fedramp-20x-mcp 0.4.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- fedramp_20x_mcp/__init__.py +14 -0
- fedramp_20x_mcp/__main__.py +12 -0
- fedramp_20x_mcp/data_loader.py +673 -0
- fedramp_20x_mcp/prompts/__init__.py +62 -0
- fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
- fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
- fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
- fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
- fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
- fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
- fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
- fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
- fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
- fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
- fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
- fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
- fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
- fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
- fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
- fedramp_20x_mcp/server.py +270 -0
- fedramp_20x_mcp/templates/__init__.py +75 -0
- fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
- fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
- fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
- fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
- fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
- fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
- fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
- fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
- fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
- fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
- fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
- fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
- fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
- fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
- fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
- fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
- fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
- fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
- fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
- fedramp_20x_mcp/tools/__init__.py +167 -0
- fedramp_20x_mcp/tools/definitions.py +154 -0
- fedramp_20x_mcp/tools/documentation.py +155 -0
- fedramp_20x_mcp/tools/enhancements.py +2256 -0
- fedramp_20x_mcp/tools/evidence.py +701 -0
- fedramp_20x_mcp/tools/export.py +753 -0
- fedramp_20x_mcp/tools/ksi.py +90 -0
- fedramp_20x_mcp/tools/requirements.py +163 -0
- fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
- fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
- fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
- fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
- fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
|
@@ -0,0 +1,61 @@
|
|
|
1
|
+
I'll help you establish a FedRAMP-compliant continuous monitoring program.
|
|
2
|
+
|
|
3
|
+
**Continuous Monitoring Components**:
|
|
4
|
+
|
|
5
|
+
**1. Collaborative Continuous Monitoring (CCM)**
|
|
6
|
+
- Quarterly reviews with agencies
|
|
7
|
+
- Continuous authorization maintenance
|
|
8
|
+
- Agency-specific monitoring requirements
|
|
9
|
+
|
|
10
|
+
**2. Persistent Validation & Assessment (PVA)**
|
|
11
|
+
- Regular assessment schedules based on impact level
|
|
12
|
+
- Validation procedures
|
|
13
|
+
- Evidence collection and documentation
|
|
14
|
+
|
|
15
|
+
**3. Key Security Indicators (KSI) Tracking**
|
|
16
|
+
Track 72 indicators across 11 categories:
|
|
17
|
+
- Authorization & Accreditation metrics
|
|
18
|
+
- Cybersecurity Education completion
|
|
19
|
+
- Commitment to security practices
|
|
20
|
+
- Change Management effectiveness
|
|
21
|
+
- Identity & Access Management
|
|
22
|
+
- Information Resources management
|
|
23
|
+
- Monitoring, Logging & Analysis
|
|
24
|
+
- Privacy protection
|
|
25
|
+
- Reporting compliance
|
|
26
|
+
- Service Offerings documentation
|
|
27
|
+
- Third Party Resources management
|
|
28
|
+
|
|
29
|
+
**4. Monitoring Schedule**:
|
|
30
|
+
|
|
31
|
+
**Monthly Activities**:
|
|
32
|
+
- [ ] Vulnerability scanning
|
|
33
|
+
- [ ] Log review and analysis
|
|
34
|
+
- [ ] Incident tracking and reporting
|
|
35
|
+
- [ ] KSI metrics collection
|
|
36
|
+
|
|
37
|
+
**Quarterly Activities**:
|
|
38
|
+
- [ ] CCM reviews with agencies
|
|
39
|
+
- [ ] Security posture assessment
|
|
40
|
+
- [ ] Control effectiveness evaluation
|
|
41
|
+
- [ ] Significant change review
|
|
42
|
+
|
|
43
|
+
**Annual Activities**:
|
|
44
|
+
- [ ] Full security assessment (based on impact level)
|
|
45
|
+
- [ ] Authorization package update
|
|
46
|
+
- [ ] Third-party assessment coordination
|
|
47
|
+
|
|
48
|
+
**5. Reporting Requirements**:
|
|
49
|
+
- Monthly vulnerability reports
|
|
50
|
+
- Quarterly CCM deliverables
|
|
51
|
+
- Incident notifications (as they occur)
|
|
52
|
+
- Annual assessment reports
|
|
53
|
+
|
|
54
|
+
**Setup Steps**:
|
|
55
|
+
1. Use list_ksi to review all 72 Key Security Indicators
|
|
56
|
+
2. Use search_requirements with "monitoring" to find related requirements
|
|
57
|
+
3. Use get_control for specific CCM and PVA requirements
|
|
58
|
+
4. Document your monitoring procedures and schedules
|
|
59
|
+
5. Establish automated collection where possible
|
|
60
|
+
|
|
61
|
+
**Next Steps**: Would you like detailed requirements for a specific monitoring component?
|
|
@@ -0,0 +1,499 @@
|
|
|
1
|
+
I'll help you generate documentation templates for FedRAMP 20x compliance.
|
|
2
|
+
|
|
3
|
+
# Documentation Generator for FedRAMP 20x
|
|
4
|
+
|
|
5
|
+
**Important Note on OSCAL:** FedRAMP 20x requires **machine-readable** formats (JSON/XML) for Authorization Data Sharing. **OSCAL is NOT mentioned in FedRAMP 20x** - it's a NIST standard shown below as one example implementation approach. Custom JSON/XML formats are equally valid.
|
|
6
|
+
|
|
7
|
+
## OSCAL System Security Plan (SSP) Template
|
|
8
|
+
|
|
9
|
+
### 1. Metadata Section
|
|
10
|
+
```json
|
|
11
|
+
{
|
|
12
|
+
"system-security-plan": {
|
|
13
|
+
"uuid": "GENERATE-UUID-HERE",
|
|
14
|
+
"metadata": {
|
|
15
|
+
"title": "[Your System Name] System Security Plan",
|
|
16
|
+
"published": "YYYY-MM-DDTHH:MM:SSZ",
|
|
17
|
+
"last-modified": "YYYY-MM-DDTHH:MM:SSZ",
|
|
18
|
+
"version": "1.0.0",
|
|
19
|
+
"oscal-version": "1.1.2",
|
|
20
|
+
"roles": [
|
|
21
|
+
{
|
|
22
|
+
"id": "ciso",
|
|
23
|
+
"title": "Chief Information Security Officer"
|
|
24
|
+
},
|
|
25
|
+
{
|
|
26
|
+
"id": "system-owner",
|
|
27
|
+
"title": "System Owner"
|
|
28
|
+
},
|
|
29
|
+
{
|
|
30
|
+
"id": "authorizing-official",
|
|
31
|
+
"title": "Authorizing Official"
|
|
32
|
+
}
|
|
33
|
+
],
|
|
34
|
+
"parties": [
|
|
35
|
+
{
|
|
36
|
+
"uuid": "GENERATE-UUID",
|
|
37
|
+
"type": "organization",
|
|
38
|
+
"name": "[Your Organization Name]",
|
|
39
|
+
"email-addresses": ["security@example.com"]
|
|
40
|
+
}
|
|
41
|
+
],
|
|
42
|
+
"responsible-parties": [
|
|
43
|
+
{
|
|
44
|
+
"role-id": "ciso",
|
|
45
|
+
"party-uuids": ["PARTY-UUID"]
|
|
46
|
+
}
|
|
47
|
+
]
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
```
|
|
52
|
+
|
|
53
|
+
### 2. System Characteristics (FRR-MAS)
|
|
54
|
+
```json
|
|
55
|
+
{
|
|
56
|
+
"system-characteristics": {
|
|
57
|
+
"system-ids": [
|
|
58
|
+
{
|
|
59
|
+
"identifier-type": "https://fedramp.gov",
|
|
60
|
+
"id": "FR-########"
|
|
61
|
+
}
|
|
62
|
+
],
|
|
63
|
+
"system-name": "[Your System Name]",
|
|
64
|
+
"system-name-short": "[Acronym]",
|
|
65
|
+
"description": "[Detailed system description including Federal Customer Data handling]",
|
|
66
|
+
"security-sensitivity-level": "moderate",
|
|
67
|
+
"system-information": {
|
|
68
|
+
"information-types": [
|
|
69
|
+
{
|
|
70
|
+
"uuid": "GENERATE-UUID",
|
|
71
|
+
"title": "Federal Customer Data",
|
|
72
|
+
"description": "Information provided by federal agencies",
|
|
73
|
+
"categorizations": [
|
|
74
|
+
{
|
|
75
|
+
"system": "https://doi.org/10.6028/NIST.SP.800-60v2r1",
|
|
76
|
+
"information-type-ids": ["C.3.5.8"]
|
|
77
|
+
}
|
|
78
|
+
],
|
|
79
|
+
"confidentiality-impact": {
|
|
80
|
+
"base": "moderate",
|
|
81
|
+
"selected": "moderate"
|
|
82
|
+
},
|
|
83
|
+
"integrity-impact": {
|
|
84
|
+
"base": "moderate",
|
|
85
|
+
"selected": "moderate"
|
|
86
|
+
},
|
|
87
|
+
"availability-impact": {
|
|
88
|
+
"base": "moderate",
|
|
89
|
+
"selected": "moderate"
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
]
|
|
93
|
+
},
|
|
94
|
+
"security-impact-level": {
|
|
95
|
+
"security-objective-confidentiality": "moderate",
|
|
96
|
+
"security-objective-integrity": "moderate",
|
|
97
|
+
"security-objective-availability": "moderate"
|
|
98
|
+
},
|
|
99
|
+
"authorization-boundary": {
|
|
100
|
+
"description": "[Detailed boundary description per FRR-MAS requirements]",
|
|
101
|
+
"diagrams": [
|
|
102
|
+
{
|
|
103
|
+
"uuid": "GENERATE-UUID",
|
|
104
|
+
"description": "System Architecture Diagram",
|
|
105
|
+
"links": [
|
|
106
|
+
{
|
|
107
|
+
"href": "https://example.com/architecture.png",
|
|
108
|
+
"rel": "diagram"
|
|
109
|
+
}
|
|
110
|
+
]
|
|
111
|
+
}
|
|
112
|
+
],
|
|
113
|
+
"remarks": "Includes all information resources likely to handle Federal Customer Data"
|
|
114
|
+
},
|
|
115
|
+
"network-architecture": {
|
|
116
|
+
"description": "Network segmentation and traffic flow (KSI-CNA-01, CNA-03)"
|
|
117
|
+
},
|
|
118
|
+
"data-flow": {
|
|
119
|
+
"description": "Federal Customer Data flow through system"
|
|
120
|
+
}
|
|
121
|
+
}
|
|
122
|
+
}
|
|
123
|
+
```
|
|
124
|
+
|
|
125
|
+
### 3. System Implementation
|
|
126
|
+
```json
|
|
127
|
+
{
|
|
128
|
+
"system-implementation": {
|
|
129
|
+
"users": [
|
|
130
|
+
{
|
|
131
|
+
"uuid": "GENERATE-UUID",
|
|
132
|
+
"role-ids": ["system-admin"],
|
|
133
|
+
"authorized-privileges": [
|
|
134
|
+
{
|
|
135
|
+
"title": "System Administration",
|
|
136
|
+
"description": "Full administrative access",
|
|
137
|
+
"functions-performed": ["user-management", "configuration"]
|
|
138
|
+
}
|
|
139
|
+
]
|
|
140
|
+
}
|
|
141
|
+
],
|
|
142
|
+
"components": [
|
|
143
|
+
{
|
|
144
|
+
"uuid": "GENERATE-UUID",
|
|
145
|
+
"type": "software",
|
|
146
|
+
"title": "Web Application Server",
|
|
147
|
+
"description": "Primary application hosting environment",
|
|
148
|
+
"status": {
|
|
149
|
+
"state": "operational"
|
|
150
|
+
},
|
|
151
|
+
"props": [
|
|
152
|
+
{
|
|
153
|
+
"name": "handles-federal-customer-data",
|
|
154
|
+
"value": "yes"
|
|
155
|
+
},
|
|
156
|
+
{
|
|
157
|
+
"name": "vendor",
|
|
158
|
+
"value": "[Vendor Name]"
|
|
159
|
+
}
|
|
160
|
+
]
|
|
161
|
+
}
|
|
162
|
+
],
|
|
163
|
+
"inventory-items": [
|
|
164
|
+
{
|
|
165
|
+
"uuid": "GENERATE-UUID",
|
|
166
|
+
"description": "Component inventory per KSI-PIY-01",
|
|
167
|
+
"props": [
|
|
168
|
+
{
|
|
169
|
+
"name": "asset-id",
|
|
170
|
+
"value": "AST-001"
|
|
171
|
+
},
|
|
172
|
+
{
|
|
173
|
+
"name": "asset-type",
|
|
174
|
+
"value": "virtual-machine"
|
|
175
|
+
}
|
|
176
|
+
],
|
|
177
|
+
"implemented-components": [
|
|
178
|
+
{
|
|
179
|
+
"component-uuid": "COMPONENT-UUID"
|
|
180
|
+
}
|
|
181
|
+
]
|
|
182
|
+
}
|
|
183
|
+
]
|
|
184
|
+
}
|
|
185
|
+
}
|
|
186
|
+
```
|
|
187
|
+
|
|
188
|
+
## Vulnerability Detection & Response Procedure (FRR-VDR)
|
|
189
|
+
|
|
190
|
+
```markdown
|
|
191
|
+
# Vulnerability Detection and Response Procedure
|
|
192
|
+
|
|
193
|
+
## 1. Vulnerability Scanning (FRR-VDR-01)
|
|
194
|
+
|
|
195
|
+
### Scanning Frequency
|
|
196
|
+
- **Infrastructure**: Continuous, minimum daily
|
|
197
|
+
- **Containers**: On build and weekly in production
|
|
198
|
+
- **Code**: On every commit (SAST)
|
|
199
|
+
- **Dependencies**: Daily checks
|
|
200
|
+
|
|
201
|
+
### Scanning Tools
|
|
202
|
+
- Infrastructure: [Tool Name]
|
|
203
|
+
- Containers: [Tool Name]
|
|
204
|
+
- Code: [Tool Name]
|
|
205
|
+
- Dependencies: [Tool Name]
|
|
206
|
+
|
|
207
|
+
## 2. Remediation Timeframes (FRR-VDR-TF)
|
|
208
|
+
|
|
209
|
+
### High Impact Systems
|
|
210
|
+
| Severity | CVSS Score | Timeframe |
|
|
211
|
+
|----------|------------|-----------|
|
|
212
|
+
| Critical | 9.0-10.0 | 7 days |
|
|
213
|
+
| High | 7.0-8.9 | 15 days |
|
|
214
|
+
| Medium | 4.0-6.9 | 60 days |
|
|
215
|
+
| Low | 0.1-3.9 | 180 days |
|
|
216
|
+
|
|
217
|
+
### Moderate Impact Systems
|
|
218
|
+
| Severity | CVSS Score | Timeframe |
|
|
219
|
+
|----------|------------|-----------|
|
|
220
|
+
| Critical | 9.0-10.0 | 15 days |
|
|
221
|
+
| High | 7.0-8.9 | 30 days |
|
|
222
|
+
| Medium | 4.0-6.9 | 90 days |
|
|
223
|
+
| Low | 0.1-3.9 | 180 days |
|
|
224
|
+
|
|
225
|
+
## 3. Remediation Process
|
|
226
|
+
|
|
227
|
+
1. **Detection**: Automated scan identifies vulnerability
|
|
228
|
+
2. **Triage**: Security team assesses within 24 hours
|
|
229
|
+
3. **Assignment**: Create ticket, assign to owner
|
|
230
|
+
4. **Remediation**: Apply patch or mitigating control
|
|
231
|
+
5. **Validation**: Re-scan to confirm fix
|
|
232
|
+
6. **Documentation**: Update POA&M if needed
|
|
233
|
+
|
|
234
|
+
## 4. Exception Process (FRR-VDR-EX)
|
|
235
|
+
|
|
236
|
+
Exceptions may be granted for:
|
|
237
|
+
- No patch available
|
|
238
|
+
- Patch breaks critical functionality
|
|
239
|
+
- Compensating controls in place
|
|
240
|
+
|
|
241
|
+
**Exception Request Must Include:**
|
|
242
|
+
- Vulnerability details (CVE, CVSS)
|
|
243
|
+
- Business justification
|
|
244
|
+
- Risk assessment
|
|
245
|
+
- Compensating controls
|
|
246
|
+
- Exception duration (max 90 days)
|
|
247
|
+
- Review date
|
|
248
|
+
|
|
249
|
+
**Approval Required From:**
|
|
250
|
+
- CISO
|
|
251
|
+
- System Owner
|
|
252
|
+
- Authorizing Official (for High/Critical)
|
|
253
|
+
|
|
254
|
+
## 5. Agency Reporting (FRR-VDR-RP)
|
|
255
|
+
|
|
256
|
+
Report to affected agencies within 24 hours if:
|
|
257
|
+
- Critical/High vulnerability affects their data
|
|
258
|
+
- Active exploitation detected
|
|
259
|
+
- Patch will cause service disruption
|
|
260
|
+
|
|
261
|
+
**Report Via:**
|
|
262
|
+
- FedRAMP Security Inbox (FRR-FSI)
|
|
263
|
+
- Agency-specific incident channels (FRR-ICP)
|
|
264
|
+
```
|
|
265
|
+
|
|
266
|
+
## Incident Communications Procedure (FRR-ICP)
|
|
267
|
+
|
|
268
|
+
```markdown
|
|
269
|
+
# Incident Communications Procedure
|
|
270
|
+
|
|
271
|
+
## 1. Incident Classification
|
|
272
|
+
|
|
273
|
+
### Severity Levels
|
|
274
|
+
- **Critical**: Data breach, service outage affecting federal data
|
|
275
|
+
- **High**: Security event with potential data impact
|
|
276
|
+
- **Medium**: Security event contained, no data impact
|
|
277
|
+
- **Low**: Security event, no immediate risk
|
|
278
|
+
|
|
279
|
+
## 2. Notification Timeframes
|
|
280
|
+
|
|
281
|
+
| Severity | Internal | FedRAMP | Agencies | Public |
|
|
282
|
+
|----------|----------|---------|----------|--------|
|
|
283
|
+
| Critical | Immediate| 1 hour | 2 hours | TBD |
|
|
284
|
+
| High | 1 hour | 4 hours | 6 hours | TBD |
|
|
285
|
+
| Medium | 4 hours | 24 hours| 24 hours | N/A |
|
|
286
|
+
| Low | 24 hours | N/A | N/A | N/A |
|
|
287
|
+
|
|
288
|
+
## 3. Communication Channels (FRR-FSI)
|
|
289
|
+
|
|
290
|
+
**FedRAMP Security Inbox**: security@fedramp.gov
|
|
291
|
+
- All security-related communications
|
|
292
|
+
- Vulnerability notifications
|
|
293
|
+
- Significant changes
|
|
294
|
+
- Incident reports
|
|
295
|
+
|
|
296
|
+
**Agency-Specific Channels**: Per ICP agreements
|
|
297
|
+
- Direct agency security contacts
|
|
298
|
+
- Agency-specific portals
|
|
299
|
+
- Coordinated disclosure timelines
|
|
300
|
+
|
|
301
|
+
## 4. Incident Report Template
|
|
302
|
+
|
|
303
|
+
```
|
|
304
|
+
Subject: [INCIDENT] [SEVERITY] - [Brief Description]
|
|
305
|
+
|
|
306
|
+
Incident ID: INC-YYYY-###
|
|
307
|
+
Date/Time Detected: YYYY-MM-DD HH:MM UTC
|
|
308
|
+
Severity: [Critical/High/Medium/Low]
|
|
309
|
+
Status: [Investigating/Contained/Resolved]
|
|
310
|
+
|
|
311
|
+
IMPACT:
|
|
312
|
+
- Systems Affected: [List]
|
|
313
|
+
- Data Affected: [Federal Customer Data? Yes/No]
|
|
314
|
+
- Agencies Affected: [List or "None"]
|
|
315
|
+
- User Impact: [Description]
|
|
316
|
+
|
|
317
|
+
SUMMARY:
|
|
318
|
+
[What happened, when detected, initial assessment]
|
|
319
|
+
|
|
320
|
+
RESPONSE ACTIONS:
|
|
321
|
+
- [Action 1]
|
|
322
|
+
- [Action 2]
|
|
323
|
+
|
|
324
|
+
NEXT STEPS:
|
|
325
|
+
[Planned actions and timeline]
|
|
326
|
+
|
|
327
|
+
CONTACT:
|
|
328
|
+
[Incident Commander name and contact]
|
|
329
|
+
```
|
|
330
|
+
|
|
331
|
+
## 5. Post-Incident Activities (KSI-INR-03)
|
|
332
|
+
|
|
333
|
+
Within 30 days of incident closure:
|
|
334
|
+
- [ ] Complete after-action report
|
|
335
|
+
- [ ] Identify root cause
|
|
336
|
+
- [ ] Document lessons learned
|
|
337
|
+
- [ ] Update procedures if needed
|
|
338
|
+
- [ ] Implement preventive measures
|
|
339
|
+
- [ ] Share with relevant stakeholders
|
|
340
|
+
```
|
|
341
|
+
|
|
342
|
+
## Significant Change Notification Template (FRR-SCN)
|
|
343
|
+
|
|
344
|
+
```markdown
|
|
345
|
+
# Significant Change Notification
|
|
346
|
+
|
|
347
|
+
## Change Information
|
|
348
|
+
- **Change ID**: CHG-YYYY-###
|
|
349
|
+
- **Date**: YYYY-MM-DD
|
|
350
|
+
- **Type**: [Routine/Administrative/Transformative/Impact]
|
|
351
|
+
- **Submitted By**: [Name, Role]
|
|
352
|
+
|
|
353
|
+
## Change Description
|
|
354
|
+
[Detailed description of the change]
|
|
355
|
+
|
|
356
|
+
## Impact Assessment
|
|
357
|
+
|
|
358
|
+
### Authorization Boundary (FRR-MAS)
|
|
359
|
+
- [ ] No boundary changes
|
|
360
|
+
- [ ] New components added: [List]
|
|
361
|
+
- [ ] Components removed: [List]
|
|
362
|
+
- [ ] Third-party services changed: [List]
|
|
363
|
+
|
|
364
|
+
### Security Controls
|
|
365
|
+
- [ ] No control changes
|
|
366
|
+
- [ ] Controls added: [List]
|
|
367
|
+
- [ ] Controls modified: [List]
|
|
368
|
+
- [ ] Controls removed: [List]
|
|
369
|
+
|
|
370
|
+
### Federal Customer Data
|
|
371
|
+
- [ ] No impact to data handling
|
|
372
|
+
- [ ] New data types collected: [List]
|
|
373
|
+
- [ ] Data flow changes: [Description]
|
|
374
|
+
- [ ] Data retention changes: [Description]
|
|
375
|
+
|
|
376
|
+
### Risk Assessment
|
|
377
|
+
- **Likelihood**: [Low/Medium/High]
|
|
378
|
+
- **Impact**: [Low/Medium/High]
|
|
379
|
+
- **Overall Risk**: [Low/Medium/High]
|
|
380
|
+
|
|
381
|
+
## Notification Required (FRR-SCN)
|
|
382
|
+
- [ ] FedRAMP PMO
|
|
383
|
+
- [ ] Authorizing Agencies: [List]
|
|
384
|
+
- [ ] 3PAO (if assessment needed)
|
|
385
|
+
|
|
386
|
+
## Testing & Validation
|
|
387
|
+
- [ ] Security testing completed
|
|
388
|
+
- [ ] Vulnerability scan completed
|
|
389
|
+
- [ ] Configuration review completed
|
|
390
|
+
- [ ] Monitoring updated
|
|
391
|
+
|
|
392
|
+
## Approvals
|
|
393
|
+
- System Owner: ________________ Date: ______
|
|
394
|
+
- CISO: ________________ Date: ______
|
|
395
|
+
- Change Advisory Board: ________________ Date: ______
|
|
396
|
+
|
|
397
|
+
## Implementation
|
|
398
|
+
- **Scheduled Date**: YYYY-MM-DD HH:MM UTC
|
|
399
|
+
- **Rollback Plan**: [Description]
|
|
400
|
+
- **Monitoring**: [How change will be monitored]
|
|
401
|
+
```
|
|
402
|
+
|
|
403
|
+
## KSI Implementation Documentation Template
|
|
404
|
+
|
|
405
|
+
```markdown
|
|
406
|
+
# Key Security Indicator: [KSI-ID]
|
|
407
|
+
|
|
408
|
+
## Indicator Information
|
|
409
|
+
- **ID**: [e.g., KSI-IAM-01]
|
|
410
|
+
- **Title**: [e.g., Phishing-Resistant MFA]
|
|
411
|
+
- **Category**: [e.g., Identity & Access Management]
|
|
412
|
+
- **Implementation Date**: YYYY-MM-DD
|
|
413
|
+
- **Owner**: [Name, Role]
|
|
414
|
+
|
|
415
|
+
## Requirement Description
|
|
416
|
+
[Copy requirement text from get_ksi(ksi_id)]
|
|
417
|
+
|
|
418
|
+
## Implementation Approach
|
|
419
|
+
|
|
420
|
+
### Technology/Tools
|
|
421
|
+
- [Tool/service name]
|
|
422
|
+
- [Configuration details]
|
|
423
|
+
- [Integration points]
|
|
424
|
+
|
|
425
|
+
### Procedures
|
|
426
|
+
1. [Step 1]
|
|
427
|
+
2. [Step 2]
|
|
428
|
+
3. [Step 3]
|
|
429
|
+
|
|
430
|
+
## Evidence Collection
|
|
431
|
+
|
|
432
|
+
### Automated Collection
|
|
433
|
+
- **Frequency**: [Continuous/Daily/Weekly]
|
|
434
|
+
- **Method**: [API/Log extraction/Report generation]
|
|
435
|
+
- **Storage**: [Location]
|
|
436
|
+
- **Format**: [JSON/CSV/PDF]
|
|
437
|
+
|
|
438
|
+
### Manual Collection
|
|
439
|
+
- **Frequency**: [Monthly/Quarterly]
|
|
440
|
+
- **Responsible Party**: [Name, Role]
|
|
441
|
+
- **Checklist**: [Items to collect]
|
|
442
|
+
|
|
443
|
+
## Metrics & Measurement
|
|
444
|
+
|
|
445
|
+
### Current Status
|
|
446
|
+
- **Compliance**: [Compliant/Partial/Non-compliant]
|
|
447
|
+
- **Metric Value**: [e.g., "100% of users"]
|
|
448
|
+
- **Last Measured**: YYYY-MM-DD
|
|
449
|
+
|
|
450
|
+
### Targets
|
|
451
|
+
- **Target Value**: [e.g., "100%"]
|
|
452
|
+
- **Target Date**: YYYY-MM-DD
|
|
453
|
+
|
|
454
|
+
### Tracking
|
|
455
|
+
- **Dashboard**: [Link to dashboard]
|
|
456
|
+
- **Reporting**: [Where metrics are published]
|
|
457
|
+
|
|
458
|
+
## Testing & Validation
|
|
459
|
+
- **Test Procedure**: [How compliance is tested]
|
|
460
|
+
- **Test Frequency**: [Quarterly/Annual]
|
|
461
|
+
- **Last Test Date**: YYYY-MM-DD
|
|
462
|
+
- **Next Test Date**: YYYY-MM-DD
|
|
463
|
+
|
|
464
|
+
## Related Requirements
|
|
465
|
+
[List related KSIs and FRR requirements using check_requirement_dependencies]
|
|
466
|
+
|
|
467
|
+
## Evidence for 3PAO
|
|
468
|
+
- [ ] Policy documentation
|
|
469
|
+
- [ ] Configuration screenshots
|
|
470
|
+
- [ ] Compliance reports
|
|
471
|
+
- [ ] Test results
|
|
472
|
+
- [ ] Training records (if applicable)
|
|
473
|
+
```
|
|
474
|
+
|
|
475
|
+
## Quick Reference: Required Documents
|
|
476
|
+
|
|
477
|
+
**Core Documents:**
|
|
478
|
+
1. System Security Plan (OSCAL format preferred)
|
|
479
|
+
2. Vulnerability Detection & Response Procedure (FRR-VDR)
|
|
480
|
+
3. Incident Communications Procedure (FRR-ICP)
|
|
481
|
+
4. Significant Change Notification Procedure (FRR-SCN)
|
|
482
|
+
5. Continuous Monitoring Plan (FRR-CCM)
|
|
483
|
+
6. All 72 KSI Implementation Documents
|
|
484
|
+
|
|
485
|
+
**Supporting Documents:**
|
|
486
|
+
7. Authorization Boundary Description (FRR-MAS)
|
|
487
|
+
8. Authorization Data Sharing API Documentation (FRR-ADS)
|
|
488
|
+
9. Persistent Validation Procedures (FRR-PVA)
|
|
489
|
+
10. Recommended Secure Configuration (FRR-RSC)
|
|
490
|
+
11. Cryptographic Module Usage (FRR-UCM)
|
|
491
|
+
|
|
492
|
+
**Quarterly Deliverables:**
|
|
493
|
+
12. Quarterly Review Report (FRR-CCM-QR)
|
|
494
|
+
13. KSI Metrics Dashboard
|
|
495
|
+
14. Vulnerability Status Report
|
|
496
|
+
15. Incident Summary
|
|
497
|
+
16. Change Log
|
|
498
|
+
|
|
499
|
+
Use get_control(requirement_id) to get specific requirement details for any documentation section.
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
I'll help you conduct a FedRAMP 20x gap analysis. Let's start by understanding your system:
|
|
2
|
+
|
|
3
|
+
1. **Authorization Level**: What FedRAMP authorization level are you targeting?
|
|
4
|
+
- Low Impact
|
|
5
|
+
- Moderate Impact
|
|
6
|
+
- High Impact
|
|
7
|
+
|
|
8
|
+
2. **Service Type**: What type of cloud service are you offering?
|
|
9
|
+
- SaaS (Software as a Service)
|
|
10
|
+
- PaaS (Platform as a Service)
|
|
11
|
+
- IaaS (Infrastructure as a Service)
|
|
12
|
+
|
|
13
|
+
3. **Current State**: Are you:
|
|
14
|
+
- Starting a new FedRAMP authorization
|
|
15
|
+
- Maintaining an existing authorization
|
|
16
|
+
- Addressing a significant change
|
|
17
|
+
|
|
18
|
+
Based on your answers, I'll help you:
|
|
19
|
+
- Identify applicable requirements from all FedRAMP 20x documents
|
|
20
|
+
- Review Key Security Indicators (KSI) you need to track
|
|
21
|
+
- Understand Minimum Assessment Scope (MAS) requirements
|
|
22
|
+
- Check Vulnerability Detection and Response (VDR) obligations
|
|
23
|
+
- Review Significant Change Notification (SCN) requirements
|
|
24
|
+
|
|
25
|
+
**Next Steps**: Please share your authorization level and service type, and I'll provide tailored guidance.
|