fedramp-20x-mcp 0.4.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- fedramp_20x_mcp/__init__.py +14 -0
- fedramp_20x_mcp/__main__.py +12 -0
- fedramp_20x_mcp/data_loader.py +673 -0
- fedramp_20x_mcp/prompts/__init__.py +62 -0
- fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
- fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
- fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
- fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
- fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
- fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
- fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
- fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
- fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
- fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
- fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
- fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
- fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
- fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
- fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
- fedramp_20x_mcp/server.py +270 -0
- fedramp_20x_mcp/templates/__init__.py +75 -0
- fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
- fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
- fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
- fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
- fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
- fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
- fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
- fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
- fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
- fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
- fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
- fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
- fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
- fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
- fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
- fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
- fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
- fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
- fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
- fedramp_20x_mcp/tools/__init__.py +167 -0
- fedramp_20x_mcp/tools/definitions.py +154 -0
- fedramp_20x_mcp/tools/documentation.py +155 -0
- fedramp_20x_mcp/tools/enhancements.py +2256 -0
- fedramp_20x_mcp/tools/evidence.py +701 -0
- fedramp_20x_mcp/tools/export.py +753 -0
- fedramp_20x_mcp/tools/ksi.py +90 -0
- fedramp_20x_mcp/tools/requirements.py +163 -0
- fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
- fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
- fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
- fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
- fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
|
@@ -0,0 +1,202 @@
|
|
|
1
|
+
I'll provide a comprehensive roadmap for starting your FedRAMP 20x authorization from scratch.
|
|
2
|
+
|
|
3
|
+
# FedRAMP 20x Initial Assessment Roadmap
|
|
4
|
+
|
|
5
|
+
**Important Note on OSCAL:** FedRAMP 20x requires **machine-readable** formats (JSON, XML, or structured data) for Authorization Data Sharing (FRR-ADS). **OSCAL is NOT mentioned in FedRAMP 20x requirements** - it's a NIST standard that can be used as one implementation approach. When you see "OSCAL" mentioned below, understand it's one option among custom JSON/XML formats. Choose based on your implementation needs.
|
|
6
|
+
|
|
7
|
+
## Phase 1: Foundation
|
|
8
|
+
|
|
9
|
+
**Understanding & Planning**
|
|
10
|
+
- [ ] Review all FedRAMP 20x standards (use list_family_controls for each)
|
|
11
|
+
- [ ] Identify your authorization level (Low, Moderate, High)
|
|
12
|
+
- [ ] Determine service categorization (SaaS, PaaS, IaaS)
|
|
13
|
+
- [ ] Assemble core team (CISO, compliance PM, engineering lead)
|
|
14
|
+
- [ ] Budget for 3PAO, tools, and staff time
|
|
15
|
+
|
|
16
|
+
**Initial Scoping**
|
|
17
|
+
- [ ] Define authorization boundary (FRR-MAS)
|
|
18
|
+
- [ ] Inventory all information resources
|
|
19
|
+
- [ ] Document Federal Customer Data flows
|
|
20
|
+
- [ ] Identify third-party dependencies
|
|
21
|
+
- [ ] Review FRD definitions for terminology
|
|
22
|
+
|
|
23
|
+
**Deliverables**: Authorization boundary diagram, resource inventory, project charter
|
|
24
|
+
|
|
25
|
+
## Phase 2: Infrastructure & Tools
|
|
26
|
+
|
|
27
|
+
**Security Monitoring**
|
|
28
|
+
- [ ] Select and deploy SIEM solution (KSI-MLA-01)
|
|
29
|
+
- [ ] Configure log forwarding from all systems
|
|
30
|
+
- [ ] Set up vulnerability scanning (FRR-VDR-01)
|
|
31
|
+
- [ ] Implement container/code scanning
|
|
32
|
+
- [ ] Configure alerting and dashboards
|
|
33
|
+
|
|
34
|
+
**Identity & Access**
|
|
35
|
+
- [ ] Implement phishing-resistant MFA (KSI-IAM-01)
|
|
36
|
+
- [ ] Configure least-privilege IAM (KSI-IAM-05)
|
|
37
|
+
- [ ] Set up identity provider integration
|
|
38
|
+
- [ ] Document access procedures
|
|
39
|
+
|
|
40
|
+
**Automation Foundation**
|
|
41
|
+
- [ ] Implement Infrastructure as Code (KSI-MLA-05)
|
|
42
|
+
- [ ] Set up CI/CD pipelines (KSI-CMT-03)
|
|
43
|
+
- [ ] Configure automated testing
|
|
44
|
+
- [ ] Implement secret management (KSI-SVC-06)
|
|
45
|
+
|
|
46
|
+
**Deliverables**: Operational SIEM, vulnerability scanning, MFA, IaC
|
|
47
|
+
|
|
48
|
+
## Phase 3: Compliance Infrastructure
|
|
49
|
+
|
|
50
|
+
**KSI Tracking**
|
|
51
|
+
- [ ] Review all 72 KSIs (use list_ksi)
|
|
52
|
+
- [ ] Map KSIs to your monitoring systems
|
|
53
|
+
- [ ] Implement automated KSI collection
|
|
54
|
+
- [ ] Create KSI dashboards
|
|
55
|
+
- [ ] Document collection procedures
|
|
56
|
+
|
|
57
|
+
**Authorization Data Sharing API**
|
|
58
|
+
- [ ] Design API endpoints (FRR-ADS)
|
|
59
|
+
- [ ] Implement machine-readable format (custom JSON/XML or OSCAL)
|
|
60
|
+
- [ ] Configure authentication (OAuth 2.0 or mTLS)
|
|
61
|
+
- [ ] Integrate with data sources
|
|
62
|
+
- [ ] Test with sample queries
|
|
63
|
+
|
|
64
|
+
**Continuous Monitoring Setup**
|
|
65
|
+
- [ ] Document quarterly review process (FRR-CCM-QR)
|
|
66
|
+
- [ ] Set up continuous vulnerability scanning
|
|
67
|
+
- [ ] Configure persistent validation (FRR-PVA)
|
|
68
|
+
- [ ] Establish agency collaboration procedures
|
|
69
|
+
|
|
70
|
+
**Deliverables**: KSI collection system, Data Sharing API, ConMon procedures
|
|
71
|
+
|
|
72
|
+
## Phase 4: Documentation
|
|
73
|
+
|
|
74
|
+
**Core Documentation**
|
|
75
|
+
- [ ] System Security Plan (OSCAL format)
|
|
76
|
+
- [ ] Vulnerability Detection & Response procedures (FRR-VDR)
|
|
77
|
+
- [ ] Incident Communications Procedures (FRR-ICP)
|
|
78
|
+
- [ ] Significant Change Notification procedures (FRR-SCN)
|
|
79
|
+
- [ ] All 72 KSI implementation descriptions
|
|
80
|
+
|
|
81
|
+
**Policies & Procedures**
|
|
82
|
+
- [ ] Security policies aligned to FedRAMP 20x
|
|
83
|
+
- [ ] Change management procedures (KSI-CMT-04)
|
|
84
|
+
- [ ] Incident response plan (KSI-INR-01)
|
|
85
|
+
- [ ] Backup and recovery plan (KSI-RPL-02)
|
|
86
|
+
- [ ] Training programs (KSI-CED)
|
|
87
|
+
|
|
88
|
+
**Evidence Collection**
|
|
89
|
+
- [ ] Configure automated evidence collection
|
|
90
|
+
- [ ] Validate all KSI metrics are being tracked
|
|
91
|
+
- [ ] Test Authorization Data Sharing API
|
|
92
|
+
- [ ] Generate sample quarterly reports
|
|
93
|
+
- [ ] Document evidence collection procedures
|
|
94
|
+
|
|
95
|
+
**Deliverables**: Complete SSP, all policies/procedures, evidence collection system
|
|
96
|
+
|
|
97
|
+
## Phase 5: Assessment Preparation
|
|
98
|
+
|
|
99
|
+
**Internal Readiness**
|
|
100
|
+
- [ ] Internal security assessment
|
|
101
|
+
- [ ] Gap remediation
|
|
102
|
+
- [ ] Evidence validation
|
|
103
|
+
- [ ] Practice runs with team
|
|
104
|
+
- [ ] Documentation review
|
|
105
|
+
|
|
106
|
+
**3PAO Selection & Engagement**
|
|
107
|
+
- [ ] Select 3PAO assessor
|
|
108
|
+
- [ ] Kickoff meeting
|
|
109
|
+
- [ ] Provide documentation
|
|
110
|
+
- [ ] Schedule assessment
|
|
111
|
+
|
|
112
|
+
**Assessment**
|
|
113
|
+
- [ ] 3PAO conducts assessment
|
|
114
|
+
- [ ] Daily standups with assessor
|
|
115
|
+
- [ ] Address findings in real-time
|
|
116
|
+
- [ ] Document any deviations
|
|
117
|
+
|
|
118
|
+
**Deliverables**: Security Assessment Report (SAR)
|
|
119
|
+
|
|
120
|
+
## Phase 6: Authorization
|
|
121
|
+
|
|
122
|
+
**POA&M Development**
|
|
123
|
+
- [ ] Document all findings
|
|
124
|
+
- [ ] Create remediation plans
|
|
125
|
+
- [ ] Assign ownership and timelines
|
|
126
|
+
- [ ] Get executive approval
|
|
127
|
+
|
|
128
|
+
**Package Submission**
|
|
129
|
+
- [ ] Compile complete ATO package
|
|
130
|
+
- [ ] Submit to agency/FedRAMP
|
|
131
|
+
- [ ] Respond to initial questions
|
|
132
|
+
|
|
133
|
+
**Authorization Review**
|
|
134
|
+
- [ ] Agency/FedRAMP reviews package
|
|
135
|
+
- [ ] Respond to questions
|
|
136
|
+
- [ ] Provide additional evidence
|
|
137
|
+
- [ ] Receive Authorization decision
|
|
138
|
+
|
|
139
|
+
**Deliverables**: Authorization to Operate (ATO)
|
|
140
|
+
|
|
141
|
+
## Ongoing: Continuous Monitoring (Post-Authorization)
|
|
142
|
+
|
|
143
|
+
**Daily/Automated**
|
|
144
|
+
- Vulnerability scanning
|
|
145
|
+
- Log collection and analysis
|
|
146
|
+
- KSI metric collection
|
|
147
|
+
- Change tracking
|
|
148
|
+
|
|
149
|
+
**Monthly**
|
|
150
|
+
- Review vulnerability findings
|
|
151
|
+
- Update POA&Ms
|
|
152
|
+
- Security control validation
|
|
153
|
+
|
|
154
|
+
**Quarterly (FRR-CCM-QR)**
|
|
155
|
+
- Formal quarterly review
|
|
156
|
+
- Update authorization package
|
|
157
|
+
- Share data via API
|
|
158
|
+
- Agency coordination
|
|
159
|
+
|
|
160
|
+
**Annual**
|
|
161
|
+
- Update authorization boundary
|
|
162
|
+
- Review significant changes
|
|
163
|
+
- Update risk assessment
|
|
164
|
+
- Plan for re-assessment
|
|
165
|
+
|
|
166
|
+
## Critical Success Factors
|
|
167
|
+
|
|
168
|
+
**1. Executive Support** (KSI-PIY-08)
|
|
169
|
+
- Secure budget and resources
|
|
170
|
+
- Get organizational buy-in
|
|
171
|
+
- Ensure priority status
|
|
172
|
+
|
|
173
|
+
**2. Automation First** (FRD-ALL-07: "automatically if possible")
|
|
174
|
+
- Automate evidence collection
|
|
175
|
+
- Use IaC for all infrastructure
|
|
176
|
+
- Implement CI/CD pipelines
|
|
177
|
+
- Automated compliance checking
|
|
178
|
+
|
|
179
|
+
**3. Team Skills**
|
|
180
|
+
- FedRAMP 20x knowledge
|
|
181
|
+
- Cloud-native expertise
|
|
182
|
+
- Security automation skills
|
|
183
|
+
- OSCAL format understanding
|
|
184
|
+
|
|
185
|
+
**4. Vendor Selection**
|
|
186
|
+
- Choose FedRAMP-ready tools
|
|
187
|
+
- Ensure API integration capabilities
|
|
188
|
+
- Verify OSCAL support
|
|
189
|
+
- Check for KSI alignment
|
|
190
|
+
|
|
191
|
+
## Timeline & Resource Planning
|
|
192
|
+
|
|
193
|
+
Engineering teams should determine their own timelines based on available resources, organizational requirements, existing infrastructure maturity, and compliance readiness. Consider factors such as team size, budget constraints, existing security controls, and agency-specific requirements when planning your implementation schedule.
|
|
194
|
+
|
|
195
|
+
## Next Steps
|
|
196
|
+
|
|
197
|
+
1. Use get_implementation_examples for specific requirements
|
|
198
|
+
2. Use check_requirement_dependencies to understand relationships
|
|
199
|
+
3. Use check_requirement_dependencies to understand relationships
|
|
200
|
+
4. Use search_requirements to find specific guidance
|
|
201
|
+
|
|
202
|
+
Ready to start? Let me know which phase you'd like to focus on first!
|
|
@@ -0,0 +1,283 @@
|
|
|
1
|
+
I'll help you prioritize the implementation of FedRAMP 20x's 72 Key Security Indicators.
|
|
2
|
+
|
|
3
|
+
# KSI Implementation Priority Guide
|
|
4
|
+
|
|
5
|
+
**Note:** Engineering teams should determine their own implementation timelines based on system complexity, team size, existing infrastructure, and organizational resources. The priorities below indicate logical sequencing and dependencies, but actual durations will vary by organization.
|
|
6
|
+
|
|
7
|
+
## Priority 1: Foundation
|
|
8
|
+
**Must be completed first - other KSIs depend on these**
|
|
9
|
+
|
|
10
|
+
### Critical Infrastructure
|
|
11
|
+
1. **KSI-MLA-01: SIEM** ⭐ HIGHEST PRIORITY
|
|
12
|
+
- Why: Required for logging all other KSIs
|
|
13
|
+
- Impact: Blocks 15+ other KSIs
|
|
14
|
+
- Dependencies: None
|
|
15
|
+
|
|
16
|
+
2. **KSI-IAM-01: Phishing-Resistant MFA** ⭐ HIGH PRIORITY
|
|
17
|
+
- Why: Security foundation, quick win
|
|
18
|
+
- Impact: Protects all access
|
|
19
|
+
- Dependencies: None
|
|
20
|
+
|
|
21
|
+
3. **KSI-PIY-01: Automated Inventory**
|
|
22
|
+
- Why: Needed to track what you're securing
|
|
23
|
+
- Impact: Required for boundary management
|
|
24
|
+
- Dependencies: None
|
|
25
|
+
|
|
26
|
+
4. **KSI-MLA-02: Audit Logging**
|
|
27
|
+
- Why: Foundation for compliance evidence
|
|
28
|
+
- Impact: Enables incident investigation
|
|
29
|
+
- Dependencies: KSI-MLA-01 (SIEM)
|
|
30
|
+
|
|
31
|
+
## Priority 2: Security Controls
|
|
32
|
+
**Core security capabilities**
|
|
33
|
+
|
|
34
|
+
### Vulnerability Management
|
|
35
|
+
5. **KSI-AFR-04: Vulnerability Detection and Response** (ties to FRR-VDR)
|
|
36
|
+
- Why: Required for continuous scanning
|
|
37
|
+
- Impact: Critical for compliance
|
|
38
|
+
- Dependencies: None
|
|
39
|
+
|
|
40
|
+
6. **KSI-SVC-07: Patching**
|
|
41
|
+
- Why: Vulnerability remediation
|
|
42
|
+
- Impact: Keeps systems secure
|
|
43
|
+
- Dependencies: KSI-AFR-04, automated deployment
|
|
44
|
+
|
|
45
|
+
### Access Management
|
|
46
|
+
7. **KSI-IAM-05: Least Privilege**
|
|
47
|
+
- Why: Limits blast radius
|
|
48
|
+
- Impact: Reduces risk across all systems
|
|
49
|
+
- Dependencies: KSI-IAM-01, KSI-PIY-01
|
|
50
|
+
|
|
51
|
+
8. **KSI-IAM-06: Suspicious Activity Detection**
|
|
52
|
+
- Why: Threat detection
|
|
53
|
+
- Impact: Early incident detection
|
|
54
|
+
- Dependencies: KSI-MLA-01 (SIEM)
|
|
55
|
+
|
|
56
|
+
### Secret Management
|
|
57
|
+
9. **KSI-SVC-06: Secret Management**
|
|
58
|
+
- Why: Prevents credential exposure
|
|
59
|
+
- Impact: Critical security control
|
|
60
|
+
- Dependencies: None
|
|
61
|
+
|
|
62
|
+
## Priority 3: Automation & Operations
|
|
63
|
+
**Improve efficiency and reduce manual work**
|
|
64
|
+
|
|
65
|
+
### Infrastructure as Code
|
|
66
|
+
10. **KSI-MLA-05: Infrastructure as Code**
|
|
67
|
+
- Why: Enables repeatability and audit
|
|
68
|
+
- Impact: Foundation for automation
|
|
69
|
+
- Dependencies: None
|
|
70
|
+
|
|
71
|
+
11. **KSI-SVC-04: Configuration Automation**
|
|
72
|
+
- Why: Consistent, auditable configs
|
|
73
|
+
- Impact: Reduces drift, improves security
|
|
74
|
+
- Dependencies: KSI-MLA-05
|
|
75
|
+
|
|
76
|
+
### CI/CD Integration
|
|
77
|
+
12. **KSI-CMT-03: Automated Testing and Validation**
|
|
78
|
+
- Why: Quality and security gates
|
|
79
|
+
- Impact: Prevents bad deployments
|
|
80
|
+
- Dependencies: CI/CD pipeline
|
|
81
|
+
|
|
82
|
+
13. **KSI-CMT-01: Log and Monitor Changes**
|
|
83
|
+
- Why: Change tracking and audit
|
|
84
|
+
- Impact: Required for FRR-SCN compliance
|
|
85
|
+
- Dependencies: KSI-MLA-01 (SIEM)
|
|
86
|
+
|
|
87
|
+
## Priority 4: Cloud-Native Security
|
|
88
|
+
**For containerized/Kubernetes environments**
|
|
89
|
+
|
|
90
|
+
### Network Security
|
|
91
|
+
14. **KSI-CNA-01: Restrict Network Traffic**
|
|
92
|
+
- Why: Defense in depth
|
|
93
|
+
- Impact: Limits lateral movement
|
|
94
|
+
- Dependencies: Network mapping
|
|
95
|
+
|
|
96
|
+
15. **KSI-CNA-03: Enforce Traffic Flow**
|
|
97
|
+
- Why: Network segmentation
|
|
98
|
+
- Impact: Contains breaches
|
|
99
|
+
- Dependencies: KSI-CNA-01
|
|
100
|
+
|
|
101
|
+
16. **KSI-CNA-04: Immutable Infrastructure**
|
|
102
|
+
- Why: Prevents tampering
|
|
103
|
+
- Impact: Improves security posture
|
|
104
|
+
- Dependencies: KSI-MLA-05 (IaC)
|
|
105
|
+
|
|
106
|
+
### Continuous Assessment
|
|
107
|
+
17. **KSI-CNA-08: Persistent Assessment and Automated Enforcement**
|
|
108
|
+
- Why: Real-time compliance checking
|
|
109
|
+
- Impact: Continuous validation
|
|
110
|
+
- Dependencies: Policy engine (OPA/Kyverno)
|
|
111
|
+
|
|
112
|
+
## Priority 5: Incident Response
|
|
113
|
+
**Detection and response capabilities**
|
|
114
|
+
|
|
115
|
+
### Incident Management
|
|
116
|
+
18. **KSI-INR-01: Incident Response Procedure**
|
|
117
|
+
- Why: Required for compliance
|
|
118
|
+
- Impact: Effective incident handling
|
|
119
|
+
- Dependencies: None
|
|
120
|
+
|
|
121
|
+
19. **KSI-INR-02: Incident Logging**
|
|
122
|
+
- Why: Evidence and investigation
|
|
123
|
+
- Impact: Post-incident analysis
|
|
124
|
+
- Dependencies: KSI-MLA-01 (SIEM)
|
|
125
|
+
|
|
126
|
+
20. **KSI-INR-03: Incident After Action Reports**
|
|
127
|
+
- Why: Continuous improvement
|
|
128
|
+
- Impact: Learn from incidents
|
|
129
|
+
- Dependencies: KSI-INR-01, KSI-INR-02
|
|
130
|
+
|
|
131
|
+
## Priority 6: Business Continuity
|
|
132
|
+
**Resilience and recovery**
|
|
133
|
+
|
|
134
|
+
### Backup & Recovery
|
|
135
|
+
21. **KSI-RPL-01: Recovery Objectives**
|
|
136
|
+
- Why: Define RTO/RPO
|
|
137
|
+
- Impact: Business continuity planning
|
|
138
|
+
- Dependencies: Business analysis
|
|
139
|
+
|
|
140
|
+
22. **KSI-RPL-03: System Backups**
|
|
141
|
+
- Why: Data protection
|
|
142
|
+
- Impact: Recovery capability
|
|
143
|
+
- Dependencies: KSI-RPL-01
|
|
144
|
+
|
|
145
|
+
23. **KSI-RPL-02: Recovery Plan**
|
|
146
|
+
- Why: Documented procedures
|
|
147
|
+
- Impact: Faster recovery
|
|
148
|
+
- Dependencies: KSI-RPL-01, KSI-RPL-03
|
|
149
|
+
|
|
150
|
+
24. **KSI-RPL-04: Recovery Testing**
|
|
151
|
+
- Why: Validate backup/recovery works
|
|
152
|
+
- Impact: Confidence in recovery
|
|
153
|
+
- Dependencies: KSI-RPL-02, KSI-RPL-03
|
|
154
|
+
|
|
155
|
+
## Priority 7: Governance & Culture
|
|
156
|
+
**Organizational capabilities**
|
|
157
|
+
|
|
158
|
+
### Education
|
|
159
|
+
25. **KSI-CED-01: General Education**
|
|
160
|
+
- Why: Security awareness baseline
|
|
161
|
+
- Impact: Reduces human error
|
|
162
|
+
- Dependencies: Training platform
|
|
163
|
+
|
|
164
|
+
26. **KSI-CED-02: Role-Specific Education**
|
|
165
|
+
- Why: Targeted training
|
|
166
|
+
- Impact: Better security practices
|
|
167
|
+
- Dependencies: KSI-CED-01
|
|
168
|
+
|
|
169
|
+
27. **KSI-CED-03: Development and Engineering Education**
|
|
170
|
+
- Why: Secure coding practices
|
|
171
|
+
- Impact: Fewer vulnerabilities
|
|
172
|
+
- Dependencies: KSI-CED-01
|
|
173
|
+
|
|
174
|
+
### Supply Chain
|
|
175
|
+
28. **KSI-PIY-07: Supply Chain Risk Management**
|
|
176
|
+
- Why: Third-party risk
|
|
177
|
+
- Impact: Vendor security
|
|
178
|
+
- Dependencies: Vendor assessment process
|
|
179
|
+
|
|
180
|
+
29. **KSI-TPR-04: Supply Chain Risk Monitoring**
|
|
181
|
+
- Why: Ongoing vendor oversight
|
|
182
|
+
- Impact: Continuous third-party risk
|
|
183
|
+
- Dependencies: KSI-PIY-07
|
|
184
|
+
|
|
185
|
+
### Executive Support
|
|
186
|
+
30. **KSI-PIY-08: Executive Support**
|
|
187
|
+
- Why: Resources and priority
|
|
188
|
+
- Impact: Project success
|
|
189
|
+
- Dependencies: Business case
|
|
190
|
+
|
|
191
|
+
## Priority 8: Advanced Capabilities
|
|
192
|
+
**Nice-to-have and advanced features**
|
|
193
|
+
|
|
194
|
+
### Additional Security
|
|
195
|
+
31. **KSI-IAM-02: Passwordless Authentication**
|
|
196
|
+
- Why: Better UX and security
|
|
197
|
+
- Impact: Reduces password attacks
|
|
198
|
+
- Dependencies: KSI-IAM-01
|
|
199
|
+
|
|
200
|
+
32. **KSI-IAM-04: Just-in-Time Authorization**
|
|
201
|
+
- Why: Temporary elevated access
|
|
202
|
+
- Impact: Reduces standing privileges
|
|
203
|
+
- Dependencies: KSI-IAM-05
|
|
204
|
+
|
|
205
|
+
33. **KSI-SVC-02: Network Encryption**
|
|
206
|
+
- Why: Data in transit protection
|
|
207
|
+
- Impact: Confidentiality
|
|
208
|
+
- Dependencies: TLS/mTLS implementation
|
|
209
|
+
|
|
210
|
+
## Quick Wins (Can be done anytime)
|
|
211
|
+
**High visibility, relatively straightforward**
|
|
212
|
+
|
|
213
|
+
- **KSI-AFR-08: FedRAMP Security Inbox**
|
|
214
|
+
- Set up email forwarding to security inbox
|
|
215
|
+
|
|
216
|
+
- **KSI-PIY-03: Vulnerability Disclosure Program**
|
|
217
|
+
- Create security.txt, disclosure policy
|
|
218
|
+
|
|
219
|
+
- **KSI-SVC-10: Data Destruction**
|
|
220
|
+
- Document and implement data deletion procedures
|
|
221
|
+
|
|
222
|
+
- **KSI-CMT-04: Change Management Procedure**
|
|
223
|
+
- Document existing change process
|
|
224
|
+
|
|
225
|
+
## Implementation Strategy
|
|
226
|
+
|
|
227
|
+
### Phase 1: Foundation
|
|
228
|
+
Focus on Priority 1-2 KSIs
|
|
229
|
+
- SIEM (KSI-MLA-01) ← Start immediately
|
|
230
|
+
- MFA (KSI-IAM-01) ← Parallel track
|
|
231
|
+
- Vulnerability scanning (KSI-AFR-04)
|
|
232
|
+
- Basic logging (KSI-MLA-02)
|
|
233
|
+
|
|
234
|
+
### Phase 2: Core Security
|
|
235
|
+
Priority 3-4 KSIs
|
|
236
|
+
- IaC (KSI-MLA-05)
|
|
237
|
+
- Secret management (KSI-SVC-06)
|
|
238
|
+
- Network controls (KSI-CNA-01, CNA-03)
|
|
239
|
+
- Automated testing (KSI-CMT-03)
|
|
240
|
+
|
|
241
|
+
### Phase 3: Operations
|
|
242
|
+
Priority 5-6 KSIs
|
|
243
|
+
- Incident response (KSI-INR-01, INR-02, INR-03)
|
|
244
|
+
- Backup/recovery (KSI-RPL-01 through RPL-04)
|
|
245
|
+
- Change tracking (KSI-CMT-01)
|
|
246
|
+
|
|
247
|
+
### Phase 4: Maturity
|
|
248
|
+
Priority 7-8 KSIs
|
|
249
|
+
- Training programs (KSI-CED)
|
|
250
|
+
- Supply chain management (KSI-PIY-07, TPR-04)
|
|
251
|
+
- Advanced IAM (KSI-IAM-02, IAM-04)
|
|
252
|
+
|
|
253
|
+
## Dependencies to Watch
|
|
254
|
+
|
|
255
|
+
**Blockers:**
|
|
256
|
+
- No SIEM = Can't implement 15+ other KSIs
|
|
257
|
+
- No IaC = Can't implement immutable infrastructure
|
|
258
|
+
- No CI/CD = Can't implement automated testing
|
|
259
|
+
|
|
260
|
+
**Common Mistakes:**
|
|
261
|
+
❌ Starting with advanced KSIs before foundation
|
|
262
|
+
❌ Trying to implement all 72 simultaneously
|
|
263
|
+
❌ Ignoring dependencies between KSIs
|
|
264
|
+
❌ Underestimating SIEM implementation complexity
|
|
265
|
+
|
|
266
|
+
**Success Patterns:**
|
|
267
|
+
✓ Start with SIEM and MFA in parallel
|
|
268
|
+
✓ Build automation early (IaC, CI/CD)
|
|
269
|
+
✓ Focus on one category at a time
|
|
270
|
+
✓ Collect evidence as you go
|
|
271
|
+
|
|
272
|
+
## Resource Allocation
|
|
273
|
+
|
|
274
|
+
**Minimum Team:**
|
|
275
|
+
- 1 Security Engineer (SIEM, vulnerability management)
|
|
276
|
+
- 1 DevOps/SRE (automation, IaC)
|
|
277
|
+
- 1 IAM Specialist (MFA, access controls)
|
|
278
|
+
- 1 Compliance PM (coordination, documentation)
|
|
279
|
+
|
|
280
|
+
**Expanded Team:**
|
|
281
|
+
Add 2-3 more engineers for parallel workstreams during peak implementation phases
|
|
282
|
+
|
|
283
|
+
Use list_ksi to see all 72 indicators, and get_ksi(ksi_id) for detailed requirements.
|