fedramp-20x-mcp 0.4.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. fedramp_20x_mcp/__init__.py +14 -0
  2. fedramp_20x_mcp/__main__.py +12 -0
  3. fedramp_20x_mcp/data_loader.py +673 -0
  4. fedramp_20x_mcp/prompts/__init__.py +62 -0
  5. fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
  6. fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
  7. fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
  8. fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
  9. fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
  10. fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
  11. fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
  12. fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
  13. fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
  14. fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
  15. fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
  16. fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
  17. fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
  18. fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
  19. fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
  20. fedramp_20x_mcp/server.py +270 -0
  21. fedramp_20x_mcp/templates/__init__.py +75 -0
  22. fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
  23. fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
  24. fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
  25. fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
  26. fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
  27. fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
  28. fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
  29. fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
  30. fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
  31. fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
  32. fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
  33. fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
  34. fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
  35. fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
  36. fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
  37. fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
  38. fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
  39. fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
  40. fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
  41. fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
  42. fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
  43. fedramp_20x_mcp/tools/__init__.py +167 -0
  44. fedramp_20x_mcp/tools/definitions.py +154 -0
  45. fedramp_20x_mcp/tools/documentation.py +155 -0
  46. fedramp_20x_mcp/tools/enhancements.py +2256 -0
  47. fedramp_20x_mcp/tools/evidence.py +701 -0
  48. fedramp_20x_mcp/tools/export.py +753 -0
  49. fedramp_20x_mcp/tools/ksi.py +90 -0
  50. fedramp_20x_mcp/tools/requirements.py +163 -0
  51. fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
  52. fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
  53. fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
  54. fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
  55. fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
@@ -0,0 +1,202 @@
1
+ I'll provide a comprehensive roadmap for starting your FedRAMP 20x authorization from scratch.
2
+
3
+ # FedRAMP 20x Initial Assessment Roadmap
4
+
5
+ **Important Note on OSCAL:** FedRAMP 20x requires **machine-readable** formats (JSON, XML, or structured data) for Authorization Data Sharing (FRR-ADS). **OSCAL is NOT mentioned in FedRAMP 20x requirements** - it's a NIST standard that can be used as one implementation approach. When you see "OSCAL" mentioned below, understand it's one option among custom JSON/XML formats. Choose based on your implementation needs.
6
+
7
+ ## Phase 1: Foundation
8
+
9
+ **Understanding & Planning**
10
+ - [ ] Review all FedRAMP 20x standards (use list_family_controls for each)
11
+ - [ ] Identify your authorization level (Low, Moderate, High)
12
+ - [ ] Determine service categorization (SaaS, PaaS, IaaS)
13
+ - [ ] Assemble core team (CISO, compliance PM, engineering lead)
14
+ - [ ] Budget for 3PAO, tools, and staff time
15
+
16
+ **Initial Scoping**
17
+ - [ ] Define authorization boundary (FRR-MAS)
18
+ - [ ] Inventory all information resources
19
+ - [ ] Document Federal Customer Data flows
20
+ - [ ] Identify third-party dependencies
21
+ - [ ] Review FRD definitions for terminology
22
+
23
+ **Deliverables**: Authorization boundary diagram, resource inventory, project charter
24
+
25
+ ## Phase 2: Infrastructure & Tools
26
+
27
+ **Security Monitoring**
28
+ - [ ] Select and deploy SIEM solution (KSI-MLA-01)
29
+ - [ ] Configure log forwarding from all systems
30
+ - [ ] Set up vulnerability scanning (FRR-VDR-01)
31
+ - [ ] Implement container/code scanning
32
+ - [ ] Configure alerting and dashboards
33
+
34
+ **Identity & Access**
35
+ - [ ] Implement phishing-resistant MFA (KSI-IAM-01)
36
+ - [ ] Configure least-privilege IAM (KSI-IAM-05)
37
+ - [ ] Set up identity provider integration
38
+ - [ ] Document access procedures
39
+
40
+ **Automation Foundation**
41
+ - [ ] Implement Infrastructure as Code (KSI-MLA-05)
42
+ - [ ] Set up CI/CD pipelines (KSI-CMT-03)
43
+ - [ ] Configure automated testing
44
+ - [ ] Implement secret management (KSI-SVC-06)
45
+
46
+ **Deliverables**: Operational SIEM, vulnerability scanning, MFA, IaC
47
+
48
+ ## Phase 3: Compliance Infrastructure
49
+
50
+ **KSI Tracking**
51
+ - [ ] Review all 72 KSIs (use list_ksi)
52
+ - [ ] Map KSIs to your monitoring systems
53
+ - [ ] Implement automated KSI collection
54
+ - [ ] Create KSI dashboards
55
+ - [ ] Document collection procedures
56
+
57
+ **Authorization Data Sharing API**
58
+ - [ ] Design API endpoints (FRR-ADS)
59
+ - [ ] Implement machine-readable format (custom JSON/XML or OSCAL)
60
+ - [ ] Configure authentication (OAuth 2.0 or mTLS)
61
+ - [ ] Integrate with data sources
62
+ - [ ] Test with sample queries
63
+
64
+ **Continuous Monitoring Setup**
65
+ - [ ] Document quarterly review process (FRR-CCM-QR)
66
+ - [ ] Set up continuous vulnerability scanning
67
+ - [ ] Configure persistent validation (FRR-PVA)
68
+ - [ ] Establish agency collaboration procedures
69
+
70
+ **Deliverables**: KSI collection system, Data Sharing API, ConMon procedures
71
+
72
+ ## Phase 4: Documentation
73
+
74
+ **Core Documentation**
75
+ - [ ] System Security Plan (OSCAL format)
76
+ - [ ] Vulnerability Detection & Response procedures (FRR-VDR)
77
+ - [ ] Incident Communications Procedures (FRR-ICP)
78
+ - [ ] Significant Change Notification procedures (FRR-SCN)
79
+ - [ ] All 72 KSI implementation descriptions
80
+
81
+ **Policies & Procedures**
82
+ - [ ] Security policies aligned to FedRAMP 20x
83
+ - [ ] Change management procedures (KSI-CMT-04)
84
+ - [ ] Incident response plan (KSI-INR-01)
85
+ - [ ] Backup and recovery plan (KSI-RPL-02)
86
+ - [ ] Training programs (KSI-CED)
87
+
88
+ **Evidence Collection**
89
+ - [ ] Configure automated evidence collection
90
+ - [ ] Validate all KSI metrics are being tracked
91
+ - [ ] Test Authorization Data Sharing API
92
+ - [ ] Generate sample quarterly reports
93
+ - [ ] Document evidence collection procedures
94
+
95
+ **Deliverables**: Complete SSP, all policies/procedures, evidence collection system
96
+
97
+ ## Phase 5: Assessment Preparation
98
+
99
+ **Internal Readiness**
100
+ - [ ] Internal security assessment
101
+ - [ ] Gap remediation
102
+ - [ ] Evidence validation
103
+ - [ ] Practice runs with team
104
+ - [ ] Documentation review
105
+
106
+ **3PAO Selection & Engagement**
107
+ - [ ] Select 3PAO assessor
108
+ - [ ] Kickoff meeting
109
+ - [ ] Provide documentation
110
+ - [ ] Schedule assessment
111
+
112
+ **Assessment**
113
+ - [ ] 3PAO conducts assessment
114
+ - [ ] Daily standups with assessor
115
+ - [ ] Address findings in real-time
116
+ - [ ] Document any deviations
117
+
118
+ **Deliverables**: Security Assessment Report (SAR)
119
+
120
+ ## Phase 6: Authorization
121
+
122
+ **POA&M Development**
123
+ - [ ] Document all findings
124
+ - [ ] Create remediation plans
125
+ - [ ] Assign ownership and timelines
126
+ - [ ] Get executive approval
127
+
128
+ **Package Submission**
129
+ - [ ] Compile complete ATO package
130
+ - [ ] Submit to agency/FedRAMP
131
+ - [ ] Respond to initial questions
132
+
133
+ **Authorization Review**
134
+ - [ ] Agency/FedRAMP reviews package
135
+ - [ ] Respond to questions
136
+ - [ ] Provide additional evidence
137
+ - [ ] Receive Authorization decision
138
+
139
+ **Deliverables**: Authorization to Operate (ATO)
140
+
141
+ ## Ongoing: Continuous Monitoring (Post-Authorization)
142
+
143
+ **Daily/Automated**
144
+ - Vulnerability scanning
145
+ - Log collection and analysis
146
+ - KSI metric collection
147
+ - Change tracking
148
+
149
+ **Monthly**
150
+ - Review vulnerability findings
151
+ - Update POA&Ms
152
+ - Security control validation
153
+
154
+ **Quarterly (FRR-CCM-QR)**
155
+ - Formal quarterly review
156
+ - Update authorization package
157
+ - Share data via API
158
+ - Agency coordination
159
+
160
+ **Annual**
161
+ - Update authorization boundary
162
+ - Review significant changes
163
+ - Update risk assessment
164
+ - Plan for re-assessment
165
+
166
+ ## Critical Success Factors
167
+
168
+ **1. Executive Support** (KSI-PIY-08)
169
+ - Secure budget and resources
170
+ - Get organizational buy-in
171
+ - Ensure priority status
172
+
173
+ **2. Automation First** (FRD-ALL-07: "automatically if possible")
174
+ - Automate evidence collection
175
+ - Use IaC for all infrastructure
176
+ - Implement CI/CD pipelines
177
+ - Automated compliance checking
178
+
179
+ **3. Team Skills**
180
+ - FedRAMP 20x knowledge
181
+ - Cloud-native expertise
182
+ - Security automation skills
183
+ - OSCAL format understanding
184
+
185
+ **4. Vendor Selection**
186
+ - Choose FedRAMP-ready tools
187
+ - Ensure API integration capabilities
188
+ - Verify OSCAL support
189
+ - Check for KSI alignment
190
+
191
+ ## Timeline & Resource Planning
192
+
193
+ Engineering teams should determine their own timelines based on available resources, organizational requirements, existing infrastructure maturity, and compliance readiness. Consider factors such as team size, budget constraints, existing security controls, and agency-specific requirements when planning your implementation schedule.
194
+
195
+ ## Next Steps
196
+
197
+ 1. Use get_implementation_examples for specific requirements
198
+ 2. Use check_requirement_dependencies to understand relationships
199
+ 3. Use check_requirement_dependencies to understand relationships
200
+ 4. Use search_requirements to find specific guidance
201
+
202
+ Ready to start? Let me know which phase you'd like to focus on first!
@@ -0,0 +1,283 @@
1
+ I'll help you prioritize the implementation of FedRAMP 20x's 72 Key Security Indicators.
2
+
3
+ # KSI Implementation Priority Guide
4
+
5
+ **Note:** Engineering teams should determine their own implementation timelines based on system complexity, team size, existing infrastructure, and organizational resources. The priorities below indicate logical sequencing and dependencies, but actual durations will vary by organization.
6
+
7
+ ## Priority 1: Foundation
8
+ **Must be completed first - other KSIs depend on these**
9
+
10
+ ### Critical Infrastructure
11
+ 1. **KSI-MLA-01: SIEM** ⭐ HIGHEST PRIORITY
12
+ - Why: Required for logging all other KSIs
13
+ - Impact: Blocks 15+ other KSIs
14
+ - Dependencies: None
15
+
16
+ 2. **KSI-IAM-01: Phishing-Resistant MFA** ⭐ HIGH PRIORITY
17
+ - Why: Security foundation, quick win
18
+ - Impact: Protects all access
19
+ - Dependencies: None
20
+
21
+ 3. **KSI-PIY-01: Automated Inventory**
22
+ - Why: Needed to track what you're securing
23
+ - Impact: Required for boundary management
24
+ - Dependencies: None
25
+
26
+ 4. **KSI-MLA-02: Audit Logging**
27
+ - Why: Foundation for compliance evidence
28
+ - Impact: Enables incident investigation
29
+ - Dependencies: KSI-MLA-01 (SIEM)
30
+
31
+ ## Priority 2: Security Controls
32
+ **Core security capabilities**
33
+
34
+ ### Vulnerability Management
35
+ 5. **KSI-AFR-04: Vulnerability Detection and Response** (ties to FRR-VDR)
36
+ - Why: Required for continuous scanning
37
+ - Impact: Critical for compliance
38
+ - Dependencies: None
39
+
40
+ 6. **KSI-SVC-07: Patching**
41
+ - Why: Vulnerability remediation
42
+ - Impact: Keeps systems secure
43
+ - Dependencies: KSI-AFR-04, automated deployment
44
+
45
+ ### Access Management
46
+ 7. **KSI-IAM-05: Least Privilege**
47
+ - Why: Limits blast radius
48
+ - Impact: Reduces risk across all systems
49
+ - Dependencies: KSI-IAM-01, KSI-PIY-01
50
+
51
+ 8. **KSI-IAM-06: Suspicious Activity Detection**
52
+ - Why: Threat detection
53
+ - Impact: Early incident detection
54
+ - Dependencies: KSI-MLA-01 (SIEM)
55
+
56
+ ### Secret Management
57
+ 9. **KSI-SVC-06: Secret Management**
58
+ - Why: Prevents credential exposure
59
+ - Impact: Critical security control
60
+ - Dependencies: None
61
+
62
+ ## Priority 3: Automation & Operations
63
+ **Improve efficiency and reduce manual work**
64
+
65
+ ### Infrastructure as Code
66
+ 10. **KSI-MLA-05: Infrastructure as Code**
67
+ - Why: Enables repeatability and audit
68
+ - Impact: Foundation for automation
69
+ - Dependencies: None
70
+
71
+ 11. **KSI-SVC-04: Configuration Automation**
72
+ - Why: Consistent, auditable configs
73
+ - Impact: Reduces drift, improves security
74
+ - Dependencies: KSI-MLA-05
75
+
76
+ ### CI/CD Integration
77
+ 12. **KSI-CMT-03: Automated Testing and Validation**
78
+ - Why: Quality and security gates
79
+ - Impact: Prevents bad deployments
80
+ - Dependencies: CI/CD pipeline
81
+
82
+ 13. **KSI-CMT-01: Log and Monitor Changes**
83
+ - Why: Change tracking and audit
84
+ - Impact: Required for FRR-SCN compliance
85
+ - Dependencies: KSI-MLA-01 (SIEM)
86
+
87
+ ## Priority 4: Cloud-Native Security
88
+ **For containerized/Kubernetes environments**
89
+
90
+ ### Network Security
91
+ 14. **KSI-CNA-01: Restrict Network Traffic**
92
+ - Why: Defense in depth
93
+ - Impact: Limits lateral movement
94
+ - Dependencies: Network mapping
95
+
96
+ 15. **KSI-CNA-03: Enforce Traffic Flow**
97
+ - Why: Network segmentation
98
+ - Impact: Contains breaches
99
+ - Dependencies: KSI-CNA-01
100
+
101
+ 16. **KSI-CNA-04: Immutable Infrastructure**
102
+ - Why: Prevents tampering
103
+ - Impact: Improves security posture
104
+ - Dependencies: KSI-MLA-05 (IaC)
105
+
106
+ ### Continuous Assessment
107
+ 17. **KSI-CNA-08: Persistent Assessment and Automated Enforcement**
108
+ - Why: Real-time compliance checking
109
+ - Impact: Continuous validation
110
+ - Dependencies: Policy engine (OPA/Kyverno)
111
+
112
+ ## Priority 5: Incident Response
113
+ **Detection and response capabilities**
114
+
115
+ ### Incident Management
116
+ 18. **KSI-INR-01: Incident Response Procedure**
117
+ - Why: Required for compliance
118
+ - Impact: Effective incident handling
119
+ - Dependencies: None
120
+
121
+ 19. **KSI-INR-02: Incident Logging**
122
+ - Why: Evidence and investigation
123
+ - Impact: Post-incident analysis
124
+ - Dependencies: KSI-MLA-01 (SIEM)
125
+
126
+ 20. **KSI-INR-03: Incident After Action Reports**
127
+ - Why: Continuous improvement
128
+ - Impact: Learn from incidents
129
+ - Dependencies: KSI-INR-01, KSI-INR-02
130
+
131
+ ## Priority 6: Business Continuity
132
+ **Resilience and recovery**
133
+
134
+ ### Backup & Recovery
135
+ 21. **KSI-RPL-01: Recovery Objectives**
136
+ - Why: Define RTO/RPO
137
+ - Impact: Business continuity planning
138
+ - Dependencies: Business analysis
139
+
140
+ 22. **KSI-RPL-03: System Backups**
141
+ - Why: Data protection
142
+ - Impact: Recovery capability
143
+ - Dependencies: KSI-RPL-01
144
+
145
+ 23. **KSI-RPL-02: Recovery Plan**
146
+ - Why: Documented procedures
147
+ - Impact: Faster recovery
148
+ - Dependencies: KSI-RPL-01, KSI-RPL-03
149
+
150
+ 24. **KSI-RPL-04: Recovery Testing**
151
+ - Why: Validate backup/recovery works
152
+ - Impact: Confidence in recovery
153
+ - Dependencies: KSI-RPL-02, KSI-RPL-03
154
+
155
+ ## Priority 7: Governance & Culture
156
+ **Organizational capabilities**
157
+
158
+ ### Education
159
+ 25. **KSI-CED-01: General Education**
160
+ - Why: Security awareness baseline
161
+ - Impact: Reduces human error
162
+ - Dependencies: Training platform
163
+
164
+ 26. **KSI-CED-02: Role-Specific Education**
165
+ - Why: Targeted training
166
+ - Impact: Better security practices
167
+ - Dependencies: KSI-CED-01
168
+
169
+ 27. **KSI-CED-03: Development and Engineering Education**
170
+ - Why: Secure coding practices
171
+ - Impact: Fewer vulnerabilities
172
+ - Dependencies: KSI-CED-01
173
+
174
+ ### Supply Chain
175
+ 28. **KSI-PIY-07: Supply Chain Risk Management**
176
+ - Why: Third-party risk
177
+ - Impact: Vendor security
178
+ - Dependencies: Vendor assessment process
179
+
180
+ 29. **KSI-TPR-04: Supply Chain Risk Monitoring**
181
+ - Why: Ongoing vendor oversight
182
+ - Impact: Continuous third-party risk
183
+ - Dependencies: KSI-PIY-07
184
+
185
+ ### Executive Support
186
+ 30. **KSI-PIY-08: Executive Support**
187
+ - Why: Resources and priority
188
+ - Impact: Project success
189
+ - Dependencies: Business case
190
+
191
+ ## Priority 8: Advanced Capabilities
192
+ **Nice-to-have and advanced features**
193
+
194
+ ### Additional Security
195
+ 31. **KSI-IAM-02: Passwordless Authentication**
196
+ - Why: Better UX and security
197
+ - Impact: Reduces password attacks
198
+ - Dependencies: KSI-IAM-01
199
+
200
+ 32. **KSI-IAM-04: Just-in-Time Authorization**
201
+ - Why: Temporary elevated access
202
+ - Impact: Reduces standing privileges
203
+ - Dependencies: KSI-IAM-05
204
+
205
+ 33. **KSI-SVC-02: Network Encryption**
206
+ - Why: Data in transit protection
207
+ - Impact: Confidentiality
208
+ - Dependencies: TLS/mTLS implementation
209
+
210
+ ## Quick Wins (Can be done anytime)
211
+ **High visibility, relatively straightforward**
212
+
213
+ - **KSI-AFR-08: FedRAMP Security Inbox**
214
+ - Set up email forwarding to security inbox
215
+
216
+ - **KSI-PIY-03: Vulnerability Disclosure Program**
217
+ - Create security.txt, disclosure policy
218
+
219
+ - **KSI-SVC-10: Data Destruction**
220
+ - Document and implement data deletion procedures
221
+
222
+ - **KSI-CMT-04: Change Management Procedure**
223
+ - Document existing change process
224
+
225
+ ## Implementation Strategy
226
+
227
+ ### Phase 1: Foundation
228
+ Focus on Priority 1-2 KSIs
229
+ - SIEM (KSI-MLA-01) ← Start immediately
230
+ - MFA (KSI-IAM-01) ← Parallel track
231
+ - Vulnerability scanning (KSI-AFR-04)
232
+ - Basic logging (KSI-MLA-02)
233
+
234
+ ### Phase 2: Core Security
235
+ Priority 3-4 KSIs
236
+ - IaC (KSI-MLA-05)
237
+ - Secret management (KSI-SVC-06)
238
+ - Network controls (KSI-CNA-01, CNA-03)
239
+ - Automated testing (KSI-CMT-03)
240
+
241
+ ### Phase 3: Operations
242
+ Priority 5-6 KSIs
243
+ - Incident response (KSI-INR-01, INR-02, INR-03)
244
+ - Backup/recovery (KSI-RPL-01 through RPL-04)
245
+ - Change tracking (KSI-CMT-01)
246
+
247
+ ### Phase 4: Maturity
248
+ Priority 7-8 KSIs
249
+ - Training programs (KSI-CED)
250
+ - Supply chain management (KSI-PIY-07, TPR-04)
251
+ - Advanced IAM (KSI-IAM-02, IAM-04)
252
+
253
+ ## Dependencies to Watch
254
+
255
+ **Blockers:**
256
+ - No SIEM = Can't implement 15+ other KSIs
257
+ - No IaC = Can't implement immutable infrastructure
258
+ - No CI/CD = Can't implement automated testing
259
+
260
+ **Common Mistakes:**
261
+ ❌ Starting with advanced KSIs before foundation
262
+ ❌ Trying to implement all 72 simultaneously
263
+ ❌ Ignoring dependencies between KSIs
264
+ ❌ Underestimating SIEM implementation complexity
265
+
266
+ **Success Patterns:**
267
+ ✓ Start with SIEM and MFA in parallel
268
+ ✓ Build automation early (IaC, CI/CD)
269
+ ✓ Focus on one category at a time
270
+ ✓ Collect evidence as you go
271
+
272
+ ## Resource Allocation
273
+
274
+ **Minimum Team:**
275
+ - 1 Security Engineer (SIEM, vulnerability management)
276
+ - 1 DevOps/SRE (automation, IaC)
277
+ - 1 IAM Specialist (MFA, access controls)
278
+ - 1 Compliance PM (coordination, documentation)
279
+
280
+ **Expanded Team:**
281
+ Add 2-3 more engineers for parallel workstreams during peak implementation phases
282
+
283
+ Use list_ksi to see all 72 indicators, and get_ksi(ksi_id) for detailed requirements.