fedramp-20x-mcp 0.4.8__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. fedramp_20x_mcp/__init__.py +14 -0
  2. fedramp_20x_mcp/__main__.py +12 -0
  3. fedramp_20x_mcp/data_loader.py +673 -0
  4. fedramp_20x_mcp/prompts/__init__.py +62 -0
  5. fedramp_20x_mcp/prompts/api_design_guide.txt +432 -0
  6. fedramp_20x_mcp/prompts/ato_package_checklist.txt +75 -0
  7. fedramp_20x_mcp/prompts/audit_preparation.txt +592 -0
  8. fedramp_20x_mcp/prompts/authorization_boundary_review.txt +76 -0
  9. fedramp_20x_mcp/prompts/azure_ksi_automation.txt +997 -0
  10. fedramp_20x_mcp/prompts/continuous_monitoring_setup.txt +61 -0
  11. fedramp_20x_mcp/prompts/documentation_generator.txt +499 -0
  12. fedramp_20x_mcp/prompts/gap_analysis.txt +25 -0
  13. fedramp_20x_mcp/prompts/initial_assessment_roadmap.txt +202 -0
  14. fedramp_20x_mcp/prompts/ksi_implementation_priorities.txt +283 -0
  15. fedramp_20x_mcp/prompts/migration_from_rev5.txt +440 -0
  16. fedramp_20x_mcp/prompts/quarterly_review_checklist.txt +231 -0
  17. fedramp_20x_mcp/prompts/significant_change_assessment.txt +50 -0
  18. fedramp_20x_mcp/prompts/vendor_evaluation.txt +349 -0
  19. fedramp_20x_mcp/prompts/vulnerability_remediation_timeline.txt +45 -0
  20. fedramp_20x_mcp/server.py +270 -0
  21. fedramp_20x_mcp/templates/__init__.py +75 -0
  22. fedramp_20x_mcp/templates/bicep/afr.txt +33 -0
  23. fedramp_20x_mcp/templates/bicep/cna.txt +48 -0
  24. fedramp_20x_mcp/templates/bicep/generic.txt +47 -0
  25. fedramp_20x_mcp/templates/bicep/iam.txt +211 -0
  26. fedramp_20x_mcp/templates/bicep/mla.txt +82 -0
  27. fedramp_20x_mcp/templates/bicep/rpl.txt +44 -0
  28. fedramp_20x_mcp/templates/bicep/svc.txt +54 -0
  29. fedramp_20x_mcp/templates/code/generic_csharp.txt +65 -0
  30. fedramp_20x_mcp/templates/code/generic_powershell.txt +65 -0
  31. fedramp_20x_mcp/templates/code/generic_python.txt +63 -0
  32. fedramp_20x_mcp/templates/code/iam_csharp.txt +150 -0
  33. fedramp_20x_mcp/templates/code/iam_powershell.txt +162 -0
  34. fedramp_20x_mcp/templates/code/iam_python.txt +224 -0
  35. fedramp_20x_mcp/templates/code/mla_python.txt +124 -0
  36. fedramp_20x_mcp/templates/terraform/afr.txt +29 -0
  37. fedramp_20x_mcp/templates/terraform/cna.txt +50 -0
  38. fedramp_20x_mcp/templates/terraform/generic.txt +40 -0
  39. fedramp_20x_mcp/templates/terraform/iam.txt +219 -0
  40. fedramp_20x_mcp/templates/terraform/mla.txt +29 -0
  41. fedramp_20x_mcp/templates/terraform/rpl.txt +32 -0
  42. fedramp_20x_mcp/templates/terraform/svc.txt +46 -0
  43. fedramp_20x_mcp/tools/__init__.py +167 -0
  44. fedramp_20x_mcp/tools/definitions.py +154 -0
  45. fedramp_20x_mcp/tools/documentation.py +155 -0
  46. fedramp_20x_mcp/tools/enhancements.py +2256 -0
  47. fedramp_20x_mcp/tools/evidence.py +701 -0
  48. fedramp_20x_mcp/tools/export.py +753 -0
  49. fedramp_20x_mcp/tools/ksi.py +90 -0
  50. fedramp_20x_mcp/tools/requirements.py +163 -0
  51. fedramp_20x_mcp-0.4.8.dist-info/METADATA +877 -0
  52. fedramp_20x_mcp-0.4.8.dist-info/RECORD +55 -0
  53. fedramp_20x_mcp-0.4.8.dist-info/WHEEL +4 -0
  54. fedramp_20x_mcp-0.4.8.dist-info/entry_points.txt +2 -0
  55. fedramp_20x_mcp-0.4.8.dist-info/licenses/LICENSE +27 -0
@@ -0,0 +1,349 @@
1
+ I'll help you evaluate vendors and tools for FedRAMP 20x compatibility.
2
+
3
+ # Vendor/Tool Evaluation Guide for FedRAMP 20x
4
+
5
+ ## General Vendor Questions
6
+
7
+ ### FedRAMP Awareness
8
+ 1. Is your product/service FedRAMP authorized?
9
+ - If yes, at what impact level? (Low/Moderate/High)
10
+ - What's your FedRAMP authorization date?
11
+ - Are you familiar with FedRAMP 20x changes from Rev 5?
12
+
13
+ 2. Do you have customers who use your product for FedRAMP compliance?
14
+ - Can you provide references?
15
+ - What FedRAMP 20x standards do they use your product for?
16
+
17
+ ### Data Handling
18
+ 3. Does your service handle Federal Customer Data?
19
+ - Where is data stored geographically?
20
+ - Is data encrypted at rest and in transit?
21
+ - Can you provide data residency guarantees?
22
+
23
+ 4. What is your data retention and deletion policy?
24
+ - Can you delete data on demand? (KSI-SVC-10)
25
+ - Do you provide certificates of destruction?
26
+
27
+ ## Category-Specific Questions
28
+
29
+ ### SIEM / Security Monitoring Tools (KSI-MLA-01)
30
+
31
+ **Required Capabilities:**
32
+ - [ ] Can ingest logs from all our sources (cloud, on-prem, containers)?
33
+ - [ ] Supports structured logging (JSON)?
34
+ - [ ] Can retain logs for 1+ years?
35
+ - [ ] Provides API access to log data?
36
+ - [ ] Supports automated alerting?
37
+ - [ ] Can generate compliance reports?
38
+ - [ ] OSCAL format support or export capability?
39
+
40
+ **FedRAMP 20x Specific:**
41
+ - [ ] Can track all 72 KSI metrics?
42
+ - [ ] Can provide data for Authorization Data Sharing API (FRR-ADS)?
43
+ - [ ] Supports continuous monitoring (FRR-CCM)?
44
+ - [ ] Can generate quarterly review reports?
45
+
46
+ **Questions to Ask:**
47
+ - What's your typical log ingestion rate capability?
48
+ - Do you offer government regions/dedicated instances?
49
+ - Can you integrate with our Authorization Data Sharing API?
50
+ - What's your SLA for log availability?
51
+
52
+ **Top Vendors:**
53
+ - Microsoft Sentinel (FedRAMP authorized, Azure-native)
54
+ - Splunk Cloud (FedRAMP authorized)
55
+ - Datadog (FedRAMP authorized)
56
+ - Sumo Logic (FedRAMP authorized)
57
+
58
+ ### Vulnerability Scanning Tools (FRR-VDR, KSI-AFR-04)
59
+
60
+ **Required Capabilities:**
61
+ - [ ] Continuous/automated scanning?
62
+ - [ ] Covers infrastructure, containers, and code?
63
+ - [ ] Provides CVSS scores and remediation guidance?
64
+ - [ ] Can scan on-demand and scheduled?
65
+ - [ ] API access to vulnerability data?
66
+ - [ ] Integrates with ticketing systems?
67
+ - [ ] Supports exception management (FRR-VDR-EX)?
68
+
69
+ **FedRAMP 20x Specific:**
70
+ - [ ] Can track remediation timeframes by severity (FRR-VDR-TF)?
71
+ - [ ] Provides data for Authorization Data Sharing API?
72
+ - [ ] Supports agency-specific vulnerability reporting (FRR-VDR-RP)?
73
+
74
+ **Questions to Ask:**
75
+ - How often can we scan without impacting performance?
76
+ - Do you support scanning ephemeral containers?
77
+ - Can you scan during CI/CD pipeline?
78
+ - What's the false positive rate?
79
+ - How do you handle zero-day vulnerabilities?
80
+
81
+ **Top Vendors:**
82
+ - Microsoft Defender for Cloud (FedRAMP authorized, Azure-native)
83
+ - Tenable.io (FedRAMP authorized)
84
+ - Qualys (FedRAMP authorized)
85
+ - Snyk (code and container scanning)
86
+ - Trivy (open source, container scanning)
87
+
88
+ ### Identity & Access Management (KSI-IAM)
89
+
90
+ **Required Capabilities:**
91
+ - [ ] Phishing-resistant MFA (FIDO2/WebAuthn)? (KSI-IAM-01)
92
+ - [ ] Supports passwordless authentication? (KSI-IAM-02)
93
+ - [ ] Provides detailed audit logs? (KSI-MLA-02)
94
+ - [ ] Supports conditional access policies?
95
+ - [ ] Can integrate with all your applications?
96
+ - [ ] API access for user management?
97
+
98
+ **FedRAMP 20x Specific:**
99
+ - [ ] Can enforce least privilege? (KSI-IAM-05)
100
+ - [ ] Detects suspicious activity? (KSI-IAM-06)
101
+ - [ ] Supports just-in-time access? (KSI-IAM-04)
102
+ - [ ] Can provide MFA compliance data for KSI tracking?
103
+
104
+ **Questions to Ask:**
105
+ - What MFA methods do you support? (must include FIDO2)
106
+ - Can you disable SMS/TOTP for privileged accounts?
107
+ - How do you handle service account authentication?
108
+ - What's your session timeout capability?
109
+ - Can you export IAM events to our SIEM?
110
+
111
+ **Top Vendors:**
112
+ - Microsoft Entra ID (formerly Azure AD, FedRAMP authorized, Azure-native)
113
+ - Okta (FedRAMP authorized)
114
+ - Ping Identity (FedRAMP authorized)
115
+
116
+ ### Secret Management (KSI-SVC-06)
117
+
118
+ **Required Capabilities:**
119
+ - [ ] Encrypted storage of secrets?
120
+ - [ ] Automatic secret rotation?
121
+ - [ ] Access audit logs?
122
+ - [ ] API access for applications?
123
+ - [ ] Integration with CI/CD pipelines?
124
+ - [ ] Emergency access procedures?
125
+
126
+ **FedRAMP 20x Specific:**
127
+ - [ ] Can provide secret access logs to SIEM?
128
+ - [ ] Supports automated secret rotation?
129
+ - [ ] Can track secret usage for KSI metrics?
130
+
131
+ **Questions to Ask:**
132
+ - How are secrets encrypted (algorithm, key management)?
133
+ - Do you support dynamic secrets?
134
+ - Can you integrate with our cloud provider's KMS?
135
+ - What happens if your service is unavailable?
136
+ - Can secrets be backed up securely?
137
+
138
+ **Top Vendors:**
139
+ - Azure Key Vault (FedRAMP authorized, Azure-native)
140
+ - HashiCorp Vault (FedRAMP authorized)
141
+ - CyberArk (FedRAMP authorized)
142
+
143
+ ### Cloud Infrastructure (KSI-CNA, KSI-SVC)
144
+
145
+ **Required Capabilities:**
146
+ - [ ] Network isolation/segmentation?
147
+ - [ ] Encryption at rest and in transit?
148
+ - [ ] Immutable infrastructure support?
149
+ - [ ] API-driven management?
150
+ - [ ] Compliance certifications?
151
+ - [ ] Logging and monitoring built-in?
152
+
153
+ **FedRAMP 20x Specific:**
154
+ - [ ] Supports Infrastructure as Code? (KSI-MLA-05)
155
+ - [ ] Can restrict network traffic programmatically? (KSI-CNA-01)
156
+ - [ ] Provides high availability options? (KSI-CNA-06)
157
+ - [ ] Supports immutable deployments? (KSI-CNA-04)
158
+
159
+ **Questions to Ask:**
160
+ - What FedRAMP impact levels are authorized?
161
+ - Do you offer government-only regions?
162
+ - Can you provide dedicated infrastructure?
163
+ - What's your SLA and how is it measured?
164
+ - How do you handle data sovereignty?
165
+
166
+ **Top Vendors:**
167
+ - Azure Government (FedRAMP High, recommended for Azure workloads)
168
+ - Azure Commercial (FedRAMP High for many services)
169
+ - AWS GovCloud (FedRAMP High)
170
+ - Google Cloud (FedRAMP High)
171
+
172
+ ### Backup & Disaster Recovery (KSI-RPL)
173
+
174
+ **Required Capabilities:**
175
+ - [ ] Automated backups?
176
+ - [ ] Point-in-time recovery?
177
+ - [ ] Encrypted backups?
178
+ - [ ] Off-site/geo-redundant storage?
179
+ - [ ] Regular restore testing?
180
+ - [ ] Documented RTO/RPO?
181
+
182
+ **FedRAMP 20x Specific:**
183
+ - [ ] Can meet your recovery objectives? (KSI-RPL-01)
184
+ - [ ] Supports automated recovery testing? (KSI-RPL-04)
185
+ - [ ] Provides backup success metrics for KSI tracking?
186
+
187
+ **Questions to Ask:**
188
+ - What's your guaranteed RTO and RPO?
189
+ - How often are backups tested?
190
+ - Can we perform test restores on-demand?
191
+ - Where are backups stored geographically?
192
+ - What's the retention period?
193
+
194
+ **Top Vendors:**
195
+ - Azure Backup (FedRAMP authorized, Azure-native)
196
+ - Azure Site Recovery (FedRAMP authorized, for DR)
197
+ - Veeam (FedRAMP authorized)
198
+ - Druva (FedRAMP authorized)
199
+
200
+ ### CI/CD & DevOps Tools (KSI-CMT)
201
+
202
+ **Required Capabilities:**
203
+ - [ ] Security scanning in pipeline?
204
+ - [ ] Automated testing support?
205
+ - [ ] Audit logs of all deployments?
206
+ - [ ] Rollback capabilities?
207
+ - [ ] Integration with secrets management?
208
+ - [ ] Infrastructure as Code support?
209
+
210
+ **FedRAMP 20x Specific:**
211
+ - [ ] Can log all changes for tracking? (KSI-CMT-01)
212
+ - [ ] Supports automated testing? (KSI-CMT-03)
213
+ - [ ] Can provide deployment metrics for KSI tracking?
214
+ - [ ] Integrates with change notification system (FRR-SCN)?
215
+
216
+ **Questions to Ask:**
217
+ - Can you block deployments based on security findings?
218
+ - How do you handle secrets in CI/CD?
219
+ - What's your audit log retention?
220
+ - Can you integrate with our SIEM?
221
+ - Do you support deployment approvals?
222
+
223
+ **Top Vendors:**
224
+ - Azure DevOps (FedRAMP authorized, Azure-native)
225
+ - GitHub Actions (with FedRAMP-authorized runners, Microsoft-owned)
226
+ - GitLab (FedRAMP authorized)
227
+ - Jenkins (self-hosted)
228
+
229
+ ## Third-Party Service Provider Evaluation
230
+
231
+ ### Supply Chain Risk (KSI-PIY-07, KSI-TPR-04)
232
+
233
+ **Due Diligence Questions:**
234
+ 1. Security Posture
235
+ - [ ] Do you have SOC 2 Type II certification?
236
+ - [ ] Are you FedRAMP authorized?
237
+ - [ ] Do you have ISO 27001 certification?
238
+ - [ ] When was your last security assessment?
239
+
240
+ 2. Incident Response
241
+ - [ ] What's your incident notification timeframe?
242
+ - [ ] Have you had breaches in the last 3 years?
243
+ - [ ] Can you provide incident response reports?
244
+
245
+ 3. Data Protection
246
+ - [ ] How do you protect Federal Customer Data?
247
+ - [ ] What encryption do you use?
248
+ - [ ] Who has access to our data?
249
+ - [ ] Can you segregate our data from other customers?
250
+
251
+ 4. Monitoring & Logging
252
+ - [ ] Can you provide logs of access to our data?
253
+ - [ ] How long do you retain logs?
254
+ - [ ] Can we access logs via API?
255
+
256
+ 5. Business Continuity
257
+ - [ ] What's your uptime SLA?
258
+ - [ ] What's your disaster recovery plan?
259
+ - [ ] Have you tested recovery procedures?
260
+
261
+ 6. Vendor Management
262
+ - [ ] Do you use fourth-party vendors?
263
+ - [ ] How do you manage supply chain risk?
264
+ - [ ] Can you provide a list of subprocessors?
265
+
266
+ ## Evaluation Scorecard Template
267
+
268
+ ```
269
+ Vendor Name: __________________
270
+ Product/Service: __________________
271
+ Date: __________________
272
+
273
+ Category: [SIEM | Vulnerability | IAM | Secrets | Cloud | Backup | CI/CD | Other]
274
+
275
+ Scoring: 0=No, 1=Partial, 2=Yes, N/A=Not Applicable
276
+
277
+ FedRAMP Readiness:
278
+ [ ] FedRAMP authorized (2)
279
+ [ ] FedRAMP ready (1)
280
+ [ ] In process (1)
281
+ [ ] No plans (0)
282
+
283
+ Technical Capabilities:
284
+ [ ] Meets functional requirements (0-2)
285
+ [ ] API access for automation (0-2)
286
+ [ ] Integration capabilities (0-2)
287
+ [ ] Scalability (0-2)
288
+
289
+ FedRAMP 20x Alignment:
290
+ [ ] KSI data collection (0-2)
291
+ [ ] Authorization Data Sharing API compatible (0-2)
292
+ [ ] Continuous monitoring support (0-2)
293
+ [ ] OSCAL format support (0-2)
294
+
295
+ Security:
296
+ [ ] Encryption at rest/transit (0-2)
297
+ [ ] Audit logging (0-2)
298
+ [ ] Access controls (0-2)
299
+ [ ] Incident response (0-2)
300
+
301
+ Operational:
302
+ [ ] SLA meets requirements (0-2)
303
+ [ ] Support quality (0-2)
304
+ [ ] Pricing (0-2)
305
+ [ ] Customer references (0-2)
306
+
307
+ Total Score: _____ / 40
308
+
309
+ Decision:
310
+ [ ] Approved
311
+ [ ] Approved with conditions
312
+ [ ] Needs more evaluation
313
+ [ ] Rejected
314
+
315
+ Notes:
316
+ ```
317
+
318
+ ## Red Flags
319
+
320
+ ⚠ **Do not select vendor if:**
321
+ - Not FedRAMP authorized and no path to authorization
322
+ - Stores data outside US (unless approved exception)
323
+ - Cannot provide audit logs
324
+ - No API access for automation
325
+ - Poor incident response history
326
+ - Cannot support required SLAs
327
+ - Unwilling to sign BAA (if handling PHI)
328
+ - Cannot isolate federal customer data
329
+
330
+ ## Best Practices
331
+
332
+ ✅ **Do:**
333
+ - Prefer FedRAMP-authorized vendors
334
+ - Get everything in writing (SLAs, data handling, security)
335
+ - Test integrations before committing
336
+ - Validate API capabilities hands-on
337
+ - Check customer references
338
+ - Include FedRAMP 20x requirements in RFP
339
+ - Plan for vendor exit (data export, deletion)
340
+
341
+ ❌ **Don't:**
342
+ - Assume FedRAMP Rev 5 authorization covers 20x needs
343
+ - Select based on price alone
344
+ - Skip technical validation
345
+ - Forget to include in authorization boundary
346
+ - Ignore integration complexity
347
+ - Overlook hidden costs (support, training, scaling)
348
+
349
+ Use search_requirements to find specific requirements for vendor evaluation areas.
@@ -0,0 +1,45 @@
1
+ I'll help you understand FedRAMP vulnerability remediation timeframes.
2
+
3
+ **Vulnerability Detection & Response (VDR) Timeframes**:
4
+
5
+ **Question 1**: What is your FedRAMP authorization impact level?
6
+ - Low Impact
7
+ - Moderate Impact
8
+ - High Impact
9
+
10
+ **Question 2**: What is the vulnerability severity?
11
+ - Critical
12
+ - High
13
+ - Moderate
14
+ - Low
15
+
16
+ **FedRAMP VDR Timeframe Requirements**:
17
+
18
+ The remediation timeline depends on both your authorization impact level and the vulnerability severity.
19
+
20
+ **For Low Impact Systems**:
21
+ - Critical vulnerabilities: [Review FRR-VDR requirements]
22
+ - High vulnerabilities: [Review FRR-VDR requirements]
23
+ - Moderate/Low vulnerabilities: [Review FRR-VDR requirements]
24
+
25
+ **For Moderate Impact Systems**:
26
+ - Critical vulnerabilities: [Stricter timeframes]
27
+ - High vulnerabilities: [Review FRR-VDR requirements]
28
+ - Moderate/Low vulnerabilities: [Review FRR-VDR requirements]
29
+
30
+ **For High Impact Systems**:
31
+ - Critical vulnerabilities: [Strictest timeframes]
32
+ - High vulnerabilities: [Stricter requirements]
33
+ - Moderate/Low vulnerabilities: [Review FRR-VDR requirements]
34
+
35
+ **Important Considerations**:
36
+ 1. **Exceptions**: Limited exceptions may apply (documented in VDR)
37
+ 2. **Reporting**: Vulnerabilities must be reported through proper channels
38
+ 3. **Agency Requirements**: Specific agencies may have stricter requirements
39
+ 4. **Compensating Controls**: May be required while remediation is in progress
40
+
41
+ **Next Steps**:
42
+ 1. Use search_requirements with "vulnerability" to find all VDR requirements
43
+ 2. Use list_family_controls with "FRR" to see all VDR-related requirements
44
+ 3. Review timeframe-specific requirements for your impact level
45
+ 4. Document your vulnerability management and remediation procedures
@@ -0,0 +1,270 @@
1
+ """
2
+ FedRAMP 20x MCP Server
3
+
4
+ This module implements an MCP server that provides access to FedRAMP 20x
5
+ security requirements and controls.
6
+ """
7
+
8
+ import asyncio
9
+ import csv
10
+ import json
11
+ import logging
12
+ import os
13
+ import sys
14
+ from datetime import datetime
15
+ from pathlib import Path
16
+ from typing import Any, Optional
17
+
18
+ from mcp.server.fastmcp import FastMCP
19
+
20
+ from .data_loader import get_data_loader
21
+ from .templates import get_infrastructure_template, get_code_template
22
+ from .tools import register_tools
23
+
24
+ # Configure logging to stderr only (MCP requirement)
25
+ logging.basicConfig(
26
+ level=logging.INFO,
27
+ format="%(asctime)s - %(name)s - %(levelname)s - %(message)s",
28
+ stream=sys.stderr,
29
+ )
30
+
31
+ logger = logging.getLogger(__name__)
32
+
33
+ # Initialize FastMCP server
34
+ mcp = FastMCP("FedRAMP 20x Requirements Server")
35
+
36
+ # Initialize data loader
37
+ data_loader = get_data_loader()
38
+
39
+ # Register all tools
40
+ register_tools(mcp, data_loader)
41
+
42
+
43
+ # Add prompts for common compliance workflows
44
+ @mcp.prompt()
45
+ async def gap_analysis() -> str:
46
+ """
47
+ Guide a FedRAMP gap analysis by helping identify which requirements apply
48
+ to your system and what evidence you need to provide.
49
+
50
+ Use this prompt to:
51
+ - Understand which FedRAMP requirements are relevant to your authorization level
52
+ - Identify Key Security Indicators (KSI) you need to track
53
+ - Determine what evidence and documentation is needed
54
+ """
55
+ from .prompts import load_prompt
56
+ return load_prompt('gap_analysis')
57
+
58
+
59
+ @mcp.prompt()
60
+ async def ato_package_checklist() -> str:
61
+ """
62
+ Generate a comprehensive checklist for preparing your FedRAMP Authorization
63
+ to Operate (ATO) package based on FedRAMP 20x requirements.
64
+
65
+ Use this prompt to:
66
+ - Ensure all required documentation is included
67
+ - Verify compliance with all applicable standards
68
+ - Prepare for assessment and authorization
69
+ """
70
+ from .prompts import load_prompt
71
+ return load_prompt('ato_package_checklist')
72
+
73
+
74
+ @mcp.prompt()
75
+ async def significant_change_assessment() -> str:
76
+ """
77
+ Assess whether a planned change to your cloud service offering requires
78
+ FedRAMP notification and help determine the change classification.
79
+
80
+ Use this prompt to:
81
+ - Determine if your change is routine, adaptive, or transformative
82
+ - Understand notification requirements
83
+ - Prepare change documentation
84
+ """
85
+ from .prompts import load_prompt
86
+ return load_prompt('significant_change_assessment')
87
+
88
+
89
+ @mcp.prompt()
90
+ async def vulnerability_remediation_timeline() -> str:
91
+ """
92
+ Determine the required remediation timeframes for vulnerabilities based on
93
+ severity and FedRAMP impact level.
94
+
95
+ Use this prompt to:
96
+ - Understand VDR timeframe requirements
97
+ - Plan vulnerability remediation
98
+ - Ensure compliance with FedRAMP deadlines
99
+ """
100
+ from .prompts import load_prompt
101
+ return load_prompt('vulnerability_remediation_timeline')
102
+
103
+
104
+ @mcp.prompt()
105
+ async def continuous_monitoring_setup() -> str:
106
+ """
107
+ Set up a FedRAMP-compliant continuous monitoring program with proper
108
+ reporting and assessment schedules.
109
+
110
+ Use this prompt to:
111
+ - Understand continuous monitoring requirements
112
+ - Set up reporting schedules
113
+ - Plan assessments and reviews
114
+ """
115
+ from .prompts import load_prompt
116
+ return load_prompt('continuous_monitoring_setup')
117
+
118
+
119
+ @mcp.prompt()
120
+ async def authorization_boundary_review() -> str:
121
+ """
122
+ Review and validate your FedRAMP authorization boundary to ensure all
123
+ required information resources are included.
124
+
125
+ Use this prompt to:
126
+ - Verify authorization boundary completeness
127
+ - Identify missing components
128
+ - Ensure MAS compliance
129
+ """
130
+ from .prompts import load_prompt
131
+ return load_prompt('authorization_boundary_review')
132
+
133
+
134
+ @mcp.prompt()
135
+ async def initial_assessment_roadmap() -> str:
136
+ """
137
+ Step-by-step guide for organizations starting FedRAMP 20x authorization from scratch.
138
+
139
+ Use this prompt to:
140
+ - Understand the complete FedRAMP 20x authorization process
141
+ - Get a phased implementation roadmap
142
+ - Identify key milestones and dependencies
143
+ """
144
+ from .prompts import load_prompt
145
+ return load_prompt('initial_assessment_roadmap')
146
+
147
+
148
+ @mcp.prompt()
149
+ async def quarterly_review_checklist() -> str:
150
+ """
151
+ Structured checklist for FedRAMP 20x Collaborative Continuous Monitoring quarterly reviews.
152
+
153
+ Use this prompt to:
154
+ - Conduct quarterly reviews per FRR-CCM-QR requirements
155
+ - Ensure all required activities are completed
156
+ - Prepare quarterly deliverables
157
+ """
158
+ from .prompts import load_prompt
159
+ return load_prompt('quarterly_review_checklist')
160
+
161
+
162
+ @mcp.prompt()
163
+ async def api_design_guide() -> str:
164
+ """
165
+ Guide for designing your Authorization Data Sharing API per FRR-ADS requirements.
166
+
167
+ Use this prompt to:
168
+ - Design compliant data sharing APIs
169
+ - Implement OSCAL format support
170
+ - Set up proper authentication and authorization
171
+ """
172
+ from .prompts import load_prompt
173
+ return load_prompt('api_design_guide')
174
+
175
+
176
+ @mcp.prompt()
177
+ async def ksi_implementation_priorities() -> str:
178
+ """
179
+ Help prioritize which Key Security Indicators to implement first based on impact and dependencies.
180
+
181
+ Use this prompt to:
182
+ - Understand KSI implementation order
183
+ - Identify quick wins vs. long-term investments
184
+ - Plan phased KSI rollout
185
+ """
186
+ from .prompts import load_prompt
187
+ return load_prompt('ksi_implementation_priorities')
188
+
189
+
190
+ @mcp.prompt()
191
+ async def vendor_evaluation() -> str:
192
+ """
193
+ Questions to ask vendors and tools to ensure FedRAMP 20x compatibility.
194
+
195
+ Use this prompt to:
196
+ - Evaluate security tools for FedRAMP 20x compliance
197
+ - Assess third-party service providers
198
+ - Identify gaps in vendor capabilities
199
+ """
200
+ from .prompts import load_prompt
201
+ return load_prompt('vendor_evaluation')
202
+
203
+
204
+ @mcp.prompt()
205
+ async def documentation_generator() -> str:
206
+ """
207
+ Generate OSCAL/documentation templates based on FedRAMP 20x requirements.
208
+
209
+ Use this prompt to:
210
+ - Create documentation structure for ATO package
211
+ - Generate OSCAL format templates
212
+ - Understand required documentation sections
213
+ """
214
+ from .prompts import load_prompt
215
+ return load_prompt('documentation_generator')
216
+
217
+
218
+ @mcp.prompt()
219
+ async def migration_from_rev5() -> str:
220
+ """
221
+ Detailed migration plan from FedRAMP Rev 5 to FedRAMP 20x.
222
+
223
+ Use this prompt to:
224
+ - Understand what changes between Rev 5 and 20x
225
+ - Create a transition plan for existing authorizations
226
+ - Identify gaps in current implementation
227
+ """
228
+ from .prompts import load_prompt
229
+ return load_prompt('migration_from_rev5')
230
+
231
+
232
+ @mcp.prompt()
233
+ async def azure_ksi_automation() -> str:
234
+ """
235
+ Comprehensive guide for implementing FedRAMP 20x KSI automation using Microsoft, Azure, and M365 capabilities.
236
+
237
+ Use this prompt to:
238
+ - Map each KSI to specific Microsoft/Azure/M365 services
239
+ - Automate evidence collection for all 72 KSIs
240
+ - Integrate with Microsoft security stack
241
+ - Build automation using PowerShell, Azure CLI, and Graph API
242
+ """
243
+ from .prompts import load_prompt
244
+ return load_prompt('azure_ksi_automation')
245
+
246
+
247
+ @mcp.prompt()
248
+ async def audit_preparation() -> str:
249
+ """
250
+ Comprehensive guide for preparing for FedRAMP 20x assessment and audit.
251
+
252
+ Use this prompt to:
253
+ - Prepare for 3PAO assessment
254
+ - Organize evidence and documentation
255
+ - Understand common audit findings
256
+ - Create testing procedures
257
+ """
258
+ from .prompts import load_prompt
259
+ return load_prompt('audit_preparation')
260
+
261
+
262
+
263
+ def main():
264
+ """Run the FedRAMP 20x MCP server."""
265
+ logger.info("Starting FedRAMP 20x MCP Server")
266
+ mcp.run(transport="stdio")
267
+
268
+
269
+ if __name__ == "__main__":
270
+ main()