fedramp-20x-mcp 0.4.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- fedramp_20x_mcp/__init__.py +14 -0
- fedramp_20x_mcp/__main__.py +12 -0
- fedramp_20x_mcp/data_loader.py +673 -0
- fedramp_20x_mcp/prompts/__init__.py +62 -0
- fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
- fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
- fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
- fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
- fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
- fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
- fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
- fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
- fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
- fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
- fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
- fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
- fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
- fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
- fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
- fedramp_20x_mcp/server.py +270 -0
- fedramp_20x_mcp/templates/__init__.py +75 -0
- fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
- fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
- fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
- fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
- fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
- fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
- fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
- fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
- fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
- fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
- fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
- fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
- fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
- fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
- fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
- fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
- fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
- fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
- fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
- fedramp_20x_mcp/tools/__init__.py +167 -0
- fedramp_20x_mcp/tools/definitions.py +154 -0
- fedramp_20x_mcp/tools/documentation.py +155 -0
- fedramp_20x_mcp/tools/enhancements.py +2256 -0
- fedramp_20x_mcp/tools/evidence.py +701 -0
- fedramp_20x_mcp/tools/export.py +753 -0
- fedramp_20x_mcp/tools/ksi.py +90 -0
- fedramp_20x_mcp/tools/requirements.py +163 -0
- fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
- fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
- fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
- fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
- fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
|
@@ -0,0 +1,440 @@
|
|
|
1
|
+
I'll help you migrate from FedRAMP Rev 5 to FedRAMP 20x.
|
|
2
|
+
|
|
3
|
+
# Migration Guide: FedRAMP Rev 5 → FedRAMP 20x
|
|
4
|
+
|
|
5
|
+
**Important Note on OSCAL:** FedRAMP 20x requires **machine-readable** formats (JSON/XML) for Authorization Data Sharing. **OSCAL is NOT mentioned in FedRAMP 20x** - it's a NIST standard you may already use in Rev 5. When migrating, focus on machine-readable formats - continue with OSCAL only if it serves your needs, or use custom JSON/XML.
|
|
6
|
+
|
|
7
|
+
## Executive Summary
|
|
8
|
+
|
|
9
|
+
**Key Changes:**
|
|
10
|
+
- Document-based → API-based data sharing
|
|
11
|
+
- Annual assessment → Continuous monitoring
|
|
12
|
+
- Static boundary → Dynamic, cloud-native support
|
|
13
|
+
- Manual evidence → Automated collection
|
|
14
|
+
- 320 controls → 72 Key Security Indicators + 11 standards
|
|
15
|
+
|
|
16
|
+
**Timeline:** 6-12 months for full transition
|
|
17
|
+
**Effort:** Significant automation investment required
|
|
18
|
+
|
|
19
|
+
## Phase 1: Assessment & Planning (Weeks 1-4)
|
|
20
|
+
|
|
21
|
+
### Gap Analysis
|
|
22
|
+
|
|
23
|
+
**What You Have (Rev 5):**
|
|
24
|
+
- System Security Plan (Word/PDF)
|
|
25
|
+
- Annual 3PAO assessment
|
|
26
|
+
- Monthly ConMon scans
|
|
27
|
+
- Quarterly POA&M updates
|
|
28
|
+
- Manual evidence packages
|
|
29
|
+
|
|
30
|
+
**What You Need (FedRAMP 20x):**
|
|
31
|
+
- Machine-readable SSP (JSON/XML - custom or OSCAL)
|
|
32
|
+
- Authorization Data Sharing API
|
|
33
|
+
- Continuous monitoring with KSI tracking
|
|
34
|
+
- Quarterly reviews with automated data sharing
|
|
35
|
+
- Real-time evidence via APIs
|
|
36
|
+
|
|
37
|
+
### Current State Inventory
|
|
38
|
+
|
|
39
|
+
**Document Your Current Implementation:**
|
|
40
|
+
- [ ] List all security controls from Rev 5 SSP
|
|
41
|
+
- [ ] Inventory monitoring/security tools
|
|
42
|
+
- [ ] Document current ConMon process
|
|
43
|
+
- [ ] List evidence collection methods
|
|
44
|
+
- [ ] Review 3PAO assessment findings
|
|
45
|
+
|
|
46
|
+
### Map Rev 5 to FedRAMP 20x
|
|
47
|
+
|
|
48
|
+
**Control Mapping:**
|
|
49
|
+
```
|
|
50
|
+
Rev 5 Control Family → FedRAMP 20x Standard
|
|
51
|
+
|
|
52
|
+
AC (Access Control) → KSI-IAM (Identity & Access)
|
|
53
|
+
AU (Audit) → KSI-MLA (Monitoring, Logging & Analysis)
|
|
54
|
+
CA (Assessment) → FRR-MAS, FRR-PVA (Assessment, Validation)
|
|
55
|
+
CM (Configuration) → KSI-CMT, KSI-SVC (Change, Services)
|
|
56
|
+
CP (Contingency) → KSI-RPL (Recovery & Planning)
|
|
57
|
+
IA (Identification) → KSI-IAM (Identity & Access)
|
|
58
|
+
IR (Incident Response) → KSI-INR, FRR-ICP (Incidents, Communications)
|
|
59
|
+
RA (Risk Assessment) → KSI-AFR, FRR-VDR (Vulnerabilities)
|
|
60
|
+
SA (System Services) → KSI-TPR, KSI-PIY (Third-party, Investment)
|
|
61
|
+
SC (System Communications) → KSI-CNA, KSI-SVC (Cloud-native, Services)
|
|
62
|
+
SI (System Integrity) → FRR-VDR, KSI-SVC (Vulnerabilities, Services)
|
|
63
|
+
```
|
|
64
|
+
|
|
65
|
+
**Use compare_with_rev4 tool to see detailed comparisons for specific areas.**
|
|
66
|
+
|
|
67
|
+
## Phase 2: Infrastructure Preparation (Weeks 5-16)
|
|
68
|
+
|
|
69
|
+
### Priority 1: SIEM & Monitoring (Weeks 5-10)
|
|
70
|
+
|
|
71
|
+
**If you have SIEM already:**
|
|
72
|
+
- [ ] Verify it can track 72 KSIs
|
|
73
|
+
- [ ] Configure automated KSI data collection
|
|
74
|
+
- [ ] Set up API access for data export
|
|
75
|
+
- [ ] Test OSCAL format export (if supported)
|
|
76
|
+
|
|
77
|
+
**If you need new SIEM:**
|
|
78
|
+
- [ ] Select FedRAMP-authorized SIEM (Splunk, Datadog, etc.)
|
|
79
|
+
- [ ] Migrate log sources
|
|
80
|
+
- [ ] Configure KSI tracking dashboards
|
|
81
|
+
- [ ] Set up API for Authorization Data Sharing
|
|
82
|
+
|
|
83
|
+
**Gap from Rev 5:**
|
|
84
|
+
- Rev 5: Monthly scan reports emailed
|
|
85
|
+
- FedRAMP 20x: Real-time data via API
|
|
86
|
+
|
|
87
|
+
### Priority 2: Authorization Data Sharing API (Weeks 8-16)
|
|
88
|
+
|
|
89
|
+
**Build New API:**
|
|
90
|
+
```
|
|
91
|
+
Required Endpoints:
|
|
92
|
+
- GET /api/v1/system (OSCAL SSP format)
|
|
93
|
+
- GET /api/v1/vulnerabilities
|
|
94
|
+
- GET /api/v1/ksi-metrics
|
|
95
|
+
- GET /api/v1/incidents
|
|
96
|
+
- GET /api/v1/changes
|
|
97
|
+
- GET /api/v1/poam
|
|
98
|
+
```
|
|
99
|
+
|
|
100
|
+
**Authentication:**
|
|
101
|
+
- OAuth 2.0 or mTLS
|
|
102
|
+
- Provide test credentials to FedRAMP
|
|
103
|
+
|
|
104
|
+
**Use api_design_guide prompt for detailed implementation guidance.**
|
|
105
|
+
|
|
106
|
+
### Priority 3: KSI Implementation (Weeks 6-16)
|
|
107
|
+
|
|
108
|
+
**Quick Wins (Weeks 6-8):**
|
|
109
|
+
Already compliant from Rev 5, just need to document:
|
|
110
|
+
- KSI-IAM-01: MFA (you already have this for AC-2)
|
|
111
|
+
- KSI-MLA-02: Audit logging (you already have this for AU-2)
|
|
112
|
+
- KSI-INR-01: Incident response (you already have this for IR-8)
|
|
113
|
+
- KSI-RPL-03: Backups (you already have this for CP-9)
|
|
114
|
+
|
|
115
|
+
**New Requirements (Weeks 8-16):**
|
|
116
|
+
Not required in Rev 5, need implementation:
|
|
117
|
+
- KSI-IAM-01: Must be phishing-resistant (upgrade from TOTP to FIDO2)
|
|
118
|
+
- KSI-PIY-01: Automated inventory (upgrade from manual)
|
|
119
|
+
- KSI-MLA-05: Infrastructure as Code (new requirement)
|
|
120
|
+
- KSI-CMT-03: Automated testing in CI/CD (new requirement)
|
|
121
|
+
- KSI-CNA-04: Immutable infrastructure (new requirement)
|
|
122
|
+
|
|
123
|
+
**Use ksi_implementation_priorities prompt to plan implementation order.**
|
|
124
|
+
|
|
125
|
+
## Phase 3: Documentation Conversion (Weeks 12-20)
|
|
126
|
+
|
|
127
|
+
### Convert SSP to Machine-Readable Format (OSCAL Preferred)
|
|
128
|
+
|
|
129
|
+
**Rev 5 SSP (Word/PDF):**
|
|
130
|
+
```
|
|
131
|
+
Section 1: System Information
|
|
132
|
+
Section 2: System Environment
|
|
133
|
+
Section 3: System Characteristics
|
|
134
|
+
...
|
|
135
|
+
Section 13: Control Responses (320 controls)
|
|
136
|
+
```
|
|
137
|
+
|
|
138
|
+
**FedRAMP 20x SSP (OSCAL JSON):**
|
|
139
|
+
```json
|
|
140
|
+
{
|
|
141
|
+
"system-security-plan": {
|
|
142
|
+
"metadata": {...},
|
|
143
|
+
"system-characteristics": {...},
|
|
144
|
+
"system-implementation": {...},
|
|
145
|
+
"control-implementation": {...}
|
|
146
|
+
}
|
|
147
|
+
}
|
|
148
|
+
```
|
|
149
|
+
|
|
150
|
+
**Migration Approach:**
|
|
151
|
+
|
|
152
|
+
**Option 1: Automated Conversion**
|
|
153
|
+
- Use OSCAL conversion tools (NIST provides some)
|
|
154
|
+
- Requires manual cleanup and validation
|
|
155
|
+
- Faster but less accurate
|
|
156
|
+
|
|
157
|
+
**Option 2: Manual Conversion**
|
|
158
|
+
- Extract data from Word/PDF
|
|
159
|
+
- Map to OSCAL structure
|
|
160
|
+
- More accurate but time-consuming
|
|
161
|
+
|
|
162
|
+
**Option 3: Fresh Start**
|
|
163
|
+
- Use current architecture to generate new OSCAL SSP
|
|
164
|
+
- Most accurate for cloud-native systems
|
|
165
|
+
- Recommended if architecture changed significantly
|
|
166
|
+
|
|
167
|
+
**Use documentation_generator prompt for OSCAL templates.**
|
|
168
|
+
|
|
169
|
+
### New Documentation Requirements
|
|
170
|
+
|
|
171
|
+
**Documents you didn't have in Rev 5:**
|
|
172
|
+
|
|
173
|
+
1. **FRR-ADS: Authorization Data Sharing API Documentation**
|
|
174
|
+
- API endpoints
|
|
175
|
+
- Authentication methods
|
|
176
|
+
- Data formats (OSCAL)
|
|
177
|
+
- SLAs
|
|
178
|
+
|
|
179
|
+
2. **FRR-KSI: All 72 KSI Implementation Documents**
|
|
180
|
+
- How each KSI is implemented
|
|
181
|
+
- Evidence collection methods
|
|
182
|
+
- Metrics and targets
|
|
183
|
+
|
|
184
|
+
3. **FRR-PVA: Persistent Validation Procedures**
|
|
185
|
+
- Continuous validation approach
|
|
186
|
+
- Automated validation tools
|
|
187
|
+
- Validation frequency
|
|
188
|
+
|
|
189
|
+
4. **FRR-CCM-QR: Quarterly Review Procedures**
|
|
190
|
+
- Structured review process
|
|
191
|
+
- Agency collaboration procedures
|
|
192
|
+
|
|
193
|
+
## Phase 4: Process Changes (Weeks 16-24)
|
|
194
|
+
|
|
195
|
+
### Continuous Monitoring (FRR-CCM)
|
|
196
|
+
|
|
197
|
+
**Rev 5 Process:**
|
|
198
|
+
```
|
|
199
|
+
Monthly: Run vulnerability scans
|
|
200
|
+
Monthly: Submit ConMon deliverable
|
|
201
|
+
Quarterly: Update POA&M
|
|
202
|
+
Annually: 3PAO assessment
|
|
203
|
+
```
|
|
204
|
+
|
|
205
|
+
**FedRAMP 20x Process:**
|
|
206
|
+
```
|
|
207
|
+
Continuously: Automated scanning and monitoring
|
|
208
|
+
Real-time: KSI metrics collection
|
|
209
|
+
Daily: Authorization Data Sharing API updated
|
|
210
|
+
Quarterly: Structured quarterly review (FRR-CCM-QR)
|
|
211
|
+
As-needed: Persistent validation (FRR-PVA)
|
|
212
|
+
```
|
|
213
|
+
|
|
214
|
+
**Key Changes:**
|
|
215
|
+
- Manual → Automated evidence collection
|
|
216
|
+
- Monthly deliverables → Real-time API access
|
|
217
|
+
- Annual assessment → Continuous validation
|
|
218
|
+
|
|
219
|
+
### Vulnerability Management (FRR-VDR)
|
|
220
|
+
|
|
221
|
+
**Rev 5 Approach:**
|
|
222
|
+
- 30 days for High vulnerabilities
|
|
223
|
+
- POA&M for longer remediation
|
|
224
|
+
- Monthly ConMon scans
|
|
225
|
+
|
|
226
|
+
**FedRAMP 20x Approach:**
|
|
227
|
+
- Timeframes vary by severity AND impact level
|
|
228
|
+
- High impact: 7-15 days for Critical/High
|
|
229
|
+
- Formal exception process (FRR-VDR-EX)
|
|
230
|
+
- Agency-specific reporting (FRR-VDR-RP)
|
|
231
|
+
|
|
232
|
+
**Action Items:**
|
|
233
|
+
- [ ] Review current vulnerability remediation times
|
|
234
|
+
- [ ] Implement automated scanning (if not already)
|
|
235
|
+
- [ ] Update procedures for new timeframes
|
|
236
|
+
- [ ] Set up agency reporting workflow
|
|
237
|
+
|
|
238
|
+
### Significant Change Notifications (FRR-SCN)
|
|
239
|
+
|
|
240
|
+
**Rev 5 Approach:**
|
|
241
|
+
- Notify FedRAMP of "significant changes"
|
|
242
|
+
- Vague definition of "significant"
|
|
243
|
+
- Email-based notifications
|
|
244
|
+
|
|
245
|
+
**FedRAMP 20x Approach:**
|
|
246
|
+
- Clear categories: Routine, Administrative, Transformative, Impact
|
|
247
|
+
- Structured notification process
|
|
248
|
+
- Must use FedRAMP Security Inbox (FRR-FSI)
|
|
249
|
+
- Specific triggers defined
|
|
250
|
+
|
|
251
|
+
**Action Items:**
|
|
252
|
+
- [ ] Document change categorization process
|
|
253
|
+
- [ ] Update change management procedures
|
|
254
|
+
- [ ] Train team on FRR-SCN requirements
|
|
255
|
+
|
|
256
|
+
## Phase 5: Testing & Validation (Weeks 20-26)
|
|
257
|
+
|
|
258
|
+
### Internal Testing
|
|
259
|
+
|
|
260
|
+
**Test Authorization Data Sharing API:**
|
|
261
|
+
- [ ] All endpoints return correct data
|
|
262
|
+
- [ ] Machine-readable format validates (OSCAL preferred)
|
|
263
|
+
- [ ] Authentication works properly
|
|
264
|
+
- [ ] Rate limiting configured
|
|
265
|
+
- [ ] Error handling works
|
|
266
|
+
|
|
267
|
+
**Test KSI Collection:**
|
|
268
|
+
- [ ] All 72 KSIs being tracked
|
|
269
|
+
- [ ] Automated collection working
|
|
270
|
+
- [ ] Data accurate and timely
|
|
271
|
+
- [ ] Dashboards showing correct metrics
|
|
272
|
+
|
|
273
|
+
**Test Continuous Monitoring:**
|
|
274
|
+
- [ ] Vulnerability scans running continuously
|
|
275
|
+
- [ ] Incidents logged automatically
|
|
276
|
+
- [ ] Changes tracked automatically
|
|
277
|
+
- [ ] Evidence collected automatically
|
|
278
|
+
|
|
279
|
+
### FedRAMP Coordination
|
|
280
|
+
|
|
281
|
+
**Schedule Review with FedRAMP:**
|
|
282
|
+
- [ ] Provide test API credentials
|
|
283
|
+
- [ ] Demonstrate data collection
|
|
284
|
+
- [ ] Show OSCAL documentation
|
|
285
|
+
- [ ] Review quarterly process
|
|
286
|
+
|
|
287
|
+
**Address Feedback:**
|
|
288
|
+
- [ ] Fix any API issues
|
|
289
|
+
- [ ] Update documentation
|
|
290
|
+
- [ ] Adjust procedures
|
|
291
|
+
|
|
292
|
+
## Phase 6: Transition (Weeks 24-28)
|
|
293
|
+
|
|
294
|
+
### Final Preparation
|
|
295
|
+
|
|
296
|
+
**Documentation:**
|
|
297
|
+
- [ ] All 11 FedRAMP 20x standard documents complete
|
|
298
|
+
- [ ] All 72 KSI implementation documents complete
|
|
299
|
+
- [ ] OSCAL SSP finalized
|
|
300
|
+
- [ ] API documentation complete
|
|
301
|
+
|
|
302
|
+
**Technical:**
|
|
303
|
+
- [ ] Authorization Data Sharing API in production
|
|
304
|
+
- [ ] All KSI metrics being collected
|
|
305
|
+
- [ ] Continuous monitoring operational
|
|
306
|
+
- [ ] Quarterly review process tested
|
|
307
|
+
|
|
308
|
+
**Team:**
|
|
309
|
+
- [ ] Team trained on new processes
|
|
310
|
+
- [ ] Roles and responsibilities updated
|
|
311
|
+
- [ ] Runbooks created for new procedures
|
|
312
|
+
|
|
313
|
+
### Go-Live
|
|
314
|
+
|
|
315
|
+
**Cutover Activities:**
|
|
316
|
+
- [ ] Final data validation
|
|
317
|
+
- [ ] Enable Authorization Data Sharing API for FedRAMP
|
|
318
|
+
- [ ] Conduct first quarterly review under new process
|
|
319
|
+
- [ ] Communicate change to agencies
|
|
320
|
+
|
|
321
|
+
**Post-Cutover:**
|
|
322
|
+
- [ ] Monitor API usage and performance
|
|
323
|
+
- [ ] Collect feedback from FedRAMP/agencies
|
|
324
|
+
- [ ] Adjust processes based on feedback
|
|
325
|
+
- [ ] Document lessons learned
|
|
326
|
+
|
|
327
|
+
## Phase 7: Continuous Improvement (Ongoing)
|
|
328
|
+
|
|
329
|
+
### First 90 Days
|
|
330
|
+
|
|
331
|
+
**Weeks 1-4:**
|
|
332
|
+
- Daily check-ins on API performance
|
|
333
|
+
- Validate KSI metrics accuracy
|
|
334
|
+
- Address any immediate issues
|
|
335
|
+
|
|
336
|
+
**Weeks 5-8:**
|
|
337
|
+
- First quarterly review under new process
|
|
338
|
+
- Gather feedback from team
|
|
339
|
+
- Optimize automation
|
|
340
|
+
|
|
341
|
+
**Weeks 9-12:**
|
|
342
|
+
- Refine procedures based on experience
|
|
343
|
+
- Update documentation with lessons learned
|
|
344
|
+
- Plan for additional automation
|
|
345
|
+
|
|
346
|
+
### Ongoing Activities
|
|
347
|
+
|
|
348
|
+
**Monthly:**
|
|
349
|
+
- Review KSI metrics for trends
|
|
350
|
+
- Validate evidence collection
|
|
351
|
+
- Update procedures as needed
|
|
352
|
+
|
|
353
|
+
**Quarterly:**
|
|
354
|
+
- Conduct formal quarterly review (FRR-CCM-QR)
|
|
355
|
+
- Update Authorization Data Sharing API with latest data
|
|
356
|
+
- Coordinate with agencies
|
|
357
|
+
|
|
358
|
+
**Annually:**
|
|
359
|
+
- Review overall 20x compliance
|
|
360
|
+
- Plan improvements for next year
|
|
361
|
+
- Update risk assessment
|
|
362
|
+
|
|
363
|
+
## Common Migration Challenges
|
|
364
|
+
|
|
365
|
+
### Challenge 1: Legacy Tools Don't Support APIs
|
|
366
|
+
|
|
367
|
+
**Problem:** Current tools can't export data via API
|
|
368
|
+
|
|
369
|
+
**Solutions:**
|
|
370
|
+
- Build middleware to expose tool data via API
|
|
371
|
+
- Replace tools with FedRAMP 20x-compatible alternatives
|
|
372
|
+
- Use manual export + automation (short-term workaround)
|
|
373
|
+
|
|
374
|
+
### Challenge 2: Manual Evidence Collection
|
|
375
|
+
|
|
376
|
+
**Problem:** Most evidence collected manually in Rev 5
|
|
377
|
+
|
|
378
|
+
**Solution:**
|
|
379
|
+
- Implement automation for top 20 KSIs first
|
|
380
|
+
- Use scripts to aggregate data
|
|
381
|
+
- Invest in tools with built-in KSI tracking
|
|
382
|
+
|
|
383
|
+
### Challenge 3: OSCAL Conversion Complexity
|
|
384
|
+
|
|
385
|
+
**Problem:** Converting Word SSP to OSCAL is difficult
|
|
386
|
+
|
|
387
|
+
**Solutions:**
|
|
388
|
+
- Start with OSCAL templates, populate from scratch
|
|
389
|
+
- Use OSCAL tools (NIST provides some)
|
|
390
|
+
- Consider consulting services for conversion
|
|
391
|
+
|
|
392
|
+
### Challenge 4: Team Knowledge Gap
|
|
393
|
+
|
|
394
|
+
**Problem:** Team doesn't know FedRAMP 20x or OSCAL
|
|
395
|
+
|
|
396
|
+
**Solutions:**
|
|
397
|
+
- Training on FedRAMP 20x requirements (use this MCP server!)
|
|
398
|
+
- OSCAL training (NIST resources)
|
|
399
|
+
- Hire consultant for initial setup
|
|
400
|
+
- Phase transition to allow learning time
|
|
401
|
+
|
|
402
|
+
## Budget Considerations
|
|
403
|
+
|
|
404
|
+
**New Costs:**
|
|
405
|
+
- Authorization Data Sharing API development: $50K-150K
|
|
406
|
+
- SIEM upgrades/new tools: $50K-200K/year
|
|
407
|
+
- OSCAL conversion: $20K-50K
|
|
408
|
+
- Training: $10K-30K
|
|
409
|
+
- Consulting (optional): $50K-200K
|
|
410
|
+
|
|
411
|
+
**Potential Savings:**
|
|
412
|
+
- Less manual evidence collection (saves time)
|
|
413
|
+
- Automated compliance checking
|
|
414
|
+
- Faster quarterly reviews
|
|
415
|
+
- Reduced 3PAO hours (potentially)
|
|
416
|
+
|
|
417
|
+
**Total Migration Cost:** $180K-630K
|
|
418
|
+
**Ongoing Additional Cost:** $50K-200K/year (tools)
|
|
419
|
+
|
|
420
|
+
## Success Criteria
|
|
421
|
+
|
|
422
|
+
**Technical:**
|
|
423
|
+
✓ Authorization Data Sharing API operational
|
|
424
|
+
✓ All 72 KSIs being tracked automatically
|
|
425
|
+
✓ OSCAL SSP validates successfully
|
|
426
|
+
✓ Continuous monitoring operational
|
|
427
|
+
|
|
428
|
+
**Process:**
|
|
429
|
+
✓ Quarterly reviews conducted on time
|
|
430
|
+
✓ Vulnerabilities remediated within timeframes
|
|
431
|
+
✓ Changes properly categorized and notified
|
|
432
|
+
✓ Incidents handled per FRR-ICP
|
|
433
|
+
|
|
434
|
+
**Compliance:**
|
|
435
|
+
✓ FedRAMP accepts Authorization Data Sharing API
|
|
436
|
+
✓ Agencies can query system data
|
|
437
|
+
✓ Documentation meets FedRAMP 20x requirements
|
|
438
|
+
✓ 3PAO validates transition
|
|
439
|
+
|
|
440
|
+
Use compare_with_rev4 for specific area comparisons, and search_requirements to find requirements related to your migration challenges.
|
|
@@ -0,0 +1,231 @@
|
|
|
1
|
+
I'll guide you through the FedRAMP 20x quarterly review process.
|
|
2
|
+
|
|
3
|
+
# Quarterly Review Checklist (FRR-CCM-QR)
|
|
4
|
+
|
|
5
|
+
## Pre-Review Preparation (Week Before)
|
|
6
|
+
|
|
7
|
+
**Data Collection (FRR-CCM-QR-01 through QR-11)**
|
|
8
|
+
- [ ] Pull KSI metrics for the quarter (all 72 indicators)
|
|
9
|
+
- [ ] Generate vulnerability scan reports
|
|
10
|
+
- [ ] Compile incident logs
|
|
11
|
+
- [ ] Gather change notifications
|
|
12
|
+
- [ ] Review POA&M status
|
|
13
|
+
- [ ] Collect evidence from Authorization Data Sharing API
|
|
14
|
+
|
|
15
|
+
**Team Coordination**
|
|
16
|
+
- [ ] Schedule review meeting with stakeholders
|
|
17
|
+
- [ ] Notify authorizing agencies
|
|
18
|
+
- [ ] Prepare agenda
|
|
19
|
+
- [ ] Assign action items from last quarter
|
|
20
|
+
|
|
21
|
+
## Quarterly Review Activities
|
|
22
|
+
|
|
23
|
+
### 1. Key Security Indicators Review
|
|
24
|
+
|
|
25
|
+
**Authorization Framework (KSI-AFR-01 through AFR-11)**
|
|
26
|
+
- [ ] Review assessment scope for changes
|
|
27
|
+
- [ ] Validate KSI tracking is current
|
|
28
|
+
- [ ] Check authorization data sharing functionality
|
|
29
|
+
- [ ] Review vulnerability response metrics
|
|
30
|
+
- [ ] Verify change notification compliance
|
|
31
|
+
- [ ] Check continuous monitoring effectiveness
|
|
32
|
+
- [ ] Validate secure configuration baselines
|
|
33
|
+
- [ ] Review security inbox activity
|
|
34
|
+
- [ ] Check persistent validation results
|
|
35
|
+
- [ ] Review incident communications
|
|
36
|
+
- [ ] Validate cryptographic module usage
|
|
37
|
+
|
|
38
|
+
**Cybersecurity Education (KSI-CED-01 through CED-04)**
|
|
39
|
+
- [ ] General education completion rates
|
|
40
|
+
- [ ] Role-specific training completion
|
|
41
|
+
- [ ] Development/engineering security training
|
|
42
|
+
- [ ] Incident response training status
|
|
43
|
+
|
|
44
|
+
**Change Management (KSI-CMT-01 through CMT-05)**
|
|
45
|
+
- [ ] Review all changes logged this quarter
|
|
46
|
+
- [ ] Verify redeployment procedures followed
|
|
47
|
+
- [ ] Check automated testing coverage
|
|
48
|
+
- [ ] Validate change management procedures
|
|
49
|
+
- [ ] Review change impacts
|
|
50
|
+
|
|
51
|
+
**Cloud Native Architecture (KSI-CNA-01 through CNA-08)**
|
|
52
|
+
- [ ] Network traffic restrictions effective
|
|
53
|
+
- [ ] Attack surface minimization progress
|
|
54
|
+
- [ ] Traffic flow enforcement working
|
|
55
|
+
- [ ] Immutable infrastructure compliance
|
|
56
|
+
- [ ] Unwanted activity detection
|
|
57
|
+
- [ ] High availability metrics
|
|
58
|
+
- [ ] Best practices adherence
|
|
59
|
+
- [ ] Persistent assessment results
|
|
60
|
+
|
|
61
|
+
**Identity & Access Management (KSI-IAM-01 through IAM-07)**
|
|
62
|
+
- [ ] MFA usage (phishing-resistant)
|
|
63
|
+
- [ ] Passwordless authentication adoption
|
|
64
|
+
- [ ] Non-user account management
|
|
65
|
+
- [ ] Just-in-time authorization usage
|
|
66
|
+
- [ ] Least privilege validation
|
|
67
|
+
- [ ] Suspicious activity detections
|
|
68
|
+
- [ ] Automated account management effectiveness
|
|
69
|
+
|
|
70
|
+
**Incident Response (KSI-INR-01 through INR-03)**
|
|
71
|
+
- [ ] Review incident response procedures
|
|
72
|
+
- [ ] Check incident logging completeness
|
|
73
|
+
- [ ] Review after-action reports
|
|
74
|
+
|
|
75
|
+
**Monitoring, Logging & Analysis (KSI-MLA-01 through MLA-08)**
|
|
76
|
+
- [ ] SIEM operational status
|
|
77
|
+
- [ ] Audit logging coverage
|
|
78
|
+
- [ ] Infrastructure as Code usage
|
|
79
|
+
- [ ] Event type coverage
|
|
80
|
+
- [ ] Log data access controls
|
|
81
|
+
|
|
82
|
+
**Proactive Investment (KSI-PIY-01 through PIY-08)**
|
|
83
|
+
- [ ] Automated inventory accuracy
|
|
84
|
+
- [ ] Security objectives progress
|
|
85
|
+
- [ ] Vulnerability disclosure program status
|
|
86
|
+
- [ ] CISA Secure by Design alignment
|
|
87
|
+
- [ ] Implementation evaluation results
|
|
88
|
+
- [ ] Security investment effectiveness
|
|
89
|
+
- [ ] Supply chain risk management
|
|
90
|
+
- [ ] Executive support validation
|
|
91
|
+
|
|
92
|
+
**Recovery & Planning (KSI-RPL-01 through RPL-04)**
|
|
93
|
+
- [ ] Recovery objectives current
|
|
94
|
+
- [ ] Recovery plan tested this quarter
|
|
95
|
+
- [ ] System backups validated
|
|
96
|
+
- [ ] Recovery testing results
|
|
97
|
+
|
|
98
|
+
**Services (KSI-SVC-01 through SVC-10)**
|
|
99
|
+
- [ ] Continuous improvement activities
|
|
100
|
+
- [ ] Network encryption status
|
|
101
|
+
- [ ] Configuration automation effectiveness
|
|
102
|
+
- [ ] Resource integrity validation
|
|
103
|
+
- [ ] Secret management review
|
|
104
|
+
- [ ] Patching compliance rates
|
|
105
|
+
- [ ] Shared resource security
|
|
106
|
+
- [ ] Communication integrity
|
|
107
|
+
- [ ] Data destruction procedures
|
|
108
|
+
|
|
109
|
+
**Third-Party Risk (KSI-TPR-01 through TPR-04)**
|
|
110
|
+
- [ ] Supply chain risk management activities
|
|
111
|
+
- [ ] Supply chain risk monitoring results
|
|
112
|
+
|
|
113
|
+
### 2. Vulnerability Management Review (FRR-VDR)
|
|
114
|
+
|
|
115
|
+
**Vulnerability Scanning**
|
|
116
|
+
- [ ] Scan frequency maintained (continuous)
|
|
117
|
+
- [ ] All systems/containers/code scanned
|
|
118
|
+
- [ ] Scan coverage verification
|
|
119
|
+
|
|
120
|
+
**Remediation Timeframes**
|
|
121
|
+
- [ ] Critical/High within timeframes (7-15 days)
|
|
122
|
+
- [ ] Medium within timeframes (30-90 days)
|
|
123
|
+
- [ ] Low within timeframes (180 days)
|
|
124
|
+
- [ ] Exceptions properly documented (FRR-VDR-EX)
|
|
125
|
+
|
|
126
|
+
**Reporting**
|
|
127
|
+
- [ ] Agency-specific vulnerabilities reported
|
|
128
|
+
- [ ] Reporting timeframes met
|
|
129
|
+
- [ ] Follow-up communications documented
|
|
130
|
+
|
|
131
|
+
### 3. Significant Changes Review (FRR-SCN)
|
|
132
|
+
|
|
133
|
+
**Change Categories**
|
|
134
|
+
- [ ] Routine/recurring changes documented
|
|
135
|
+
- [ ] Administrative changes tracked
|
|
136
|
+
- [ ] Transformative changes assessed
|
|
137
|
+
- [ ] Impact changes reported
|
|
138
|
+
- [ ] Notifications sent to appropriate parties
|
|
139
|
+
|
|
140
|
+
### 4. Authorization Boundary Review (FRR-MAS)
|
|
141
|
+
|
|
142
|
+
- [ ] No unauthorized changes to boundary
|
|
143
|
+
- [ ] New components added properly
|
|
144
|
+
- [ ] Removed components documented
|
|
145
|
+
- [ ] Third-party services reviewed
|
|
146
|
+
- [ ] Inventory accuracy validated
|
|
147
|
+
|
|
148
|
+
### 5. Incident Review (FRR-ICP, FRR-FSI)
|
|
149
|
+
|
|
150
|
+
**Incidents This Quarter**
|
|
151
|
+
- [ ] All incidents logged
|
|
152
|
+
- [ ] Communications followed procedures
|
|
153
|
+
- [ ] Security Inbox used appropriately
|
|
154
|
+
- [ ] Agency notifications completed
|
|
155
|
+
- [ ] Lessons learned documented
|
|
156
|
+
|
|
157
|
+
### 6. Persistent Validation (FRR-PVA)
|
|
158
|
+
|
|
159
|
+
- [ ] Continuous validation operational
|
|
160
|
+
- [ ] Results reviewed and analyzed
|
|
161
|
+
- [ ] Issues addressed
|
|
162
|
+
- [ ] Validation coverage adequate
|
|
163
|
+
|
|
164
|
+
### 7. Authorization Data Sharing (FRR-ADS)
|
|
165
|
+
|
|
166
|
+
**API Functionality**
|
|
167
|
+
- [ ] API operational and accessible
|
|
168
|
+
- [ ] Authentication working properly
|
|
169
|
+
- [ ] Data current and accurate
|
|
170
|
+
- [ ] Agencies able to query successfully
|
|
171
|
+
- [ ] OSCAL format compliance
|
|
172
|
+
|
|
173
|
+
**Data Shared**
|
|
174
|
+
- [ ] System boundary information
|
|
175
|
+
- [ ] Vulnerability data
|
|
176
|
+
- [ ] KSI metrics
|
|
177
|
+
- [ ] Incident data
|
|
178
|
+
- [ ] Change notifications
|
|
179
|
+
- [ ] POA&M status
|
|
180
|
+
|
|
181
|
+
## Post-Review Actions
|
|
182
|
+
|
|
183
|
+
**Documentation**
|
|
184
|
+
- [ ] Complete quarterly review report
|
|
185
|
+
- [ ] Update POA&Ms with new findings
|
|
186
|
+
- [ ] Document any exceptions or deviations
|
|
187
|
+
- [ ] Record decisions and action items
|
|
188
|
+
|
|
189
|
+
**Communication**
|
|
190
|
+
- [ ] Share results with authorizing agencies
|
|
191
|
+
- [ ] Update Authorization Data Sharing API
|
|
192
|
+
- [ ] Notify stakeholders of significant findings
|
|
193
|
+
- [ ] Schedule follow-up meetings if needed
|
|
194
|
+
|
|
195
|
+
**Continuous Improvement**
|
|
196
|
+
- [ ] Identify process improvements
|
|
197
|
+
- [ ] Update procedures based on lessons learned
|
|
198
|
+
- [ ] Address any gaps found
|
|
199
|
+
- [ ] Plan next quarter's activities
|
|
200
|
+
|
|
201
|
+
## Deliverables Checklist
|
|
202
|
+
|
|
203
|
+
- [ ] Quarterly Review Report
|
|
204
|
+
- [ ] Updated KSI metrics dashboard
|
|
205
|
+
- [ ] Vulnerability scan results summary
|
|
206
|
+
- [ ] Incident summary report
|
|
207
|
+
- [ ] POA&M updates
|
|
208
|
+
- [ ] Change log for the quarter
|
|
209
|
+
- [ ] Evidence package (via Authorization Data Sharing API)
|
|
210
|
+
- [ ] Agency coordination notes
|
|
211
|
+
|
|
212
|
+
## Red Flags to Escalate
|
|
213
|
+
|
|
214
|
+
⚠ **Immediate escalation required if:**
|
|
215
|
+
- Critical/High vulnerabilities past remediation deadline
|
|
216
|
+
- Unauthorized boundary changes
|
|
217
|
+
- Security incidents not properly reported
|
|
218
|
+
- KSI metrics showing degradation
|
|
219
|
+
- Authorization Data Sharing API unavailable
|
|
220
|
+
- Required training completion below threshold
|
|
221
|
+
- Significant changes not properly notified
|
|
222
|
+
|
|
223
|
+
## Next Quarter Planning
|
|
224
|
+
|
|
225
|
+
- [ ] Review upcoming system changes
|
|
226
|
+
- [ ] Plan security improvements
|
|
227
|
+
- [ ] Schedule next quarterly review
|
|
228
|
+
- [ ] Assign preparatory tasks
|
|
229
|
+
- [ ] Update calendar reminders
|
|
230
|
+
|
|
231
|
+
Use search_requirements to find specific requirement details for any area needing deeper investigation.
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
I'll help you assess your planned change and determine FedRAMP notification requirements.
|
|
2
|
+
|
|
3
|
+
**Significant Change Classification (SCN)**:
|
|
4
|
+
|
|
5
|
+
**1. Change Description**
|
|
6
|
+
Please describe the change you're planning:
|
|
7
|
+
- What systems/components are affected?
|
|
8
|
+
- What functionality is changing?
|
|
9
|
+
- When is the change scheduled?
|
|
10
|
+
|
|
11
|
+
**2. Change Categories (per FedRAMP SCN requirements)**:
|
|
12
|
+
|
|
13
|
+
**Routine/Recurring Changes**:
|
|
14
|
+
- Regularly scheduled updates following documented procedures
|
|
15
|
+
- Changes within normal operational parameters
|
|
16
|
+
- No substantial impact to security posture
|
|
17
|
+
- Examples: Patch updates, regular maintenance
|
|
18
|
+
|
|
19
|
+
**Adaptive Changes**:
|
|
20
|
+
- Modifications to existing functionality
|
|
21
|
+
- Changes in response to operational needs
|
|
22
|
+
- May affect some security controls
|
|
23
|
+
- Examples: Configuration changes, minor feature updates
|
|
24
|
+
|
|
25
|
+
**Transformative Changes**:
|
|
26
|
+
- Major architectural changes
|
|
27
|
+
- New technologies or services
|
|
28
|
+
- Significant impact to authorization boundary
|
|
29
|
+
- Examples: Major version upgrades, infrastructure changes, adding new services
|
|
30
|
+
|
|
31
|
+
**3. Impact Assessment**:
|
|
32
|
+
Does your change affect:
|
|
33
|
+
- [ ] Authorization boundary?
|
|
34
|
+
- [ ] Federal customer data handling?
|
|
35
|
+
- [ ] Security controls implementation?
|
|
36
|
+
- [ ] Third-party service dependencies?
|
|
37
|
+
- [ ] Cryptographic modules?
|
|
38
|
+
- [ ] Information resources in assessment scope?
|
|
39
|
+
|
|
40
|
+
**4. Notification Requirements**:
|
|
41
|
+
Based on your classification:
|
|
42
|
+
- **Routine**: Covered by continuous monitoring, no special notification
|
|
43
|
+
- **Adaptive**: May require notification depending on impact
|
|
44
|
+
- **Transformative**: Requires notification and may require re-assessment
|
|
45
|
+
|
|
46
|
+
**Next Steps**:
|
|
47
|
+
1. Use get_control with "FRR-SCN-*" IDs to review detailed change requirements
|
|
48
|
+
2. Use search_requirements with "significant change" to find related guidance
|
|
49
|
+
3. Document your change classification and justification
|
|
50
|
+
4. Prepare notification if required
|