fedramp-20x-mcp 0.4.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. fedramp_20x_mcp/__init__.py +14 -0
  2. fedramp_20x_mcp/__main__.py +12 -0
  3. fedramp_20x_mcp/data_loader.py +673 -0
  4. fedramp_20x_mcp/prompts/__init__.py +62 -0
  5. fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
  6. fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
  7. fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
  8. fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
  9. fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
  10. fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
  11. fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
  12. fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
  13. fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
  14. fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
  15. fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
  16. fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
  17. fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
  18. fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
  19. fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
  20. fedramp_20x_mcp/server.py +270 -0
  21. fedramp_20x_mcp/templates/__init__.py +75 -0
  22. fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
  23. fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
  24. fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
  25. fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
  26. fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
  27. fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
  28. fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
  29. fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
  30. fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
  31. fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
  32. fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
  33. fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
  34. fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
  35. fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
  36. fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
  37. fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
  38. fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
  39. fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
  40. fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
  41. fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
  42. fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
  43. fedramp_20x_mcp/tools/__init__.py +167 -0
  44. fedramp_20x_mcp/tools/definitions.py +154 -0
  45. fedramp_20x_mcp/tools/documentation.py +155 -0
  46. fedramp_20x_mcp/tools/enhancements.py +2256 -0
  47. fedramp_20x_mcp/tools/evidence.py +701 -0
  48. fedramp_20x_mcp/tools/export.py +753 -0
  49. fedramp_20x_mcp/tools/ksi.py +90 -0
  50. fedramp_20x_mcp/tools/requirements.py +163 -0
  51. fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
  52. fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
  53. fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
  54. fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
  55. fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
@@ -0,0 +1,440 @@
1
+ I'll help you migrate from FedRAMP Rev 5 to FedRAMP 20x.
2
+
3
+ # Migration Guide: FedRAMP Rev 5 → FedRAMP 20x
4
+
5
+ **Important Note on OSCAL:** FedRAMP 20x requires **machine-readable** formats (JSON/XML) for Authorization Data Sharing. **OSCAL is NOT mentioned in FedRAMP 20x** - it's a NIST standard you may already use in Rev 5. When migrating, focus on machine-readable formats - continue with OSCAL only if it serves your needs, or use custom JSON/XML.
6
+
7
+ ## Executive Summary
8
+
9
+ **Key Changes:**
10
+ - Document-based → API-based data sharing
11
+ - Annual assessment → Continuous monitoring
12
+ - Static boundary → Dynamic, cloud-native support
13
+ - Manual evidence → Automated collection
14
+ - 320 controls → 72 Key Security Indicators + 11 standards
15
+
16
+ **Timeline:** 6-12 months for full transition
17
+ **Effort:** Significant automation investment required
18
+
19
+ ## Phase 1: Assessment & Planning (Weeks 1-4)
20
+
21
+ ### Gap Analysis
22
+
23
+ **What You Have (Rev 5):**
24
+ - System Security Plan (Word/PDF)
25
+ - Annual 3PAO assessment
26
+ - Monthly ConMon scans
27
+ - Quarterly POA&M updates
28
+ - Manual evidence packages
29
+
30
+ **What You Need (FedRAMP 20x):**
31
+ - Machine-readable SSP (JSON/XML - custom or OSCAL)
32
+ - Authorization Data Sharing API
33
+ - Continuous monitoring with KSI tracking
34
+ - Quarterly reviews with automated data sharing
35
+ - Real-time evidence via APIs
36
+
37
+ ### Current State Inventory
38
+
39
+ **Document Your Current Implementation:**
40
+ - [ ] List all security controls from Rev 5 SSP
41
+ - [ ] Inventory monitoring/security tools
42
+ - [ ] Document current ConMon process
43
+ - [ ] List evidence collection methods
44
+ - [ ] Review 3PAO assessment findings
45
+
46
+ ### Map Rev 5 to FedRAMP 20x
47
+
48
+ **Control Mapping:**
49
+ ```
50
+ Rev 5 Control Family → FedRAMP 20x Standard
51
+
52
+ AC (Access Control) → KSI-IAM (Identity & Access)
53
+ AU (Audit) → KSI-MLA (Monitoring, Logging & Analysis)
54
+ CA (Assessment) → FRR-MAS, FRR-PVA (Assessment, Validation)
55
+ CM (Configuration) → KSI-CMT, KSI-SVC (Change, Services)
56
+ CP (Contingency) → KSI-RPL (Recovery & Planning)
57
+ IA (Identification) → KSI-IAM (Identity & Access)
58
+ IR (Incident Response) → KSI-INR, FRR-ICP (Incidents, Communications)
59
+ RA (Risk Assessment) → KSI-AFR, FRR-VDR (Vulnerabilities)
60
+ SA (System Services) → KSI-TPR, KSI-PIY (Third-party, Investment)
61
+ SC (System Communications) → KSI-CNA, KSI-SVC (Cloud-native, Services)
62
+ SI (System Integrity) → FRR-VDR, KSI-SVC (Vulnerabilities, Services)
63
+ ```
64
+
65
+ **Use compare_with_rev4 tool to see detailed comparisons for specific areas.**
66
+
67
+ ## Phase 2: Infrastructure Preparation (Weeks 5-16)
68
+
69
+ ### Priority 1: SIEM & Monitoring (Weeks 5-10)
70
+
71
+ **If you have SIEM already:**
72
+ - [ ] Verify it can track 72 KSIs
73
+ - [ ] Configure automated KSI data collection
74
+ - [ ] Set up API access for data export
75
+ - [ ] Test OSCAL format export (if supported)
76
+
77
+ **If you need new SIEM:**
78
+ - [ ] Select FedRAMP-authorized SIEM (Splunk, Datadog, etc.)
79
+ - [ ] Migrate log sources
80
+ - [ ] Configure KSI tracking dashboards
81
+ - [ ] Set up API for Authorization Data Sharing
82
+
83
+ **Gap from Rev 5:**
84
+ - Rev 5: Monthly scan reports emailed
85
+ - FedRAMP 20x: Real-time data via API
86
+
87
+ ### Priority 2: Authorization Data Sharing API (Weeks 8-16)
88
+
89
+ **Build New API:**
90
+ ```
91
+ Required Endpoints:
92
+ - GET /api/v1/system (OSCAL SSP format)
93
+ - GET /api/v1/vulnerabilities
94
+ - GET /api/v1/ksi-metrics
95
+ - GET /api/v1/incidents
96
+ - GET /api/v1/changes
97
+ - GET /api/v1/poam
98
+ ```
99
+
100
+ **Authentication:**
101
+ - OAuth 2.0 or mTLS
102
+ - Provide test credentials to FedRAMP
103
+
104
+ **Use api_design_guide prompt for detailed implementation guidance.**
105
+
106
+ ### Priority 3: KSI Implementation (Weeks 6-16)
107
+
108
+ **Quick Wins (Weeks 6-8):**
109
+ Already compliant from Rev 5, just need to document:
110
+ - KSI-IAM-01: MFA (you already have this for AC-2)
111
+ - KSI-MLA-02: Audit logging (you already have this for AU-2)
112
+ - KSI-INR-01: Incident response (you already have this for IR-8)
113
+ - KSI-RPL-03: Backups (you already have this for CP-9)
114
+
115
+ **New Requirements (Weeks 8-16):**
116
+ Not required in Rev 5, need implementation:
117
+ - KSI-IAM-01: Must be phishing-resistant (upgrade from TOTP to FIDO2)
118
+ - KSI-PIY-01: Automated inventory (upgrade from manual)
119
+ - KSI-MLA-05: Infrastructure as Code (new requirement)
120
+ - KSI-CMT-03: Automated testing in CI/CD (new requirement)
121
+ - KSI-CNA-04: Immutable infrastructure (new requirement)
122
+
123
+ **Use ksi_implementation_priorities prompt to plan implementation order.**
124
+
125
+ ## Phase 3: Documentation Conversion (Weeks 12-20)
126
+
127
+ ### Convert SSP to Machine-Readable Format (OSCAL Preferred)
128
+
129
+ **Rev 5 SSP (Word/PDF):**
130
+ ```
131
+ Section 1: System Information
132
+ Section 2: System Environment
133
+ Section 3: System Characteristics
134
+ ...
135
+ Section 13: Control Responses (320 controls)
136
+ ```
137
+
138
+ **FedRAMP 20x SSP (OSCAL JSON):**
139
+ ```json
140
+ {
141
+ "system-security-plan": {
142
+ "metadata": {...},
143
+ "system-characteristics": {...},
144
+ "system-implementation": {...},
145
+ "control-implementation": {...}
146
+ }
147
+ }
148
+ ```
149
+
150
+ **Migration Approach:**
151
+
152
+ **Option 1: Automated Conversion**
153
+ - Use OSCAL conversion tools (NIST provides some)
154
+ - Requires manual cleanup and validation
155
+ - Faster but less accurate
156
+
157
+ **Option 2: Manual Conversion**
158
+ - Extract data from Word/PDF
159
+ - Map to OSCAL structure
160
+ - More accurate but time-consuming
161
+
162
+ **Option 3: Fresh Start**
163
+ - Use current architecture to generate new OSCAL SSP
164
+ - Most accurate for cloud-native systems
165
+ - Recommended if architecture changed significantly
166
+
167
+ **Use documentation_generator prompt for OSCAL templates.**
168
+
169
+ ### New Documentation Requirements
170
+
171
+ **Documents you didn't have in Rev 5:**
172
+
173
+ 1. **FRR-ADS: Authorization Data Sharing API Documentation**
174
+ - API endpoints
175
+ - Authentication methods
176
+ - Data formats (OSCAL)
177
+ - SLAs
178
+
179
+ 2. **FRR-KSI: All 72 KSI Implementation Documents**
180
+ - How each KSI is implemented
181
+ - Evidence collection methods
182
+ - Metrics and targets
183
+
184
+ 3. **FRR-PVA: Persistent Validation Procedures**
185
+ - Continuous validation approach
186
+ - Automated validation tools
187
+ - Validation frequency
188
+
189
+ 4. **FRR-CCM-QR: Quarterly Review Procedures**
190
+ - Structured review process
191
+ - Agency collaboration procedures
192
+
193
+ ## Phase 4: Process Changes (Weeks 16-24)
194
+
195
+ ### Continuous Monitoring (FRR-CCM)
196
+
197
+ **Rev 5 Process:**
198
+ ```
199
+ Monthly: Run vulnerability scans
200
+ Monthly: Submit ConMon deliverable
201
+ Quarterly: Update POA&M
202
+ Annually: 3PAO assessment
203
+ ```
204
+
205
+ **FedRAMP 20x Process:**
206
+ ```
207
+ Continuously: Automated scanning and monitoring
208
+ Real-time: KSI metrics collection
209
+ Daily: Authorization Data Sharing API updated
210
+ Quarterly: Structured quarterly review (FRR-CCM-QR)
211
+ As-needed: Persistent validation (FRR-PVA)
212
+ ```
213
+
214
+ **Key Changes:**
215
+ - Manual → Automated evidence collection
216
+ - Monthly deliverables → Real-time API access
217
+ - Annual assessment → Continuous validation
218
+
219
+ ### Vulnerability Management (FRR-VDR)
220
+
221
+ **Rev 5 Approach:**
222
+ - 30 days for High vulnerabilities
223
+ - POA&M for longer remediation
224
+ - Monthly ConMon scans
225
+
226
+ **FedRAMP 20x Approach:**
227
+ - Timeframes vary by severity AND impact level
228
+ - High impact: 7-15 days for Critical/High
229
+ - Formal exception process (FRR-VDR-EX)
230
+ - Agency-specific reporting (FRR-VDR-RP)
231
+
232
+ **Action Items:**
233
+ - [ ] Review current vulnerability remediation times
234
+ - [ ] Implement automated scanning (if not already)
235
+ - [ ] Update procedures for new timeframes
236
+ - [ ] Set up agency reporting workflow
237
+
238
+ ### Significant Change Notifications (FRR-SCN)
239
+
240
+ **Rev 5 Approach:**
241
+ - Notify FedRAMP of "significant changes"
242
+ - Vague definition of "significant"
243
+ - Email-based notifications
244
+
245
+ **FedRAMP 20x Approach:**
246
+ - Clear categories: Routine, Administrative, Transformative, Impact
247
+ - Structured notification process
248
+ - Must use FedRAMP Security Inbox (FRR-FSI)
249
+ - Specific triggers defined
250
+
251
+ **Action Items:**
252
+ - [ ] Document change categorization process
253
+ - [ ] Update change management procedures
254
+ - [ ] Train team on FRR-SCN requirements
255
+
256
+ ## Phase 5: Testing & Validation (Weeks 20-26)
257
+
258
+ ### Internal Testing
259
+
260
+ **Test Authorization Data Sharing API:**
261
+ - [ ] All endpoints return correct data
262
+ - [ ] Machine-readable format validates (OSCAL preferred)
263
+ - [ ] Authentication works properly
264
+ - [ ] Rate limiting configured
265
+ - [ ] Error handling works
266
+
267
+ **Test KSI Collection:**
268
+ - [ ] All 72 KSIs being tracked
269
+ - [ ] Automated collection working
270
+ - [ ] Data accurate and timely
271
+ - [ ] Dashboards showing correct metrics
272
+
273
+ **Test Continuous Monitoring:**
274
+ - [ ] Vulnerability scans running continuously
275
+ - [ ] Incidents logged automatically
276
+ - [ ] Changes tracked automatically
277
+ - [ ] Evidence collected automatically
278
+
279
+ ### FedRAMP Coordination
280
+
281
+ **Schedule Review with FedRAMP:**
282
+ - [ ] Provide test API credentials
283
+ - [ ] Demonstrate data collection
284
+ - [ ] Show OSCAL documentation
285
+ - [ ] Review quarterly process
286
+
287
+ **Address Feedback:**
288
+ - [ ] Fix any API issues
289
+ - [ ] Update documentation
290
+ - [ ] Adjust procedures
291
+
292
+ ## Phase 6: Transition (Weeks 24-28)
293
+
294
+ ### Final Preparation
295
+
296
+ **Documentation:**
297
+ - [ ] All 11 FedRAMP 20x standard documents complete
298
+ - [ ] All 72 KSI implementation documents complete
299
+ - [ ] OSCAL SSP finalized
300
+ - [ ] API documentation complete
301
+
302
+ **Technical:**
303
+ - [ ] Authorization Data Sharing API in production
304
+ - [ ] All KSI metrics being collected
305
+ - [ ] Continuous monitoring operational
306
+ - [ ] Quarterly review process tested
307
+
308
+ **Team:**
309
+ - [ ] Team trained on new processes
310
+ - [ ] Roles and responsibilities updated
311
+ - [ ] Runbooks created for new procedures
312
+
313
+ ### Go-Live
314
+
315
+ **Cutover Activities:**
316
+ - [ ] Final data validation
317
+ - [ ] Enable Authorization Data Sharing API for FedRAMP
318
+ - [ ] Conduct first quarterly review under new process
319
+ - [ ] Communicate change to agencies
320
+
321
+ **Post-Cutover:**
322
+ - [ ] Monitor API usage and performance
323
+ - [ ] Collect feedback from FedRAMP/agencies
324
+ - [ ] Adjust processes based on feedback
325
+ - [ ] Document lessons learned
326
+
327
+ ## Phase 7: Continuous Improvement (Ongoing)
328
+
329
+ ### First 90 Days
330
+
331
+ **Weeks 1-4:**
332
+ - Daily check-ins on API performance
333
+ - Validate KSI metrics accuracy
334
+ - Address any immediate issues
335
+
336
+ **Weeks 5-8:**
337
+ - First quarterly review under new process
338
+ - Gather feedback from team
339
+ - Optimize automation
340
+
341
+ **Weeks 9-12:**
342
+ - Refine procedures based on experience
343
+ - Update documentation with lessons learned
344
+ - Plan for additional automation
345
+
346
+ ### Ongoing Activities
347
+
348
+ **Monthly:**
349
+ - Review KSI metrics for trends
350
+ - Validate evidence collection
351
+ - Update procedures as needed
352
+
353
+ **Quarterly:**
354
+ - Conduct formal quarterly review (FRR-CCM-QR)
355
+ - Update Authorization Data Sharing API with latest data
356
+ - Coordinate with agencies
357
+
358
+ **Annually:**
359
+ - Review overall 20x compliance
360
+ - Plan improvements for next year
361
+ - Update risk assessment
362
+
363
+ ## Common Migration Challenges
364
+
365
+ ### Challenge 1: Legacy Tools Don't Support APIs
366
+
367
+ **Problem:** Current tools can't export data via API
368
+
369
+ **Solutions:**
370
+ - Build middleware to expose tool data via API
371
+ - Replace tools with FedRAMP 20x-compatible alternatives
372
+ - Use manual export + automation (short-term workaround)
373
+
374
+ ### Challenge 2: Manual Evidence Collection
375
+
376
+ **Problem:** Most evidence collected manually in Rev 5
377
+
378
+ **Solution:**
379
+ - Implement automation for top 20 KSIs first
380
+ - Use scripts to aggregate data
381
+ - Invest in tools with built-in KSI tracking
382
+
383
+ ### Challenge 3: OSCAL Conversion Complexity
384
+
385
+ **Problem:** Converting Word SSP to OSCAL is difficult
386
+
387
+ **Solutions:**
388
+ - Start with OSCAL templates, populate from scratch
389
+ - Use OSCAL tools (NIST provides some)
390
+ - Consider consulting services for conversion
391
+
392
+ ### Challenge 4: Team Knowledge Gap
393
+
394
+ **Problem:** Team doesn't know FedRAMP 20x or OSCAL
395
+
396
+ **Solutions:**
397
+ - Training on FedRAMP 20x requirements (use this MCP server!)
398
+ - OSCAL training (NIST resources)
399
+ - Hire consultant for initial setup
400
+ - Phase transition to allow learning time
401
+
402
+ ## Budget Considerations
403
+
404
+ **New Costs:**
405
+ - Authorization Data Sharing API development: $50K-150K
406
+ - SIEM upgrades/new tools: $50K-200K/year
407
+ - OSCAL conversion: $20K-50K
408
+ - Training: $10K-30K
409
+ - Consulting (optional): $50K-200K
410
+
411
+ **Potential Savings:**
412
+ - Less manual evidence collection (saves time)
413
+ - Automated compliance checking
414
+ - Faster quarterly reviews
415
+ - Reduced 3PAO hours (potentially)
416
+
417
+ **Total Migration Cost:** $180K-630K
418
+ **Ongoing Additional Cost:** $50K-200K/year (tools)
419
+
420
+ ## Success Criteria
421
+
422
+ **Technical:**
423
+ ✓ Authorization Data Sharing API operational
424
+ ✓ All 72 KSIs being tracked automatically
425
+ ✓ OSCAL SSP validates successfully
426
+ ✓ Continuous monitoring operational
427
+
428
+ **Process:**
429
+ ✓ Quarterly reviews conducted on time
430
+ ✓ Vulnerabilities remediated within timeframes
431
+ ✓ Changes properly categorized and notified
432
+ ✓ Incidents handled per FRR-ICP
433
+
434
+ **Compliance:**
435
+ ✓ FedRAMP accepts Authorization Data Sharing API
436
+ ✓ Agencies can query system data
437
+ ✓ Documentation meets FedRAMP 20x requirements
438
+ ✓ 3PAO validates transition
439
+
440
+ Use compare_with_rev4 for specific area comparisons, and search_requirements to find requirements related to your migration challenges.
@@ -0,0 +1,231 @@
1
+ I'll guide you through the FedRAMP 20x quarterly review process.
2
+
3
+ # Quarterly Review Checklist (FRR-CCM-QR)
4
+
5
+ ## Pre-Review Preparation (Week Before)
6
+
7
+ **Data Collection (FRR-CCM-QR-01 through QR-11)**
8
+ - [ ] Pull KSI metrics for the quarter (all 72 indicators)
9
+ - [ ] Generate vulnerability scan reports
10
+ - [ ] Compile incident logs
11
+ - [ ] Gather change notifications
12
+ - [ ] Review POA&M status
13
+ - [ ] Collect evidence from Authorization Data Sharing API
14
+
15
+ **Team Coordination**
16
+ - [ ] Schedule review meeting with stakeholders
17
+ - [ ] Notify authorizing agencies
18
+ - [ ] Prepare agenda
19
+ - [ ] Assign action items from last quarter
20
+
21
+ ## Quarterly Review Activities
22
+
23
+ ### 1. Key Security Indicators Review
24
+
25
+ **Authorization Framework (KSI-AFR-01 through AFR-11)**
26
+ - [ ] Review assessment scope for changes
27
+ - [ ] Validate KSI tracking is current
28
+ - [ ] Check authorization data sharing functionality
29
+ - [ ] Review vulnerability response metrics
30
+ - [ ] Verify change notification compliance
31
+ - [ ] Check continuous monitoring effectiveness
32
+ - [ ] Validate secure configuration baselines
33
+ - [ ] Review security inbox activity
34
+ - [ ] Check persistent validation results
35
+ - [ ] Review incident communications
36
+ - [ ] Validate cryptographic module usage
37
+
38
+ **Cybersecurity Education (KSI-CED-01 through CED-04)**
39
+ - [ ] General education completion rates
40
+ - [ ] Role-specific training completion
41
+ - [ ] Development/engineering security training
42
+ - [ ] Incident response training status
43
+
44
+ **Change Management (KSI-CMT-01 through CMT-05)**
45
+ - [ ] Review all changes logged this quarter
46
+ - [ ] Verify redeployment procedures followed
47
+ - [ ] Check automated testing coverage
48
+ - [ ] Validate change management procedures
49
+ - [ ] Review change impacts
50
+
51
+ **Cloud Native Architecture (KSI-CNA-01 through CNA-08)**
52
+ - [ ] Network traffic restrictions effective
53
+ - [ ] Attack surface minimization progress
54
+ - [ ] Traffic flow enforcement working
55
+ - [ ] Immutable infrastructure compliance
56
+ - [ ] Unwanted activity detection
57
+ - [ ] High availability metrics
58
+ - [ ] Best practices adherence
59
+ - [ ] Persistent assessment results
60
+
61
+ **Identity & Access Management (KSI-IAM-01 through IAM-07)**
62
+ - [ ] MFA usage (phishing-resistant)
63
+ - [ ] Passwordless authentication adoption
64
+ - [ ] Non-user account management
65
+ - [ ] Just-in-time authorization usage
66
+ - [ ] Least privilege validation
67
+ - [ ] Suspicious activity detections
68
+ - [ ] Automated account management effectiveness
69
+
70
+ **Incident Response (KSI-INR-01 through INR-03)**
71
+ - [ ] Review incident response procedures
72
+ - [ ] Check incident logging completeness
73
+ - [ ] Review after-action reports
74
+
75
+ **Monitoring, Logging & Analysis (KSI-MLA-01 through MLA-08)**
76
+ - [ ] SIEM operational status
77
+ - [ ] Audit logging coverage
78
+ - [ ] Infrastructure as Code usage
79
+ - [ ] Event type coverage
80
+ - [ ] Log data access controls
81
+
82
+ **Proactive Investment (KSI-PIY-01 through PIY-08)**
83
+ - [ ] Automated inventory accuracy
84
+ - [ ] Security objectives progress
85
+ - [ ] Vulnerability disclosure program status
86
+ - [ ] CISA Secure by Design alignment
87
+ - [ ] Implementation evaluation results
88
+ - [ ] Security investment effectiveness
89
+ - [ ] Supply chain risk management
90
+ - [ ] Executive support validation
91
+
92
+ **Recovery & Planning (KSI-RPL-01 through RPL-04)**
93
+ - [ ] Recovery objectives current
94
+ - [ ] Recovery plan tested this quarter
95
+ - [ ] System backups validated
96
+ - [ ] Recovery testing results
97
+
98
+ **Services (KSI-SVC-01 through SVC-10)**
99
+ - [ ] Continuous improvement activities
100
+ - [ ] Network encryption status
101
+ - [ ] Configuration automation effectiveness
102
+ - [ ] Resource integrity validation
103
+ - [ ] Secret management review
104
+ - [ ] Patching compliance rates
105
+ - [ ] Shared resource security
106
+ - [ ] Communication integrity
107
+ - [ ] Data destruction procedures
108
+
109
+ **Third-Party Risk (KSI-TPR-01 through TPR-04)**
110
+ - [ ] Supply chain risk management activities
111
+ - [ ] Supply chain risk monitoring results
112
+
113
+ ### 2. Vulnerability Management Review (FRR-VDR)
114
+
115
+ **Vulnerability Scanning**
116
+ - [ ] Scan frequency maintained (continuous)
117
+ - [ ] All systems/containers/code scanned
118
+ - [ ] Scan coverage verification
119
+
120
+ **Remediation Timeframes**
121
+ - [ ] Critical/High within timeframes (7-15 days)
122
+ - [ ] Medium within timeframes (30-90 days)
123
+ - [ ] Low within timeframes (180 days)
124
+ - [ ] Exceptions properly documented (FRR-VDR-EX)
125
+
126
+ **Reporting**
127
+ - [ ] Agency-specific vulnerabilities reported
128
+ - [ ] Reporting timeframes met
129
+ - [ ] Follow-up communications documented
130
+
131
+ ### 3. Significant Changes Review (FRR-SCN)
132
+
133
+ **Change Categories**
134
+ - [ ] Routine/recurring changes documented
135
+ - [ ] Administrative changes tracked
136
+ - [ ] Transformative changes assessed
137
+ - [ ] Impact changes reported
138
+ - [ ] Notifications sent to appropriate parties
139
+
140
+ ### 4. Authorization Boundary Review (FRR-MAS)
141
+
142
+ - [ ] No unauthorized changes to boundary
143
+ - [ ] New components added properly
144
+ - [ ] Removed components documented
145
+ - [ ] Third-party services reviewed
146
+ - [ ] Inventory accuracy validated
147
+
148
+ ### 5. Incident Review (FRR-ICP, FRR-FSI)
149
+
150
+ **Incidents This Quarter**
151
+ - [ ] All incidents logged
152
+ - [ ] Communications followed procedures
153
+ - [ ] Security Inbox used appropriately
154
+ - [ ] Agency notifications completed
155
+ - [ ] Lessons learned documented
156
+
157
+ ### 6. Persistent Validation (FRR-PVA)
158
+
159
+ - [ ] Continuous validation operational
160
+ - [ ] Results reviewed and analyzed
161
+ - [ ] Issues addressed
162
+ - [ ] Validation coverage adequate
163
+
164
+ ### 7. Authorization Data Sharing (FRR-ADS)
165
+
166
+ **API Functionality**
167
+ - [ ] API operational and accessible
168
+ - [ ] Authentication working properly
169
+ - [ ] Data current and accurate
170
+ - [ ] Agencies able to query successfully
171
+ - [ ] OSCAL format compliance
172
+
173
+ **Data Shared**
174
+ - [ ] System boundary information
175
+ - [ ] Vulnerability data
176
+ - [ ] KSI metrics
177
+ - [ ] Incident data
178
+ - [ ] Change notifications
179
+ - [ ] POA&M status
180
+
181
+ ## Post-Review Actions
182
+
183
+ **Documentation**
184
+ - [ ] Complete quarterly review report
185
+ - [ ] Update POA&Ms with new findings
186
+ - [ ] Document any exceptions or deviations
187
+ - [ ] Record decisions and action items
188
+
189
+ **Communication**
190
+ - [ ] Share results with authorizing agencies
191
+ - [ ] Update Authorization Data Sharing API
192
+ - [ ] Notify stakeholders of significant findings
193
+ - [ ] Schedule follow-up meetings if needed
194
+
195
+ **Continuous Improvement**
196
+ - [ ] Identify process improvements
197
+ - [ ] Update procedures based on lessons learned
198
+ - [ ] Address any gaps found
199
+ - [ ] Plan next quarter's activities
200
+
201
+ ## Deliverables Checklist
202
+
203
+ - [ ] Quarterly Review Report
204
+ - [ ] Updated KSI metrics dashboard
205
+ - [ ] Vulnerability scan results summary
206
+ - [ ] Incident summary report
207
+ - [ ] POA&M updates
208
+ - [ ] Change log for the quarter
209
+ - [ ] Evidence package (via Authorization Data Sharing API)
210
+ - [ ] Agency coordination notes
211
+
212
+ ## Red Flags to Escalate
213
+
214
+ ⚠ **Immediate escalation required if:**
215
+ - Critical/High vulnerabilities past remediation deadline
216
+ - Unauthorized boundary changes
217
+ - Security incidents not properly reported
218
+ - KSI metrics showing degradation
219
+ - Authorization Data Sharing API unavailable
220
+ - Required training completion below threshold
221
+ - Significant changes not properly notified
222
+
223
+ ## Next Quarter Planning
224
+
225
+ - [ ] Review upcoming system changes
226
+ - [ ] Plan security improvements
227
+ - [ ] Schedule next quarterly review
228
+ - [ ] Assign preparatory tasks
229
+ - [ ] Update calendar reminders
230
+
231
+ Use search_requirements to find specific requirement details for any area needing deeper investigation.
@@ -0,0 +1,50 @@
1
+ I'll help you assess your planned change and determine FedRAMP notification requirements.
2
+
3
+ **Significant Change Classification (SCN)**:
4
+
5
+ **1. Change Description**
6
+ Please describe the change you're planning:
7
+ - What systems/components are affected?
8
+ - What functionality is changing?
9
+ - When is the change scheduled?
10
+
11
+ **2. Change Categories (per FedRAMP SCN requirements)**:
12
+
13
+ **Routine/Recurring Changes**:
14
+ - Regularly scheduled updates following documented procedures
15
+ - Changes within normal operational parameters
16
+ - No substantial impact to security posture
17
+ - Examples: Patch updates, regular maintenance
18
+
19
+ **Adaptive Changes**:
20
+ - Modifications to existing functionality
21
+ - Changes in response to operational needs
22
+ - May affect some security controls
23
+ - Examples: Configuration changes, minor feature updates
24
+
25
+ **Transformative Changes**:
26
+ - Major architectural changes
27
+ - New technologies or services
28
+ - Significant impact to authorization boundary
29
+ - Examples: Major version upgrades, infrastructure changes, adding new services
30
+
31
+ **3. Impact Assessment**:
32
+ Does your change affect:
33
+ - [ ] Authorization boundary?
34
+ - [ ] Federal customer data handling?
35
+ - [ ] Security controls implementation?
36
+ - [ ] Third-party service dependencies?
37
+ - [ ] Cryptographic modules?
38
+ - [ ] Information resources in assessment scope?
39
+
40
+ **4. Notification Requirements**:
41
+ Based on your classification:
42
+ - **Routine**: Covered by continuous monitoring, no special notification
43
+ - **Adaptive**: May require notification depending on impact
44
+ - **Transformative**: Requires notification and may require re-assessment
45
+
46
+ **Next Steps**:
47
+ 1. Use get_control with "FRR-SCN-*" IDs to review detailed change requirements
48
+ 2. Use search_requirements with "significant change" to find related guidance
49
+ 3. Document your change classification and justification
50
+ 4. Prepare notification if required