### 2. System Characteristics (FRR-MAS)
54
+ ```json
55
+ {
56
+ "system-characteristics": {
57
+ "system-ids": [
58
+ {
59
+ "identifier-type": "https://fedramp.gov",
60
+ "id": "FR-########"
61
+ }
62
+ ],
63
+ "system-name": "[Your System Name]",
64
+ "system-name-short": "[Acronym]",
65
+ "description": "[Detailed system description including Federal Customer Data handling]",
66
+ "security-sensitivity-level": "moderate",
67
+ "system-information": {
68
+ "information-types": [
69
+ {
70
+ "uuid": "GENERATE-UUID",
71
+ "title": "Federal Customer Data",
72
+ "description": "Information provided by federal agencies",
73
+ "categorizations": [
74
+ {
75
+ "system": "https://doi.org/10.6028/NIST.SP.800-60v2r1",
76
+ "information-type-ids": ["C.3.5.8"]
77
+ }
78
+ ],
79
+ "confidentiality-impact": {
80
+ "base": "moderate",
81
+ "selected": "moderate"
82
+ },
83
+ "integrity-impact": {
84
+ "base": "moderate",
85
+ "selected": "moderate"
86
+ },
87
+ "availability-impact": {
88
+ "base": "moderate",
89
+ "selected": "moderate"
90
+ }
91
+ }
92
+ ]
93
+ },
94
+ "security-impact-level": {
95
+ "security-objective-confidentiality": "moderate",
96
+ "security-objective-integrity": "moderate",
97
+ "security-objective-availability": "moderate"
98
+ },
99
+ "authorization-boundary": {
100
+ "description": "[Detailed boundary description per FRR-MAS requirements]",
101
+ "diagrams": [
102
+ {
103
+ "uuid": "GENERATE-UUID",
104
+ "description": "System Architecture Diagram",
105
+ "links": [
106
+ {
107
+ "href": "https://example.com/architecture.png",
108
+ "rel": "diagram"
109
+ }
110
+ ]
111
+ }
112
+ ],
113
+ "remarks": "Includes all information resources likely to handle Federal Customer Data"
114
+ },
115
+ "network-architecture": {
116
+ "description": "Network segmentation and traffic flow (KSI-CNA-01, CNA-03)"
117
+ },
118
+ "data-flow": {
119
+ "description": "Federal Customer Data flow through system"
120
+ }
121
+ }
122
+ }
123
+ ```
124
+
125
+ ### 3. System Implementation
126
+ ```json
127
+ {
128
+ "system-implementation": {
129
+ "users": [
130
+ {
131
+ "uuid": "GENERATE-UUID",
132
+ "role-ids": ["system-admin"],
133
+ "authorized-privileges": [
134
+ {
135
+ "title": "System Administration",
136
+ "description": "Full administrative access",
137
+ "functions-performed": ["user-management", "configuration"]
138
+ }
139
+ ]
140
+ }
141
+ ],
142
+ "components": [
143
+ {
144
+ "uuid": "GENERATE-UUID",
145
+ "type": "software",
146
+ "title": "Web Application Server",
147
+ "description": "Primary application hosting environment",
148
+ "status": {
149
+ "state": "operational"
150
+ },
151
+ "props": [
152
+ {
153
+ "name": "handles-federal-customer-data",
154
+ "value": "yes"
155
+ },
156
+ {
157
+ "name": "vendor",
158
+ "value": "[Vendor Name]"
159
+ }
160
+ ]
161
+ }
162
+ ],
163
+ "inventory-items": [
164
+ {
165
+ "uuid": "GENERATE-UUID",
166
+ "description": "Component inventory per KSI-PIY-01",
167
+ "props": [
168
+ {
169
+ "name": "asset-id",
170
+ "value": "AST-001"
171
+ },
172
+ {
173
+ "name": "asset-type",
174
+ "value": "virtual-machine"
175
+ }
176
+ ],
177
+ "implemented-components": [
178
+ {
179
+ "component-uuid": "COMPONENT-UUID"
180
+ }
181
+ ]
182
+ }
183
+ ]
184
+ }
185
+ }
186
+ ```
187
+
188
+ ## Vulnerability Detection & Response Procedure (FRR-VDR)
189
+
190
+ ```markdown
191
+ # Vulnerability Detection and Response Procedure
192
+
193
+ ## 1. Vulnerability Scanning (FRR-VDR-01)
194
+
195
+ ### Scanning Frequency
196
+ - **Infrastructure**: Continuous, minimum daily
197
+ - **Containers**: On build and weekly in production
198
+ - **Code**: On every commit (SAST)
199
+ - **Dependencies**: Daily checks
200
+
201
+ ### Scanning Tools
202
+ - Infrastructure: [Tool Name]
203
+ - Containers: [Tool Name]
204
+ - Code: [Tool Name]
205
+ - Dependencies: [Tool Name]
206
+
207
+ ## 2. Remediation Timeframes (FRR-VDR-TF)
208
+
209
+ ### High Impact Systems
210
+ | Severity | CVSS Score | Timeframe |
211
+ |----------|------------|-----------|
212
+ | Critical | 9.0-10.0 | 7 days |
213
+ | High | 7.0-8.9 | 15 days |
214
+ | Medium | 4.0-6.9 | 60 days |
215
+ | Low | 0.1-3.9 | 180 days |
216
+
217
+ ### Moderate Impact Systems
218
+ | Severity | CVSS Score | Timeframe |
219
+ |----------|------------|-----------|
220
+ | Critical | 9.0-10.0 | 15 days |
221
+ | High | 7.0-8.9 | 30 days |
222
+ | Medium | 4.0-6.9 | 90 days |
223
+ | Low | 0.1-3.9 | 180 days |
224
+
225
+ ## 3. Remediation Process
226
+
227
+ 1. **Detection**: Automated scan identifies vulnerability
228
+ 2. **Triage**: Security team assesses within 24 hours
229
+ 3. **Assignment**: Create ticket, assign to owner
230
+ 4. **Remediation**: Apply patch or mitigating control
231
+ 5. **Validation**: Re-scan to confirm fix
232
+ 6. **Documentation**: Update POA&M if needed
233
+
234
+ ## 4. Exception Process (FRR-VDR-EX)
235
+
236
+ Exceptions may be granted for:
237
+ - No patch available
238
+ - Patch breaks critical functionality
239
+ - Compensating controls in place
240
+
241
+ **Exception Request Must Include:**
242
+ - Vulnerability details (CVE, CVSS)
243
+ - Business justification
244
+ - Risk assessment
245
+ - Compensating controls
246
+ - Exception duration (max 90 days)
247
+ - Review date
248
+
249
+ **Approval Required From:**
250
+ - CISO
251
+ - System Owner
252
+ - Authorizing Official (for High/Critical)
253
+
254
+ ## 5. Agency Reporting (FRR-VDR-RP)
255
+
256
+ Report to affected agencies within 24 hours if:
257
+ - Critical/High vulnerability affects their data
258
+ - Active exploitation detected
259
+ - Patch will cause service disruption
260
+
261
+ **Report Via:**
262
+ - FedRAMP Security Inbox (FRR-FSI)
263
+ - Agency-specific incident channels (FRR-ICP)
264
+ ```
265
+
266
+ ## Incident Communications Procedure (FRR-ICP)
267
+
268
+ ```markdown
269
+ # Incident Communications Procedure
270
+
271
+ ## 1. Incident Classification
272
+
273
+ ### Severity Levels
274
+ - **Critical**: Data breach, service outage affecting federal data
275
+ - **High**: Security event with potential data impact
276
+ - **Medium**: Security event contained, no data impact
277
+ - **Low**: Security event, no immediate risk
278
+
279
+ ## 2. Notification Timeframes
280
+
281
+ | Severity | Internal | FedRAMP | Agencies | Public |
282
+ |----------|----------|---------|----------|--------|
283
+ | Critical | Immediate| 1 hour | 2 hours | TBD |
284
+ | High | 1 hour | 4 hours | 6 hours | TBD |
285
+ | Medium | 4 hours | 24 hours| 24 hours | N/A |
286
+ | Low | 24 hours | N/A | N/A | N/A |
287
+
288
+ ## 3. Communication Channels (FRR-FSI)
289
+
290
+ **FedRAMP Security Inbox**: security@fedramp.gov
291
+ - All security-related communications
292
+ - Vulnerability notifications
293
+ - Significant changes
294
+ - Incident reports
295
+
296
+ **Agency-Specific Channels**: Per ICP agreements
297
+ - Direct agency security contacts
298
+ - Agency-specific portals
299
+ - Coordinated disclosure timelines
300
+
301
+ ## 4. Incident Report Template
302
+
303
+ ```
304
+ Subject: [INCIDENT] [SEVERITY] - [Brief Description]
305
+
306
+ Incident ID: INC-YYYY-###
307
+ Date/Time Detected: YYYY-MM-DD HH:MM UTC
308
+ Severity: [Critical/High/Medium/Low]
309
+ Status: [Investigating/Contained/Resolved]
310
+
311
+ IMPACT:
312
+ - Systems Affected: [List]
313
+ - Data Affected: [Federal Customer Data? Yes/No]
314
+ - Agencies Affected: [List or "None"]
315
+ - User Impact: [Description]
316
+
317
+ SUMMARY:
318
+ [What happened, when detected, initial assessment]
319
+
320
+ RESPONSE ACTIONS:
321
+ - [Action 1]
322
+ - [Action 2]
323
+
324
+ NEXT STEPS:
325
+ [Planned actions and timeline]
326
+
327
+ CONTACT:
328
+ [Incident Commander name and contact]
329
+ ```
330
+
331
+ ## 5. Post-Incident Activities (KSI-INR-03)
332
+
333
+ Within 30 days of incident closure:
334
+ - [ ] Complete after-action report
335
+ - [ ] Identify root cause
336
+ - [ ] Document lessons learned
337
+ - [ ] Update procedures if needed
338
+ - [ ] Implement preventive measures
339
+ - [ ] Share with relevant stakeholders
340
+ ```
341
+
342
+ ## Significant Change Notification Template (FRR-SCN)
343
+
344
+ ```markdown
345
+ # Significant Change Notification
346
+
347
+ ## Change Information
348
+ - **Change ID**: CHG-YYYY-###
349
+ - **Date**: YYYY-MM-DD
350
+ - **Type**: [Routine/Administrative/Transformative/Impact]
351
+ - **Submitted By**: [Name, Role]
352
+
353
+ ## Change Description
354
+ [Detailed description of the change]
355
+
356
+ ## Impact Assessment
357
+
358
+ ### Authorization Boundary (FRR-MAS)
359
+ - [ ] No boundary changes
360
+ - [ ] New components added: [List]
361
+ - [ ] Components removed: [List]
362
+ - [ ] Third-party services changed: [List]
363
+
364
+ ### Security Controls
365
+ - [ ] No control changes
366
+ - [ ] Controls added: [List]
367
+ - [ ] Controls modified: [List]
368
+ - [ ] Controls removed: [List]
369
+
370
+ ### Federal Customer Data
371
+ - [ ] No impact to data handling
372
+ - [ ] New data types collected: [List]
373
+ - [ ] Data flow changes: [Description]
374
+ - [ ] Data retention changes: [Description]
375
+
376
+ ### Risk Assessment
377
+ - **Likelihood**: [Low/Medium/High]
378
+ - **Impact**: [Low/Medium/High]
379
+ - **Overall Risk**: [Low/Medium/High]
380
+
381
+ ## Notification Required (FRR-SCN)
382
+ - [ ] FedRAMP PMO
383
+ - [ ] Authorizing Agencies: [List]
384
+ - [ ] 3PAO (if assessment needed)
385
+
386
+ ## Testing & Validation
387
+ - [ ] Security testing completed
388
+ - [ ] Vulnerability scan completed
389
+ - [ ] Configuration review completed
390
+ - [ ] Monitoring updated
391
+
392
+ ## Approvals
393
+ - System Owner: ________________ Date: ______
394
+ - CISO: ________________ Date: ______
395
+ - Change Advisory Board: ________________ Date: ______
396
+
397
+ ## Implementation
398
+ - **Scheduled Date**: YYYY-MM-DD HH:MM UTC
399
+ - **Rollback Plan**: [Description]
400
+ - **Monitoring**: [How change will be monitored]
401
+ ```
402
+
403
+ ## KSI Implementation Documentation Template
404
+
405
+ ```markdown
406
+ # Key Security Indicator: [KSI-ID]
407
+
408
+ ## Indicator Information
409
+ - **ID**: [e.g., KSI-IAM-01]
410
+ - **Title**: [e.g., Phishing-Resistant MFA]
411
+ - **Category**: [e.g., Identity & Access Management]
412
+ - **Implementation Date**: YYYY-MM-DD
413
+ - **Owner**: [Name, Role]
414
+
415
+ ## Requirement Description
416
+ [Copy requirement text from get_ksi(ksi_id)]
417
+
418
+ ## Implementation Approach
419
+
420
+ ### Technology/Tools
421
+ - [Tool/service name]
422
+ - [Configuration details]
423
+ - [Integration points]
424
+
425
+ ### Procedures
426
+ 1. [Step 1]
427
+ 2. [Step 2]
428
+ 3. [Step 3]
429
+
430
+ ## Evidence Collection
431
+
432
+ ### Automated Collection
433
+ - **Frequency**: [Continuous/Daily/Weekly]
434
+ - **Method**: [API/Log extraction/Report generation]
435
+ - **Storage**: [Location]
436
+ - **Format**: [JSON/CSV/PDF]
437
+
438
+ ### Manual Collection
439
+ - **Frequency**: [Monthly/Quarterly]
440
+ - **Responsible Party**: [Name, Role]
441
+ - **Checklist**: [Items to collect]
442
+
443
+ ## Metrics & Measurement
444
+
445
+ ### Current Status
446
+ - **Compliance**: [Compliant/Partial/Non-compliant]
447
+ - **Metric Value**: [e.g., "100% of users"]
448
+ - **Last Measured**: YYYY-MM-DD
449
+
450
+ ### Targets
451
+ - **Target Value**: [e.g., "100%"]
452
+ - **Target Date**: YYYY-MM-DD
453
+
454
+ ### Tracking
455
+ - **Dashboard**: [Link to dashboard]
456
+ - **Reporting**: [Where metrics are published]
457
+
458
+ ## Testing & Validation
459
+ - **Test Procedure**: [How compliance is tested]
460
+ - **Test Frequency**: [Quarterly/Annual]
461
+ - **Last Test Date**: YYYY-MM-DD
462
+ - **Next Test Date**: YYYY-MM-DD
463
+
464
+ ## Related Requirements
465
+ [List related KSIs and FRR requirements using check_requirement_dependencies]
466
+
467
+ ## Evidence for 3PAO
468
+ - [ ] Policy documentation
469
+ - [ ] Configuration screenshots
470
+ - [ ] Compliance reports
471
+ - [ ] Test results
472
+ - [ ] Training records (if applicable)
473
+ ```
474
+
475
+ ## Quick Reference: Required Documents
476
+
477
+ **Core Documents:**
478
+ 1. System Security Plan (OSCAL format preferred)
479
+ 2. Vulnerability Detection & Response Procedure (FRR-VDR)
480
+ 3. Incident Communications Procedure (FRR-ICP)
481
+ 4. Significant Change Notification Procedure (FRR-SCN)
482
+ 5. Continuous Monitoring Plan (FRR-CCM)
483
+ 6. All 72 KSI Implementation Documents
484
+
485
+ **Supporting Documents:**
486
+ 7. Authorization Boundary Description (FRR-MAS)
487
+ 8. Authorization Data Sharing API Documentation (FRR-ADS)
488
+ 9. Persistent Validation Procedures (FRR-PVA)
489
+ 10. Recommended Secure Configuration (FRR-RSC)
490
+ 11. Cryptographic Module Usage (FRR-UCM)
491
+
492
+ **Quarterly Deliverables:**
493
+ 12. Quarterly Review Report (FRR-CCM-QR)
494
+ 13. KSI Metrics Dashboard
495
+ 14. Vulnerability Status Report
496
+ 15. Incident Summary
497
+ 16. Change Log
498
+
499
+ Use get_control(requirement_id) to get specific requirement details for any documentation section.
@@ -0,0 +1,25 @@
1
+ I'll help you conduct a FedRAMP 20x gap analysis. Let's start by understanding your system:
2
+
3
+ 1. **Authorization Level**: What FedRAMP authorization level are you targeting?
4
+ - Low Impact
5
+ - Moderate Impact
6
+ - High Impact
7
+
8
+ 2. **Service Type**: What type of cloud service are you offering?
9
+ - SaaS (Software as a Service)
10
+ - PaaS (Platform as a Service)
11
+ - IaaS (Infrastructure as a Service)
12
+
13
+ 3. **Current State**: Are you:
14
+ - Starting a new FedRAMP authorization
15
+ - Maintaining an existing authorization
16
+ - Addressing a significant change
17
+
18
+ Based on your answers, I'll help you:
19
+ - Identify applicable requirements from all FedRAMP 20x documents
20
+ - Review Key Security Indicators (KSI) you need to track
21
+ - Understand Minimum Assessment Scope (MAS) requirements
22
+ - Check Vulnerability Detection and Response (VDR) obligations
23
+ - Review Significant Change Notification (SCN) requirements
24
+
25
+ **Next Steps**: Please share your authorization level and service type, and I'll provide tailored guidance.