fedramp-20x-mcp 0.4.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- fedramp_20x_mcp/__init__.py +14 -0
- fedramp_20x_mcp/__main__.py +12 -0
- fedramp_20x_mcp/data_loader.py +673 -0
- fedramp_20x_mcp/prompts/__init__.py +62 -0
- fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
- fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
- fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
- fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
- fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
- fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
- fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
- fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
- fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
- fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
- fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
- fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
- fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
- fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
- fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
- fedramp_20x_mcp/server.py +270 -0
- fedramp_20x_mcp/templates/__init__.py +75 -0
- fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
- fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
- fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
- fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
- fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
- fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
- fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
- fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
- fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
- fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
- fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
- fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
- fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
- fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
- fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
- fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
- fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
- fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
- fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
- fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
- fedramp_20x_mcp/tools/__init__.py +167 -0
- fedramp_20x_mcp/tools/definitions.py +154 -0
- fedramp_20x_mcp/tools/documentation.py +155 -0
- fedramp_20x_mcp/tools/enhancements.py +2256 -0
- fedramp_20x_mcp/tools/evidence.py +701 -0
- fedramp_20x_mcp/tools/export.py +753 -0
- fedramp_20x_mcp/tools/ksi.py +90 -0
- fedramp_20x_mcp/tools/requirements.py +163 -0
- fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
- fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
- fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
- fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
- fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
|
@@ -0,0 +1,349 @@
|
|
|
1
|
+
I'll help you evaluate vendors and tools for FedRAMP 20x compatibility.
|
|
2
|
+
|
|
3
|
+
# Vendor/Tool Evaluation Guide for FedRAMP 20x
|
|
4
|
+
|
|
5
|
+
## General Vendor Questions
|
|
6
|
+
|
|
7
|
+
### FedRAMP Awareness
|
|
8
|
+
1. Is your product/service FedRAMP authorized?
|
|
9
|
+
- If yes, at what impact level? (Low/Moderate/High)
|
|
10
|
+
- What's your FedRAMP authorization date?
|
|
11
|
+
- Are you familiar with FedRAMP 20x changes from Rev 5?
|
|
12
|
+
|
|
13
|
+
2. Do you have customers who use your product for FedRAMP compliance?
|
|
14
|
+
- Can you provide references?
|
|
15
|
+
- What FedRAMP 20x standards do they use your product for?
|
|
16
|
+
|
|
17
|
+
### Data Handling
|
|
18
|
+
3. Does your service handle Federal Customer Data?
|
|
19
|
+
- Where is data stored geographically?
|
|
20
|
+
- Is data encrypted at rest and in transit?
|
|
21
|
+
- Can you provide data residency guarantees?
|
|
22
|
+
|
|
23
|
+
4. What is your data retention and deletion policy?
|
|
24
|
+
- Can you delete data on demand? (KSI-SVC-10)
|
|
25
|
+
- Do you provide certificates of destruction?
|
|
26
|
+
|
|
27
|
+
## Category-Specific Questions
|
|
28
|
+
|
|
29
|
+
### SIEM / Security Monitoring Tools (KSI-MLA-01)
|
|
30
|
+
|
|
31
|
+
**Required Capabilities:**
|
|
32
|
+
- [ ] Can ingest logs from all our sources (cloud, on-prem, containers)?
|
|
33
|
+
- [ ] Supports structured logging (JSON)?
|
|
34
|
+
- [ ] Can retain logs for 1+ years?
|
|
35
|
+
- [ ] Provides API access to log data?
|
|
36
|
+
- [ ] Supports automated alerting?
|
|
37
|
+
- [ ] Can generate compliance reports?
|
|
38
|
+
- [ ] OSCAL format support or export capability?
|
|
39
|
+
|
|
40
|
+
**FedRAMP 20x Specific:**
|
|
41
|
+
- [ ] Can track all 72 KSI metrics?
|
|
42
|
+
- [ ] Can provide data for Authorization Data Sharing API (FRR-ADS)?
|
|
43
|
+
- [ ] Supports continuous monitoring (FRR-CCM)?
|
|
44
|
+
- [ ] Can generate quarterly review reports?
|
|
45
|
+
|
|
46
|
+
**Questions to Ask:**
|
|
47
|
+
- What's your typical log ingestion rate capability?
|
|
48
|
+
- Do you offer government regions/dedicated instances?
|
|
49
|
+
- Can you integrate with our Authorization Data Sharing API?
|
|
50
|
+
- What's your SLA for log availability?
|
|
51
|
+
|
|
52
|
+
**Top Vendors:**
|
|
53
|
+
- Microsoft Sentinel (FedRAMP authorized, Azure-native)
|
|
54
|
+
- Splunk Cloud (FedRAMP authorized)
|
|
55
|
+
- Datadog (FedRAMP authorized)
|
|
56
|
+
- Sumo Logic (FedRAMP authorized)
|
|
57
|
+
|
|
58
|
+
### Vulnerability Scanning Tools (FRR-VDR, KSI-AFR-04)
|
|
59
|
+
|
|
60
|
+
**Required Capabilities:**
|
|
61
|
+
- [ ] Continuous/automated scanning?
|
|
62
|
+
- [ ] Covers infrastructure, containers, and code?
|
|
63
|
+
- [ ] Provides CVSS scores and remediation guidance?
|
|
64
|
+
- [ ] Can scan on-demand and scheduled?
|
|
65
|
+
- [ ] API access to vulnerability data?
|
|
66
|
+
- [ ] Integrates with ticketing systems?
|
|
67
|
+
- [ ] Supports exception management (FRR-VDR-EX)?
|
|
68
|
+
|
|
69
|
+
**FedRAMP 20x Specific:**
|
|
70
|
+
- [ ] Can track remediation timeframes by severity (FRR-VDR-TF)?
|
|
71
|
+
- [ ] Provides data for Authorization Data Sharing API?
|
|
72
|
+
- [ ] Supports agency-specific vulnerability reporting (FRR-VDR-RP)?
|
|
73
|
+
|
|
74
|
+
**Questions to Ask:**
|
|
75
|
+
- How often can we scan without impacting performance?
|
|
76
|
+
- Do you support scanning ephemeral containers?
|
|
77
|
+
- Can you scan during CI/CD pipeline?
|
|
78
|
+
- What's the false positive rate?
|
|
79
|
+
- How do you handle zero-day vulnerabilities?
|
|
80
|
+
|
|
81
|
+
**Top Vendors:**
|
|
82
|
+
- Microsoft Defender for Cloud (FedRAMP authorized, Azure-native)
|
|
83
|
+
- Tenable.io (FedRAMP authorized)
|
|
84
|
+
- Qualys (FedRAMP authorized)
|
|
85
|
+
- Snyk (code and container scanning)
|
|
86
|
+
- Trivy (open source, container scanning)
|
|
87
|
+
|
|
88
|
+
### Identity & Access Management (KSI-IAM)
|
|
89
|
+
|
|
90
|
+
**Required Capabilities:**
|
|
91
|
+
- [ ] Phishing-resistant MFA (FIDO2/WebAuthn)? (KSI-IAM-01)
|
|
92
|
+
- [ ] Supports passwordless authentication? (KSI-IAM-02)
|
|
93
|
+
- [ ] Provides detailed audit logs? (KSI-MLA-02)
|
|
94
|
+
- [ ] Supports conditional access policies?
|
|
95
|
+
- [ ] Can integrate with all your applications?
|
|
96
|
+
- [ ] API access for user management?
|
|
97
|
+
|
|
98
|
+
**FedRAMP 20x Specific:**
|
|
99
|
+
- [ ] Can enforce least privilege? (KSI-IAM-05)
|
|
100
|
+
- [ ] Detects suspicious activity? (KSI-IAM-06)
|
|
101
|
+
- [ ] Supports just-in-time access? (KSI-IAM-04)
|
|
102
|
+
- [ ] Can provide MFA compliance data for KSI tracking?
|
|
103
|
+
|
|
104
|
+
**Questions to Ask:**
|
|
105
|
+
- What MFA methods do you support? (must include FIDO2)
|
|
106
|
+
- Can you disable SMS/TOTP for privileged accounts?
|
|
107
|
+
- How do you handle service account authentication?
|
|
108
|
+
- What's your session timeout capability?
|
|
109
|
+
- Can you export IAM events to our SIEM?
|
|
110
|
+
|
|
111
|
+
**Top Vendors:**
|
|
112
|
+
- Microsoft Entra ID (formerly Azure AD, FedRAMP authorized, Azure-native)
|
|
113
|
+
- Okta (FedRAMP authorized)
|
|
114
|
+
- Ping Identity (FedRAMP authorized)
|
|
115
|
+
|
|
116
|
+
### Secret Management (KSI-SVC-06)
|
|
117
|
+
|
|
118
|
+
**Required Capabilities:**
|
|
119
|
+
- [ ] Encrypted storage of secrets?
|
|
120
|
+
- [ ] Automatic secret rotation?
|
|
121
|
+
- [ ] Access audit logs?
|
|
122
|
+
- [ ] API access for applications?
|
|
123
|
+
- [ ] Integration with CI/CD pipelines?
|
|
124
|
+
- [ ] Emergency access procedures?
|
|
125
|
+
|
|
126
|
+
**FedRAMP 20x Specific:**
|
|
127
|
+
- [ ] Can provide secret access logs to SIEM?
|
|
128
|
+
- [ ] Supports automated secret rotation?
|
|
129
|
+
- [ ] Can track secret usage for KSI metrics?
|
|
130
|
+
|
|
131
|
+
**Questions to Ask:**
|
|
132
|
+
- How are secrets encrypted (algorithm, key management)?
|
|
133
|
+
- Do you support dynamic secrets?
|
|
134
|
+
- Can you integrate with our cloud provider's KMS?
|
|
135
|
+
- What happens if your service is unavailable?
|
|
136
|
+
- Can secrets be backed up securely?
|
|
137
|
+
|
|
138
|
+
**Top Vendors:**
|
|
139
|
+
- Azure Key Vault (FedRAMP authorized, Azure-native)
|
|
140
|
+
- HashiCorp Vault (FedRAMP authorized)
|
|
141
|
+
- CyberArk (FedRAMP authorized)
|
|
142
|
+
|
|
143
|
+
### Cloud Infrastructure (KSI-CNA, KSI-SVC)
|
|
144
|
+
|
|
145
|
+
**Required Capabilities:**
|
|
146
|
+
- [ ] Network isolation/segmentation?
|
|
147
|
+
- [ ] Encryption at rest and in transit?
|
|
148
|
+
- [ ] Immutable infrastructure support?
|
|
149
|
+
- [ ] API-driven management?
|
|
150
|
+
- [ ] Compliance certifications?
|
|
151
|
+
- [ ] Logging and monitoring built-in?
|
|
152
|
+
|
|
153
|
+
**FedRAMP 20x Specific:**
|
|
154
|
+
- [ ] Supports Infrastructure as Code? (KSI-MLA-05)
|
|
155
|
+
- [ ] Can restrict network traffic programmatically? (KSI-CNA-01)
|
|
156
|
+
- [ ] Provides high availability options? (KSI-CNA-06)
|
|
157
|
+
- [ ] Supports immutable deployments? (KSI-CNA-04)
|
|
158
|
+
|
|
159
|
+
**Questions to Ask:**
|
|
160
|
+
- What FedRAMP impact levels are authorized?
|
|
161
|
+
- Do you offer government-only regions?
|
|
162
|
+
- Can you provide dedicated infrastructure?
|
|
163
|
+
- What's your SLA and how is it measured?
|
|
164
|
+
- How do you handle data sovereignty?
|
|
165
|
+
|
|
166
|
+
**Top Vendors:**
|
|
167
|
+
- Azure Government (FedRAMP High, recommended for Azure workloads)
|
|
168
|
+
- Azure Commercial (FedRAMP High for many services)
|
|
169
|
+
- AWS GovCloud (FedRAMP High)
|
|
170
|
+
- Google Cloud (FedRAMP High)
|
|
171
|
+
|
|
172
|
+
### Backup & Disaster Recovery (KSI-RPL)
|
|
173
|
+
|
|
174
|
+
**Required Capabilities:**
|
|
175
|
+
- [ ] Automated backups?
|
|
176
|
+
- [ ] Point-in-time recovery?
|
|
177
|
+
- [ ] Encrypted backups?
|
|
178
|
+
- [ ] Off-site/geo-redundant storage?
|
|
179
|
+
- [ ] Regular restore testing?
|
|
180
|
+
- [ ] Documented RTO/RPO?
|
|
181
|
+
|
|
182
|
+
**FedRAMP 20x Specific:**
|
|
183
|
+
- [ ] Can meet your recovery objectives? (KSI-RPL-01)
|
|
184
|
+
- [ ] Supports automated recovery testing? (KSI-RPL-04)
|
|
185
|
+
- [ ] Provides backup success metrics for KSI tracking?
|
|
186
|
+
|
|
187
|
+
**Questions to Ask:**
|
|
188
|
+
- What's your guaranteed RTO and RPO?
|
|
189
|
+
- How often are backups tested?
|
|
190
|
+
- Can we perform test restores on-demand?
|
|
191
|
+
- Where are backups stored geographically?
|
|
192
|
+
- What's the retention period?
|
|
193
|
+
|
|
194
|
+
**Top Vendors:**
|
|
195
|
+
- Azure Backup (FedRAMP authorized, Azure-native)
|
|
196
|
+
- Azure Site Recovery (FedRAMP authorized, for DR)
|
|
197
|
+
- Veeam (FedRAMP authorized)
|
|
198
|
+
- Druva (FedRAMP authorized)
|
|
199
|
+
|
|
200
|
+
### CI/CD & DevOps Tools (KSI-CMT)
|
|
201
|
+
|
|
202
|
+
**Required Capabilities:**
|
|
203
|
+
- [ ] Security scanning in pipeline?
|
|
204
|
+
- [ ] Automated testing support?
|
|
205
|
+
- [ ] Audit logs of all deployments?
|
|
206
|
+
- [ ] Rollback capabilities?
|
|
207
|
+
- [ ] Integration with secrets management?
|
|
208
|
+
- [ ] Infrastructure as Code support?
|
|
209
|
+
|
|
210
|
+
**FedRAMP 20x Specific:**
|
|
211
|
+
- [ ] Can log all changes for tracking? (KSI-CMT-01)
|
|
212
|
+
- [ ] Supports automated testing? (KSI-CMT-03)
|
|
213
|
+
- [ ] Can provide deployment metrics for KSI tracking?
|
|
214
|
+
- [ ] Integrates with change notification system (FRR-SCN)?
|
|
215
|
+
|
|
216
|
+
**Questions to Ask:**
|
|
217
|
+
- Can you block deployments based on security findings?
|
|
218
|
+
- How do you handle secrets in CI/CD?
|
|
219
|
+
- What's your audit log retention?
|
|
220
|
+
- Can you integrate with our SIEM?
|
|
221
|
+
- Do you support deployment approvals?
|
|
222
|
+
|
|
223
|
+
**Top Vendors:**
|
|
224
|
+
- Azure DevOps (FedRAMP authorized, Azure-native)
|
|
225
|
+
- GitHub Actions (with FedRAMP-authorized runners, Microsoft-owned)
|
|
226
|
+
- GitLab (FedRAMP authorized)
|
|
227
|
+
- Jenkins (self-hosted)
|
|
228
|
+
|
|
229
|
+
## Third-Party Service Provider Evaluation
|
|
230
|
+
|
|
231
|
+
### Supply Chain Risk (KSI-PIY-07, KSI-TPR-04)
|
|
232
|
+
|
|
233
|
+
**Due Diligence Questions:**
|
|
234
|
+
1. Security Posture
|
|
235
|
+
- [ ] Do you have SOC 2 Type II certification?
|
|
236
|
+
- [ ] Are you FedRAMP authorized?
|
|
237
|
+
- [ ] Do you have ISO 27001 certification?
|
|
238
|
+
- [ ] When was your last security assessment?
|
|
239
|
+
|
|
240
|
+
2. Incident Response
|
|
241
|
+
- [ ] What's your incident notification timeframe?
|
|
242
|
+
- [ ] Have you had breaches in the last 3 years?
|
|
243
|
+
- [ ] Can you provide incident response reports?
|
|
244
|
+
|
|
245
|
+
3. Data Protection
|
|
246
|
+
- [ ] How do you protect Federal Customer Data?
|
|
247
|
+
- [ ] What encryption do you use?
|
|
248
|
+
- [ ] Who has access to our data?
|
|
249
|
+
- [ ] Can you segregate our data from other customers?
|
|
250
|
+
|
|
251
|
+
4. Monitoring & Logging
|
|
252
|
+
- [ ] Can you provide logs of access to our data?
|
|
253
|
+
- [ ] How long do you retain logs?
|
|
254
|
+
- [ ] Can we access logs via API?
|
|
255
|
+
|
|
256
|
+
5. Business Continuity
|
|
257
|
+
- [ ] What's your uptime SLA?
|
|
258
|
+
- [ ] What's your disaster recovery plan?
|
|
259
|
+
- [ ] Have you tested recovery procedures?
|
|
260
|
+
|
|
261
|
+
6. Vendor Management
|
|
262
|
+
- [ ] Do you use fourth-party vendors?
|
|
263
|
+
- [ ] How do you manage supply chain risk?
|
|
264
|
+
- [ ] Can you provide a list of subprocessors?
|
|
265
|
+
|
|
266
|
+
## Evaluation Scorecard Template
|
|
267
|
+
|
|
268
|
+
```
|
|
269
|
+
Vendor Name: __________________
|
|
270
|
+
Product/Service: __________________
|
|
271
|
+
Date: __________________
|
|
272
|
+
|
|
273
|
+
Category: [SIEM | Vulnerability | IAM | Secrets | Cloud | Backup | CI/CD | Other]
|
|
274
|
+
|
|
275
|
+
Scoring: 0=No, 1=Partial, 2=Yes, N/A=Not Applicable
|
|
276
|
+
|
|
277
|
+
FedRAMP Readiness:
|
|
278
|
+
[ ] FedRAMP authorized (2)
|
|
279
|
+
[ ] FedRAMP ready (1)
|
|
280
|
+
[ ] In process (1)
|
|
281
|
+
[ ] No plans (0)
|
|
282
|
+
|
|
283
|
+
Technical Capabilities:
|
|
284
|
+
[ ] Meets functional requirements (0-2)
|
|
285
|
+
[ ] API access for automation (0-2)
|
|
286
|
+
[ ] Integration capabilities (0-2)
|
|
287
|
+
[ ] Scalability (0-2)
|
|
288
|
+
|
|
289
|
+
FedRAMP 20x Alignment:
|
|
290
|
+
[ ] KSI data collection (0-2)
|
|
291
|
+
[ ] Authorization Data Sharing API compatible (0-2)
|
|
292
|
+
[ ] Continuous monitoring support (0-2)
|
|
293
|
+
[ ] OSCAL format support (0-2)
|
|
294
|
+
|
|
295
|
+
Security:
|
|
296
|
+
[ ] Encryption at rest/transit (0-2)
|
|
297
|
+
[ ] Audit logging (0-2)
|
|
298
|
+
[ ] Access controls (0-2)
|
|
299
|
+
[ ] Incident response (0-2)
|
|
300
|
+
|
|
301
|
+
Operational:
|
|
302
|
+
[ ] SLA meets requirements (0-2)
|
|
303
|
+
[ ] Support quality (0-2)
|
|
304
|
+
[ ] Pricing (0-2)
|
|
305
|
+
[ ] Customer references (0-2)
|
|
306
|
+
|
|
307
|
+
Total Score: _____ / 40
|
|
308
|
+
|
|
309
|
+
Decision:
|
|
310
|
+
[ ] Approved
|
|
311
|
+
[ ] Approved with conditions
|
|
312
|
+
[ ] Needs more evaluation
|
|
313
|
+
[ ] Rejected
|
|
314
|
+
|
|
315
|
+
Notes:
|
|
316
|
+
```
|
|
317
|
+
|
|
318
|
+
## Red Flags
|
|
319
|
+
|
|
320
|
+
⚠ **Do not select vendor if:**
|
|
321
|
+
- Not FedRAMP authorized and no path to authorization
|
|
322
|
+
- Stores data outside US (unless approved exception)
|
|
323
|
+
- Cannot provide audit logs
|
|
324
|
+
- No API access for automation
|
|
325
|
+
- Poor incident response history
|
|
326
|
+
- Cannot support required SLAs
|
|
327
|
+
- Unwilling to sign BAA (if handling PHI)
|
|
328
|
+
- Cannot isolate federal customer data
|
|
329
|
+
|
|
330
|
+
## Best Practices
|
|
331
|
+
|
|
332
|
+
✅ **Do:**
|
|
333
|
+
- Prefer FedRAMP-authorized vendors
|
|
334
|
+
- Get everything in writing (SLAs, data handling, security)
|
|
335
|
+
- Test integrations before committing
|
|
336
|
+
- Validate API capabilities hands-on
|
|
337
|
+
- Check customer references
|
|
338
|
+
- Include FedRAMP 20x requirements in RFP
|
|
339
|
+
- Plan for vendor exit (data export, deletion)
|
|
340
|
+
|
|
341
|
+
❌ **Don't:**
|
|
342
|
+
- Assume FedRAMP Rev 5 authorization covers 20x needs
|
|
343
|
+
- Select based on price alone
|
|
344
|
+
- Skip technical validation
|
|
345
|
+
- Forget to include in authorization boundary
|
|
346
|
+
- Ignore integration complexity
|
|
347
|
+
- Overlook hidden costs (support, training, scaling)
|
|
348
|
+
|
|
349
|
+
Use search_requirements to find specific requirements for vendor evaluation areas.
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
I'll help you understand FedRAMP vulnerability remediation timeframes.
|
|
2
|
+
|
|
3
|
+
**Vulnerability Detection & Response (VDR) Timeframes**:
|
|
4
|
+
|
|
5
|
+
**Question 1**: What is your FedRAMP authorization impact level?
|
|
6
|
+
- Low Impact
|
|
7
|
+
- Moderate Impact
|
|
8
|
+
- High Impact
|
|
9
|
+
|
|
10
|
+
**Question 2**: What is the vulnerability severity?
|
|
11
|
+
- Critical
|
|
12
|
+
- High
|
|
13
|
+
- Moderate
|
|
14
|
+
- Low
|
|
15
|
+
|
|
16
|
+
**FedRAMP VDR Timeframe Requirements**:
|
|
17
|
+
|
|
18
|
+
The remediation timeline depends on both your authorization impact level and the vulnerability severity.
|
|
19
|
+
|
|
20
|
+
**For Low Impact Systems**:
|
|
21
|
+
- Critical vulnerabilities: [Review FRR-VDR requirements]
|
|
22
|
+
- High vulnerabilities: [Review FRR-VDR requirements]
|
|
23
|
+
- Moderate/Low vulnerabilities: [Review FRR-VDR requirements]
|
|
24
|
+
|
|
25
|
+
**For Moderate Impact Systems**:
|
|
26
|
+
- Critical vulnerabilities: [Stricter timeframes]
|
|
27
|
+
- High vulnerabilities: [Review FRR-VDR requirements]
|
|
28
|
+
- Moderate/Low vulnerabilities: [Review FRR-VDR requirements]
|
|
29
|
+
|
|
30
|
+
**For High Impact Systems**:
|
|
31
|
+
- Critical vulnerabilities: [Strictest timeframes]
|
|
32
|
+
- High vulnerabilities: [Stricter requirements]
|
|
33
|
+
- Moderate/Low vulnerabilities: [Review FRR-VDR requirements]
|
|
34
|
+
|
|
35
|
+
**Important Considerations**:
|
|
36
|
+
1. **Exceptions**: Limited exceptions may apply (documented in VDR)
|
|
37
|
+
2. **Reporting**: Vulnerabilities must be reported through proper channels
|
|
38
|
+
3. **Agency Requirements**: Specific agencies may have stricter requirements
|
|
39
|
+
4. **Compensating Controls**: May be required while remediation is in progress
|
|
40
|
+
|
|
41
|
+
**Next Steps**:
|
|
42
|
+
1. Use search_requirements with "vulnerability" to find all VDR requirements
|
|
43
|
+
2. Use list_family_controls with "FRR" to see all VDR-related requirements
|
|
44
|
+
3. Review timeframe-specific requirements for your impact level
|
|
45
|
+
4. Document your vulnerability management and remediation procedures
|
|
@@ -0,0 +1,270 @@
|
|
|
1
|
+
"""
|
|
2
|
+
FedRAMP 20x MCP Server
|
|
3
|
+
|
|
4
|
+
This module implements an MCP server that provides access to FedRAMP 20x
|
|
5
|
+
security requirements and controls.
|
|
6
|
+
"""
|
|
7
|
+
|
|
8
|
+
import asyncio
|
|
9
|
+
import csv
|
|
10
|
+
import json
|
|
11
|
+
import logging
|
|
12
|
+
import os
|
|
13
|
+
import sys
|
|
14
|
+
from datetime import datetime
|
|
15
|
+
from pathlib import Path
|
|
16
|
+
from typing import Any, Optional
|
|
17
|
+
|
|
18
|
+
from mcp.server.fastmcp import FastMCP
|
|
19
|
+
|
|
20
|
+
from .data_loader import get_data_loader
|
|
21
|
+
from .templates import get_infrastructure_template, get_code_template
|
|
22
|
+
from .tools import register_tools
|
|
23
|
+
|
|
24
|
+
# Configure logging to stderr only (MCP requirement)
|
|
25
|
+
logging.basicConfig(
|
|
26
|
+
level=logging.INFO,
|
|
27
|
+
format="%(asctime)s - %(name)s - %(levelname)s - %(message)s",
|
|
28
|
+
stream=sys.stderr,
|
|
29
|
+
)
|
|
30
|
+
|
|
31
|
+
logger = logging.getLogger(__name__)
|
|
32
|
+
|
|
33
|
+
# Initialize FastMCP server
|
|
34
|
+
mcp = FastMCP("FedRAMP 20x Requirements Server")
|
|
35
|
+
|
|
36
|
+
# Initialize data loader
|
|
37
|
+
data_loader = get_data_loader()
|
|
38
|
+
|
|
39
|
+
# Register all tools
|
|
40
|
+
register_tools(mcp, data_loader)
|
|
41
|
+
|
|
42
|
+
|
|
43
|
+
# Add prompts for common compliance workflows
|
|
44
|
+
@mcp.prompt()
|
|
45
|
+
async def gap_analysis() -> str:
|
|
46
|
+
"""
|
|
47
|
+
Guide a FedRAMP gap analysis by helping identify which requirements apply
|
|
48
|
+
to your system and what evidence you need to provide.
|
|
49
|
+
|
|
50
|
+
Use this prompt to:
|
|
51
|
+
- Understand which FedRAMP requirements are relevant to your authorization level
|
|
52
|
+
- Identify Key Security Indicators (KSI) you need to track
|
|
53
|
+
- Determine what evidence and documentation is needed
|
|
54
|
+
"""
|
|
55
|
+
from .prompts import load_prompt
|
|
56
|
+
return load_prompt('gap_analysis')
|
|
57
|
+
|
|
58
|
+
|
|
59
|
+
@mcp.prompt()
|
|
60
|
+
async def ato_package_checklist() -> str:
|
|
61
|
+
"""
|
|
62
|
+
Generate a comprehensive checklist for preparing your FedRAMP Authorization
|
|
63
|
+
to Operate (ATO) package based on FedRAMP 20x requirements.
|
|
64
|
+
|
|
65
|
+
Use this prompt to:
|
|
66
|
+
- Ensure all required documentation is included
|
|
67
|
+
- Verify compliance with all applicable standards
|
|
68
|
+
- Prepare for assessment and authorization
|
|
69
|
+
"""
|
|
70
|
+
from .prompts import load_prompt
|
|
71
|
+
return load_prompt('ato_package_checklist')
|
|
72
|
+
|
|
73
|
+
|
|
74
|
+
@mcp.prompt()
|
|
75
|
+
async def significant_change_assessment() -> str:
|
|
76
|
+
"""
|
|
77
|
+
Assess whether a planned change to your cloud service offering requires
|
|
78
|
+
FedRAMP notification and help determine the change classification.
|
|
79
|
+
|
|
80
|
+
Use this prompt to:
|
|
81
|
+
- Determine if your change is routine, adaptive, or transformative
|
|
82
|
+
- Understand notification requirements
|
|
83
|
+
- Prepare change documentation
|
|
84
|
+
"""
|
|
85
|
+
from .prompts import load_prompt
|
|
86
|
+
return load_prompt('significant_change_assessment')
|
|
87
|
+
|
|
88
|
+
|
|
89
|
+
@mcp.prompt()
|
|
90
|
+
async def vulnerability_remediation_timeline() -> str:
|
|
91
|
+
"""
|
|
92
|
+
Determine the required remediation timeframes for vulnerabilities based on
|
|
93
|
+
severity and FedRAMP impact level.
|
|
94
|
+
|
|
95
|
+
Use this prompt to:
|
|
96
|
+
- Understand VDR timeframe requirements
|
|
97
|
+
- Plan vulnerability remediation
|
|
98
|
+
- Ensure compliance with FedRAMP deadlines
|
|
99
|
+
"""
|
|
100
|
+
from .prompts import load_prompt
|
|
101
|
+
return load_prompt('vulnerability_remediation_timeline')
|
|
102
|
+
|
|
103
|
+
|
|
104
|
+
@mcp.prompt()
|
|
105
|
+
async def continuous_monitoring_setup() -> str:
|
|
106
|
+
"""
|
|
107
|
+
Set up a FedRAMP-compliant continuous monitoring program with proper
|
|
108
|
+
reporting and assessment schedules.
|
|
109
|
+
|
|
110
|
+
Use this prompt to:
|
|
111
|
+
- Understand continuous monitoring requirements
|
|
112
|
+
- Set up reporting schedules
|
|
113
|
+
- Plan assessments and reviews
|
|
114
|
+
"""
|
|
115
|
+
from .prompts import load_prompt
|
|
116
|
+
return load_prompt('continuous_monitoring_setup')
|
|
117
|
+
|
|
118
|
+
|
|
119
|
+
@mcp.prompt()
|
|
120
|
+
async def authorization_boundary_review() -> str:
|
|
121
|
+
"""
|
|
122
|
+
Review and validate your FedRAMP authorization boundary to ensure all
|
|
123
|
+
required information resources are included.
|
|
124
|
+
|
|
125
|
+
Use this prompt to:
|
|
126
|
+
- Verify authorization boundary completeness
|
|
127
|
+
- Identify missing components
|
|
128
|
+
- Ensure MAS compliance
|
|
129
|
+
"""
|
|
130
|
+
from .prompts import load_prompt
|
|
131
|
+
return load_prompt('authorization_boundary_review')
|
|
132
|
+
|
|
133
|
+
|
|
134
|
+
@mcp.prompt()
|
|
135
|
+
async def initial_assessment_roadmap() -> str:
|
|
136
|
+
"""
|
|
137
|
+
Step-by-step guide for organizations starting FedRAMP 20x authorization from scratch.
|
|
138
|
+
|
|
139
|
+
Use this prompt to:
|
|
140
|
+
- Understand the complete FedRAMP 20x authorization process
|
|
141
|
+
- Get a phased implementation roadmap
|
|
142
|
+
- Identify key milestones and dependencies
|
|
143
|
+
"""
|
|
144
|
+
from .prompts import load_prompt
|
|
145
|
+
return load_prompt('initial_assessment_roadmap')
|
|
146
|
+
|
|
147
|
+
|
|
148
|
+
@mcp.prompt()
|
|
149
|
+
async def quarterly_review_checklist() -> str:
|
|
150
|
+
"""
|
|
151
|
+
Structured checklist for FedRAMP 20x Collaborative Continuous Monitoring quarterly reviews.
|
|
152
|
+
|
|
153
|
+
Use this prompt to:
|
|
154
|
+
- Conduct quarterly reviews per FRR-CCM-QR requirements
|
|
155
|
+
- Ensure all required activities are completed
|
|
156
|
+
- Prepare quarterly deliverables
|
|
157
|
+
"""
|
|
158
|
+
from .prompts import load_prompt
|
|
159
|
+
return load_prompt('quarterly_review_checklist')
|
|
160
|
+
|
|
161
|
+
|
|
162
|
+
@mcp.prompt()
|
|
163
|
+
async def api_design_guide() -> str:
|
|
164
|
+
"""
|
|
165
|
+
Guide for designing your Authorization Data Sharing API per FRR-ADS requirements.
|
|
166
|
+
|
|
167
|
+
Use this prompt to:
|
|
168
|
+
- Design compliant data sharing APIs
|
|
169
|
+
- Implement OSCAL format support
|
|
170
|
+
- Set up proper authentication and authorization
|
|
171
|
+
"""
|
|
172
|
+
from .prompts import load_prompt
|
|
173
|
+
return load_prompt('api_design_guide')
|
|
174
|
+
|
|
175
|
+
|
|
176
|
+
@mcp.prompt()
|
|
177
|
+
async def ksi_implementation_priorities() -> str:
|
|
178
|
+
"""
|
|
179
|
+
Help prioritize which Key Security Indicators to implement first based on impact and dependencies.
|
|
180
|
+
|
|
181
|
+
Use this prompt to:
|
|
182
|
+
- Understand KSI implementation order
|
|
183
|
+
- Identify quick wins vs. long-term investments
|
|
184
|
+
- Plan phased KSI rollout
|
|
185
|
+
"""
|
|
186
|
+
from .prompts import load_prompt
|
|
187
|
+
return load_prompt('ksi_implementation_priorities')
|
|
188
|
+
|
|
189
|
+
|
|
190
|
+
@mcp.prompt()
|
|
191
|
+
async def vendor_evaluation() -> str:
|
|
192
|
+
"""
|
|
193
|
+
Questions to ask vendors and tools to ensure FedRAMP 20x compatibility.
|
|
194
|
+
|
|
195
|
+
Use this prompt to:
|
|
196
|
+
- Evaluate security tools for FedRAMP 20x compliance
|
|
197
|
+
- Assess third-party service providers
|
|
198
|
+
- Identify gaps in vendor capabilities
|
|
199
|
+
"""
|
|
200
|
+
from .prompts import load_prompt
|
|
201
|
+
return load_prompt('vendor_evaluation')
|
|
202
|
+
|
|
203
|
+
|
|
204
|
+
@mcp.prompt()
|
|
205
|
+
async def documentation_generator() -> str:
|
|
206
|
+
"""
|
|
207
|
+
Generate OSCAL/documentation templates based on FedRAMP 20x requirements.
|
|
208
|
+
|
|
209
|
+
Use this prompt to:
|
|
210
|
+
- Create documentation structure for ATO package
|
|
211
|
+
- Generate OSCAL format templates
|
|
212
|
+
- Understand required documentation sections
|
|
213
|
+
"""
|
|
214
|
+
from .prompts import load_prompt
|
|
215
|
+
return load_prompt('documentation_generator')
|
|
216
|
+
|
|
217
|
+
|
|
218
|
+
@mcp.prompt()
|
|
219
|
+
async def migration_from_rev5() -> str:
|
|
220
|
+
"""
|
|
221
|
+
Detailed migration plan from FedRAMP Rev 5 to FedRAMP 20x.
|
|
222
|
+
|
|
223
|
+
Use this prompt to:
|
|
224
|
+
- Understand what changes between Rev 5 and 20x
|
|
225
|
+
- Create a transition plan for existing authorizations
|
|
226
|
+
- Identify gaps in current implementation
|
|
227
|
+
"""
|
|
228
|
+
from .prompts import load_prompt
|
|
229
|
+
return load_prompt('migration_from_rev5')
|
|
230
|
+
|
|
231
|
+
|
|
232
|
+
@mcp.prompt()
|
|
233
|
+
async def azure_ksi_automation() -> str:
|
|
234
|
+
"""
|
|
235
|
+
Comprehensive guide for implementing FedRAMP 20x KSI automation using Microsoft, Azure, and M365 capabilities.
|
|
236
|
+
|
|
237
|
+
Use this prompt to:
|
|
238
|
+
- Map each KSI to specific Microsoft/Azure/M365 services
|
|
239
|
+
- Automate evidence collection for all 72 KSIs
|
|
240
|
+
- Integrate with Microsoft security stack
|
|
241
|
+
- Build automation using PowerShell, Azure CLI, and Graph API
|
|
242
|
+
"""
|
|
243
|
+
from .prompts import load_prompt
|
|
244
|
+
return load_prompt('azure_ksi_automation')
|
|
245
|
+
|
|
246
|
+
|
|
247
|
+
@mcp.prompt()
|
|
248
|
+
async def audit_preparation() -> str:
|
|
249
|
+
"""
|
|
250
|
+
Comprehensive guide for preparing for FedRAMP 20x assessment and audit.
|
|
251
|
+
|
|
252
|
+
Use this prompt to:
|
|
253
|
+
- Prepare for 3PAO assessment
|
|
254
|
+
- Organize evidence and documentation
|
|
255
|
+
- Understand common audit findings
|
|
256
|
+
- Create testing procedures
|
|
257
|
+
"""
|
|
258
|
+
from .prompts import load_prompt
|
|
259
|
+
return load_prompt('audit_preparation')
|
|
260
|
+
|
|
261
|
+
|
|
262
|
+
|
|
263
|
+
def main():
|
|
264
|
+
"""Run the FedRAMP 20x MCP server."""
|
|
265
|
+
logger.info("Starting FedRAMP 20x MCP Server")
|
|
266
|
+
mcp.run(transport="stdio")
|
|
267
|
+
|
|
268
|
+
|
|
269
|
+
if __name__ == "__main__":
|
|
270
|
+
main()
|