icdev 1.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (1105) hide show
  1. icdev/__init__.py +18 -0
  2. icdev/_paths.py +85 -0
  3. icdev/_version.py +3 -0
  4. icdev/data/__init__.py +1 -0
  5. icdev/data/args/__init__.py +1 -0
  6. icdev/data/args/agent_authority.yaml +61 -0
  7. icdev/data/args/agent_config.yaml +355 -0
  8. icdev/data/args/agentic_fitness.yaml +31 -0
  9. icdev/data/args/ai_governance_config.yaml +137 -0
  10. icdev/data/args/atlas_critique_config.yaml +66 -0
  11. icdev/data/args/bedrock_models.yaml +63 -0
  12. icdev/data/args/cicd_config.yaml +82 -0
  13. icdev/data/args/classification_config.yaml +232 -0
  14. icdev/data/args/cli_config.yaml +154 -0
  15. icdev/data/args/cloud_config.yaml +63 -0
  16. icdev/data/args/code_pattern_config.yaml +151 -0
  17. icdev/data/args/code_quality_config.yaml +47 -0
  18. icdev/data/args/companion_registry.yaml +202 -0
  19. icdev/data/args/context_config.yaml +82 -0
  20. icdev/data/args/csp_monitor_config.yaml +268 -0
  21. icdev/data/args/cui_markings.yaml +35 -0
  22. icdev/data/args/db_config.yaml +40 -0
  23. icdev/data/args/deployment_profiles.yaml +248 -0
  24. icdev/data/args/dev_profile_config.yaml +144 -0
  25. icdev/data/args/devsecops_config.yaml +286 -0
  26. icdev/data/args/endpoint_security_config.yaml +137 -0
  27. icdev/data/args/extension_config.yaml +79 -0
  28. icdev/data/args/file_access_tiers.yaml +88 -0
  29. icdev/data/args/framework_registry.yaml +415 -0
  30. icdev/data/args/innovation_config.yaml +431 -0
  31. icdev/data/args/installation_manifest.yaml +1087 -0
  32. icdev/data/args/llm_config.yaml +495 -0
  33. icdev/data/args/maintenance_config.yaml +55 -0
  34. icdev/data/args/memory_config.yaml +83 -0
  35. icdev/data/args/monitoring_config.yaml +127 -0
  36. icdev/data/args/mosa_config.yaml +190 -0
  37. icdev/data/args/nlq_config.yaml +35 -0
  38. icdev/data/args/observability_config.yaml +39 -0
  39. icdev/data/args/observability_tracing_config.yaml +170 -0
  40. icdev/data/args/oscal_tools_config.yaml +43 -0
  41. icdev/data/args/owasp_agentic_config.yaml +171 -0
  42. icdev/data/args/phase_registry.yaml +618 -0
  43. icdev/data/args/project_defaults.yaml +235 -0
  44. icdev/data/args/prompt_chains.yaml +163 -0
  45. icdev/data/args/resilience_config.yaml +50 -0
  46. icdev/data/args/ricoas_config.yaml +191 -0
  47. icdev/data/args/role_personas.yaml +362 -0
  48. icdev/data/args/scaling_config.yaml +176 -0
  49. icdev/data/args/security_gates.yaml +685 -0
  50. icdev/data/args/skill_injection_config.yaml +322 -0
  51. icdev/data/args/spec_config.yaml +53 -0
  52. icdev/data/args/supply_chain_config.yaml +76 -0
  53. icdev/data/args/translation_config.yaml +228 -0
  54. icdev/data/args/workflow_templates/ato_acceleration.yaml +54 -0
  55. icdev/data/args/workflow_templates/build_deploy.yaml +63 -0
  56. icdev/data/args/workflow_templates/full_compliance.yaml +43 -0
  57. icdev/data/args/workflow_templates/security_hardening.yaml +55 -0
  58. icdev/data/args/worktree_config.yaml +34 -0
  59. icdev/data/args/zta_config.yaml +247 -0
  60. icdev/data/context/__init__.py +1 -0
  61. icdev/data/context/agent/__init__.py +1 -0
  62. icdev/data/context/agent/response_schemas/__init__.py +1 -0
  63. icdev/data/context/agent/response_schemas/debate_position.json +46 -0
  64. icdev/data/context/agent/response_schemas/fitness_scorecard.json +74 -0
  65. icdev/data/context/agent/response_schemas/review_decision.json +39 -0
  66. icdev/data/context/agent/response_schemas/task_decomposition.json +82 -0
  67. icdev/data/context/agent/response_schemas/veto_decision.json +40 -0
  68. icdev/data/context/agentic/__init__.py +1 -0
  69. icdev/data/context/agentic/architecture_patterns.md +269 -0
  70. icdev/data/context/agentic/capability_registry.yaml +202 -0
  71. icdev/data/context/agentic/csp_mcp_registry.yaml +280 -0
  72. icdev/data/context/agentic/fitness_rubric.md +56 -0
  73. icdev/data/context/agentic/governance_baseline.md +205 -0
  74. icdev/data/context/ci/__init__.py +1 -0
  75. icdev/data/context/ci/worktree_templates.json +44 -0
  76. icdev/data/context/cloud/__init__.py +1 -0
  77. icdev/data/context/cloud/csp_service_registry.json +739 -0
  78. icdev/data/context/compliance/__init__.py +1 -0
  79. icdev/data/context/compliance/atlas_mitigations.json +293 -0
  80. icdev/data/context/compliance/atlas_techniques.json +833 -0
  81. icdev/data/context/compliance/cisa_sbd_requirements.json +432 -0
  82. icdev/data/context/compliance/cjis_security_policy.json +522 -0
  83. icdev/data/context/compliance/cmmc_practices.json +2494 -0
  84. icdev/data/context/compliance/cmmc_report_template.md +142 -0
  85. icdev/data/context/compliance/cnssi_1253_overlay.json +109 -0
  86. icdev/data/context/compliance/control_crosswalk.json +1914 -0
  87. icdev/data/context/compliance/control_families/__init__.py +1 -0
  88. icdev/data/context/compliance/csp_certifications.json +251 -0
  89. icdev/data/context/compliance/cssp_report_template.md +193 -0
  90. icdev/data/context/compliance/cui_templates/__init__.py +1 -0
  91. icdev/data/context/compliance/cui_templates/banner_block.txt +4 -0
  92. icdev/data/context/compliance/cui_templates/code_header.txt +8 -0
  93. icdev/data/context/compliance/cui_templates/document_template.md +35 -0
  94. icdev/data/context/compliance/data_type_framework_map.json +321 -0
  95. icdev/data/context/compliance/data_type_registry.json +147 -0
  96. icdev/data/context/compliance/dod_cssp_8530.json +463 -0
  97. icdev/data/context/compliance/eu_ai_act_annex_iii.json +108 -0
  98. icdev/data/context/compliance/export_templates/__init__.py +1 -0
  99. icdev/data/context/compliance/export_templates/emass_controls.csv.j2 +4 -0
  100. icdev/data/context/compliance/export_templates/evidence_package.md.j2 +39 -0
  101. icdev/data/context/compliance/export_templates/executive_summary.md.j2 +55 -0
  102. icdev/data/context/compliance/export_templates/poam_tracking.csv.j2 +4 -0
  103. icdev/data/context/compliance/fedramp_20x_ksi_schemas.json +133 -0
  104. icdev/data/context/compliance/fedramp_high_baseline.json +4370 -0
  105. icdev/data/context/compliance/fedramp_moderate_baseline.json +2183 -0
  106. icdev/data/context/compliance/fedramp_report_template.md +181 -0
  107. icdev/data/context/compliance/fips_200_areas.json +362 -0
  108. icdev/data/context/compliance/gao_ai_accountability.json +262 -0
  109. icdev/data/context/compliance/hipaa_security_rule.json +720 -0
  110. icdev/data/context/compliance/hitrust_csf_v11.json +930 -0
  111. icdev/data/context/compliance/impact_level_profiles.json +251 -0
  112. icdev/data/context/compliance/incident_response_template.md +1110 -0
  113. icdev/data/context/compliance/iso27001_2022_controls.json +750 -0
  114. icdev/data/context/compliance/iso27001_nist_bridge.json +382 -0
  115. icdev/data/context/compliance/iso42001_controls.json +254 -0
  116. icdev/data/context/compliance/ivv_checklist_template.md +80 -0
  117. icdev/data/context/compliance/ivv_report_template.md +116 -0
  118. icdev/data/context/compliance/ivv_requirements.json +372 -0
  119. icdev/data/context/compliance/mosa_crosswalk.json +327 -0
  120. icdev/data/context/compliance/mosa_framework.json +250 -0
  121. icdev/data/context/compliance/narrative_templates/AC.md.j2 +101 -0
  122. icdev/data/context/compliance/narrative_templates/AU.md.j2 +106 -0
  123. icdev/data/context/compliance/narrative_templates/IA.md.j2 +104 -0
  124. icdev/data/context/compliance/narrative_templates/SC.md.j2 +102 -0
  125. icdev/data/context/compliance/narrative_templates/SI.md.j2 +111 -0
  126. icdev/data/context/compliance/narrative_templates/__init__.py +1 -0
  127. icdev/data/context/compliance/narrative_templates/default.md.j2 +50 -0
  128. icdev/data/context/compliance/narrative_templates/executive_summary.j2 +27 -0
  129. icdev/data/context/compliance/narrative_templates/poam_milestone.j2 +19 -0
  130. icdev/data/context/compliance/narrative_templates/ssp_section.j2 +11 -0
  131. icdev/data/context/compliance/nist_800_171_controls.json +1552 -0
  132. icdev/data/context/compliance/nist_800_207_crosswalk.json +399 -0
  133. icdev/data/context/compliance/nist_800_207_zta.json +258 -0
  134. icdev/data/context/compliance/nist_800_53.json +324 -0
  135. icdev/data/context/compliance/nist_ai_600_1_genai.json +326 -0
  136. icdev/data/context/compliance/nist_ai_rmf.json +206 -0
  137. icdev/data/context/compliance/nist_sp_800_60_types.json +1667 -0
  138. icdev/data/context/compliance/omb_m25_21_high_impact_ai.json +248 -0
  139. icdev/data/context/compliance/omb_m26_04_unbiased_ai.json +262 -0
  140. icdev/data/context/compliance/owasp_agentic_asi.json +133 -0
  141. icdev/data/context/compliance/owasp_agentic_threats.json +285 -0
  142. icdev/data/context/compliance/owasp_llm_top10.json +274 -0
  143. icdev/data/context/compliance/pci_dss_v4.json +510 -0
  144. icdev/data/context/compliance/poam_template.md +117 -0
  145. icdev/data/context/compliance/safeai_controls.json +512 -0
  146. icdev/data/context/compliance/sbd_report_template.md +77 -0
  147. icdev/data/context/compliance/siem_config_templates/__init__.py +1 -0
  148. icdev/data/context/compliance/siem_config_templates/filebeat.yml +213 -0
  149. icdev/data/context/compliance/siem_config_templates/log_sources.json +208 -0
  150. icdev/data/context/compliance/soc2_trust_criteria.json +661 -0
  151. icdev/data/context/compliance/ssp_template.md +432 -0
  152. icdev/data/context/compliance/stig_templates/__init__.py +1 -0
  153. icdev/data/context/compliance/stig_templates/webapp_stig.json +139 -0
  154. icdev/data/context/compliance/xai_requirements.json +108 -0
  155. icdev/data/context/dashboard/__init__.py +1 -0
  156. icdev/data/context/dashboard/nlq_examples.json +50 -0
  157. icdev/data/context/dashboard/schema_descriptions.json +23 -0
  158. icdev/data/context/integration/__init__.py +1 -0
  159. icdev/data/context/integration/approval_workflows.json +32 -0
  160. icdev/data/context/integration/gitlab_field_mappings.json +33 -0
  161. icdev/data/context/integration/jira_field_mappings.json +32 -0
  162. icdev/data/context/integration/reqif_export_schema.json +23 -0
  163. icdev/data/context/integration/servicenow_field_mappings.json +22 -0
  164. icdev/data/context/languages/__init__.py +1 -0
  165. icdev/data/context/languages/framework_patterns.json +205 -0
  166. icdev/data/context/languages/language_registry.json +279 -0
  167. icdev/data/context/llm/__init__.py +1 -0
  168. icdev/data/context/llm/example_provider.py +86 -0
  169. icdev/data/context/mbse/__init__.py +1 -0
  170. icdev/data/context/mbse/des_report_template.md +162 -0
  171. icdev/data/context/mbse/des_requirements.json +411 -0
  172. icdev/data/context/mbse/digital_thread_patterns.json +403 -0
  173. icdev/data/context/mbse/reqif_schema.json +280 -0
  174. icdev/data/context/mbse/sysml_element_types.json +432 -0
  175. icdev/data/context/modernization/__init__.py +1 -0
  176. icdev/data/context/modernization/db_type_mappings.json +148 -0
  177. icdev/data/context/modernization/decomposition_patterns.json +284 -0
  178. icdev/data/context/modernization/framework_migration_patterns.json +359 -0
  179. icdev/data/context/modernization/migration_report_template.md +168 -0
  180. icdev/data/context/modernization/seven_rs_catalog.json +369 -0
  181. icdev/data/context/modernization/version_upgrade_rules.json +279 -0
  182. icdev/data/context/oscal/NIST_SP-800-53_rev5_catalog.json +254987 -0
  183. icdev/data/context/oscal/README.md +43 -0
  184. icdev/data/context/patterns/__init__.py +1 -0
  185. icdev/data/context/profiles/__init__.py +1 -0
  186. icdev/data/context/profiles/dod_baseline_v1.yaml +145 -0
  187. icdev/data/context/profiles/fedramp_baseline_v1.yaml +143 -0
  188. icdev/data/context/profiles/financial_baseline_v1.yaml +142 -0
  189. icdev/data/context/profiles/healthcare_baseline_v1.yaml +135 -0
  190. icdev/data/context/profiles/law_enforcement_v1.yaml +129 -0
  191. icdev/data/context/profiles/startup_v1.yaml +134 -0
  192. icdev/data/context/requirements/__init__.py +1 -0
  193. icdev/data/context/requirements/ambiguity_patterns.json +97 -0
  194. icdev/data/context/requirements/boundary_impact_rules.json +123 -0
  195. icdev/data/context/requirements/default_constitutions.json +67 -0
  196. icdev/data/context/requirements/document_extraction_rules.json +58 -0
  197. icdev/data/context/requirements/gap_patterns.json +108 -0
  198. icdev/data/context/requirements/readiness_rubric.json +78 -0
  199. icdev/data/context/requirements/red_alternative_patterns.json +210 -0
  200. icdev/data/context/requirements/safe_templates.json +72 -0
  201. icdev/data/context/requirements/spec_quality_checklist.json +122 -0
  202. icdev/data/context/simulation/__init__.py +1 -0
  203. icdev/data/context/simulation/architecture_patterns.json +36 -0
  204. icdev/data/context/simulation/coa_templates.json +38 -0
  205. icdev/data/context/simulation/cost_models.json +23 -0
  206. icdev/data/context/simulation/risk_categories.json +46 -0
  207. icdev/data/context/supply_chain/__init__.py +1 -0
  208. icdev/data/context/supply_chain/isa_templates.json +129 -0
  209. icdev/data/context/supply_chain/nist_800_161_controls.json +247 -0
  210. icdev/data/context/supply_chain/scrm_risk_matrix.json +147 -0
  211. icdev/data/context/templates/__init__.py +1 -0
  212. icdev/data/context/templates/ansible/__init__.py +1 -0
  213. icdev/data/context/templates/ansible/playbooks/__init__.py +1 -0
  214. icdev/data/context/templates/ansible/roles/__init__.py +1 -0
  215. icdev/data/context/templates/gitlab_ci/__init__.py +1 -0
  216. icdev/data/context/templates/grafana/__init__.py +1 -0
  217. icdev/data/context/templates/kubernetes/__init__.py +1 -0
  218. icdev/data/context/templates/project/__init__.py +1 -0
  219. icdev/data/context/templates/project/api/__init__.py +1 -0
  220. icdev/data/context/templates/project/cli/__init__.py +1 -0
  221. icdev/data/context/templates/project/data_pipeline/__init__.py +1 -0
  222. icdev/data/context/templates/project/iac/__init__.py +1 -0
  223. icdev/data/context/templates/project/javascript_frontend/__init__.py +1 -0
  224. icdev/data/context/templates/project/javascript_frontend/src/__init__.py +1 -0
  225. icdev/data/context/templates/project/javascript_frontend/tests/__init__.py +1 -0
  226. icdev/data/context/templates/project/microservice/__init__.py +1 -0
  227. icdev/data/context/templates/project/python_backend/__init__.py +1 -0
  228. icdev/data/context/templates/project/python_backend/src/__init__.py +1 -0
  229. icdev/data/context/templates/project/python_backend/tests/__init__.py +1 -0
  230. icdev/data/context/templates/project/python_backend/tests/features/__init__.py +1 -0
  231. icdev/data/context/templates/project/python_backend/tests/steps/__init__.py +1 -0
  232. icdev/data/context/templates/terraform/__init__.py +1 -0
  233. icdev/data/context/templates/terraform/govcloud_base/__init__.py +1 -0
  234. icdev/data/context/templates/terraform/modules/__init__.py +1 -0
  235. icdev/data/context/tone/__init__.py +1 -0
  236. icdev/data/context/translation/dependency_mappings.json +186 -0
  237. icdev/data/context/translation/type_mappings.json +149 -0
  238. icdev/data/docs/README.md +187 -0
  239. icdev/data/docs/__init__.py +1 -0
  240. icdev/data/docs/admin/gateway-guide.md +338 -0
  241. icdev/data/docs/admin/marketplace-guide.md +396 -0
  242. icdev/data/docs/admin/monitoring-guide.md +509 -0
  243. icdev/data/docs/architecture/compliance-framework.md +764 -0
  244. icdev/data/docs/architecture/database-schema.md +689 -0
  245. icdev/data/docs/architecture/gotcha-framework.md +518 -0
  246. icdev/data/docs/architecture/multi-agent-system.md +603 -0
  247. icdev/data/docs/dx/README.md +106 -0
  248. icdev/data/docs/dx/__init__.py +1 -0
  249. icdev/data/docs/dx/ci-cd-integration.md +378 -0
  250. icdev/data/docs/dx/claude-code-guide.md +213 -0
  251. icdev/data/docs/dx/companion-guide.md +232 -0
  252. icdev/data/docs/dx/dev-profiles.md +309 -0
  253. icdev/data/docs/dx/icdev-yaml-spec.md +219 -0
  254. icdev/data/docs/dx/integration-tiers.md +279 -0
  255. icdev/data/docs/dx/llm-routing-guide.md +456 -0
  256. icdev/data/docs/dx/quickstart.md +192 -0
  257. icdev/data/docs/dx/sdk-reference.md +356 -0
  258. icdev/data/docs/dx/unified-mcp-setup.md +525 -0
  259. icdev/data/docs/features/__init__.py +1 -0
  260. icdev/data/docs/features/phase-01-gotcha-framework.md +249 -0
  261. icdev/data/docs/features/phase-02-atlas-build-workflow.md +223 -0
  262. icdev/data/docs/features/phase-03-tdd-bdd-testing.md +261 -0
  263. icdev/data/docs/features/phase-04-nist-compliance.md +255 -0
  264. icdev/data/docs/features/phase-05-security-scanning.md +229 -0
  265. icdev/data/docs/features/phase-06-infrastructure-deployment.md +288 -0
  266. icdev/data/docs/features/phase-07-code-review-gates.md +276 -0
  267. icdev/data/docs/features/phase-08-self-healing.md +223 -0
  268. icdev/data/docs/features/phase-09-monitoring-observability.md +230 -0
  269. icdev/data/docs/features/phase-10-dashboard-web-ui.md +218 -0
  270. icdev/data/docs/features/phase-11-multi-agent-architecture.md +272 -0
  271. icdev/data/docs/features/phase-12-integration-testing.md +228 -0
  272. icdev/data/docs/features/phase-13-cicd-integration.md +257 -0
  273. icdev/data/docs/features/phase-14-secure-by-design-ivv.md +240 -0
  274. icdev/data/docs/features/phase-15-maintenance-audit.md +192 -0
  275. icdev/data/docs/features/phase-16-ato-acceleration.md +228 -0
  276. icdev/data/docs/features/phase-17-multi-framework-compliance.md +223 -0
  277. icdev/data/docs/features/phase-18-mbse-integration.md +242 -0
  278. icdev/data/docs/features/phase-19-agentic-generation.md +202 -0
  279. icdev/data/docs/features/phase-20-fips-security-categorization.md +198 -0
  280. icdev/data/docs/features/phase-21-saas-multi-tenancy.md +273 -0
  281. icdev/data/docs/features/phase-22-federated-gotcha-marketplace.md +242 -0
  282. icdev/data/docs/features/phase-23-universal-compliance-platform.md +238 -0
  283. icdev/data/docs/features/phase-24-devsecops-pipeline-security.md +198 -0
  284. icdev/data/docs/features/phase-25-zero-trust-architecture.md +220 -0
  285. icdev/data/docs/features/phase-26-dod-mosa.md +205 -0
  286. icdev/data/docs/features/phase-27-cli-capabilities.md +222 -0
  287. icdev/data/docs/features/phase-28-remote-command-gateway.md +235 -0
  288. icdev/data/docs/features/phase-29-proactive-monitoring.md +212 -0
  289. icdev/data/docs/features/phase-30-dashboard-auth.md +215 -0
  290. icdev/data/docs/features/phase-31-dashboard-ux-low-impact.md +188 -0
  291. icdev/data/docs/features/phase-32-dashboard-ux-medium-impact.md +223 -0
  292. icdev/data/docs/features/phase-33-modular-installation.md +218 -0
  293. icdev/data/docs/features/phase-34-dev-profiles.md +239 -0
  294. icdev/data/docs/features/phase-35-innovation-engine.md +257 -0
  295. icdev/data/docs/features/phase-36-evolutionary-intelligence.md +351 -0
  296. icdev/data/docs/features/phase-37-mitre-atlas-integration.md +485 -0
  297. icdev/data/docs/features/phase-38-cloud-agnostic-architecture.md +1033 -0
  298. icdev/data/docs/features/phase-39-observability-operations.md +178 -0
  299. icdev/data/docs/features/phase-40-nlq-compliance-queries.md +176 -0
  300. icdev/data/docs/features/phase-41-parallel-cicd.md +169 -0
  301. icdev/data/docs/features/phase-42-framework-planning.md +177 -0
  302. icdev/data/docs/features/phase-43-cross-language-translation.md +225 -0
  303. icdev/data/docs/features/phase-44-innovation-adaptation.md +227 -0
  304. icdev/data/docs/features/phase-45-owasp-agentic-security.md +239 -0
  305. icdev/data/docs/features/phase-46-observability-traceability-xai.md +240 -0
  306. icdev/data/docs/features/phase-47-unified-mcp-gateway.md +257 -0
  307. icdev/data/docs/features/phase-48-ai-transparency.md +203 -0
  308. icdev/data/docs/features/phase-49-ai-accountability.md +243 -0
  309. icdev/data/docs/features/phase-50-ai-governance-intake-chat.md +195 -0
  310. icdev/data/docs/features/phase-51-unified-chat-dashboard.md +240 -0
  311. icdev/data/docs/features/phase-52-code-intelligence.md +244 -0
  312. icdev/data/docs/features/phase-53-fedramp-20x-owasp-asi.md +359 -0
  313. icdev/data/docs/features/phase-54-slsa-swft-orchestration.md +379 -0
  314. icdev/data/docs/features/phase-55-a2a-v03-mcp-oauth.md +322 -0
  315. icdev/data/docs/features/phase-56-evidence-lineage.md +352 -0
  316. icdev/data/docs/features/phase-57-eu-ai-act-iron-bank.md +319 -0
  317. icdev/data/docs/features/phase-58-creative-engine.md +370 -0
  318. icdev/data/docs/features/phase-59-govcon-intelligence.md +535 -0
  319. icdev/data/docs/features/phase-60-cpmp.md +528 -0
  320. icdev/data/docs/features/phase-61-orchestration-improvements.md +534 -0
  321. icdev/data/docs/operations/dashboard-guide.md +354 -0
  322. icdev/data/docs/operations/deployment-guide.md +556 -0
  323. icdev/data/docs/operations/saas-admin-guide.md +439 -0
  324. icdev/data/docs/operations/security-operations-guide.md +733 -0
  325. icdev/data/docs/runbooks/backup-restore.md +412 -0
  326. icdev/data/docs/runbooks/troubleshooting.md +499 -0
  327. icdev/data/features/__init__.py +1 -0
  328. icdev/data/features/cicd_integration.feature +41 -0
  329. icdev/data/features/compliance_gates.feature +46 -0
  330. icdev/data/features/dashboard.feature +72 -0
  331. icdev/data/features/environment.py +25 -0
  332. icdev/data/features/project_management.feature +32 -0
  333. icdev/data/features/requirements_intake.feature +42 -0
  334. icdev/data/features/saas_platform.feature +53 -0
  335. icdev/data/features/security_scanning.feature +36 -0
  336. icdev/data/features/steps/__init__.py +1 -0
  337. icdev/data/features/steps/cicd_steps.py +465 -0
  338. icdev/data/features/steps/compliance_steps.py +308 -0
  339. icdev/data/features/steps/dashboard_steps.py +88 -0
  340. icdev/data/features/steps/project_steps.py +126 -0
  341. icdev/data/features/steps/requirements_intake_steps.py +689 -0
  342. icdev/data/features/steps/saas_platform_steps.py +572 -0
  343. icdev/data/features/steps/security_steps.py +236 -0
  344. icdev/data/features/steps/testing_steps.py +226 -0
  345. icdev/data/features/testing_pipeline.feature +42 -0
  346. icdev/data/goals/__init__.py +1 -0
  347. icdev/data/goals/agent_management.md +144 -0
  348. icdev/data/goals/agentic_generation.md +345 -0
  349. icdev/data/goals/agentic_threat_model.md +309 -0
  350. icdev/data/goals/ai_accountability.md +90 -0
  351. icdev/data/goals/ai_governance_intake.md +132 -0
  352. icdev/data/goals/ai_transparency.md +76 -0
  353. icdev/data/goals/atlas_integration.md +405 -0
  354. icdev/data/goals/ato_acceleration.md +139 -0
  355. icdev/data/goals/boundary_supply_chain.md +206 -0
  356. icdev/data/goals/build_app.md +544 -0
  357. icdev/data/goals/cicd_integration.md +86 -0
  358. icdev/data/goals/claude_dir_maintenance.md +77 -0
  359. icdev/data/goals/cli_capabilities.md +340 -0
  360. icdev/data/goals/cloud_agnostic.md +312 -0
  361. icdev/data/goals/code_intelligence.md +197 -0
  362. icdev/data/goals/code_review.md +94 -0
  363. icdev/data/goals/compliance_workflow.md +858 -0
  364. icdev/data/goals/continuous_harmonization.md +140 -0
  365. icdev/data/goals/cross_language_translation.md +171 -0
  366. icdev/data/goals/dashboard.md +142 -0
  367. icdev/data/goals/deploy_workflow.md +390 -0
  368. icdev/data/goals/devsecops_workflow.md +408 -0
  369. icdev/data/goals/evolutionary_intelligence.md +305 -0
  370. icdev/data/goals/external_integration.md +113 -0
  371. icdev/data/goals/framework_planning.md +63 -0
  372. icdev/data/goals/init_project.md +235 -0
  373. icdev/data/goals/innovation_engine.md +199 -0
  374. icdev/data/goals/integration_testing.md +189 -0
  375. icdev/data/goals/maintenance_audit.md +196 -0
  376. icdev/data/goals/manifest.md +56 -0
  377. icdev/data/goals/mbse_integration.md +504 -0
  378. icdev/data/goals/modernization_workflow.md +618 -0
  379. icdev/data/goals/monitoring.md +126 -0
  380. icdev/data/goals/mosa_workflow.md +463 -0
  381. icdev/data/goals/multi_agent_orchestration.md +68 -0
  382. icdev/data/goals/nlq_compliance.md +63 -0
  383. icdev/data/goals/observability.md +64 -0
  384. icdev/data/goals/observability_traceability_xai.md +154 -0
  385. icdev/data/goals/owasp_agentic_security.md +395 -0
  386. icdev/data/goals/parallel_cicd.md +61 -0
  387. icdev/data/goals/requirements_intake.md +213 -0
  388. icdev/data/goals/sbd_ivv_workflow.md +195 -0
  389. icdev/data/goals/security_categorization.md +133 -0
  390. icdev/data/goals/security_scan.md +381 -0
  391. icdev/data/goals/self_healing.md +120 -0
  392. icdev/data/goals/simulation_engine.md +111 -0
  393. icdev/data/goals/tdd_workflow.md +403 -0
  394. icdev/data/goals/zero_trust_architecture.md +403 -0
  395. icdev/data/hardprompts/__init__.py +1 -0
  396. icdev/data/hardprompts/agent/__init__.py +1 -0
  397. icdev/data/hardprompts/agent/agentic_architect.md +100 -0
  398. icdev/data/hardprompts/agent/debate_prompt.md +32 -0
  399. icdev/data/hardprompts/agent/fitness_evaluation.md +48 -0
  400. icdev/data/hardprompts/agent/governance_review.md +214 -0
  401. icdev/data/hardprompts/agent/reviewer_prompt.md +34 -0
  402. icdev/data/hardprompts/agent/skill_design.md +172 -0
  403. icdev/data/hardprompts/agent/task_decomposition.md +275 -0
  404. icdev/data/hardprompts/agent/veto_check_prompt.md +33 -0
  405. icdev/data/hardprompts/architect/__init__.py +1 -0
  406. icdev/data/hardprompts/architect/api_design.md +283 -0
  407. icdev/data/hardprompts/architect/data_model.md +277 -0
  408. icdev/data/hardprompts/architect/system_design.md +180 -0
  409. icdev/data/hardprompts/builder/__init__.py +1 -0
  410. icdev/data/hardprompts/builder/code_generation.md +59 -0
  411. icdev/data/hardprompts/builder/refactor.md +58 -0
  412. icdev/data/hardprompts/builder/scaffold_project.md +69 -0
  413. icdev/data/hardprompts/builder/test_generation.md +87 -0
  414. icdev/data/hardprompts/ci/__init__.py +1 -0
  415. icdev/data/hardprompts/ci/worktree_setup.md +35 -0
  416. icdev/data/hardprompts/compliance/__init__.py +1 -0
  417. icdev/data/hardprompts/compliance/cmmc_assessment.md +63 -0
  418. icdev/data/hardprompts/compliance/cssp_assessment.md +75 -0
  419. icdev/data/hardprompts/compliance/cui_marking.md +86 -0
  420. icdev/data/hardprompts/compliance/fedramp_assessment.md +55 -0
  421. icdev/data/hardprompts/compliance/ivv_assessment.md +96 -0
  422. icdev/data/hardprompts/compliance/poam_generation.md +57 -0
  423. icdev/data/hardprompts/compliance/sbd_assessment.md +101 -0
  424. icdev/data/hardprompts/compliance/security_categorization.md +74 -0
  425. icdev/data/hardprompts/compliance/ssp_generation.md +56 -0
  426. icdev/data/hardprompts/compliance/stig_evaluation.md +63 -0
  427. icdev/data/hardprompts/dashboard/__init__.py +1 -0
  428. icdev/data/hardprompts/dashboard/nlq_system_prompt.md +26 -0
  429. icdev/data/hardprompts/infra/__init__.py +1 -0
  430. icdev/data/hardprompts/infra/k8s_manifests.md +118 -0
  431. icdev/data/hardprompts/infra/pipeline_generation.md +160 -0
  432. icdev/data/hardprompts/infra/terraform_generation.md +92 -0
  433. icdev/data/hardprompts/integration/__init__.py +1 -0
  434. icdev/data/hardprompts/integration/approval_review.md +17 -0
  435. icdev/data/hardprompts/integration/jira_mapping.md +25 -0
  436. icdev/data/hardprompts/integration/servicenow_mapping.md +14 -0
  437. icdev/data/hardprompts/knowledge/__init__.py +1 -0
  438. icdev/data/hardprompts/knowledge/pattern_detection.md +73 -0
  439. icdev/data/hardprompts/knowledge/recommendation_engine.md +90 -0
  440. icdev/data/hardprompts/knowledge/root_cause_analysis.md +91 -0
  441. icdev/data/hardprompts/maintenance/__init__.py +1 -0
  442. icdev/data/hardprompts/maintenance/maintenance_assessment.md +82 -0
  443. icdev/data/hardprompts/mbse/__init__.py +1 -0
  444. icdev/data/hardprompts/mbse/digital_thread.md +67 -0
  445. icdev/data/hardprompts/mbse/model_import.md +62 -0
  446. icdev/data/hardprompts/mbse/model_to_code.md +65 -0
  447. icdev/data/hardprompts/modernization/__init__.py +1 -0
  448. icdev/data/hardprompts/modernization/legacy_analysis.md +93 -0
  449. icdev/data/hardprompts/modernization/migration_planning.md +150 -0
  450. icdev/data/hardprompts/modernization/seven_r_assessment.md +107 -0
  451. icdev/data/hardprompts/requirements/__init__.py +1 -0
  452. icdev/data/hardprompts/requirements/bdd_generation.md +35 -0
  453. icdev/data/hardprompts/requirements/clarification_prioritization.md +29 -0
  454. icdev/data/hardprompts/requirements/decomposition.md +60 -0
  455. icdev/data/hardprompts/requirements/document_extraction.md +45 -0
  456. icdev/data/hardprompts/requirements/gap_detection.md +70 -0
  457. icdev/data/hardprompts/requirements/intake_conversation.md +101 -0
  458. icdev/data/hardprompts/requirements/readiness_assessment.md +39 -0
  459. icdev/data/hardprompts/requirements/spec_quality.md +33 -0
  460. icdev/data/hardprompts/requirements/traceability_analysis.md +23 -0
  461. icdev/data/hardprompts/security/__init__.py +1 -0
  462. icdev/data/hardprompts/security/endpoint_security.md +78 -0
  463. icdev/data/hardprompts/security/threat_model.md +70 -0
  464. icdev/data/hardprompts/security/vulnerability_assessment.md +81 -0
  465. icdev/data/hardprompts/simulation/__init__.py +1 -0
  466. icdev/data/hardprompts/simulation/architecture_impact.md +27 -0
  467. icdev/data/hardprompts/simulation/coa_alternative.md +27 -0
  468. icdev/data/hardprompts/simulation/coa_generation.md +25 -0
  469. icdev/data/hardprompts/simulation/compliance_impact.md +28 -0
  470. icdev/data/hardprompts/simulation/cost_estimation.md +33 -0
  471. icdev/data/hardprompts/simulation/risk_assessment.md +28 -0
  472. icdev/data/hardprompts/translation/code_translation.md +68 -0
  473. icdev/data/hardprompts/translation/dependency_suggestion.md +44 -0
  474. icdev/data/hardprompts/translation/test_translation.md +64 -0
  475. icdev/data/hardprompts/translation/translation_repair.md +59 -0
  476. icdev/py.typed +0 -0
  477. icdev/tools/__init__.py +1 -0
  478. icdev/tools/_gen_formatter.py +12 -0
  479. icdev/tools/a2a/__init__.py +1 -0
  480. icdev/tools/a2a/agent_cards/architect.json +43 -0
  481. icdev/tools/a2a/agent_cards/builder.json +50 -0
  482. icdev/tools/a2a/agent_cards/compliance.json +57 -0
  483. icdev/tools/a2a/agent_cards/devsecops.json +71 -0
  484. icdev/tools/a2a/agent_cards/infra.json +57 -0
  485. icdev/tools/a2a/agent_cards/integration.json +57 -0
  486. icdev/tools/a2a/agent_cards/knowledge.json +43 -0
  487. icdev/tools/a2a/agent_cards/mbse.json +57 -0
  488. icdev/tools/a2a/agent_cards/modernization.json +50 -0
  489. icdev/tools/a2a/agent_cards/monitor.json +43 -0
  490. icdev/tools/a2a/agent_cards/orchestrator.json +36 -0
  491. icdev/tools/a2a/agent_cards/requirements_analyst.json +64 -0
  492. icdev/tools/a2a/agent_cards/security.json +50 -0
  493. icdev/tools/a2a/agent_cards/simulation.json +57 -0
  494. icdev/tools/a2a/agent_cards/supply_chain.json +50 -0
  495. icdev/tools/a2a/agent_client.py +349 -0
  496. icdev/tools/a2a/agent_registry.py +412 -0
  497. icdev/tools/a2a/agent_server.py +579 -0
  498. icdev/tools/a2a/task.py +200 -0
  499. icdev/tools/agent/__init__.py +2 -0
  500. icdev/tools/agent/a2a_agent_card_generator.py +285 -0
  501. icdev/tools/agent/a2a_discovery_server.py +250 -0
  502. icdev/tools/agent/agent_executor.py +529 -0
  503. icdev/tools/agent/agent_memory.py +557 -0
  504. icdev/tools/agent/agent_models.py +51 -0
  505. icdev/tools/agent/atlas_critique.py +908 -0
  506. icdev/tools/agent/authority.py +443 -0
  507. icdev/tools/agent/bedrock_client.py +1075 -0
  508. icdev/tools/agent/collaboration.py +871 -0
  509. icdev/tools/agent/dispatcher_mode.py +665 -0
  510. icdev/tools/agent/mailbox.py +575 -0
  511. icdev/tools/agent/prompt_chain_executor.py +1064 -0
  512. icdev/tools/agent/session_purpose.py +350 -0
  513. icdev/tools/agent/skill_router.py +638 -0
  514. icdev/tools/agent/skill_selector.py +486 -0
  515. icdev/tools/agent/team_orchestrator.py +1108 -0
  516. icdev/tools/agent/token_tracker.py +290 -0
  517. icdev/tools/analysis/__init__.py +1 -0
  518. icdev/tools/analysis/code_analyzer.py +780 -0
  519. icdev/tools/analysis/runtime_feedback.py +389 -0
  520. icdev/tools/audit/__init__.py +1 -0
  521. icdev/tools/audit/audit_logger.py +196 -0
  522. icdev/tools/audit/audit_query.py +157 -0
  523. icdev/tools/audit/decision_recorder.py +72 -0
  524. icdev/tools/builder/__init__.py +1 -0
  525. icdev/tools/builder/agentic_fitness.py +534 -0
  526. icdev/tools/builder/agentic_test_templates/test_a2a_callback.py +117 -0
  527. icdev/tools/builder/agentic_test_templates/test_a2a_lifecycle.feature +52 -0
  528. icdev/tools/builder/agentic_test_templates/test_agent_card.feature +37 -0
  529. icdev/tools/builder/agentic_test_templates/test_agent_health.py +128 -0
  530. icdev/tools/builder/agentic_test_templates/test_memory_system.feature +50 -0
  531. icdev/tools/builder/agentic_test_templates/test_skill_execution.feature +40 -0
  532. icdev/tools/builder/app_blueprint.py +1583 -0
  533. icdev/tools/builder/child_app_generator.py +2852 -0
  534. icdev/tools/builder/claude_md_generator.py +1734 -0
  535. icdev/tools/builder/code_generator.py +3703 -0
  536. icdev/tools/builder/db_init_generator.py +1709 -0
  537. icdev/tools/builder/dev_profile_manager.py +954 -0
  538. icdev/tools/builder/formatter.py +768 -0
  539. icdev/tools/builder/goal_adapter.py +592 -0
  540. icdev/tools/builder/gotcha_validator.py +812 -0
  541. icdev/tools/builder/language_support.py +441 -0
  542. icdev/tools/builder/linter.py +976 -0
  543. icdev/tools/builder/profile_detector.py +657 -0
  544. icdev/tools/builder/profile_md_generator.py +723 -0
  545. icdev/tools/builder/scaffolder.py +1590 -0
  546. icdev/tools/builder/scaffolder_extended.py +1771 -0
  547. icdev/tools/builder/test_writer.py +950 -0
  548. icdev/tools/ci/__init__.py +2 -0
  549. icdev/tools/ci/connectors/__init__.py +2 -0
  550. icdev/tools/ci/connectors/base_connector.py +80 -0
  551. icdev/tools/ci/connectors/connector_registry.py +188 -0
  552. icdev/tools/ci/connectors/mattermost_connector.py +159 -0
  553. icdev/tools/ci/connectors/slack_connector.py +197 -0
  554. icdev/tools/ci/core/__init__.py +2 -0
  555. icdev/tools/ci/core/air_gap_detector.py +115 -0
  556. icdev/tools/ci/core/comment_handler.py +192 -0
  557. icdev/tools/ci/core/conversation_manager.py +479 -0
  558. icdev/tools/ci/core/event_envelope.py +500 -0
  559. icdev/tools/ci/core/event_router.py +443 -0
  560. icdev/tools/ci/core/failure_parser.py +397 -0
  561. icdev/tools/ci/core/recovery_engine.py +527 -0
  562. icdev/tools/ci/modules/__init__.py +2 -0
  563. icdev/tools/ci/modules/agent.py +271 -0
  564. icdev/tools/ci/modules/git_ops.py +175 -0
  565. icdev/tools/ci/modules/state.py +117 -0
  566. icdev/tools/ci/modules/vcs.py +303 -0
  567. icdev/tools/ci/modules/workflow_ops.py +295 -0
  568. icdev/tools/ci/modules/worktree.py +340 -0
  569. icdev/tools/ci/pipeline_config_generator.py +558 -0
  570. icdev/tools/ci/triggers/__init__.py +2 -0
  571. icdev/tools/ci/triggers/gitlab_task_monitor.py +330 -0
  572. icdev/tools/ci/triggers/poll_trigger.py +237 -0
  573. icdev/tools/ci/triggers/webhook_server.py +356 -0
  574. icdev/tools/ci/workflows/__init__.py +2 -0
  575. icdev/tools/ci/workflows/icdev_build.py +140 -0
  576. icdev/tools/ci/workflows/icdev_comply.py +284 -0
  577. icdev/tools/ci/workflows/icdev_document.py +152 -0
  578. icdev/tools/ci/workflows/icdev_e2e.py +188 -0
  579. icdev/tools/ci/workflows/icdev_patch.py +186 -0
  580. icdev/tools/ci/workflows/icdev_plan.py +202 -0
  581. icdev/tools/ci/workflows/icdev_plan_build.py +41 -0
  582. icdev/tools/ci/workflows/icdev_plan_build_test.py +46 -0
  583. icdev/tools/ci/workflows/icdev_plan_build_test_review.py +47 -0
  584. icdev/tools/ci/workflows/icdev_review.py +126 -0
  585. icdev/tools/ci/workflows/icdev_sdlc.py +261 -0
  586. icdev/tools/ci/workflows/icdev_test.py +240 -0
  587. icdev/tools/cli/__init__.py +1 -0
  588. icdev/tools/cli/output_formatter.py +756 -0
  589. icdev/tools/cli_formatter.py +42 -0
  590. icdev/tools/cloud/__init__.py +11 -0
  591. icdev/tools/cloud/cloud_mode_manager.py +364 -0
  592. icdev/tools/cloud/csp_changelog.py +383 -0
  593. icdev/tools/cloud/csp_health_checker.py +268 -0
  594. icdev/tools/cloud/csp_monitor.py +951 -0
  595. icdev/tools/cloud/iam_provider.py +593 -0
  596. icdev/tools/cloud/kms_provider.py +346 -0
  597. icdev/tools/cloud/monitoring_provider.py +628 -0
  598. icdev/tools/cloud/provider_factory.py +376 -0
  599. icdev/tools/cloud/region_validator.py +345 -0
  600. icdev/tools/cloud/registry_provider.py +563 -0
  601. icdev/tools/cloud/secrets_provider.py +486 -0
  602. icdev/tools/cloud/storage_provider.py +446 -0
  603. icdev/tools/compat/__init__.py +21 -0
  604. icdev/tools/compat/cli_harmonizer.py +251 -0
  605. icdev/tools/compat/datetime_utils.py +18 -0
  606. icdev/tools/compat/db_utils.py +160 -0
  607. icdev/tools/compat/platform_utils.py +123 -0
  608. icdev/tools/compliance/__init__.py +1 -0
  609. icdev/tools/compliance/accountability_manager.py +397 -0
  610. icdev/tools/compliance/ai_accountability_audit.py +294 -0
  611. icdev/tools/compliance/ai_impact_assessor.py +273 -0
  612. icdev/tools/compliance/ai_incident_response.py +301 -0
  613. icdev/tools/compliance/ai_inventory_manager.py +239 -0
  614. icdev/tools/compliance/ai_reassessment_scheduler.py +256 -0
  615. icdev/tools/compliance/ai_transparency_audit.py +248 -0
  616. icdev/tools/compliance/atlas_assessor.py +278 -0
  617. icdev/tools/compliance/atlas_report_generator.py +1211 -0
  618. icdev/tools/compliance/base_assessor.py +597 -0
  619. icdev/tools/compliance/cato_monitor.py +1385 -0
  620. icdev/tools/compliance/cato_scheduler.py +699 -0
  621. icdev/tools/compliance/cjis_assessor.py +76 -0
  622. icdev/tools/compliance/classification_manager.py +1353 -0
  623. icdev/tools/compliance/cmmc_assessor.py +1491 -0
  624. icdev/tools/compliance/cmmc_report_generator.py +1100 -0
  625. icdev/tools/compliance/compliance_detector.py +463 -0
  626. icdev/tools/compliance/compliance_exporter.py +427 -0
  627. icdev/tools/compliance/compliance_status.py +825 -0
  628. icdev/tools/compliance/control_mapper.py +505 -0
  629. icdev/tools/compliance/crosswalk_engine.py +1203 -0
  630. icdev/tools/compliance/cssp_assessor.py +1045 -0
  631. icdev/tools/compliance/cssp_evidence_collector.py +729 -0
  632. icdev/tools/compliance/cssp_report_generator.py +1116 -0
  633. icdev/tools/compliance/cui_marker.py +388 -0
  634. icdev/tools/compliance/diagram_validator.py +600 -0
  635. icdev/tools/compliance/emass/__init__.py +2 -0
  636. icdev/tools/compliance/emass/emass_client.py +840 -0
  637. icdev/tools/compliance/emass/emass_export.py +777 -0
  638. icdev/tools/compliance/emass/emass_sync.py +826 -0
  639. icdev/tools/compliance/eu_ai_act_classifier.py +194 -0
  640. icdev/tools/compliance/evidence_collector.py +468 -0
  641. icdev/tools/compliance/fairness_assessor.py +316 -0
  642. icdev/tools/compliance/fedramp_assessor.py +1808 -0
  643. icdev/tools/compliance/fedramp_authorization_packager.py +137 -0
  644. icdev/tools/compliance/fedramp_ksi_generator.py +355 -0
  645. icdev/tools/compliance/fedramp_report_generator.py +1128 -0
  646. icdev/tools/compliance/fips199_categorizer.py +881 -0
  647. icdev/tools/compliance/fips200_validator.py +315 -0
  648. icdev/tools/compliance/gao_ai_assessor.py +231 -0
  649. icdev/tools/compliance/gao_evidence_builder.py +308 -0
  650. icdev/tools/compliance/hipaa_assessor.py +78 -0
  651. icdev/tools/compliance/hitrust_assessor.py +49 -0
  652. icdev/tools/compliance/incident_response_plan.py +718 -0
  653. icdev/tools/compliance/iso27001_assessor.py +92 -0
  654. icdev/tools/compliance/iso42001_assessor.py +114 -0
  655. icdev/tools/compliance/ivv_assessor.py +2327 -0
  656. icdev/tools/compliance/ivv_report_generator.py +1662 -0
  657. icdev/tools/compliance/model_card_generator.py +297 -0
  658. icdev/tools/compliance/mosa_assessor.py +117 -0
  659. icdev/tools/compliance/multi_regime_assessor.py +451 -0
  660. icdev/tools/compliance/narrative_generator.py +1013 -0
  661. icdev/tools/compliance/nist_800_207_assessor.py +191 -0
  662. icdev/tools/compliance/nist_ai_600_1_assessor.py +188 -0
  663. icdev/tools/compliance/nist_ai_rmf_assessor.py +110 -0
  664. icdev/tools/compliance/nist_lookup.py +245 -0
  665. icdev/tools/compliance/omb_m25_21_assessor.py +228 -0
  666. icdev/tools/compliance/omb_m26_04_assessor.py +188 -0
  667. icdev/tools/compliance/oscal_catalog_adapter.py +395 -0
  668. icdev/tools/compliance/oscal_generator.py +2170 -0
  669. icdev/tools/compliance/oscal_tools.py +1182 -0
  670. icdev/tools/compliance/owasp_agentic_assessor.py +226 -0
  671. icdev/tools/compliance/owasp_asi_assessor.py +200 -0
  672. icdev/tools/compliance/owasp_llm_assessor.py +244 -0
  673. icdev/tools/compliance/pci_dss_assessor.py +80 -0
  674. icdev/tools/compliance/pi_compliance_tracker.py +1461 -0
  675. icdev/tools/compliance/poam_generator.py +405 -0
  676. icdev/tools/compliance/resolve_marking.py +283 -0
  677. icdev/tools/compliance/sbd_assessor.py +2068 -0
  678. icdev/tools/compliance/sbd_report_generator.py +1236 -0
  679. icdev/tools/compliance/sbom_generator.py +1008 -0
  680. icdev/tools/compliance/siem_config_generator.py +674 -0
  681. icdev/tools/compliance/slsa_attestation_generator.py +490 -0
  682. icdev/tools/compliance/soc2_assessor.py +77 -0
  683. icdev/tools/compliance/ssp_generator.py +573 -0
  684. icdev/tools/compliance/stig_checker.py +727 -0
  685. icdev/tools/compliance/swft_evidence_bundler.py +337 -0
  686. icdev/tools/compliance/system_card_generator.py +309 -0
  687. icdev/tools/compliance/traceability_matrix.py +1281 -0
  688. icdev/tools/compliance/universal_classification_manager.py +1172 -0
  689. icdev/tools/compliance/xacta/__init__.py +2 -0
  690. icdev/tools/compliance/xacta/xacta_client.py +449 -0
  691. icdev/tools/compliance/xacta/xacta_export.py +557 -0
  692. icdev/tools/compliance/xacta/xacta_sync.py +333 -0
  693. icdev/tools/compliance/xai_assessor.py +231 -0
  694. icdev/tools/dashboard/__init__.py +1 -0
  695. icdev/tools/dashboard/api/__init__.py +1 -0
  696. icdev/tools/dashboard/api/_pipeline_state.py +17 -0
  697. icdev/tools/dashboard/api/activity.py +206 -0
  698. icdev/tools/dashboard/api/admin.py +176 -0
  699. icdev/tools/dashboard/api/agents.py +53 -0
  700. icdev/tools/dashboard/api/ai_accountability.py +163 -0
  701. icdev/tools/dashboard/api/ai_transparency.py +198 -0
  702. icdev/tools/dashboard/api/audit.py +58 -0
  703. icdev/tools/dashboard/api/batch.py +666 -0
  704. icdev/tools/dashboard/api/chat.py +241 -0
  705. icdev/tools/dashboard/api/cicd.py +219 -0
  706. icdev/tools/dashboard/api/code_quality.py +223 -0
  707. icdev/tools/dashboard/api/compliance.py +171 -0
  708. icdev/tools/dashboard/api/cpmp.py +915 -0
  709. icdev/tools/dashboard/api/diagrams.py +65 -0
  710. icdev/tools/dashboard/api/events.py +250 -0
  711. icdev/tools/dashboard/api/evidence.py +99 -0
  712. icdev/tools/dashboard/api/fedramp_20x.py +77 -0
  713. icdev/tools/dashboard/api/govcon.py +1095 -0
  714. icdev/tools/dashboard/api/intake.py +1171 -0
  715. icdev/tools/dashboard/api/lineage.py +163 -0
  716. icdev/tools/dashboard/api/metrics.py +155 -0
  717. icdev/tools/dashboard/api/nlq.py +72 -0
  718. icdev/tools/dashboard/api/orchestration.py +472 -0
  719. icdev/tools/dashboard/api/oscal.py +183 -0
  720. icdev/tools/dashboard/api/prod_audit.py +183 -0
  721. icdev/tools/dashboard/api/projects.py +191 -0
  722. icdev/tools/dashboard/api/proposals.py +1084 -0
  723. icdev/tools/dashboard/api/traces.py +363 -0
  724. icdev/tools/dashboard/api/usage.py +234 -0
  725. icdev/tools/dashboard/app.py +1986 -0
  726. icdev/tools/dashboard/auth.py +500 -0
  727. icdev/tools/dashboard/byok.py +245 -0
  728. icdev/tools/dashboard/chat_manager.py +675 -0
  729. icdev/tools/dashboard/config.py +116 -0
  730. icdev/tools/dashboard/diagram_definitions.py +642 -0
  731. icdev/tools/dashboard/nlq_processor.py +323 -0
  732. icdev/tools/dashboard/phase_loader.py +136 -0
  733. icdev/tools/dashboard/sse_manager.py +89 -0
  734. icdev/tools/dashboard/state_tracker.py +267 -0
  735. icdev/tools/dashboard/static/css/style.css +706 -0
  736. icdev/tools/dashboard/static/css/ux.css +2047 -0
  737. icdev/tools/dashboard/static/js/activity.js +322 -0
  738. icdev/tools/dashboard/static/js/api.js +161 -0
  739. icdev/tools/dashboard/static/js/batch.js +814 -0
  740. icdev/tools/dashboard/static/js/charts.js +618 -0
  741. icdev/tools/dashboard/static/js/chat.js +1514 -0
  742. icdev/tools/dashboard/static/js/kanban.js +113 -0
  743. icdev/tools/dashboard/static/js/live.js +569 -0
  744. icdev/tools/dashboard/static/js/mermaid-icdev.js +332 -0
  745. icdev/tools/dashboard/static/js/proposals.js +588 -0
  746. icdev/tools/dashboard/static/js/shortcuts.js +544 -0
  747. icdev/tools/dashboard/static/js/tables.js +652 -0
  748. icdev/tools/dashboard/static/js/tour.js +524 -0
  749. icdev/tools/dashboard/static/js/ux.js +942 -0
  750. icdev/tools/dashboard/templates/404.html +10 -0
  751. icdev/tools/dashboard/templates/activity.html +80 -0
  752. icdev/tools/dashboard/templates/admin/users.html +144 -0
  753. icdev/tools/dashboard/templates/ai_accountability.html +235 -0
  754. icdev/tools/dashboard/templates/ai_transparency.html +263 -0
  755. icdev/tools/dashboard/templates/base.html +104 -0
  756. icdev/tools/dashboard/templates/batch.html +23 -0
  757. icdev/tools/dashboard/templates/chat.html +332 -0
  758. icdev/tools/dashboard/templates/children.html +149 -0
  759. icdev/tools/dashboard/templates/cicd.html +253 -0
  760. icdev/tools/dashboard/templates/code_quality.html +214 -0
  761. icdev/tools/dashboard/templates/cpmp/cor_detail.html +220 -0
  762. icdev/tools/dashboard/templates/cpmp/cor_portal.html +91 -0
  763. icdev/tools/dashboard/templates/cpmp/deliverable_detail.html +197 -0
  764. icdev/tools/dashboard/templates/cpmp/detail.html +578 -0
  765. icdev/tools/dashboard/templates/cpmp/portfolio.html +202 -0
  766. icdev/tools/dashboard/templates/dev_profiles.html +304 -0
  767. icdev/tools/dashboard/templates/diagrams.html +224 -0
  768. icdev/tools/dashboard/templates/events/timeline.html +232 -0
  769. icdev/tools/dashboard/templates/evidence.html +134 -0
  770. icdev/tools/dashboard/templates/fedramp_20x.html +207 -0
  771. icdev/tools/dashboard/templates/gateway.html +244 -0
  772. icdev/tools/dashboard/templates/govcon/capabilities.html +135 -0
  773. icdev/tools/dashboard/templates/govcon/pipeline.html +214 -0
  774. icdev/tools/dashboard/templates/govcon/requirements.html +120 -0
  775. icdev/tools/dashboard/templates/index.html +254 -0
  776. icdev/tools/dashboard/templates/lineage.html +141 -0
  777. icdev/tools/dashboard/templates/login.html +51 -0
  778. icdev/tools/dashboard/templates/monitoring/overview.html +193 -0
  779. icdev/tools/dashboard/templates/orchestration/dashboard.html +545 -0
  780. icdev/tools/dashboard/templates/oscal.html +263 -0
  781. icdev/tools/dashboard/templates/phases.html +150 -0
  782. icdev/tools/dashboard/templates/prod_audit.html +280 -0
  783. icdev/tools/dashboard/templates/profile.html +183 -0
  784. icdev/tools/dashboard/templates/projects/detail.html +583 -0
  785. icdev/tools/dashboard/templates/projects/list.html +47 -0
  786. icdev/tools/dashboard/templates/proposals/detail.html +1253 -0
  787. icdev/tools/dashboard/templates/proposals/list.html +179 -0
  788. icdev/tools/dashboard/templates/proposals/section_detail.html +193 -0
  789. icdev/tools/dashboard/templates/provenance.html +181 -0
  790. icdev/tools/dashboard/templates/query/nlq.html +234 -0
  791. icdev/tools/dashboard/templates/quick_paths.html +69 -0
  792. icdev/tools/dashboard/templates/traces.html +155 -0
  793. icdev/tools/dashboard/templates/translation_detail.html +199 -0
  794. icdev/tools/dashboard/templates/translations.html +162 -0
  795. icdev/tools/dashboard/templates/usage.html +225 -0
  796. icdev/tools/dashboard/templates/wizard.html +539 -0
  797. icdev/tools/dashboard/templates/xai.html +208 -0
  798. icdev/tools/dashboard/ux_helpers.py +962 -0
  799. icdev/tools/dashboard/websocket.py +81 -0
  800. icdev/tools/db/__init__.py +1 -0
  801. icdev/tools/db/backup.py +312 -0
  802. icdev/tools/db/backup_manager.py +832 -0
  803. icdev/tools/db/init_icdev_db.py +5900 -0
  804. icdev/tools/db/migrate.py +178 -0
  805. icdev/tools/db/migration_runner.py +549 -0
  806. icdev/tools/db/migrations/001_baseline/meta.json +9 -0
  807. icdev/tools/db/migrations/001_baseline/up.py +68 -0
  808. icdev/tools/db/migrations/002_memory_enhancements/down.sql +8 -0
  809. icdev/tools/db/migrations/002_memory_enhancements/meta.json +9 -0
  810. icdev/tools/db/migrations/002_memory_enhancements/up.py +118 -0
  811. icdev/tools/db/migrations/003_dev_profiles/meta.json +8 -0
  812. icdev/tools/db/migrations/003_dev_profiles/up.py +93 -0
  813. icdev/tools/db/migrations/004_innovation_engine/down.py +19 -0
  814. icdev/tools/db/migrations/004_innovation_engine/up.py +227 -0
  815. icdev/tools/db/migrations/005_phase_37_ai_security/down.py +19 -0
  816. icdev/tools/db/migrations/005_phase_37_ai_security/up.py +258 -0
  817. icdev/tools/db/migrations/006_phase_36_evolution/down.py +21 -0
  818. icdev/tools/db/migrations/006_phase_36_evolution/up.py +323 -0
  819. icdev/tools/db/migrations/007_phase_38_cloud/down.py +14 -0
  820. icdev/tools/db/migrations/007_phase_38_cloud/up.py +110 -0
  821. icdev/tools/db/migrations/008_phase36_37_integration/up.py +55 -0
  822. icdev/tools/db/migrations/__init__.py +2 -0
  823. icdev/tools/devsecops/__init__.py +2 -0
  824. icdev/tools/devsecops/attestation_manager.py +458 -0
  825. icdev/tools/devsecops/network_segmentation_generator.py +614 -0
  826. icdev/tools/devsecops/pdp_config_generator.py +1256 -0
  827. icdev/tools/devsecops/pipeline_security_generator.py +484 -0
  828. icdev/tools/devsecops/policy_generator.py +653 -0
  829. icdev/tools/devsecops/profile_manager.py +388 -0
  830. icdev/tools/devsecops/service_mesh_generator.py +1073 -0
  831. icdev/tools/devsecops/zta_maturity_scorer.py +368 -0
  832. icdev/tools/devsecops/zta_terraform_generator.py +1303 -0
  833. icdev/tools/dx/__init__.py +3 -0
  834. icdev/tools/dx/companion.py +266 -0
  835. icdev/tools/dx/instruction_generator.py +753 -0
  836. icdev/tools/dx/mcp_config_generator.py +282 -0
  837. icdev/tools/dx/skill_translator.py +425 -0
  838. icdev/tools/dx/tool_detector.py +144 -0
  839. icdev/tools/extensions/__init__.py +21 -0
  840. icdev/tools/extensions/builtins/010_ai_governance_chat.py +277 -0
  841. icdev/tools/extensions/builtins/__init__.py +2 -0
  842. icdev/tools/extensions/extension_manager.py +455 -0
  843. icdev/tools/infra/__init__.py +1 -0
  844. icdev/tools/infra/ansible_generator.py +869 -0
  845. icdev/tools/infra/dockerfile_generator.py +361 -0
  846. icdev/tools/infra/infra_status.py +393 -0
  847. icdev/tools/infra/ironbank_metadata_generator.py +411 -0
  848. icdev/tools/infra/k8s_generator.py +1002 -0
  849. icdev/tools/infra/pipeline_generator.py +832 -0
  850. icdev/tools/infra/rollback.py +400 -0
  851. icdev/tools/infra/terraform_generator.py +1142 -0
  852. icdev/tools/infra/terraform_generator_azure.py +1254 -0
  853. icdev/tools/infra/terraform_generator_gcp.py +953 -0
  854. icdev/tools/infra/terraform_generator_ibm.py +360 -0
  855. icdev/tools/infra/terraform_generator_oci.py +919 -0
  856. icdev/tools/infra/terraform_generator_onprem.py +319 -0
  857. icdev/tools/innovation/__init__.py +8 -0
  858. icdev/tools/innovation/competitive_intel.py +492 -0
  859. icdev/tools/innovation/innovation_manager.py +681 -0
  860. icdev/tools/innovation/introspective_analyzer.py +774 -0
  861. icdev/tools/innovation/register_external_patterns.py +440 -0
  862. icdev/tools/innovation/signal_ranker.py +1038 -0
  863. icdev/tools/innovation/solution_generator.py +697 -0
  864. icdev/tools/innovation/standards_monitor.py +466 -0
  865. icdev/tools/innovation/trend_detector.py +1046 -0
  866. icdev/tools/innovation/triage_engine.py +1149 -0
  867. icdev/tools/innovation/web_scanner.py +894 -0
  868. icdev/tools/installer/__init__.py +1 -0
  869. icdev/tools/installer/compliance_configurator.py +637 -0
  870. icdev/tools/installer/installer.py +1711 -0
  871. icdev/tools/installer/module_registry.py +805 -0
  872. icdev/tools/installer/platform_setup.py +961 -0
  873. icdev/tools/integration/__init__.py +2 -0
  874. icdev/tools/integration/approval_manager.py +561 -0
  875. icdev/tools/integration/doors_exporter.py +627 -0
  876. icdev/tools/integration/gitlab_connector.py +784 -0
  877. icdev/tools/integration/jira_connector.py +774 -0
  878. icdev/tools/integration/servicenow_connector.py +693 -0
  879. icdev/tools/knowledge/__init__.py +1 -0
  880. icdev/tools/knowledge/knowledge_ingest.py +293 -0
  881. icdev/tools/knowledge/pattern_detector.py +693 -0
  882. icdev/tools/knowledge/recommendation_engine.py +461 -0
  883. icdev/tools/knowledge/self_heal_analyzer.py +504 -0
  884. icdev/tools/llm/__init__.py +72 -0
  885. icdev/tools/llm/anthropic_provider.py +170 -0
  886. icdev/tools/llm/azure_openai_provider.py +338 -0
  887. icdev/tools/llm/bedrock_provider.py +315 -0
  888. icdev/tools/llm/embedding_provider.py +438 -0
  889. icdev/tools/llm/gemini_provider.py +381 -0
  890. icdev/tools/llm/ibm_watsonx_provider.py +232 -0
  891. icdev/tools/llm/oci_genai_provider.py +462 -0
  892. icdev/tools/llm/ollama_provider.py +340 -0
  893. icdev/tools/llm/openai_provider.py +225 -0
  894. icdev/tools/llm/provider.py +355 -0
  895. icdev/tools/llm/provider_sdk.py +175 -0
  896. icdev/tools/llm/router.py +780 -0
  897. icdev/tools/llm/vertex_ai_provider.py +374 -0
  898. icdev/tools/maintenance/__init__.py +2 -0
  899. icdev/tools/maintenance/dependency_scanner.py +1030 -0
  900. icdev/tools/maintenance/maintenance_auditor.py +815 -0
  901. icdev/tools/maintenance/remediation_engine.py +966 -0
  902. icdev/tools/maintenance/vulnerability_checker.py +987 -0
  903. icdev/tools/mbse/__init__.py +3 -0
  904. icdev/tools/mbse/des_assessor.py +1186 -0
  905. icdev/tools/mbse/des_report_generator.py +800 -0
  906. icdev/tools/mbse/diagram_extractor.py +811 -0
  907. icdev/tools/mbse/digital_thread.py +1665 -0
  908. icdev/tools/mbse/model_code_generator.py +1122 -0
  909. icdev/tools/mbse/model_control_mapper.py +420 -0
  910. icdev/tools/mbse/pi_model_tracker.py +1093 -0
  911. icdev/tools/mbse/reqif_parser.py +1483 -0
  912. icdev/tools/mbse/sync_engine.py +1805 -0
  913. icdev/tools/mbse/xmi_parser.py +1573 -0
  914. icdev/tools/mcp/__init__.py +1 -0
  915. icdev/tools/mcp/base_server.py +535 -0
  916. icdev/tools/mcp/builder_server.py +725 -0
  917. icdev/tools/mcp/compliance_server.py +1407 -0
  918. icdev/tools/mcp/context_indexer.py +199 -0
  919. icdev/tools/mcp/context_server.py +305 -0
  920. icdev/tools/mcp/core_server.py +679 -0
  921. icdev/tools/mcp/devsecops_server.py +432 -0
  922. icdev/tools/mcp/gap_handlers.py +1079 -0
  923. icdev/tools/mcp/gateway_server.py +339 -0
  924. icdev/tools/mcp/generate_registry.py +623 -0
  925. icdev/tools/mcp/infra_server.py +264 -0
  926. icdev/tools/mcp/innovation_server.py +316 -0
  927. icdev/tools/mcp/integration_server.py +527 -0
  928. icdev/tools/mcp/knowledge_server.py +429 -0
  929. icdev/tools/mcp/maintenance_server.py +248 -0
  930. icdev/tools/mcp/marketplace_server.py +499 -0
  931. icdev/tools/mcp/mbse_server.py +398 -0
  932. icdev/tools/mcp/modernization_server.py +496 -0
  933. icdev/tools/mcp/observability_server.py +354 -0
  934. icdev/tools/mcp/requirements_server.py +415 -0
  935. icdev/tools/mcp/simulation_server.py +468 -0
  936. icdev/tools/mcp/standalone/__init__.py +2 -0
  937. icdev/tools/mcp/standalone/builder.py +59 -0
  938. icdev/tools/mcp/standalone/compliance.py +59 -0
  939. icdev/tools/mcp/standalone/core.py +59 -0
  940. icdev/tools/mcp/standalone/knowledge.py +59 -0
  941. icdev/tools/mcp/standalone/maintenance.py +59 -0
  942. icdev/tools/mcp/supply_chain_server.py +476 -0
  943. icdev/tools/mcp/tool_registry.py +2008 -0
  944. icdev/tools/mcp/unified_server.py +158 -0
  945. icdev/tools/memory/__init__.py +2 -0
  946. icdev/tools/memory/auto_capture.py +347 -0
  947. icdev/tools/memory/embed_memory.py +158 -0
  948. icdev/tools/memory/history_compressor.py +334 -0
  949. icdev/tools/memory/hybrid_search.py +236 -0
  950. icdev/tools/memory/maintenance_cron.py +289 -0
  951. icdev/tools/memory/memory_consolidation.py +444 -0
  952. icdev/tools/memory/memory_db.py +133 -0
  953. icdev/tools/memory/memory_read.py +102 -0
  954. icdev/tools/memory/memory_write.py +222 -0
  955. icdev/tools/memory/semantic_search.py +139 -0
  956. icdev/tools/memory/time_decay.py +435 -0
  957. icdev/tools/modernization/__init__.py +3 -0
  958. icdev/tools/modernization/architecture_extractor.py +734 -0
  959. icdev/tools/modernization/compliance_bridge.py +1499 -0
  960. icdev/tools/modernization/db_migration_planner.py +1385 -0
  961. icdev/tools/modernization/doc_generator.py +1428 -0
  962. icdev/tools/modernization/framework_migrator.py +1525 -0
  963. icdev/tools/modernization/legacy_analyzer.py +1948 -0
  964. icdev/tools/modernization/migration_code_generator.py +1639 -0
  965. icdev/tools/modernization/migration_report_generator.py +1653 -0
  966. icdev/tools/modernization/migration_tracker.py +1726 -0
  967. icdev/tools/modernization/monolith_decomposer.py +1508 -0
  968. icdev/tools/modernization/seven_r_assessor.py +1658 -0
  969. icdev/tools/modernization/strangler_fig_manager.py +1705 -0
  970. icdev/tools/modernization/ui_analyzer.py +771 -0
  971. icdev/tools/modernization/version_migrator.py +1392 -0
  972. icdev/tools/monitor/__init__.py +1 -0
  973. icdev/tools/monitor/alert_correlator.py +495 -0
  974. icdev/tools/monitor/auto_resolver.py +612 -0
  975. icdev/tools/monitor/health_checker.py +509 -0
  976. icdev/tools/monitor/heartbeat_daemon.py +792 -0
  977. icdev/tools/monitor/log_analyzer.py +516 -0
  978. icdev/tools/monitor/metric_collector.py +496 -0
  979. icdev/tools/mosa/__init__.py +10 -0
  980. icdev/tools/mosa/icd_generator.py +370 -0
  981. icdev/tools/mosa/modular_design_analyzer.py +683 -0
  982. icdev/tools/mosa/mosa_code_enforcer.py +349 -0
  983. icdev/tools/mosa/tsp_generator.py +265 -0
  984. icdev/tools/observability/__init__.py +100 -0
  985. icdev/tools/observability/genai_attributes.py +88 -0
  986. icdev/tools/observability/instrumentation.py +140 -0
  987. icdev/tools/observability/mlflow_exporter.py +194 -0
  988. icdev/tools/observability/otel_tracer.py +168 -0
  989. icdev/tools/observability/provenance/__init__.py +3 -0
  990. icdev/tools/observability/provenance/prov_recorder.py +324 -0
  991. icdev/tools/observability/shap/__init__.py +3 -0
  992. icdev/tools/observability/shap/agent_shap.py +275 -0
  993. icdev/tools/observability/sqlite_tracer.py +361 -0
  994. icdev/tools/observability/trace_context.py +205 -0
  995. icdev/tools/observability/tracer.py +230 -0
  996. icdev/tools/orchestration/__init__.py +2 -0
  997. icdev/tools/orchestration/workflow_composer.py +361 -0
  998. icdev/tools/project/__init__.py +1 -0
  999. icdev/tools/project/manifest_loader.py +418 -0
  1000. icdev/tools/project/project_create.py +350 -0
  1001. icdev/tools/project/project_list.py +174 -0
  1002. icdev/tools/project/project_scaffold.py +1715 -0
  1003. icdev/tools/project/project_status.py +479 -0
  1004. icdev/tools/project/session_context_builder.py +757 -0
  1005. icdev/tools/project/validate_manifest.py +55 -0
  1006. icdev/tools/registry/__init__.py +10 -0
  1007. icdev/tools/registry/absorption_engine.py +832 -0
  1008. icdev/tools/registry/capability_evaluator.py +668 -0
  1009. icdev/tools/registry/child_registry.py +617 -0
  1010. icdev/tools/registry/cross_pollinator.py +1065 -0
  1011. icdev/tools/registry/genome_manager.py +671 -0
  1012. icdev/tools/registry/learning_collector.py +912 -0
  1013. icdev/tools/registry/propagation_manager.py +942 -0
  1014. icdev/tools/registry/staging_manager.py +742 -0
  1015. icdev/tools/registry/telemetry_collector.py +423 -0
  1016. icdev/tools/requirements/__init__.py +1 -0
  1017. icdev/tools/requirements/ai_governance_scorer.py +208 -0
  1018. icdev/tools/requirements/boundary_analyzer.py +1293 -0
  1019. icdev/tools/requirements/clarification_engine.py +618 -0
  1020. icdev/tools/requirements/complexity_scorer.py +387 -0
  1021. icdev/tools/requirements/consistency_analyzer.py +803 -0
  1022. icdev/tools/requirements/constitution_manager.py +605 -0
  1023. icdev/tools/requirements/decomposition_engine.py +778 -0
  1024. icdev/tools/requirements/document_extractor.py +1016 -0
  1025. icdev/tools/requirements/elicitation_techniques.py +519 -0
  1026. icdev/tools/requirements/gap_detector.py +271 -0
  1027. icdev/tools/requirements/intake_engine.py +2188 -0
  1028. icdev/tools/requirements/prd_generator.py +847 -0
  1029. icdev/tools/requirements/prd_validator.py +595 -0
  1030. icdev/tools/requirements/readiness_scorer.py +313 -0
  1031. icdev/tools/requirements/spec_organizer.py +1029 -0
  1032. icdev/tools/requirements/spec_quality_checker.py +1097 -0
  1033. icdev/tools/requirements/traceability_builder.py +579 -0
  1034. icdev/tools/resilience/__init__.py +34 -0
  1035. icdev/tools/resilience/circuit_breaker.py +340 -0
  1036. icdev/tools/resilience/correlation.py +150 -0
  1037. icdev/tools/resilience/errors.py +81 -0
  1038. icdev/tools/resilience/retry.py +95 -0
  1039. icdev/tools/schemas/__init__.py +27 -0
  1040. icdev/tools/schemas/chat.py +61 -0
  1041. icdev/tools/schemas/compliance.py +56 -0
  1042. icdev/tools/schemas/core.py +85 -0
  1043. icdev/tools/schemas/innovation.py +37 -0
  1044. icdev/tools/schemas/validation.py +109 -0
  1045. icdev/tools/sdk/__init__.py +3 -0
  1046. icdev/tools/sdk/icdev_client.py +218 -0
  1047. icdev/tools/security/__init__.py +1 -0
  1048. icdev/tools/security/agent_output_validator.py +330 -0
  1049. icdev/tools/security/agent_trust_scorer.py +466 -0
  1050. icdev/tools/security/ai_bom_generator.py +725 -0
  1051. icdev/tools/security/ai_telemetry_logger.py +469 -0
  1052. icdev/tools/security/atlas_red_team.py +543 -0
  1053. icdev/tools/security/code_pattern_scanner.py +378 -0
  1054. icdev/tools/security/confabulation_detector.py +271 -0
  1055. icdev/tools/security/container_scanner.py +491 -0
  1056. icdev/tools/security/dependency_auditor.py +944 -0
  1057. icdev/tools/security/endpoint_security_scanner.py +579 -0
  1058. icdev/tools/security/mcp_tool_authorizer.py +243 -0
  1059. icdev/tools/security/prompt_injection_detector.py +737 -0
  1060. icdev/tools/security/sast_runner.py +948 -0
  1061. icdev/tools/security/secret_detector.py +378 -0
  1062. icdev/tools/security/tool_chain_validator.py +357 -0
  1063. icdev/tools/security/vuln_scanner.py +539 -0
  1064. icdev/tools/simulation/__init__.py +2 -0
  1065. icdev/tools/simulation/coa_generator.py +1552 -0
  1066. icdev/tools/simulation/monte_carlo.py +758 -0
  1067. icdev/tools/simulation/scenario_manager.py +1073 -0
  1068. icdev/tools/simulation/simulation_engine.py +1104 -0
  1069. icdev/tools/supply_chain/__init__.py +2 -0
  1070. icdev/tools/supply_chain/cve_triager.py +705 -0
  1071. icdev/tools/supply_chain/dependency_graph.py +645 -0
  1072. icdev/tools/supply_chain/isa_manager.py +540 -0
  1073. icdev/tools/supply_chain/scrm_assessor.py +546 -0
  1074. icdev/tools/testing/__init__.py +2 -0
  1075. icdev/tools/testing/acceptance_validator.py +411 -0
  1076. icdev/tools/testing/claude_dir_validator.py +831 -0
  1077. icdev/tools/testing/data_types.py +199 -0
  1078. icdev/tools/testing/e2e_runner.py +715 -0
  1079. icdev/tools/testing/fuzz_cli.py +306 -0
  1080. icdev/tools/testing/health_check.py +483 -0
  1081. icdev/tools/testing/platform_check.py +143 -0
  1082. icdev/tools/testing/production_audit.py +1862 -0
  1083. icdev/tools/testing/production_remediate.py +804 -0
  1084. icdev/tools/testing/screenshot_validator.py +539 -0
  1085. icdev/tools/testing/smoke_test.py +283 -0
  1086. icdev/tools/testing/test_agent_models.py +117 -0
  1087. icdev/tools/testing/test_orchestrator.py +957 -0
  1088. icdev/tools/testing/utils.py +229 -0
  1089. icdev/tools/translation/__init__.py +17 -0
  1090. icdev/tools/translation/code_translator.py +550 -0
  1091. icdev/tools/translation/dependency_mapper.py +277 -0
  1092. icdev/tools/translation/feature_map.py +395 -0
  1093. icdev/tools/translation/project_assembler.py +439 -0
  1094. icdev/tools/translation/source_extractor.py +609 -0
  1095. icdev/tools/translation/test_translator.py +333 -0
  1096. icdev/tools/translation/translation_manager.py +582 -0
  1097. icdev/tools/translation/translation_validator.py +662 -0
  1098. icdev/tools/translation/type_checker.py +371 -0
  1099. icdev-1.0.0.dist-info/METADATA +868 -0
  1100. icdev-1.0.0.dist-info/RECORD +1105 -0
  1101. icdev-1.0.0.dist-info/WHEEL +5 -0
  1102. icdev-1.0.0.dist-info/entry_points.txt +9 -0
  1103. icdev-1.0.0.dist-info/licenses/LICENSE +254 -0
  1104. icdev-1.0.0.dist-info/licenses/NOTICE +268 -0
  1105. icdev-1.0.0.dist-info/top_level.txt +1 -0
@@ -0,0 +1,4370 @@
1
+ {
2
+ "metadata": {
3
+ "title": "FedRAMP High Baseline Controls",
4
+ "source": "FedRAMP Rev 5 High Baseline (2023), NIST SP 800-53 Rev 5",
5
+ "classification": "CUI // SP-CTI",
6
+ "version": "1.0",
7
+ "last_updated": "2026-02-15",
8
+ "description": "FedRAMP High baseline control requirements for DoD IL5+ cloud systems. Extends FedRAMP Moderate with additional controls and enhanced parameters for high-impact systems processing classified or mission-critical data."
9
+ },
10
+ "controls": [
11
+ {
12
+ "id": "FRM-H-AC-1",
13
+ "family": "AC",
14
+ "nist_control_id": "AC-1",
15
+ "title": "Access Control Policy and Procedures",
16
+ "description": "Develop, document, and disseminate an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance. Review and update the current access control policy and procedures in accordance with FedRAMP-defined frequencies.",
17
+ "fedramp_parameters": {
18
+ "policy_review_frequency": "at least every 3 years",
19
+ "procedure_review_frequency": "at least annually"
20
+ },
21
+ "fedramp_additional_requirements": "Policy must explicitly address cloud-specific access control requirements including API access, multi-tenancy isolation, CSP administrative access, and high-impact data handling procedures.",
22
+ "priority": "P1",
23
+ "baseline": "high",
24
+ "moderate_also": true
25
+ },
26
+ {
27
+ "id": "FRM-H-AC-2",
28
+ "family": "AC",
29
+ "nist_control_id": "AC-2",
30
+ "title": "Account Management",
31
+ "description": "Define and document account types, establish conditions for group and role membership, specify authorized users and access authorizations, require approvals for account creation, create/enable/modify/disable/remove accounts in accordance with policy, monitor accounts, and review accounts for compliance.",
32
+ "fedramp_parameters": {
33
+ "account_review_frequency": "at least annually",
34
+ "inactivity_disable_period": "90 days",
35
+ "notification_period": "notify account managers within 24 hours when accounts are no longer required, users are terminated or transferred, or system usage changes"
36
+ },
37
+ "fedramp_additional_requirements": "CSP must implement automated mechanisms to support account management functions. Shared/group accounts are prohibited for privileged access. Guest/anonymous accounts must be disabled. For High systems, account reviews must include verification of need-to-know and clearance status.",
38
+ "priority": "P1",
39
+ "baseline": "high",
40
+ "moderate_also": true
41
+ },
42
+ {
43
+ "id": "FRM-H-AC-2(1)",
44
+ "family": "AC",
45
+ "nist_control_id": "AC-2(1)",
46
+ "title": "Account Management | Automated System Account Management",
47
+ "description": "Employ automated mechanisms to support the management of system accounts including creation, modification, enabling, disabling, and removal of accounts.",
48
+ "fedramp_parameters": {},
49
+ "fedramp_additional_requirements": "Automated account management must integrate with CSP identity provider and support SCIM or equivalent provisioning protocols.",
50
+ "priority": "P1",
51
+ "baseline": "high",
52
+ "moderate_also": true
53
+ },
54
+ {
55
+ "id": "FRM-H-AC-2(2)",
56
+ "family": "AC",
57
+ "nist_control_id": "AC-2(2)",
58
+ "title": "Account Management | Automated Temporary and Emergency Account Management",
59
+ "description": "Automatically remove or disable temporary and emergency accounts after a FedRAMP-defined time period.",
60
+ "fedramp_parameters": {
61
+ "temporary_account_duration": "no more than 72 hours",
62
+ "emergency_account_duration": "no more than 72 hours"
63
+ },
64
+ "fedramp_additional_requirements": "Emergency accounts must be logged and reviewed. Notification to ISSO required upon emergency account activation.",
65
+ "priority": "P1",
66
+ "baseline": "high",
67
+ "moderate_also": true
68
+ },
69
+ {
70
+ "id": "FRM-H-AC-2(3)",
71
+ "family": "AC",
72
+ "nist_control_id": "AC-2(3)",
73
+ "title": "Account Management | Disable Accounts",
74
+ "description": "Disable accounts when the accounts have been inactive for a FedRAMP-defined time period.",
75
+ "fedramp_parameters": {
76
+ "inactivity_period": "90 days for user accounts, 35 days for non-interactive service accounts"
77
+ },
78
+ "fedramp_additional_requirements": "",
79
+ "priority": "P1",
80
+ "baseline": "high",
81
+ "moderate_also": true
82
+ },
83
+ {
84
+ "id": "FRM-H-AC-2(4)",
85
+ "family": "AC",
86
+ "nist_control_id": "AC-2(4)",
87
+ "title": "Account Management | Automated Audit Actions",
88
+ "description": "Automatically audit account creation, modification, enabling, disabling, and removal actions and notify appropriate personnel.",
89
+ "fedramp_parameters": {
90
+ "notification_recipients": "system administrators and ISSOs"
91
+ },
92
+ "fedramp_additional_requirements": "",
93
+ "priority": "P1",
94
+ "baseline": "high",
95
+ "moderate_also": true
96
+ },
97
+ {
98
+ "id": "FRM-H-AC-2(5)",
99
+ "family": "AC",
100
+ "nist_control_id": "AC-2(5)",
101
+ "title": "Account Management | Inactivity Logout",
102
+ "description": "Require that users log out when the FedRAMP-defined time period of expected inactivity is exceeded or when the session inactivity timeout is reached.",
103
+ "fedramp_parameters": {
104
+ "inactivity_logout": "after session inactivity timeout defined in AC-12"
105
+ },
106
+ "fedramp_additional_requirements": "Users must be notified prior to automatic logout. Re-authentication required after logout.",
107
+ "priority": "P2",
108
+ "baseline": "high",
109
+ "moderate_also": true
110
+ },
111
+ {
112
+ "id": "FRM-H-AC-2(12)",
113
+ "family": "AC",
114
+ "nist_control_id": "AC-2(12)",
115
+ "title": "Account Management | Account Monitoring for Atypical Usage",
116
+ "description": "Monitor system accounts for atypical usage and report atypical usage of system accounts to designated personnel.",
117
+ "fedramp_parameters": {
118
+ "monitoring_criteria": "atypical usage patterns including off-hours access, excessive failed login attempts, access from unusual locations, and privilege escalation attempts",
119
+ "report_recipients": "ISSOs and system administrators"
120
+ },
121
+ "fedramp_additional_requirements": "Monitoring must include behavioral analytics for high-impact systems. Automated alerting required for anomalous privileged account activity.",
122
+ "priority": "P1",
123
+ "baseline": "high",
124
+ "moderate_also": true
125
+ },
126
+ {
127
+ "id": "FRM-H-AC-2(13)",
128
+ "family": "AC",
129
+ "nist_control_id": "AC-2(13)",
130
+ "title": "Account Management | Disable Accounts for High-Risk Individuals",
131
+ "description": "Disable accounts of individuals within 24 hours of discovery of significant risk.",
132
+ "fedramp_parameters": {
133
+ "disable_timeframe": "within 1 hour of determination of significant risk for High baseline"
134
+ },
135
+ "fedramp_additional_requirements": "Risk determinations must be documented in audit trail. Accounts must be disabled, not deleted, to preserve forensic data.",
136
+ "priority": "P1",
137
+ "baseline": "high",
138
+ "moderate_also": false
139
+ },
140
+ {
141
+ "id": "FRM-H-AC-3",
142
+ "family": "AC",
143
+ "nist_control_id": "AC-3",
144
+ "title": "Access Enforcement",
145
+ "description": "Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.",
146
+ "fedramp_parameters": {},
147
+ "fedramp_additional_requirements": "Access enforcement must address multi-tenant isolation ensuring one tenant cannot access another tenant's data or resources. API-level access enforcement is required.",
148
+ "priority": "P1",
149
+ "baseline": "high",
150
+ "moderate_also": true
151
+ },
152
+ {
153
+ "id": "FRM-H-AC-4",
154
+ "family": "AC",
155
+ "nist_control_id": "AC-4",
156
+ "title": "Information Flow Enforcement",
157
+ "description": "Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on FedRAMP-defined information flow control policies.",
158
+ "fedramp_parameters": {
159
+ "flow_control_policies": "policies defined by the organization and approved by the JAB/AO"
160
+ },
161
+ "fedramp_additional_requirements": "Information flow enforcement must prevent data exfiltration between authorization boundaries and enforce tenant data isolation in multi-tenant architectures.",
162
+ "priority": "P1",
163
+ "baseline": "high",
164
+ "moderate_also": true
165
+ },
166
+ {
167
+ "id": "FRM-H-AC-4(4)",
168
+ "family": "AC",
169
+ "nist_control_id": "AC-4(4)",
170
+ "title": "Information Flow Enforcement | Flow Control of Encrypted Information",
171
+ "description": "Prevent encrypted information from bypassing content-checking mechanisms by decrypting the information, blocking the flow of the encrypted information, or terminating communications sessions attempting to pass encrypted information.",
172
+ "fedramp_parameters": {
173
+ "encrypted_flow_action": "decrypt and inspect or block encrypted traffic that cannot be inspected"
174
+ },
175
+ "fedramp_additional_requirements": "TLS inspection required at authorization boundaries for High systems. SSL/TLS break-and-inspect must use FIPS 140-2 validated modules.",
176
+ "priority": "P1",
177
+ "baseline": "high",
178
+ "moderate_also": false
179
+ },
180
+ {
181
+ "id": "FRM-H-AC-5",
182
+ "family": "AC",
183
+ "nist_control_id": "AC-5",
184
+ "title": "Separation of Duties",
185
+ "description": "Identify and document duties of individuals requiring separation. Define system access authorizations to support separation of duties.",
186
+ "fedramp_parameters": {
187
+ "separation_duties": "at minimum: security administration, system administration, audit administration, and application administration"
188
+ },
189
+ "fedramp_additional_requirements": "CSP must document separation of duties between CSP operations and customer tenant administration.",
190
+ "priority": "P1",
191
+ "baseline": "high",
192
+ "moderate_also": true
193
+ },
194
+ {
195
+ "id": "FRM-H-AC-6",
196
+ "family": "AC",
197
+ "nist_control_id": "AC-6",
198
+ "title": "Least Privilege",
199
+ "description": "Employ the principle of least privilege, allowing only authorized accesses for users and processes which are necessary to accomplish assigned organizational tasks.",
200
+ "fedramp_parameters": {},
201
+ "fedramp_additional_requirements": "Least privilege must be enforced for CSP administrative access to customer tenants. Just-in-time access provisioning is required for privileged functions on High systems.",
202
+ "priority": "P1",
203
+ "baseline": "high",
204
+ "moderate_also": true
205
+ },
206
+ {
207
+ "id": "FRM-H-AC-6(1)",
208
+ "family": "AC",
209
+ "nist_control_id": "AC-6(1)",
210
+ "title": "Least Privilege | Authorize Access to Security Functions",
211
+ "description": "Authorize access to security functions and security-relevant information for only those personnel explicitly designated by the organization.",
212
+ "fedramp_parameters": {},
213
+ "fedramp_additional_requirements": "Access to security functions must be reviewed quarterly for High systems.",
214
+ "priority": "P1",
215
+ "baseline": "high",
216
+ "moderate_also": true
217
+ },
218
+ {
219
+ "id": "FRM-H-AC-6(2)",
220
+ "family": "AC",
221
+ "nist_control_id": "AC-6(2)",
222
+ "title": "Least Privilege | Non-Privileged Access for Nonsecurity Functions",
223
+ "description": "Require that users of system accounts or roles with access to security functions or security-relevant information use non-privileged accounts or roles when accessing nonsecurity functions.",
224
+ "fedramp_parameters": {},
225
+ "fedramp_additional_requirements": "Privileged accounts must be separate from day-to-day user accounts with no email or web browsing capability.",
226
+ "priority": "P1",
227
+ "baseline": "high",
228
+ "moderate_also": true
229
+ },
230
+ {
231
+ "id": "FRM-H-AC-6(3)",
232
+ "family": "AC",
233
+ "nist_control_id": "AC-6(3)",
234
+ "title": "Least Privilege | Network Access to Privileged Commands",
235
+ "description": "Authorize network access to privileged commands only for compelling operational needs and document the rationale for such access in the security plan for the system.",
236
+ "fedramp_parameters": {},
237
+ "fedramp_additional_requirements": "Network access to privileged commands must traverse a jump box or privileged access workstation (PAW). All sessions must be recorded.",
238
+ "priority": "P1",
239
+ "baseline": "high",
240
+ "moderate_also": false
241
+ },
242
+ {
243
+ "id": "FRM-H-AC-6(5)",
244
+ "family": "AC",
245
+ "nist_control_id": "AC-6(5)",
246
+ "title": "Least Privilege | Privileged Accounts",
247
+ "description": "Restrict privileged accounts on the system to specific personnel or roles designated by the organization.",
248
+ "fedramp_parameters": {},
249
+ "fedramp_additional_requirements": "CSP must maintain a list of all privileged accounts and review quarterly.",
250
+ "priority": "P1",
251
+ "baseline": "high",
252
+ "moderate_also": true
253
+ },
254
+ {
255
+ "id": "FRM-H-AC-6(9)",
256
+ "family": "AC",
257
+ "nist_control_id": "AC-6(9)",
258
+ "title": "Least Privilege | Log Use of Privileged Functions",
259
+ "description": "Log the execution of privileged functions.",
260
+ "fedramp_parameters": {},
261
+ "fedramp_additional_requirements": "Logs of privileged function execution must be retained for at least one year and available for review within 72 hours.",
262
+ "priority": "P1",
263
+ "baseline": "high",
264
+ "moderate_also": true
265
+ },
266
+ {
267
+ "id": "FRM-H-AC-6(10)",
268
+ "family": "AC",
269
+ "nist_control_id": "AC-6(10)",
270
+ "title": "Least Privilege | Prohibit Non-Privileged Users from Executing Privileged Functions",
271
+ "description": "Prevent non-privileged users from executing privileged functions.",
272
+ "fedramp_parameters": {},
273
+ "fedramp_additional_requirements": "System must enforce technical controls preventing privilege escalation, not rely solely on policy.",
274
+ "priority": "P1",
275
+ "baseline": "high",
276
+ "moderate_also": true
277
+ },
278
+ {
279
+ "id": "FRM-H-AC-7",
280
+ "family": "AC",
281
+ "nist_control_id": "AC-7",
282
+ "title": "Unsuccessful Logon Attempts",
283
+ "description": "Enforce a limit of consecutive invalid logon attempts by a user during a FedRAMP-defined time period and automatically lock the account or delay the next logon prompt.",
284
+ "fedramp_parameters": {
285
+ "max_unsuccessful_attempts": "not more than 3",
286
+ "time_period": "15 minutes",
287
+ "lockout_duration": "lock account for at least 30 minutes or until released by an administrator"
288
+ },
289
+ "fedramp_additional_requirements": "All failed logon attempts must be logged with source IP, timestamp, and account identifier.",
290
+ "priority": "P1",
291
+ "baseline": "high",
292
+ "moderate_also": true
293
+ },
294
+ {
295
+ "id": "FRM-H-AC-8",
296
+ "family": "AC",
297
+ "nist_control_id": "AC-8",
298
+ "title": "System Use Notification",
299
+ "description": "Display a system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable laws, policies, and standards.",
300
+ "fedramp_parameters": {
301
+ "banner_content": "US Government system notice with unauthorized use warning and monitoring consent"
302
+ },
303
+ "fedramp_additional_requirements": "Banner must be displayed for all interactive sessions including web, SSH, API console, and administrative interfaces.",
304
+ "priority": "P1",
305
+ "baseline": "high",
306
+ "moderate_also": true
307
+ },
308
+ {
309
+ "id": "FRM-H-AC-10",
310
+ "family": "AC",
311
+ "nist_control_id": "AC-10",
312
+ "title": "Concurrent Session Control",
313
+ "description": "Limit the number of concurrent sessions for each system account to the FedRAMP-defined number.",
314
+ "fedramp_parameters": {
315
+ "max_concurrent_sessions": "3 sessions for privileged users, 5 sessions for non-privileged users"
316
+ },
317
+ "fedramp_additional_requirements": "Concurrent session limits must be enforced at both the application and infrastructure layers. Exceeding session limits must generate an alert.",
318
+ "priority": "P2",
319
+ "baseline": "high",
320
+ "moderate_also": false
321
+ },
322
+ {
323
+ "id": "FRM-H-AC-11",
324
+ "family": "AC",
325
+ "nist_control_id": "AC-11",
326
+ "title": "Device Lock",
327
+ "description": "Prevent further access to the system by initiating a device lock after a FedRAMP-defined time period of inactivity, and retain the device lock until the user re-authenticates.",
328
+ "fedramp_parameters": {
329
+ "inactivity_timeout": "15 minutes"
330
+ },
331
+ "fedramp_additional_requirements": "",
332
+ "priority": "P3",
333
+ "baseline": "high",
334
+ "moderate_also": true
335
+ },
336
+ {
337
+ "id": "FRM-H-AC-11(1)",
338
+ "family": "AC",
339
+ "nist_control_id": "AC-11(1)",
340
+ "title": "Device Lock | Pattern-Hiding Displays",
341
+ "description": "Conceal information previously visible on the display with a publicly viewable image via a pattern-hiding display.",
342
+ "fedramp_parameters": {},
343
+ "fedramp_additional_requirements": "Screen lock must completely obscure all displayed information. No partial screen savers permitted.",
344
+ "priority": "P3",
345
+ "baseline": "high",
346
+ "moderate_also": true
347
+ },
348
+ {
349
+ "id": "FRM-H-AC-12",
350
+ "family": "AC",
351
+ "nist_control_id": "AC-12",
352
+ "title": "Session Termination",
353
+ "description": "Automatically terminate a user session after FedRAMP-defined conditions or trigger events.",
354
+ "fedramp_parameters": {
355
+ "session_timeout": "30 minutes of inactivity for non-privileged sessions",
356
+ "privileged_session_timeout": "15 minutes of inactivity for privileged sessions"
357
+ },
358
+ "fedramp_additional_requirements": "Session tokens must be invalidated server-side upon termination. Re-authentication required after session timeout.",
359
+ "priority": "P2",
360
+ "baseline": "high",
361
+ "moderate_also": true
362
+ },
363
+ {
364
+ "id": "FRM-H-AC-14",
365
+ "family": "AC",
366
+ "nist_control_id": "AC-14",
367
+ "title": "Permitted Actions Without Identification or Authentication",
368
+ "description": "Identify user actions that can be performed on the system without identification or authentication consistent with organizational mission and business functions and document and justify such actions.",
369
+ "fedramp_parameters": {},
370
+ "fedramp_additional_requirements": "CSP must document all unauthenticated access paths and ensure no CUI is accessible without authentication. For High, unauthenticated actions must be minimized to only public-facing content.",
371
+ "priority": "P3",
372
+ "baseline": "high",
373
+ "moderate_also": true
374
+ },
375
+ {
376
+ "id": "FRM-H-AC-17",
377
+ "family": "AC",
378
+ "nist_control_id": "AC-17",
379
+ "title": "Remote Access",
380
+ "description": "Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed. Authorize each type of remote access to the system prior to allowing such connections.",
381
+ "fedramp_parameters": {},
382
+ "fedramp_additional_requirements": "All remote administrative access must use encrypted channels (FIPS-validated cryptography) and multi-factor authentication.",
383
+ "priority": "P1",
384
+ "baseline": "high",
385
+ "moderate_also": true
386
+ },
387
+ {
388
+ "id": "FRM-H-AC-17(1)",
389
+ "family": "AC",
390
+ "nist_control_id": "AC-17(1)",
391
+ "title": "Remote Access | Monitoring and Control",
392
+ "description": "Employ automated mechanisms to monitor and control remote access methods.",
393
+ "fedramp_parameters": {},
394
+ "fedramp_additional_requirements": "Real-time monitoring of all remote access sessions required for High systems.",
395
+ "priority": "P1",
396
+ "baseline": "high",
397
+ "moderate_also": true
398
+ },
399
+ {
400
+ "id": "FRM-H-AC-17(2)",
401
+ "family": "AC",
402
+ "nist_control_id": "AC-17(2)",
403
+ "title": "Remote Access | Protection of Confidentiality and Integrity Using Encryption",
404
+ "description": "Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.",
405
+ "fedramp_parameters": {
406
+ "encryption_standard": "FIPS 140-2 validated cryptographic modules, TLS 1.2 minimum, TLS 1.3 preferred"
407
+ },
408
+ "fedramp_additional_requirements": "All remote access must use FIPS 140-2 validated encryption. SSH must use FIPS-approved algorithms only.",
409
+ "priority": "P1",
410
+ "baseline": "high",
411
+ "moderate_also": true
412
+ },
413
+ {
414
+ "id": "FRM-H-AC-17(3)",
415
+ "family": "AC",
416
+ "nist_control_id": "AC-17(3)",
417
+ "title": "Remote Access | Managed Access Control Points",
418
+ "description": "Route remote accesses through authorized and managed network access control points.",
419
+ "fedramp_parameters": {
420
+ "access_control_points": "managed VPN concentrators or zero-trust network access gateways"
421
+ },
422
+ "fedramp_additional_requirements": "All remote access must traverse a managed access control point with full packet inspection capability. Split tunneling is prohibited.",
423
+ "priority": "P1",
424
+ "baseline": "high",
425
+ "moderate_also": false
426
+ },
427
+ {
428
+ "id": "FRM-H-AC-17(4)",
429
+ "family": "AC",
430
+ "nist_control_id": "AC-17(4)",
431
+ "title": "Remote Access | Privileged Commands and Access",
432
+ "description": "Authorize the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs and document the rationale for such access in the security plan.",
433
+ "fedramp_parameters": {},
434
+ "fedramp_additional_requirements": "Remote privileged access must use dedicated privileged access workstations. Session recording required for all remote privileged commands.",
435
+ "priority": "P1",
436
+ "baseline": "high",
437
+ "moderate_also": false
438
+ },
439
+ {
440
+ "id": "FRM-H-AC-18",
441
+ "family": "AC",
442
+ "nist_control_id": "AC-18",
443
+ "title": "Wireless Access",
444
+ "description": "Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access. Authorize each type of wireless access to the system prior to allowing such connections.",
445
+ "fedramp_parameters": {},
446
+ "fedramp_additional_requirements": "Wireless access must use WPA3 or FIPS-validated encryption. Wireless IDS/IPS required.",
447
+ "priority": "P1",
448
+ "baseline": "high",
449
+ "moderate_also": true
450
+ },
451
+ {
452
+ "id": "FRM-H-AC-18(1)",
453
+ "family": "AC",
454
+ "nist_control_id": "AC-18(1)",
455
+ "title": "Wireless Access | Authentication and Encryption",
456
+ "description": "Protect wireless access to the system using authentication of users and/or devices and encryption.",
457
+ "fedramp_parameters": {
458
+ "wireless_encryption": "FIPS 140-2 validated cryptographic mechanisms"
459
+ },
460
+ "fedramp_additional_requirements": "",
461
+ "priority": "P1",
462
+ "baseline": "high",
463
+ "moderate_also": true
464
+ },
465
+ {
466
+ "id": "FRM-H-AC-18(4)",
467
+ "family": "AC",
468
+ "nist_control_id": "AC-18(4)",
469
+ "title": "Wireless Access | Restrict Configurations by Users",
470
+ "description": "Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.",
471
+ "fedramp_parameters": {},
472
+ "fedramp_additional_requirements": "Users must not be permitted to configure ad-hoc wireless networks. Configuration changes require ISSO approval.",
473
+ "priority": "P1",
474
+ "baseline": "high",
475
+ "moderate_also": false
476
+ },
477
+ {
478
+ "id": "FRM-H-AC-18(5)",
479
+ "family": "AC",
480
+ "nist_control_id": "AC-18(5)",
481
+ "title": "Wireless Access | Antennas and Transmission Power Levels",
482
+ "description": "Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.",
483
+ "fedramp_parameters": {},
484
+ "fedramp_additional_requirements": "Wireless signal leakage assessments required annually. Transmission power must be minimized to prevent emanation beyond facility boundaries.",
485
+ "priority": "P1",
486
+ "baseline": "high",
487
+ "moderate_also": false
488
+ },
489
+ {
490
+ "id": "FRM-H-AC-19",
491
+ "family": "AC",
492
+ "nist_control_id": "AC-19",
493
+ "title": "Access Control for Mobile Devices",
494
+ "description": "Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, including when such devices are outside of controlled areas. Authorize the connection of mobile devices to organizational systems.",
495
+ "fedramp_parameters": {},
496
+ "fedramp_additional_requirements": "Mobile devices accessing High systems must be organization-managed with MDM enrollment, full-device encryption, and remote wipe capability.",
497
+ "priority": "P1",
498
+ "baseline": "high",
499
+ "moderate_also": true
500
+ },
501
+ {
502
+ "id": "FRM-H-AC-19(5)",
503
+ "family": "AC",
504
+ "nist_control_id": "AC-19(5)",
505
+ "title": "Access Control for Mobile Devices | Full Device or Container-Based Encryption",
506
+ "description": "Employ full-device encryption or container-based encryption to protect the confidentiality and integrity of information on mobile devices.",
507
+ "fedramp_parameters": {
508
+ "encryption_standard": "FIPS 140-2 validated full-device encryption"
509
+ },
510
+ "fedramp_additional_requirements": "",
511
+ "priority": "P1",
512
+ "baseline": "high",
513
+ "moderate_also": true
514
+ },
515
+ {
516
+ "id": "FRM-H-AC-20",
517
+ "family": "AC",
518
+ "nist_control_id": "AC-20",
519
+ "title": "Use of External Systems",
520
+ "description": "Establish terms and conditions consistent with trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to access the system from external systems and process, store, or transmit organization-controlled information using external systems.",
521
+ "fedramp_parameters": {},
522
+ "fedramp_additional_requirements": "External systems must meet equivalent FedRAMP High baseline requirements or connections must be restricted via controlled interfaces with data loss prevention.",
523
+ "priority": "P1",
524
+ "baseline": "high",
525
+ "moderate_also": true
526
+ },
527
+ {
528
+ "id": "FRM-H-AC-20(1)",
529
+ "family": "AC",
530
+ "nist_control_id": "AC-20(1)",
531
+ "title": "Use of External Systems | Limits on Authorized Use",
532
+ "description": "Permit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after verification that required security controls are implemented on the external system as specified in organizational policy.",
533
+ "fedramp_parameters": {},
534
+ "fedramp_additional_requirements": "",
535
+ "priority": "P1",
536
+ "baseline": "high",
537
+ "moderate_also": true
538
+ },
539
+ {
540
+ "id": "FRM-H-AC-20(2)",
541
+ "family": "AC",
542
+ "nist_control_id": "AC-20(2)",
543
+ "title": "Use of External Systems | Portable Storage Devices \u00e2\u20ac\u201d Restricted Use",
544
+ "description": "Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems.",
545
+ "fedramp_parameters": {},
546
+ "fedramp_additional_requirements": "Portable storage devices must be encrypted with FIPS 140-2 validated encryption. Use of personally-owned portable storage is prohibited on High systems.",
547
+ "priority": "P1",
548
+ "baseline": "high",
549
+ "moderate_also": true
550
+ },
551
+ {
552
+ "id": "FRM-H-AC-21",
553
+ "family": "AC",
554
+ "nist_control_id": "AC-21",
555
+ "title": "Information Sharing",
556
+ "description": "Facilitate information sharing by enabling authorized users to determine whether access authorizations assigned to a sharing partner match the information's access and use restrictions and employ automated mechanisms or manual processes to assist users in making information sharing and collaboration decisions.",
557
+ "fedramp_parameters": {
558
+ "sharing_circumstances": "when processing, storing, or transmitting CUI between systems at different impact levels or with different authorization boundaries"
559
+ },
560
+ "fedramp_additional_requirements": "Information sharing agreements must be documented and approved by the AO. Automated data classification and labeling required for High systems.",
561
+ "priority": "P2",
562
+ "baseline": "high",
563
+ "moderate_also": false
564
+ },
565
+ {
566
+ "id": "FRM-H-AC-22",
567
+ "family": "AC",
568
+ "nist_control_id": "AC-22",
569
+ "title": "Publicly Accessible Content",
570
+ "description": "Designate individuals authorized to make information publicly accessible, train authorized individuals to ensure publicly accessible information does not contain nonpublic information, review proposed content before posting, review content on the publicly accessible system for nonpublic information and remove if found.",
571
+ "fedramp_parameters": {
572
+ "review_frequency": "at least quarterly"
573
+ },
574
+ "fedramp_additional_requirements": "Automated scanning for CUI/PII in publicly accessible content required. Immediate removal upon discovery of nonpublic information.",
575
+ "priority": "P3",
576
+ "baseline": "high",
577
+ "moderate_also": false
578
+ },
579
+ {
580
+ "id": "FRM-H-AT-1",
581
+ "family": "AT",
582
+ "nist_control_id": "AT-1",
583
+ "title": "Awareness and Training Policy and Procedures",
584
+ "description": "Develop, document, and disseminate a security and privacy awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance. Review and update the policy and procedures.",
585
+ "fedramp_parameters": {
586
+ "policy_review_frequency": "at least every 3 years",
587
+ "procedure_review_frequency": "at least annually"
588
+ },
589
+ "fedramp_additional_requirements": "Policy must address cloud-specific security awareness topics including phishing, social engineering, and insider threat for High systems.",
590
+ "priority": "P1",
591
+ "baseline": "high",
592
+ "moderate_also": true
593
+ },
594
+ {
595
+ "id": "FRM-H-AT-2",
596
+ "family": "AT",
597
+ "nist_control_id": "AT-2",
598
+ "title": "Literacy Training and Awareness",
599
+ "description": "Provide security and privacy literacy training to system users as part of initial training for new users and at least annually thereafter. Update literacy training and awareness content at least annually and following significant security events.",
600
+ "fedramp_parameters": {
601
+ "training_frequency": "at least annually",
602
+ "training_update_frequency": "at least annually"
603
+ },
604
+ "fedramp_additional_requirements": "Training must include cloud security best practices, CUI handling, and incident reporting procedures.",
605
+ "priority": "P1",
606
+ "baseline": "high",
607
+ "moderate_also": true
608
+ },
609
+ {
610
+ "id": "FRM-H-AT-2(2)",
611
+ "family": "AT",
612
+ "nist_control_id": "AT-2(2)",
613
+ "title": "Literacy Training and Awareness | Insider Threat",
614
+ "description": "Provide literacy training on recognizing and reporting potential indicators of insider threat.",
615
+ "fedramp_parameters": {},
616
+ "fedramp_additional_requirements": "Insider threat training must be provided within 30 days of onboarding and annually thereafter.",
617
+ "priority": "P1",
618
+ "baseline": "high",
619
+ "moderate_also": true
620
+ },
621
+ {
622
+ "id": "FRM-H-AT-3",
623
+ "family": "AT",
624
+ "nist_control_id": "AT-3",
625
+ "title": "Role-Based Training",
626
+ "description": "Provide role-based security and privacy training to personnel with assigned security roles and responsibilities before authorizing access and at least annually thereafter.",
627
+ "fedramp_parameters": {
628
+ "training_frequency": "at least annually",
629
+ "initial_training": "before granting system access"
630
+ },
631
+ "fedramp_additional_requirements": "Role-based training must include system-specific security procedures, incident handling, and CUI protection requirements.",
632
+ "priority": "P1",
633
+ "baseline": "high",
634
+ "moderate_also": true
635
+ },
636
+ {
637
+ "id": "FRM-H-AT-4",
638
+ "family": "AT",
639
+ "nist_control_id": "AT-4",
640
+ "title": "Training Records",
641
+ "description": "Document and monitor individual security and privacy training activities including initial training, refresher training, and role-based training. Retain individual training records for at least the FedRAMP-defined time period.",
642
+ "fedramp_parameters": {
643
+ "retention_period": "at least 3 years"
644
+ },
645
+ "fedramp_additional_requirements": "Training records must be available for audit within 72 hours of request.",
646
+ "priority": "P3",
647
+ "baseline": "high",
648
+ "moderate_also": true
649
+ },
650
+ {
651
+ "id": "FRM-H-AU-1",
652
+ "family": "AU",
653
+ "nist_control_id": "AU-1",
654
+ "title": "Audit and Accountability Policy and Procedures",
655
+ "description": "Develop, document, and disseminate an audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance. Review and update the policy and procedures.",
656
+ "fedramp_parameters": {
657
+ "policy_review_frequency": "at least every 3 years",
658
+ "procedure_review_frequency": "at least annually"
659
+ },
660
+ "fedramp_additional_requirements": "Audit policy must address cloud-specific considerations including API logging, multi-tenant audit isolation, and CSP administrative action logging.",
661
+ "priority": "P1",
662
+ "baseline": "high",
663
+ "moderate_also": true
664
+ },
665
+ {
666
+ "id": "FRM-H-AU-2",
667
+ "family": "AU",
668
+ "nist_control_id": "AU-2",
669
+ "title": "Event Logging",
670
+ "description": "Identify the types of events that the system is capable of logging in support of the audit function. Coordinate the event logging function with other organizational entities requiring audit-related information.",
671
+ "fedramp_parameters": {
672
+ "auditable_events": "successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, system events, and all administrator activity"
673
+ },
674
+ "fedramp_additional_requirements": "Event logging must include API calls, configuration changes, data access events, and container/orchestration events. Audit review frequency: at least weekly.",
675
+ "priority": "P1",
676
+ "baseline": "high",
677
+ "moderate_also": true
678
+ },
679
+ {
680
+ "id": "FRM-H-AU-3",
681
+ "family": "AU",
682
+ "nist_control_id": "AU-3",
683
+ "title": "Content of Audit Records",
684
+ "description": "Ensure that audit records contain information that establishes the type of event, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of individuals or subjects associated with the event.",
685
+ "fedramp_parameters": {},
686
+ "fedramp_additional_requirements": "Audit records must include session ID, source IP, user agent, and request identifiers for correlation.",
687
+ "priority": "P1",
688
+ "baseline": "high",
689
+ "moderate_also": true
690
+ },
691
+ {
692
+ "id": "FRM-H-AU-3(1)",
693
+ "family": "AU",
694
+ "nist_control_id": "AU-3(1)",
695
+ "title": "Content of Audit Records | Additional Audit Information",
696
+ "description": "Generate audit records containing additional information including full text recording of privileged commands or the individual identities of group account users.",
697
+ "fedramp_parameters": {
698
+ "additional_info": "full-text recording of privileged commands, session recording for administrative access, and database query logging"
699
+ },
700
+ "fedramp_additional_requirements": "Full command-line auditing required for all privileged sessions. Database transaction logging must capture query text and affected records.",
701
+ "priority": "P1",
702
+ "baseline": "high",
703
+ "moderate_also": false
704
+ },
705
+ {
706
+ "id": "FRM-H-AU-3(2)",
707
+ "family": "AU",
708
+ "nist_control_id": "AU-3(2)",
709
+ "title": "Content of Audit Records | Centralized Management of Planned Audit Record Content",
710
+ "description": "Centrally manage the content of audit records generated by the system components defined by the organization.",
711
+ "fedramp_parameters": {},
712
+ "fedramp_additional_requirements": "Centralized audit management must be implemented using a SIEM or equivalent tool. Audit record schemas must be standardized across all system components.",
713
+ "priority": "P1",
714
+ "baseline": "high",
715
+ "moderate_also": false
716
+ },
717
+ {
718
+ "id": "FRM-H-AU-4",
719
+ "family": "AU",
720
+ "nist_control_id": "AU-4",
721
+ "title": "Audit Log Storage Capacity",
722
+ "description": "Allocate audit log storage capacity to accommodate the organization-defined audit log retention requirements and reduce the likelihood of such capacity being exceeded.",
723
+ "fedramp_parameters": {
724
+ "storage_capacity": "sufficient to retain at least 90 days online and 1 year total"
725
+ },
726
+ "fedramp_additional_requirements": "Audit log storage must support automated archival and retrieval. Storage growth monitoring and alerting required.",
727
+ "priority": "P1",
728
+ "baseline": "high",
729
+ "moderate_also": true
730
+ },
731
+ {
732
+ "id": "FRM-H-AU-4(1)",
733
+ "family": "AU",
734
+ "nist_control_id": "AU-4(1)",
735
+ "title": "Audit Log Storage Capacity | Transfer to Alternate Storage",
736
+ "description": "Transfer audit logs to a different system, media type, or location when the log storage capacity of the primary audit log storage reaches the organization-defined percentage.",
737
+ "fedramp_parameters": {
738
+ "transfer_threshold": "75% of allocated storage capacity"
739
+ },
740
+ "fedramp_additional_requirements": "Alternate storage must be in a separate availability zone or region. Transfer must be automated and verified.",
741
+ "priority": "P1",
742
+ "baseline": "high",
743
+ "moderate_also": false
744
+ },
745
+ {
746
+ "id": "FRM-H-AU-5",
747
+ "family": "AU",
748
+ "nist_control_id": "AU-5",
749
+ "title": "Response to Audit Logging Process Failures",
750
+ "description": "Alert designated personnel in the event of an audit logging process failure and take organization-defined additional actions.",
751
+ "fedramp_parameters": {
752
+ "alert_personnel": "system administrators, ISSOs, and ISSMs within 5 minutes",
753
+ "additional_actions": "overwrite oldest audit records if storage is full and alert on overwrite"
754
+ },
755
+ "fedramp_additional_requirements": "For High systems, audit failure must trigger automated incident response procedures. System must halt processing if audit capability cannot be restored within 5 minutes.",
756
+ "priority": "P1",
757
+ "baseline": "high",
758
+ "moderate_also": true
759
+ },
760
+ {
761
+ "id": "FRM-H-AU-5(1)",
762
+ "family": "AU",
763
+ "nist_control_id": "AU-5(1)",
764
+ "title": "Response to Audit Logging Process Failures | Storage Capacity Warning",
765
+ "description": "Provide a warning to designated personnel when allocated audit log storage volume reaches the organization-defined percentage of capacity.",
766
+ "fedramp_parameters": {
767
+ "warning_threshold": "75% of allocated audit log storage capacity",
768
+ "warning_recipients": "system administrators and ISSOs"
769
+ },
770
+ "fedramp_additional_requirements": "Warnings must be delivered in real-time via automated alerting mechanisms.",
771
+ "priority": "P1",
772
+ "baseline": "high",
773
+ "moderate_also": false
774
+ },
775
+ {
776
+ "id": "FRM-H-AU-5(2)",
777
+ "family": "AU",
778
+ "nist_control_id": "AU-5(2)",
779
+ "title": "Response to Audit Logging Process Failures | Real-Time Alerts",
780
+ "description": "Provide an alert within the organization-defined real-time period to designated personnel when the organization-defined audit failure events occur.",
781
+ "fedramp_parameters": {
782
+ "alert_period": "within 1 minute of failure detection",
783
+ "failure_events": "audit logging software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity reached"
784
+ },
785
+ "fedramp_additional_requirements": "Real-time alerts must be sent via at least two independent communication channels (e.g., email and SMS/pager).",
786
+ "priority": "P1",
787
+ "baseline": "high",
788
+ "moderate_also": false
789
+ },
790
+ {
791
+ "id": "FRM-H-AU-6",
792
+ "family": "AU",
793
+ "nist_control_id": "AU-6",
794
+ "title": "Audit Record Review, Analysis, and Reporting",
795
+ "description": "Review and analyze system audit records for indications of inappropriate or unusual activity and report findings to designated personnel.",
796
+ "fedramp_parameters": {
797
+ "review_frequency": "at least weekly",
798
+ "report_recipients": "ISSOs and designated security personnel"
799
+ },
800
+ "fedramp_additional_requirements": "Audit analysis must employ automated mechanisms to integrate audit review, analysis, and reporting for investigating and responding to suspicious activity.",
801
+ "priority": "P1",
802
+ "baseline": "high",
803
+ "moderate_also": true
804
+ },
805
+ {
806
+ "id": "FRM-H-AU-6(1)",
807
+ "family": "AU",
808
+ "nist_control_id": "AU-6(1)",
809
+ "title": "Audit Record Review, Analysis, and Reporting | Automated Process Integration",
810
+ "description": "Integrate audit record review, analysis, and reporting processes using automated mechanisms to support organizational processes for investigation and response to suspicious activities.",
811
+ "fedramp_parameters": {},
812
+ "fedramp_additional_requirements": "SIEM or equivalent automated analysis platform required. Must support correlation across all system components.",
813
+ "priority": "P1",
814
+ "baseline": "high",
815
+ "moderate_also": false
816
+ },
817
+ {
818
+ "id": "FRM-H-AU-6(3)",
819
+ "family": "AU",
820
+ "nist_control_id": "AU-6(3)",
821
+ "title": "Audit Record Review, Analysis, and Reporting | Correlate Audit Record Repositories",
822
+ "description": "Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.",
823
+ "fedramp_parameters": {},
824
+ "fedramp_additional_requirements": "Cross-repository correlation must include network, application, database, and infrastructure audit records. Correlation rules must be reviewed quarterly.",
825
+ "priority": "P1",
826
+ "baseline": "high",
827
+ "moderate_also": false
828
+ },
829
+ {
830
+ "id": "FRM-H-AU-6(5)",
831
+ "family": "AU",
832
+ "nist_control_id": "AU-6(5)",
833
+ "title": "Audit Record Review, Analysis, and Reporting | Integrated Analysis of Audit Records",
834
+ "description": "Integrate analysis of audit records with analysis of vulnerability scanning information, performance data, and system monitoring information to further enhance the ability to identify inappropriate or unusual activity.",
835
+ "fedramp_parameters": {},
836
+ "fedramp_additional_requirements": "Integrated analysis must correlate audit data with vulnerability scan results and IDS/IPS alerts.",
837
+ "priority": "P1",
838
+ "baseline": "high",
839
+ "moderate_also": false
840
+ },
841
+ {
842
+ "id": "FRM-H-AU-6(6)",
843
+ "family": "AU",
844
+ "nist_control_id": "AU-6(6)",
845
+ "title": "Audit Record Review, Analysis, and Reporting | Correlation with Physical Monitoring",
846
+ "description": "Correlate information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.",
847
+ "fedramp_parameters": {},
848
+ "fedramp_additional_requirements": "Physical access logs must be correlated with logical access audit records for data center access events.",
849
+ "priority": "P1",
850
+ "baseline": "high",
851
+ "moderate_also": false
852
+ },
853
+ {
854
+ "id": "FRM-H-AU-7",
855
+ "family": "AU",
856
+ "nist_control_id": "AU-7",
857
+ "title": "Audit Record Reduction and Report Generation",
858
+ "description": "Provide and implement an audit record reduction and report generation capability that supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of incidents.",
859
+ "fedramp_parameters": {},
860
+ "fedramp_additional_requirements": "Audit reduction tools must support queries across all audit record fields. Report generation must produce output suitable for AO review.",
861
+ "priority": "P2",
862
+ "baseline": "high",
863
+ "moderate_also": true
864
+ },
865
+ {
866
+ "id": "FRM-H-AU-7(1)",
867
+ "family": "AU",
868
+ "nist_control_id": "AU-7(1)",
869
+ "title": "Audit Record Reduction and Report Generation | Automatic Processing",
870
+ "description": "Provide and implement the capability to process, sort, and search audit records for events of interest based on defined audit fields.",
871
+ "fedramp_parameters": {},
872
+ "fedramp_additional_requirements": "",
873
+ "priority": "P2",
874
+ "baseline": "high",
875
+ "moderate_also": true
876
+ },
877
+ {
878
+ "id": "FRM-H-AU-8",
879
+ "family": "AU",
880
+ "nist_control_id": "AU-8",
881
+ "title": "Time Stamps",
882
+ "description": "Use internal system clocks to generate time stamps for audit records and record time stamps that map to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) with a defined granularity of time measurement.",
883
+ "fedramp_parameters": {
884
+ "time_granularity": "at least millisecond granularity"
885
+ },
886
+ "fedramp_additional_requirements": "All system components must synchronize to authoritative time source (e.g., NIST, DoD NTP). Time synchronization drift must not exceed 1 second.",
887
+ "priority": "P1",
888
+ "baseline": "high",
889
+ "moderate_also": true
890
+ },
891
+ {
892
+ "id": "FRM-H-AU-9",
893
+ "family": "AU",
894
+ "nist_control_id": "AU-9",
895
+ "title": "Protection of Audit Information",
896
+ "description": "Protect audit information and audit logging tools from unauthorized access, modification, and deletion.",
897
+ "fedramp_parameters": {},
898
+ "fedramp_additional_requirements": "Audit information must be protected using access controls that limit access to authorized audit personnel only. Integrity verification of audit logs required.",
899
+ "priority": "P1",
900
+ "baseline": "high",
901
+ "moderate_also": true
902
+ },
903
+ {
904
+ "id": "FRM-H-AU-9(2)",
905
+ "family": "AU",
906
+ "nist_control_id": "AU-9(2)",
907
+ "title": "Protection of Audit Information | Store on Separate Physical Systems or Components",
908
+ "description": "Store audit records on a repository on a physically different system or system component than the system or component being audited.",
909
+ "fedramp_parameters": {},
910
+ "fedramp_additional_requirements": "Audit storage must be on a separate system with independent access controls. Cross-account or cross-region storage recommended.",
911
+ "priority": "P1",
912
+ "baseline": "high",
913
+ "moderate_also": false
914
+ },
915
+ {
916
+ "id": "FRM-H-AU-9(3)",
917
+ "family": "AU",
918
+ "nist_control_id": "AU-9(3)",
919
+ "title": "Protection of Audit Information | Cryptographic Protection",
920
+ "description": "Implement cryptographic mechanisms to protect the integrity of audit information and audit tools.",
921
+ "fedramp_parameters": {
922
+ "cryptographic_mechanism": "FIPS 140-2 validated hashing (SHA-256 minimum) for audit record integrity"
923
+ },
924
+ "fedramp_additional_requirements": "Cryptographic hash chains or digital signatures required to detect tampering of audit records.",
925
+ "priority": "P1",
926
+ "baseline": "high",
927
+ "moderate_also": false
928
+ },
929
+ {
930
+ "id": "FRM-H-AU-9(4)",
931
+ "family": "AU",
932
+ "nist_control_id": "AU-9(4)",
933
+ "title": "Protection of Audit Information | Access by Subset of Privileged Users",
934
+ "description": "Authorize access to management of audit logging functionality to only a subset of privileged users or roles.",
935
+ "fedramp_parameters": {
936
+ "authorized_users": "only designated audit administrators separate from system administrators"
937
+ },
938
+ "fedramp_additional_requirements": "Audit administration role must be separate from system administration role. Dual authorization required for audit configuration changes.",
939
+ "priority": "P1",
940
+ "baseline": "high",
941
+ "moderate_also": false
942
+ },
943
+ {
944
+ "id": "FRM-H-AU-10",
945
+ "family": "AU",
946
+ "nist_control_id": "AU-10",
947
+ "title": "Non-Repudiation",
948
+ "description": "Provide irrefutable evidence that an individual or process performed specific actions to protect against false claims of not having performed such actions.",
949
+ "fedramp_parameters": {},
950
+ "fedramp_additional_requirements": "Non-repudiation must be enforced for all privileged actions, data exports, and configuration changes. Digital signatures or equivalent mechanisms required.",
951
+ "priority": "P1",
952
+ "baseline": "high",
953
+ "moderate_also": false
954
+ },
955
+ {
956
+ "id": "FRM-H-AU-11",
957
+ "family": "AU",
958
+ "nist_control_id": "AU-11",
959
+ "title": "Audit Record Retention",
960
+ "description": "Retain audit records for a FedRAMP-defined time period to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.",
961
+ "fedramp_parameters": {
962
+ "retention_period": "at least 1 year online, 3 years total for High baseline"
963
+ },
964
+ "fedramp_additional_requirements": "Audit records must be retrievable within 24 hours for the most recent 90 days, within 72 hours for records up to 1 year, and within 30 days for archived records.",
965
+ "priority": "P3",
966
+ "baseline": "high",
967
+ "moderate_also": true
968
+ },
969
+ {
970
+ "id": "FRM-H-AU-12",
971
+ "family": "AU",
972
+ "nist_control_id": "AU-12",
973
+ "title": "Audit Record Generation",
974
+ "description": "Provide audit record generation capability for the events defined in AU-2 at all system components where audit capability is deployed. Allow authorized personnel to select the events to be logged by specific components.",
975
+ "fedramp_parameters": {},
976
+ "fedramp_additional_requirements": "Audit record generation must be enabled by default and cannot be disabled by non-audit personnel.",
977
+ "priority": "P1",
978
+ "baseline": "high",
979
+ "moderate_also": true
980
+ },
981
+ {
982
+ "id": "FRM-H-AU-12(1)",
983
+ "family": "AU",
984
+ "nist_control_id": "AU-12(1)",
985
+ "title": "Audit Record Generation | System-Wide and Time-Correlated Audit Trail",
986
+ "description": "Compile audit records from all system components into a system-wide (logical or physical) audit trail that is time-correlated to within the organization-defined level of tolerance.",
987
+ "fedramp_parameters": {
988
+ "time_tolerance": "within 1 second tolerance across all system components"
989
+ },
990
+ "fedramp_additional_requirements": "System-wide audit trail must be centralized in SIEM and support real-time correlation.",
991
+ "priority": "P1",
992
+ "baseline": "high",
993
+ "moderate_also": false
994
+ },
995
+ {
996
+ "id": "FRM-H-AU-12(3)",
997
+ "family": "AU",
998
+ "nist_control_id": "AU-12(3)",
999
+ "title": "Audit Record Generation | Changes by Authorized Individuals",
1000
+ "description": "Provide and implement the capability for authorized individuals or roles to change the logging to be performed on specified system components based on defined auditable events, time thresholds, or in response to specific events.",
1001
+ "fedramp_parameters": {},
1002
+ "fedramp_additional_requirements": "Changes to audit logging configuration must be logged and require approval from the ISSO. Emergency changes permitted with retrospective review within 24 hours.",
1003
+ "priority": "P1",
1004
+ "baseline": "high",
1005
+ "moderate_also": false
1006
+ },
1007
+ {
1008
+ "id": "FRM-H-CA-1",
1009
+ "family": "CA",
1010
+ "nist_control_id": "CA-1",
1011
+ "title": "Assessment, Authorization, and Monitoring Policy and Procedures",
1012
+ "description": "Develop, document, and disseminate a security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
1013
+ "fedramp_parameters": {
1014
+ "policy_review_frequency": "at least every 3 years",
1015
+ "procedure_review_frequency": "at least annually"
1016
+ },
1017
+ "fedramp_additional_requirements": "Policy must address FedRAMP continuous monitoring requirements and JAB/AO reporting obligations.",
1018
+ "priority": "P1",
1019
+ "baseline": "high",
1020
+ "moderate_also": true
1021
+ },
1022
+ {
1023
+ "id": "FRM-H-CA-2",
1024
+ "family": "CA",
1025
+ "nist_control_id": "CA-2",
1026
+ "title": "Control Assessments",
1027
+ "description": "Develop a control assessment plan and assess the controls in the system and its environment of operation at the FedRAMP-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome.",
1028
+ "fedramp_parameters": {
1029
+ "assessment_frequency": "at least annually",
1030
+ "assessment_scope": "all FedRAMP High baseline controls"
1031
+ },
1032
+ "fedramp_additional_requirements": "Assessment must be performed by an independent 3PAO. Results must be submitted to FedRAMP PMO.",
1033
+ "priority": "P1",
1034
+ "baseline": "high",
1035
+ "moderate_also": true
1036
+ },
1037
+ {
1038
+ "id": "FRM-H-CA-2(1)",
1039
+ "family": "CA",
1040
+ "nist_control_id": "CA-2(1)",
1041
+ "title": "Control Assessments | Independent Assessors",
1042
+ "description": "Employ independent assessors or assessment teams to conduct control assessments.",
1043
+ "fedramp_parameters": {},
1044
+ "fedramp_additional_requirements": "Assessors must be FedRAMP-recognized 3PAOs with appropriate clearances for High systems.",
1045
+ "priority": "P1",
1046
+ "baseline": "high",
1047
+ "moderate_also": true
1048
+ },
1049
+ {
1050
+ "id": "FRM-H-CA-3",
1051
+ "family": "CA",
1052
+ "nist_control_id": "CA-3",
1053
+ "title": "Information Exchange",
1054
+ "description": "Approve and manage the exchange of information between the system and other systems using interconnection security agreements, information exchange security agreements, memoranda of understanding or agreement, or other exchange agreements.",
1055
+ "fedramp_parameters": {},
1056
+ "fedramp_additional_requirements": "All system interconnections must be documented in ISAs and approved by AO. Interconnections to non-FedRAMP systems require risk acceptance.",
1057
+ "priority": "P1",
1058
+ "baseline": "high",
1059
+ "moderate_also": true
1060
+ },
1061
+ {
1062
+ "id": "FRM-H-CA-3(5)",
1063
+ "family": "CA",
1064
+ "nist_control_id": "CA-3(5)",
1065
+ "title": "Information Exchange | Restrictions on External System Connections",
1066
+ "description": "Employ an allow-all, deny-by-exception or deny-all, permit-by-exception policy for allowing external systems to connect to the system.",
1067
+ "fedramp_parameters": {
1068
+ "connection_policy": "deny-all, permit-by-exception"
1069
+ },
1070
+ "fedramp_additional_requirements": "External connections require documented approval, risk assessment, and ISA. Default deny policy required for High systems.",
1071
+ "priority": "P1",
1072
+ "baseline": "high",
1073
+ "moderate_also": false
1074
+ },
1075
+ {
1076
+ "id": "FRM-H-CA-5",
1077
+ "family": "CA",
1078
+ "nist_control_id": "CA-5",
1079
+ "title": "Plan of Action and Milestones",
1080
+ "description": "Develop a plan of action and milestones (POA&M) for the system to document planned remediation actions to correct weaknesses or deficiencies and reduce or eliminate known vulnerabilities.",
1081
+ "fedramp_parameters": {
1082
+ "update_frequency": "at least monthly"
1083
+ },
1084
+ "fedramp_additional_requirements": "POA&M must be submitted to FedRAMP PMO monthly. Critical/high findings must include remediation timelines.",
1085
+ "priority": "P3",
1086
+ "baseline": "high",
1087
+ "moderate_also": true
1088
+ },
1089
+ {
1090
+ "id": "FRM-H-CA-6",
1091
+ "family": "CA",
1092
+ "nist_control_id": "CA-6",
1093
+ "title": "Authorization",
1094
+ "description": "Assign a senior official as the authorizing official for the system. Ensure the authorizing official authorizes the system for processing before commencing operations.",
1095
+ "fedramp_parameters": {},
1096
+ "fedramp_additional_requirements": "Authorization must be granted by JAB or agency AO. Provisional ATOs from JAB are valid for 3 years with continuous monitoring.",
1097
+ "priority": "P1",
1098
+ "baseline": "high",
1099
+ "moderate_also": true
1100
+ },
1101
+ {
1102
+ "id": "FRM-H-CA-7",
1103
+ "family": "CA",
1104
+ "nist_control_id": "CA-7",
1105
+ "title": "Continuous Monitoring",
1106
+ "description": "Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy.",
1107
+ "fedramp_parameters": {
1108
+ "monitoring_frequency": "ongoing with monthly reporting to FedRAMP"
1109
+ },
1110
+ "fedramp_additional_requirements": "Continuous monitoring must include monthly vulnerability scanning, annual 3PAO assessment, and monthly POA&M updates per FedRAMP ConMon guidance.",
1111
+ "priority": "P1",
1112
+ "baseline": "high",
1113
+ "moderate_also": true
1114
+ },
1115
+ {
1116
+ "id": "FRM-H-CA-7(1)",
1117
+ "family": "CA",
1118
+ "nist_control_id": "CA-7(1)",
1119
+ "title": "Continuous Monitoring | Independent Assessment",
1120
+ "description": "Employ independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.",
1121
+ "fedramp_parameters": {},
1122
+ "fedramp_additional_requirements": "Annual assessment by FedRAMP-recognized 3PAO required.",
1123
+ "priority": "P2",
1124
+ "baseline": "high",
1125
+ "moderate_also": true
1126
+ },
1127
+ {
1128
+ "id": "FRM-H-CA-8",
1129
+ "family": "CA",
1130
+ "nist_control_id": "CA-8",
1131
+ "title": "Penetration Testing",
1132
+ "description": "Conduct penetration testing at the FedRAMP-defined frequency on the system or system components.",
1133
+ "fedramp_parameters": {
1134
+ "penetration_test_frequency": "at least annually"
1135
+ },
1136
+ "fedramp_additional_requirements": "Penetration testing must be performed by 3PAO or independent team. Must include social engineering, network, application, and physical testing for High systems.",
1137
+ "priority": "P1",
1138
+ "baseline": "high",
1139
+ "moderate_also": false
1140
+ },
1141
+ {
1142
+ "id": "FRM-H-CA-8(1)",
1143
+ "family": "CA",
1144
+ "nist_control_id": "CA-8(1)",
1145
+ "title": "Penetration Testing | Independent Penetration Testing Agent or Team",
1146
+ "description": "Employ an independent penetration testing agent or team to perform penetration testing on the system or system components.",
1147
+ "fedramp_parameters": {},
1148
+ "fedramp_additional_requirements": "Penetration testers must hold appropriate clearances and be independent from system development and operations teams.",
1149
+ "priority": "P1",
1150
+ "baseline": "high",
1151
+ "moderate_also": false
1152
+ },
1153
+ {
1154
+ "id": "FRM-H-CA-9",
1155
+ "family": "CA",
1156
+ "nist_control_id": "CA-9",
1157
+ "title": "Internal System Connections",
1158
+ "description": "Authorize internal connections of system components and monitor/control the connections on an ongoing basis.",
1159
+ "fedramp_parameters": {},
1160
+ "fedramp_additional_requirements": "Internal system connections must be documented and authorized. Micro-segmentation recommended for High systems.",
1161
+ "priority": "P2",
1162
+ "baseline": "high",
1163
+ "moderate_also": true
1164
+ },
1165
+ {
1166
+ "id": "FRM-H-CM-1",
1167
+ "family": "CM",
1168
+ "nist_control_id": "CM-1",
1169
+ "title": "Configuration Management Policy and Procedures",
1170
+ "description": "Develop, document, and disseminate a configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
1171
+ "fedramp_parameters": {
1172
+ "policy_review_frequency": "at least every 3 years",
1173
+ "procedure_review_frequency": "at least annually"
1174
+ },
1175
+ "fedramp_additional_requirements": "Policy must address infrastructure-as-code, container image management, and cloud service configuration baselines.",
1176
+ "priority": "P1",
1177
+ "baseline": "high",
1178
+ "moderate_also": true
1179
+ },
1180
+ {
1181
+ "id": "FRM-H-CM-2",
1182
+ "family": "CM",
1183
+ "nist_control_id": "CM-2",
1184
+ "title": "Baseline Configuration",
1185
+ "description": "Develop, document, and maintain a current baseline configuration of the system under configuration control.",
1186
+ "fedramp_parameters": {
1187
+ "baseline_review_frequency": "at least annually and when significant changes occur"
1188
+ },
1189
+ "fedramp_additional_requirements": "Baseline must include all cloud service configurations, network diagrams, and container/VM images. Configuration drift detection required.",
1190
+ "priority": "P1",
1191
+ "baseline": "high",
1192
+ "moderate_also": true
1193
+ },
1194
+ {
1195
+ "id": "FRM-H-CM-2(2)",
1196
+ "family": "CM",
1197
+ "nist_control_id": "CM-2(2)",
1198
+ "title": "Baseline Configuration | Automation Support for Accuracy and Currency",
1199
+ "description": "Employ automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the system.",
1200
+ "fedramp_parameters": {},
1201
+ "fedramp_additional_requirements": "Infrastructure-as-code and configuration management tools must be used to maintain baselines.",
1202
+ "priority": "P1",
1203
+ "baseline": "high",
1204
+ "moderate_also": true
1205
+ },
1206
+ {
1207
+ "id": "FRM-H-CM-2(3)",
1208
+ "family": "CM",
1209
+ "nist_control_id": "CM-2(3)",
1210
+ "title": "Baseline Configuration | Retention of Previous Configurations",
1211
+ "description": "Retain previous versions of baseline configurations of the system to support rollback.",
1212
+ "fedramp_parameters": {
1213
+ "retention_count": "at least 3 previous baseline versions"
1214
+ },
1215
+ "fedramp_additional_requirements": "Previous baselines must be stored in version control with rollback capability tested quarterly.",
1216
+ "priority": "P1",
1217
+ "baseline": "high",
1218
+ "moderate_also": true
1219
+ },
1220
+ {
1221
+ "id": "FRM-H-CM-3",
1222
+ "family": "CM",
1223
+ "nist_control_id": "CM-3",
1224
+ "title": "Configuration Change Control",
1225
+ "description": "Determine and document the types of changes to the system that are configuration-controlled. Review proposed configuration-controlled changes and approve or disapprove with explicit consideration for security and privacy impact analyses.",
1226
+ "fedramp_parameters": {},
1227
+ "fedramp_additional_requirements": "All changes must go through formal change control board review. Emergency changes require retrospective CCB approval within 48 hours.",
1228
+ "priority": "P1",
1229
+ "baseline": "high",
1230
+ "moderate_also": true
1231
+ },
1232
+ {
1233
+ "id": "FRM-H-CM-3(1)",
1234
+ "family": "CM",
1235
+ "nist_control_id": "CM-3(1)",
1236
+ "title": "Configuration Change Control | Automated Documentation, Notification, and Prohibition of Changes",
1237
+ "description": "Use automated mechanisms to document proposed changes, notify approval authorities, highlight unapproved changes, prohibit changes until approvals are received, and document completed changes.",
1238
+ "fedramp_parameters": {},
1239
+ "fedramp_additional_requirements": "CI/CD pipeline must enforce change approval gates. Unapproved changes must be automatically blocked.",
1240
+ "priority": "P1",
1241
+ "baseline": "high",
1242
+ "moderate_also": false
1243
+ },
1244
+ {
1245
+ "id": "FRM-H-CM-3(2)",
1246
+ "family": "CM",
1247
+ "nist_control_id": "CM-3(2)",
1248
+ "title": "Configuration Change Control | Testing, Validation, and Documentation of Changes",
1249
+ "description": "Test, validate, and document changes to the system before finalizing the implementation of the changes.",
1250
+ "fedramp_parameters": {},
1251
+ "fedramp_additional_requirements": "All changes must be tested in a staging environment before production deployment. Security regression testing required.",
1252
+ "priority": "P1",
1253
+ "baseline": "high",
1254
+ "moderate_also": false
1255
+ },
1256
+ {
1257
+ "id": "FRM-H-CM-3(4)",
1258
+ "family": "CM",
1259
+ "nist_control_id": "CM-3(4)",
1260
+ "title": "Configuration Change Control | Security and Privacy Representatives",
1261
+ "description": "Require a security and privacy representative to be a member of the configuration change control element.",
1262
+ "fedramp_parameters": {},
1263
+ "fedramp_additional_requirements": "ISSO or designated security representative must approve all configuration changes for High systems.",
1264
+ "priority": "P1",
1265
+ "baseline": "high",
1266
+ "moderate_also": false
1267
+ },
1268
+ {
1269
+ "id": "FRM-H-CM-4",
1270
+ "family": "CM",
1271
+ "nist_control_id": "CM-4",
1272
+ "title": "Impact Analyses",
1273
+ "description": "Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.",
1274
+ "fedramp_parameters": {},
1275
+ "fedramp_additional_requirements": "Impact analysis must document security implications including effects on authorization boundary, data flows, and compliance posture.",
1276
+ "priority": "P2",
1277
+ "baseline": "high",
1278
+ "moderate_also": true
1279
+ },
1280
+ {
1281
+ "id": "FRM-H-CM-5",
1282
+ "family": "CM",
1283
+ "nist_control_id": "CM-5",
1284
+ "title": "Access Restrictions for Change",
1285
+ "description": "Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.",
1286
+ "fedramp_parameters": {},
1287
+ "fedramp_additional_requirements": "Only authorized personnel with documented change authorization may implement changes. Separation of duties between change requestor, approver, and implementer required.",
1288
+ "priority": "P1",
1289
+ "baseline": "high",
1290
+ "moderate_also": true
1291
+ },
1292
+ {
1293
+ "id": "FRM-H-CM-5(1)",
1294
+ "family": "CM",
1295
+ "nist_control_id": "CM-5(1)",
1296
+ "title": "Access Restrictions for Change | Automated Access Enforcement and Audit Records",
1297
+ "description": "Enforce access restrictions using automated mechanisms and generate audit records of the enforcement actions.",
1298
+ "fedramp_parameters": {},
1299
+ "fedramp_additional_requirements": "CI/CD pipeline must enforce RBAC for deployment actions. All deployment actions must be logged with actor identity.",
1300
+ "priority": "P1",
1301
+ "baseline": "high",
1302
+ "moderate_also": false
1303
+ },
1304
+ {
1305
+ "id": "FRM-H-CM-6",
1306
+ "family": "CM",
1307
+ "nist_control_id": "CM-6",
1308
+ "title": "Configuration Settings",
1309
+ "description": "Establish and document configuration settings for system components using organization-defined security configuration checklists. Implement the configuration settings and identify, document, and approve any deviations.",
1310
+ "fedramp_parameters": {
1311
+ "configuration_checklists": "DISA STIGs, CIS Benchmarks, or vendor security guides as applicable"
1312
+ },
1313
+ "fedramp_additional_requirements": "Configuration settings must comply with DISA STIGs. Deviations require documented risk acceptance from AO.",
1314
+ "priority": "P1",
1315
+ "baseline": "high",
1316
+ "moderate_also": true
1317
+ },
1318
+ {
1319
+ "id": "FRM-H-CM-6(1)",
1320
+ "family": "CM",
1321
+ "nist_control_id": "CM-6(1)",
1322
+ "title": "Configuration Settings | Automated Management, Application, and Verification",
1323
+ "description": "Manage, apply, and verify configuration settings for system components using automated mechanisms.",
1324
+ "fedramp_parameters": {},
1325
+ "fedramp_additional_requirements": "Automated configuration management and compliance scanning required. Drift detection must alert within 15 minutes.",
1326
+ "priority": "P1",
1327
+ "baseline": "high",
1328
+ "moderate_also": false
1329
+ },
1330
+ {
1331
+ "id": "FRM-H-CM-6(2)",
1332
+ "family": "CM",
1333
+ "nist_control_id": "CM-6(2)",
1334
+ "title": "Configuration Settings | Respond to Unauthorized Changes",
1335
+ "description": "Take organization-defined actions in response to unauthorized changes to system configuration settings.",
1336
+ "fedramp_parameters": {
1337
+ "response_actions": "alert ISSO, revert unauthorized change, and generate incident ticket"
1338
+ },
1339
+ "fedramp_additional_requirements": "Automated remediation of unauthorized configuration changes required for High systems. Changes must be reverted within 1 hour.",
1340
+ "priority": "P1",
1341
+ "baseline": "high",
1342
+ "moderate_also": false
1343
+ },
1344
+ {
1345
+ "id": "FRM-H-CM-7",
1346
+ "family": "CM",
1347
+ "nist_control_id": "CM-7",
1348
+ "title": "Least Functionality",
1349
+ "description": "Configure the system to provide only mission-essential capabilities. Prohibit or restrict the use of specified functions, ports, protocols, software, and/or services.",
1350
+ "fedramp_parameters": {
1351
+ "prohibited_functions": "unnecessary services, protocols (Telnet, FTP, SNMP v1/v2), and software not required for system operation"
1352
+ },
1353
+ "fedramp_additional_requirements": "Only ports, protocols, and services documented in the SSP are permitted. All others must be disabled.",
1354
+ "priority": "P1",
1355
+ "baseline": "high",
1356
+ "moderate_also": true
1357
+ },
1358
+ {
1359
+ "id": "FRM-H-CM-7(1)",
1360
+ "family": "CM",
1361
+ "nist_control_id": "CM-7(1)",
1362
+ "title": "Least Functionality | Periodic Review",
1363
+ "description": "Review the system at the FedRAMP-defined frequency to identify unnecessary and/or nonsecure functions, ports, protocols, software, and services.",
1364
+ "fedramp_parameters": {
1365
+ "review_frequency": "at least monthly"
1366
+ },
1367
+ "fedramp_additional_requirements": "",
1368
+ "priority": "P1",
1369
+ "baseline": "high",
1370
+ "moderate_also": true
1371
+ },
1372
+ {
1373
+ "id": "FRM-H-CM-7(2)",
1374
+ "family": "CM",
1375
+ "nist_control_id": "CM-7(2)",
1376
+ "title": "Least Functionality | Prevent Program Execution",
1377
+ "description": "Prevent program execution in accordance with the organization-defined policies regarding software program usage and restrictions.",
1378
+ "fedramp_parameters": {},
1379
+ "fedramp_additional_requirements": "Application whitelisting required for all server components. Only authorized executables may run on High systems.",
1380
+ "priority": "P1",
1381
+ "baseline": "high",
1382
+ "moderate_also": false
1383
+ },
1384
+ {
1385
+ "id": "FRM-H-CM-7(5)",
1386
+ "family": "CM",
1387
+ "nist_control_id": "CM-7(5)",
1388
+ "title": "Least Functionality | Authorized Software \u2014 Allow-by-Exception",
1389
+ "description": "Identify and maintain a list of authorized software programs. Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.",
1390
+ "fedramp_parameters": {
1391
+ "review_frequency": "at least monthly"
1392
+ },
1393
+ "fedramp_additional_requirements": "Software inventory must be maintained and verified against authorized list. Unauthorized software must be blocked or removed within 24 hours.",
1394
+ "priority": "P1",
1395
+ "baseline": "high",
1396
+ "moderate_also": false
1397
+ },
1398
+ {
1399
+ "id": "FRM-H-CM-8",
1400
+ "family": "CM",
1401
+ "nist_control_id": "CM-8",
1402
+ "title": "System Component Inventory",
1403
+ "description": "Develop and document an inventory of system components that accurately reflects the system, includes all components within the authorization boundary, and is at the level of granularity deemed necessary for tracking and reporting.",
1404
+ "fedramp_parameters": {
1405
+ "update_frequency": "continuously with automated discovery and at least monthly manual verification"
1406
+ },
1407
+ "fedramp_additional_requirements": "Inventory must include all VMs, containers, cloud resources, APIs, and network components within the authorization boundary.",
1408
+ "priority": "P1",
1409
+ "baseline": "high",
1410
+ "moderate_also": true
1411
+ },
1412
+ {
1413
+ "id": "FRM-H-CM-8(1)",
1414
+ "family": "CM",
1415
+ "nist_control_id": "CM-8(1)",
1416
+ "title": "System Component Inventory | Updates During Installation and Removal",
1417
+ "description": "Update the inventory of system components as part of component installations, removals, and system updates.",
1418
+ "fedramp_parameters": {},
1419
+ "fedramp_additional_requirements": "CI/CD pipeline must automatically update inventory on deployments.",
1420
+ "priority": "P1",
1421
+ "baseline": "high",
1422
+ "moderate_also": true
1423
+ },
1424
+ {
1425
+ "id": "FRM-H-CM-8(3)",
1426
+ "family": "CM",
1427
+ "nist_control_id": "CM-8(3)",
1428
+ "title": "System Component Inventory | Automated Unauthorized Component Detection",
1429
+ "description": "Detect the presence of unauthorized hardware, software, and firmware components within the system using automated mechanisms.",
1430
+ "fedramp_parameters": {
1431
+ "detection_frequency": "continuously or at least every 72 hours"
1432
+ },
1433
+ "fedramp_additional_requirements": "Unauthorized components must be flagged, quarantined, and reported to ISSO within 24 hours.",
1434
+ "priority": "P1",
1435
+ "baseline": "high",
1436
+ "moderate_also": false
1437
+ },
1438
+ {
1439
+ "id": "FRM-H-CM-8(4)",
1440
+ "family": "CM",
1441
+ "nist_control_id": "CM-8(4)",
1442
+ "title": "System Component Inventory | Accountability Information",
1443
+ "description": "Include in the system component inventory, information to achieve effective property accountability.",
1444
+ "fedramp_parameters": {},
1445
+ "fedramp_additional_requirements": "Inventory must track responsible individual, acquisition date, license status, and disposal tracking.",
1446
+ "priority": "P1",
1447
+ "baseline": "high",
1448
+ "moderate_also": false
1449
+ },
1450
+ {
1451
+ "id": "FRM-H-CM-9",
1452
+ "family": "CM",
1453
+ "nist_control_id": "CM-9",
1454
+ "title": "Configuration Management Plan",
1455
+ "description": "Develop, document, and implement a configuration management plan for the system that addresses roles, responsibilities, and configuration management processes and procedures.",
1456
+ "fedramp_parameters": {},
1457
+ "fedramp_additional_requirements": "CM plan must address cloud service configuration, infrastructure-as-code practices, and container image management.",
1458
+ "priority": "P1",
1459
+ "baseline": "high",
1460
+ "moderate_also": true
1461
+ },
1462
+ {
1463
+ "id": "FRM-H-CM-10",
1464
+ "family": "CM",
1465
+ "nist_control_id": "CM-10",
1466
+ "title": "Software Usage Restrictions",
1467
+ "description": "Use software and associated documentation in accordance with contract agreements and copyright laws. Track the use of software protected by quantity licenses.",
1468
+ "fedramp_parameters": {},
1469
+ "fedramp_additional_requirements": "Software license compliance must be verified quarterly. Open source components must comply with license obligations.",
1470
+ "priority": "P2",
1471
+ "baseline": "high",
1472
+ "moderate_also": true
1473
+ },
1474
+ {
1475
+ "id": "FRM-H-CM-11",
1476
+ "family": "CM",
1477
+ "nist_control_id": "CM-11",
1478
+ "title": "User-Installed Software",
1479
+ "description": "Establish and enforce policies governing the installation of software by users.",
1480
+ "fedramp_parameters": {},
1481
+ "fedramp_additional_requirements": "User-installed software prohibited on High systems without explicit ISSO approval. Application whitelisting enforced.",
1482
+ "priority": "P1",
1483
+ "baseline": "high",
1484
+ "moderate_also": true
1485
+ },
1486
+ {
1487
+ "id": "FRM-H-CM-12",
1488
+ "family": "CM",
1489
+ "nist_control_id": "CM-12",
1490
+ "title": "Information Location",
1491
+ "description": "Identify and document the location of organization-defined information and the specific system components on which the information is processed and stored.",
1492
+ "fedramp_parameters": {},
1493
+ "fedramp_additional_requirements": "Data residency requirements must be documented. For High/DoD systems, data must reside within CONUS in authorized GovCloud regions.",
1494
+ "priority": "P1",
1495
+ "baseline": "high",
1496
+ "moderate_also": false
1497
+ },
1498
+ {
1499
+ "id": "FRM-H-CP-1",
1500
+ "family": "CP",
1501
+ "nist_control_id": "CP-1",
1502
+ "title": "Contingency Planning Policy and Procedures",
1503
+ "description": "Develop, document, and disseminate a contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
1504
+ "fedramp_parameters": {
1505
+ "policy_review_frequency": "at least every 3 years",
1506
+ "procedure_review_frequency": "at least annually"
1507
+ },
1508
+ "fedramp_additional_requirements": "Policy must address cloud-specific contingency scenarios including region failures, CSP service outages, and multi-tenant recovery.",
1509
+ "priority": "P1",
1510
+ "baseline": "high",
1511
+ "moderate_also": true
1512
+ },
1513
+ {
1514
+ "id": "FRM-H-CP-2",
1515
+ "family": "CP",
1516
+ "nist_control_id": "CP-2",
1517
+ "title": "Contingency Plan",
1518
+ "description": "Develop a contingency plan for the system that identifies essential mission and business functions and associated contingency requirements, provides recovery objectives, restoration priorities, and metrics.",
1519
+ "fedramp_parameters": {
1520
+ "plan_review_frequency": "at least annually",
1521
+ "plan_update_triggers": "significant changes to the system, operating environment, or after contingency plan testing"
1522
+ },
1523
+ "fedramp_additional_requirements": "Contingency plan must be tested at least annually and updated based on test results. Plan must include RPO and RTO targets.",
1524
+ "priority": "P1",
1525
+ "baseline": "high",
1526
+ "moderate_also": true
1527
+ },
1528
+ {
1529
+ "id": "FRM-H-CP-2(1)",
1530
+ "family": "CP",
1531
+ "nist_control_id": "CP-2(1)",
1532
+ "title": "Contingency Plan | Coordinate with Related Plans",
1533
+ "description": "Coordinate contingency plan development with organizational elements responsible for related plans.",
1534
+ "fedramp_parameters": {},
1535
+ "fedramp_additional_requirements": "Coordination must include CSP disaster recovery, customer notification, and FedRAMP PMO notification.",
1536
+ "priority": "P1",
1537
+ "baseline": "high",
1538
+ "moderate_also": false
1539
+ },
1540
+ {
1541
+ "id": "FRM-H-CP-2(2)",
1542
+ "family": "CP",
1543
+ "nist_control_id": "CP-2(2)",
1544
+ "title": "Contingency Plan | Capacity Planning",
1545
+ "description": "Conduct capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.",
1546
+ "fedramp_parameters": {},
1547
+ "fedramp_additional_requirements": "Alternate processing capacity must support full production workload. Auto-scaling policies must account for failover scenarios.",
1548
+ "priority": "P1",
1549
+ "baseline": "high",
1550
+ "moderate_also": false
1551
+ },
1552
+ {
1553
+ "id": "FRM-H-CP-2(3)",
1554
+ "family": "CP",
1555
+ "nist_control_id": "CP-2(3)",
1556
+ "title": "Contingency Plan | Resume Mission and Business Functions",
1557
+ "description": "Plan for the resumption of mission and business functions within the organization-defined time period of contingency plan activation.",
1558
+ "fedramp_parameters": {
1559
+ "resumption_period": "within 24 hours for High baseline"
1560
+ },
1561
+ "fedramp_additional_requirements": "Full mission capability must be restored within 24 hours. Essential functions must resume within 4 hours.",
1562
+ "priority": "P1",
1563
+ "baseline": "high",
1564
+ "moderate_also": false
1565
+ },
1566
+ {
1567
+ "id": "FRM-H-CP-2(5)",
1568
+ "family": "CP",
1569
+ "nist_control_id": "CP-2(5)",
1570
+ "title": "Contingency Plan | Continue Mission and Business Functions",
1571
+ "description": "Plan for the continuance of mission and business functions with minimal or no loss of operational continuity.",
1572
+ "fedramp_parameters": {},
1573
+ "fedramp_additional_requirements": "Active-active or active-warm standby configurations required for High systems. Zero data loss (RPO=0) required for critical data.",
1574
+ "priority": "P1",
1575
+ "baseline": "high",
1576
+ "moderate_also": false
1577
+ },
1578
+ {
1579
+ "id": "FRM-H-CP-2(8)",
1580
+ "family": "CP",
1581
+ "nist_control_id": "CP-2(8)",
1582
+ "title": "Contingency Plan | Identify Critical Assets",
1583
+ "description": "Identify critical system assets supporting mission and business functions.",
1584
+ "fedramp_parameters": {},
1585
+ "fedramp_additional_requirements": "Critical assets inventory must be maintained and prioritized for recovery. Business impact analysis required annually.",
1586
+ "priority": "P1",
1587
+ "baseline": "high",
1588
+ "moderate_also": false
1589
+ },
1590
+ {
1591
+ "id": "FRM-H-CP-3",
1592
+ "family": "CP",
1593
+ "nist_control_id": "CP-3",
1594
+ "title": "Contingency Training",
1595
+ "description": "Provide contingency training to system users consistent with assigned roles and responsibilities.",
1596
+ "fedramp_parameters": {
1597
+ "initial_training": "within 10 days of assuming role",
1598
+ "refresher_frequency": "at least annually"
1599
+ },
1600
+ "fedramp_additional_requirements": "Training must include tabletop exercises and hands-on recovery procedures.",
1601
+ "priority": "P2",
1602
+ "baseline": "high",
1603
+ "moderate_also": true
1604
+ },
1605
+ {
1606
+ "id": "FRM-H-CP-4",
1607
+ "family": "CP",
1608
+ "nist_control_id": "CP-4",
1609
+ "title": "Contingency Plan Testing",
1610
+ "description": "Test the contingency plan for the system at the FedRAMP-defined frequency to determine the effectiveness of the plan and the readiness to execute the plan.",
1611
+ "fedramp_parameters": {
1612
+ "test_frequency": "at least annually",
1613
+ "test_types": "functional testing with full recovery for High baseline"
1614
+ },
1615
+ "fedramp_additional_requirements": "Full failover test required annually for High systems. Results must be documented and deficiencies tracked in POA&M.",
1616
+ "priority": "P2",
1617
+ "baseline": "high",
1618
+ "moderate_also": true
1619
+ },
1620
+ {
1621
+ "id": "FRM-H-CP-4(1)",
1622
+ "family": "CP",
1623
+ "nist_control_id": "CP-4(1)",
1624
+ "title": "Contingency Plan Testing | Coordinate with Related Plans",
1625
+ "description": "Coordinate contingency plan testing with organizational elements responsible for related plans.",
1626
+ "fedramp_parameters": {},
1627
+ "fedramp_additional_requirements": "",
1628
+ "priority": "P2",
1629
+ "baseline": "high",
1630
+ "moderate_also": true
1631
+ },
1632
+ {
1633
+ "id": "FRM-H-CP-6",
1634
+ "family": "CP",
1635
+ "nist_control_id": "CP-6",
1636
+ "title": "Alternate Storage Site",
1637
+ "description": "Establish an alternate storage site and initiate necessary agreements to permit the storage and retrieval of system backup information.",
1638
+ "fedramp_parameters": {},
1639
+ "fedramp_additional_requirements": "Alternate storage must be in a geographically separate region. Must meet same FedRAMP High requirements.",
1640
+ "priority": "P1",
1641
+ "baseline": "high",
1642
+ "moderate_also": true
1643
+ },
1644
+ {
1645
+ "id": "FRM-H-CP-6(1)",
1646
+ "family": "CP",
1647
+ "nist_control_id": "CP-6(1)",
1648
+ "title": "Alternate Storage Site | Separation from Primary Site",
1649
+ "description": "Identify an alternate storage site that is geographically separated from the primary storage site.",
1650
+ "fedramp_parameters": {
1651
+ "separation_distance": "at least 100 miles from primary site"
1652
+ },
1653
+ "fedramp_additional_requirements": "Alternate site must be in a different FEMA region when possible.",
1654
+ "priority": "P1",
1655
+ "baseline": "high",
1656
+ "moderate_also": false
1657
+ },
1658
+ {
1659
+ "id": "FRM-H-CP-6(2)",
1660
+ "family": "CP",
1661
+ "nist_control_id": "CP-6(2)",
1662
+ "title": "Alternate Storage Site | Recovery Time and Recovery Point Objectives",
1663
+ "description": "Configure the alternate storage site to facilitate recovery operations in accordance with RTO and RPO.",
1664
+ "fedramp_parameters": {
1665
+ "rto": "24 hours maximum",
1666
+ "rpo": "1 hour maximum for High baseline"
1667
+ },
1668
+ "fedramp_additional_requirements": "Automated replication required to meet RPO. Recovery testing must validate RTO/RPO targets.",
1669
+ "priority": "P1",
1670
+ "baseline": "high",
1671
+ "moderate_also": false
1672
+ },
1673
+ {
1674
+ "id": "FRM-H-CP-6(3)",
1675
+ "family": "CP",
1676
+ "nist_control_id": "CP-6(3)",
1677
+ "title": "Alternate Storage Site | Accessibility",
1678
+ "description": "Identify potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster.",
1679
+ "fedramp_parameters": {},
1680
+ "fedramp_additional_requirements": "Alternate site must have independent network connectivity and power infrastructure.",
1681
+ "priority": "P1",
1682
+ "baseline": "high",
1683
+ "moderate_also": false
1684
+ },
1685
+ {
1686
+ "id": "FRM-H-CP-7",
1687
+ "family": "CP",
1688
+ "nist_control_id": "CP-7",
1689
+ "title": "Alternate Processing Site",
1690
+ "description": "Establish an alternate processing site and initiate necessary agreements to permit the transfer and resumption of system operations.",
1691
+ "fedramp_parameters": {
1692
+ "transfer_period": "within 24 hours for High baseline"
1693
+ },
1694
+ "fedramp_additional_requirements": "Alternate processing site must be pre-provisioned with capacity to handle full production workload.",
1695
+ "priority": "P1",
1696
+ "baseline": "high",
1697
+ "moderate_also": true
1698
+ },
1699
+ {
1700
+ "id": "FRM-H-CP-7(1)",
1701
+ "family": "CP",
1702
+ "nist_control_id": "CP-7(1)",
1703
+ "title": "Alternate Processing Site | Separation from Primary Site",
1704
+ "description": "Identify an alternate processing site that is geographically separated from the primary processing site.",
1705
+ "fedramp_parameters": {
1706
+ "separation_distance": "at least 100 miles from primary site"
1707
+ },
1708
+ "fedramp_additional_requirements": "",
1709
+ "priority": "P1",
1710
+ "baseline": "high",
1711
+ "moderate_also": false
1712
+ },
1713
+ {
1714
+ "id": "FRM-H-CP-7(2)",
1715
+ "family": "CP",
1716
+ "nist_control_id": "CP-7(2)",
1717
+ "title": "Alternate Processing Site | Accessibility",
1718
+ "description": "Identify potential accessibility problems to the alternate processing site in the event of an area-wide disruption.",
1719
+ "fedramp_parameters": {},
1720
+ "fedramp_additional_requirements": "",
1721
+ "priority": "P1",
1722
+ "baseline": "high",
1723
+ "moderate_also": false
1724
+ },
1725
+ {
1726
+ "id": "FRM-H-CP-7(3)",
1727
+ "family": "CP",
1728
+ "nist_control_id": "CP-7(3)",
1729
+ "title": "Alternate Processing Site | Priority of Service",
1730
+ "description": "Develop alternate processing site agreements that contain priority-of-service provisions.",
1731
+ "fedramp_parameters": {},
1732
+ "fedramp_additional_requirements": "Service level agreements must guarantee processing priority during failover events.",
1733
+ "priority": "P1",
1734
+ "baseline": "high",
1735
+ "moderate_also": false
1736
+ },
1737
+ {
1738
+ "id": "FRM-H-CP-8",
1739
+ "family": "CP",
1740
+ "nist_control_id": "CP-8",
1741
+ "title": "Telecommunications Services",
1742
+ "description": "Establish alternate telecommunications services to permit the resumption of system operations when the primary telecommunications capabilities are unavailable.",
1743
+ "fedramp_parameters": {
1744
+ "resumption_period": "within 24 hours"
1745
+ },
1746
+ "fedramp_additional_requirements": "Alternate telecommunications must use diverse routing and different service providers where possible.",
1747
+ "priority": "P1",
1748
+ "baseline": "high",
1749
+ "moderate_also": true
1750
+ },
1751
+ {
1752
+ "id": "FRM-H-CP-8(1)",
1753
+ "family": "CP",
1754
+ "nist_control_id": "CP-8(1)",
1755
+ "title": "Telecommunications Services | Priority of Service Provisions",
1756
+ "description": "Develop primary and alternate telecommunications service agreements that contain priority-of-service provisions.",
1757
+ "fedramp_parameters": {},
1758
+ "fedramp_additional_requirements": "Telecommunications priority must be established through TSP program.",
1759
+ "priority": "P1",
1760
+ "baseline": "high",
1761
+ "moderate_also": false
1762
+ },
1763
+ {
1764
+ "id": "FRM-H-CP-8(2)",
1765
+ "family": "CP",
1766
+ "nist_control_id": "CP-8(2)",
1767
+ "title": "Telecommunications Services | Single Points of Failure",
1768
+ "description": "Obtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.",
1769
+ "fedramp_parameters": {},
1770
+ "fedramp_additional_requirements": "Network path diversity analysis required. No shared last-mile connectivity between primary and alternate.",
1771
+ "priority": "P1",
1772
+ "baseline": "high",
1773
+ "moderate_also": false
1774
+ },
1775
+ {
1776
+ "id": "FRM-H-CP-9",
1777
+ "family": "CP",
1778
+ "nist_control_id": "CP-9",
1779
+ "title": "System Backup",
1780
+ "description": "Conduct backups of user-level information, system-level information, and system documentation consistent with recovery time and recovery point objectives.",
1781
+ "fedramp_parameters": {
1782
+ "user_backup_frequency": "at least daily",
1783
+ "system_backup_frequency": "at least daily",
1784
+ "documentation_backup_frequency": "at least weekly"
1785
+ },
1786
+ "fedramp_additional_requirements": "Backups must be encrypted with FIPS 140-2 validated modules. Three copies in two media types with one offsite.",
1787
+ "priority": "P1",
1788
+ "baseline": "high",
1789
+ "moderate_also": true
1790
+ },
1791
+ {
1792
+ "id": "FRM-H-CP-9(1)",
1793
+ "family": "CP",
1794
+ "nist_control_id": "CP-9(1)",
1795
+ "title": "System Backup | Testing for Reliability and Integrity",
1796
+ "description": "Test backup information to verify media reliability and information integrity.",
1797
+ "fedramp_parameters": {
1798
+ "test_frequency": "at least quarterly for High baseline"
1799
+ },
1800
+ "fedramp_additional_requirements": "Full restoration test required quarterly. Results must be documented.",
1801
+ "priority": "P1",
1802
+ "baseline": "high",
1803
+ "moderate_also": false
1804
+ },
1805
+ {
1806
+ "id": "FRM-H-CP-9(2)",
1807
+ "family": "CP",
1808
+ "nist_control_id": "CP-9(2)",
1809
+ "title": "System Backup | Test Restoration Using Sampling",
1810
+ "description": "Use a sample of backup information in the restoration of selected system functions as part of contingency plan testing.",
1811
+ "fedramp_parameters": {},
1812
+ "fedramp_additional_requirements": "",
1813
+ "priority": "P1",
1814
+ "baseline": "high",
1815
+ "moderate_also": false
1816
+ },
1817
+ {
1818
+ "id": "FRM-H-CP-9(3)",
1819
+ "family": "CP",
1820
+ "nist_control_id": "CP-9(3)",
1821
+ "title": "System Backup | Separate Storage for Critical Information",
1822
+ "description": "Store backup copies of the operating system and other critical system software in a separate facility.",
1823
+ "fedramp_parameters": {},
1824
+ "fedramp_additional_requirements": "Critical system backups must be stored in a geographically separate GovCloud region.",
1825
+ "priority": "P1",
1826
+ "baseline": "high",
1827
+ "moderate_also": false
1828
+ },
1829
+ {
1830
+ "id": "FRM-H-CP-9(5)",
1831
+ "family": "CP",
1832
+ "nist_control_id": "CP-9(5)",
1833
+ "title": "System Backup | Transfer to Alternate Storage Site",
1834
+ "description": "Transfer system backup information to the alternate storage site at the FedRAMP-defined frequency.",
1835
+ "fedramp_parameters": {
1836
+ "transfer_frequency": "at least daily for High baseline"
1837
+ },
1838
+ "fedramp_additional_requirements": "Replication to alternate site must be automated and verified. Transfer must be encrypted in transit.",
1839
+ "priority": "P1",
1840
+ "baseline": "high",
1841
+ "moderate_also": false
1842
+ },
1843
+ {
1844
+ "id": "FRM-H-CP-10",
1845
+ "family": "CP",
1846
+ "nist_control_id": "CP-10",
1847
+ "title": "System Recovery and Reconstitution",
1848
+ "description": "Provide for the recovery and reconstitution of the system to a known state after a disruption, compromise, or failure.",
1849
+ "fedramp_parameters": {
1850
+ "recovery_period": "within 24 hours for High baseline"
1851
+ },
1852
+ "fedramp_additional_requirements": "Recovery procedures must be automated where possible. System must be reconstituted to a known secure state.",
1853
+ "priority": "P1",
1854
+ "baseline": "high",
1855
+ "moderate_also": true
1856
+ },
1857
+ {
1858
+ "id": "FRM-H-CP-10(2)",
1859
+ "family": "CP",
1860
+ "nist_control_id": "CP-10(2)",
1861
+ "title": "System Recovery and Reconstitution | Transaction Recovery",
1862
+ "description": "Implement transaction recovery for systems that are transaction-based.",
1863
+ "fedramp_parameters": {},
1864
+ "fedramp_additional_requirements": "Database transaction logging and point-in-time recovery required. Transaction replay capability must be tested.",
1865
+ "priority": "P1",
1866
+ "baseline": "high",
1867
+ "moderate_also": false
1868
+ },
1869
+ {
1870
+ "id": "FRM-H-CP-10(4)",
1871
+ "family": "CP",
1872
+ "nist_control_id": "CP-10(4)",
1873
+ "title": "System Recovery and Reconstitution | Restore Within Time Period",
1874
+ "description": "Provide the capability to restore system components within the FedRAMP-defined restoration time periods.",
1875
+ "fedramp_parameters": {
1876
+ "restoration_period": "within 24 hours for full system, 4 hours for critical components"
1877
+ },
1878
+ "fedramp_additional_requirements": "Infrastructure-as-code must support automated reprovisioning. Immutable infrastructure patterns recommended.",
1879
+ "priority": "P1",
1880
+ "baseline": "high",
1881
+ "moderate_also": false
1882
+ },
1883
+ {
1884
+ "id": "FRM-H-IA-1",
1885
+ "family": "IA",
1886
+ "nist_control_id": "IA-1",
1887
+ "title": "Identification and Authentication Policy and Procedures",
1888
+ "description": "Develop, document, and disseminate an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
1889
+ "fedramp_parameters": {
1890
+ "policy_review_frequency": "at least every 3 years",
1891
+ "procedure_review_frequency": "at least annually"
1892
+ },
1893
+ "fedramp_additional_requirements": "Policy must address cloud-specific authentication including API key management, federation, and multi-tenant identity isolation.",
1894
+ "priority": "P1",
1895
+ "baseline": "high",
1896
+ "moderate_also": true
1897
+ },
1898
+ {
1899
+ "id": "FRM-H-IA-2",
1900
+ "family": "IA",
1901
+ "nist_control_id": "IA-2",
1902
+ "title": "Identification and Authentication (Organizational Users)",
1903
+ "description": "Uniquely identify and authenticate organizational users or processes acting on behalf of organizational users.",
1904
+ "fedramp_parameters": {},
1905
+ "fedramp_additional_requirements": "All user accounts must be uniquely identifiable. No shared or generic accounts for interactive access.",
1906
+ "priority": "P1",
1907
+ "baseline": "high",
1908
+ "moderate_also": true
1909
+ },
1910
+ {
1911
+ "id": "FRM-H-IA-2(1)",
1912
+ "family": "IA",
1913
+ "nist_control_id": "IA-2(1)",
1914
+ "title": "Identification and Authentication | Multi-Factor Authentication to Privileged Accounts",
1915
+ "description": "Implement multi-factor authentication for access to privileged accounts.",
1916
+ "fedramp_parameters": {
1917
+ "mfa_type": "phishing-resistant MFA (FIDO2, PIV, or equivalent) required for High baseline"
1918
+ },
1919
+ "fedramp_additional_requirements": "MFA must be hardware-backed or FIDO2/PIV for privileged access on High systems. SMS-based MFA prohibited.",
1920
+ "priority": "P1",
1921
+ "baseline": "high",
1922
+ "moderate_also": true
1923
+ },
1924
+ {
1925
+ "id": "FRM-H-IA-2(2)",
1926
+ "family": "IA",
1927
+ "nist_control_id": "IA-2(2)",
1928
+ "title": "Identification and Authentication | Multi-Factor Authentication to Non-Privileged Accounts",
1929
+ "description": "Implement multi-factor authentication for access to non-privileged accounts.",
1930
+ "fedramp_parameters": {
1931
+ "mfa_type": "phishing-resistant MFA preferred; at minimum TOTP or push notification"
1932
+ },
1933
+ "fedramp_additional_requirements": "All interactive user accounts must use MFA. API access must use certificate-based or equivalent strong authentication.",
1934
+ "priority": "P1",
1935
+ "baseline": "high",
1936
+ "moderate_also": true
1937
+ },
1938
+ {
1939
+ "id": "FRM-H-IA-2(5)",
1940
+ "family": "IA",
1941
+ "nist_control_id": "IA-2(5)",
1942
+ "title": "Identification and Authentication | Individual Authentication with Group Authentication",
1943
+ "description": "When shared accounts or credentials are necessary, require individual authentication prior to granting access to the shared account or resource.",
1944
+ "fedramp_parameters": {},
1945
+ "fedramp_additional_requirements": "Individual accountability must be maintained even when shared resources are accessed. All shared account usage must be logged with individual identity.",
1946
+ "priority": "P1",
1947
+ "baseline": "high",
1948
+ "moderate_also": false
1949
+ },
1950
+ {
1951
+ "id": "FRM-H-IA-2(8)",
1952
+ "family": "IA",
1953
+ "nist_control_id": "IA-2(8)",
1954
+ "title": "Identification and Authentication | Access to Accounts \u2014 Replay Resistant",
1955
+ "description": "Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts.",
1956
+ "fedramp_parameters": {},
1957
+ "fedramp_additional_requirements": "Authentication protocols must be replay-resistant (e.g., challenge-response, time-based tokens). Session tokens must include anti-replay protections.",
1958
+ "priority": "P1",
1959
+ "baseline": "high",
1960
+ "moderate_also": false
1961
+ },
1962
+ {
1963
+ "id": "FRM-H-IA-2(12)",
1964
+ "family": "IA",
1965
+ "nist_control_id": "IA-2(12)",
1966
+ "title": "Identification and Authentication | Acceptance of PIV Credentials",
1967
+ "description": "Accept and electronically verify Personal Identity Verification (PIV) credentials.",
1968
+ "fedramp_parameters": {},
1969
+ "fedramp_additional_requirements": "System must accept and verify PIV/CAC credentials for DoD users. OCSP or CRL checking required for certificate validation.",
1970
+ "priority": "P1",
1971
+ "baseline": "high",
1972
+ "moderate_also": false
1973
+ },
1974
+ {
1975
+ "id": "FRM-H-IA-3",
1976
+ "family": "IA",
1977
+ "nist_control_id": "IA-3",
1978
+ "title": "Device Identification and Authentication",
1979
+ "description": "Uniquely identify and authenticate devices before establishing a local, remote, or network connection.",
1980
+ "fedramp_parameters": {},
1981
+ "fedramp_additional_requirements": "Device certificates or equivalent strong device authentication required. 802.1X network access control recommended.",
1982
+ "priority": "P1",
1983
+ "baseline": "high",
1984
+ "moderate_also": true
1985
+ },
1986
+ {
1987
+ "id": "FRM-H-IA-3(1)",
1988
+ "family": "IA",
1989
+ "nist_control_id": "IA-3(1)",
1990
+ "title": "Device Identification and Authentication | Cryptographic Bidirectional Authentication",
1991
+ "description": "Authenticate devices before establishing remote or network connections using bidirectional authentication that is cryptographically based.",
1992
+ "fedramp_parameters": {},
1993
+ "fedramp_additional_requirements": "Mutual TLS (mTLS) required for all inter-service communication on High systems. Device certificates must be managed via PKI.",
1994
+ "priority": "P1",
1995
+ "baseline": "high",
1996
+ "moderate_also": false
1997
+ },
1998
+ {
1999
+ "id": "FRM-H-IA-4",
2000
+ "family": "IA",
2001
+ "nist_control_id": "IA-4",
2002
+ "title": "Identifier Management",
2003
+ "description": "Manage system identifiers by receiving authorization from designated personnel to assign individual, group, role, service, or device identifiers. Select identifiers that identify individuals, groups, roles, services, or devices. Assign the identifiers to intended individuals, groups, roles, services, or devices. Prevent reuse of identifiers for a defined time period.",
2004
+ "fedramp_parameters": {
2005
+ "reuse_prevention_period": "at least 2 years for user identifiers"
2006
+ },
2007
+ "fedramp_additional_requirements": "Identifier lifecycle management must be automated. Orphaned identifiers must be detected and disabled within 30 days.",
2008
+ "priority": "P1",
2009
+ "baseline": "high",
2010
+ "moderate_also": true
2011
+ },
2012
+ {
2013
+ "id": "FRM-H-IA-5",
2014
+ "family": "IA",
2015
+ "nist_control_id": "IA-5",
2016
+ "title": "Authenticator Management",
2017
+ "description": "Manage system authenticators by verifying the identity of individuals, groups, roles, services, or devices receiving authenticators as part of initial authenticator distribution. Establish initial authenticator content, administrative procedures for lost or compromised authenticators, and provisions for changing or refreshing authenticators.",
2018
+ "fedramp_parameters": {
2019
+ "password_complexity": "minimum 12 characters with complexity requirements or minimum 15 characters without complexity",
2020
+ "password_lifetime": "maximum 60 days",
2021
+ "password_history": "last 24 passwords"
2022
+ },
2023
+ "fedramp_additional_requirements": "Passwords must be stored using FIPS-approved one-way hashing. Default passwords must be changed before production. Authenticator compromise procedures must be documented.",
2024
+ "priority": "P1",
2025
+ "baseline": "high",
2026
+ "moderate_also": true
2027
+ },
2028
+ {
2029
+ "id": "FRM-H-IA-5(1)",
2030
+ "family": "IA",
2031
+ "nist_control_id": "IA-5(1)",
2032
+ "title": "Authenticator Management | Password-Based Authentication",
2033
+ "description": "For password-based authentication, enforce minimum password complexity, store and transmit only cryptographically protected passwords, enforce password minimum and maximum lifetime restrictions, prohibit password reuse, and allow temporary password use for system logons with immediate change.",
2034
+ "fedramp_parameters": {
2035
+ "min_length": "12 characters minimum",
2036
+ "max_lifetime": "60 days",
2037
+ "min_lifetime": "1 day",
2038
+ "history_count": "24 passwords"
2039
+ },
2040
+ "fedramp_additional_requirements": "Passwords must be checked against known compromised password lists. Account lockout after 3 failed attempts.",
2041
+ "priority": "P1",
2042
+ "baseline": "high",
2043
+ "moderate_also": true
2044
+ },
2045
+ {
2046
+ "id": "FRM-H-IA-5(2)",
2047
+ "family": "IA",
2048
+ "nist_control_id": "IA-5(2)",
2049
+ "title": "Authenticator Management | PKI-Based Authentication",
2050
+ "description": "For PKI-based authentication, validate certificates by constructing and verifying a certification path to an accepted trust anchor, enforce authorized access to the corresponding private key, and map the authenticated identity to the account of the individual or group.",
2051
+ "fedramp_parameters": {},
2052
+ "fedramp_additional_requirements": "PKI certificates must be issued by DoD-approved CA or FedRAMP-approved CA. OCSP stapling or CRL checking required. Certificate pinning recommended for High systems.",
2053
+ "priority": "P1",
2054
+ "baseline": "high",
2055
+ "moderate_also": false
2056
+ },
2057
+ {
2058
+ "id": "FRM-H-IA-5(6)",
2059
+ "family": "IA",
2060
+ "nist_control_id": "IA-5(6)",
2061
+ "title": "Authenticator Management | Protection of Authenticators",
2062
+ "description": "Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.",
2063
+ "fedramp_parameters": {},
2064
+ "fedramp_additional_requirements": "Authenticators for High systems must be stored in hardware security modules (HSMs) or equivalent FIPS 140-2 Level 2+ validated modules.",
2065
+ "priority": "P1",
2066
+ "baseline": "high",
2067
+ "moderate_also": false
2068
+ },
2069
+ {
2070
+ "id": "FRM-H-IA-6",
2071
+ "family": "IA",
2072
+ "nist_control_id": "IA-6",
2073
+ "title": "Authentication Feedback",
2074
+ "description": "Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation or use by unauthorized individuals.",
2075
+ "fedramp_parameters": {},
2076
+ "fedramp_additional_requirements": "Authentication error messages must not reveal which element (username or password) was incorrect.",
2077
+ "priority": "P2",
2078
+ "baseline": "high",
2079
+ "moderate_also": true
2080
+ },
2081
+ {
2082
+ "id": "FRM-H-IA-7",
2083
+ "family": "IA",
2084
+ "nist_control_id": "IA-7",
2085
+ "title": "Cryptographic Module Authentication",
2086
+ "description": "Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication.",
2087
+ "fedramp_parameters": {
2088
+ "fips_level": "FIPS 140-2 Level 1 minimum; Level 2 for High baseline sensitive operations"
2089
+ },
2090
+ "fedramp_additional_requirements": "All cryptographic modules must be FIPS 140-2 validated. CMVP validation certificate numbers must be documented in SSP.",
2091
+ "priority": "P1",
2092
+ "baseline": "high",
2093
+ "moderate_also": true
2094
+ },
2095
+ {
2096
+ "id": "FRM-H-IA-8",
2097
+ "family": "IA",
2098
+ "nist_control_id": "IA-8",
2099
+ "title": "Identification and Authentication (Non-Organizational Users)",
2100
+ "description": "Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.",
2101
+ "fedramp_parameters": {},
2102
+ "fedramp_additional_requirements": "Non-organizational users must be identified and authenticated with the same rigor as organizational users. Guest access prohibited on High systems.",
2103
+ "priority": "P1",
2104
+ "baseline": "high",
2105
+ "moderate_also": true
2106
+ },
2107
+ {
2108
+ "id": "FRM-H-IA-8(1)",
2109
+ "family": "IA",
2110
+ "nist_control_id": "IA-8(1)",
2111
+ "title": "Identification and Authentication | Acceptance of PIV Credentials from Other Agencies",
2112
+ "description": "Accept and electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.",
2113
+ "fedramp_parameters": {},
2114
+ "fedramp_additional_requirements": "Cross-agency PIV/CAC acceptance must be supported. Federal PKI bridge trust required.",
2115
+ "priority": "P1",
2116
+ "baseline": "high",
2117
+ "moderate_also": false
2118
+ },
2119
+ {
2120
+ "id": "FRM-H-IA-8(2)",
2121
+ "family": "IA",
2122
+ "nist_control_id": "IA-8(2)",
2123
+ "title": "Identification and Authentication | Acceptance of External Authenticators",
2124
+ "description": "Accept only external authenticators that are NIST-compliant and meet the assurance level requirements.",
2125
+ "fedramp_parameters": {
2126
+ "assurance_level": "AAL2 minimum for High baseline, AAL3 for privileged access"
2127
+ },
2128
+ "fedramp_additional_requirements": "External authenticators must meet NIST SP 800-63B assurance levels. Federation must use SAML 2.0 or OIDC with signed assertions.",
2129
+ "priority": "P1",
2130
+ "baseline": "high",
2131
+ "moderate_also": false
2132
+ },
2133
+ {
2134
+ "id": "FRM-H-IA-8(4)",
2135
+ "family": "IA",
2136
+ "nist_control_id": "IA-8(4)",
2137
+ "title": "Identification and Authentication | Use of Defined Profiles",
2138
+ "description": "Conform to organization-defined profiles for identity management.",
2139
+ "fedramp_parameters": {},
2140
+ "fedramp_additional_requirements": "Identity management must conform to FICAM profiles. SAML/OIDC implementations must follow NIST SP 800-63C federation guidelines.",
2141
+ "priority": "P1",
2142
+ "baseline": "high",
2143
+ "moderate_also": false
2144
+ },
2145
+ {
2146
+ "id": "FRM-H-IR-1",
2147
+ "family": "IR",
2148
+ "nist_control_id": "IR-1",
2149
+ "title": "Incident Response Policy and Procedures",
2150
+ "description": "Develop, document, and disseminate an incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
2151
+ "fedramp_parameters": {
2152
+ "policy_review_frequency": "at least every 3 years",
2153
+ "procedure_review_frequency": "at least annually"
2154
+ },
2155
+ "fedramp_additional_requirements": "Policy must address FedRAMP incident reporting requirements including US-CERT notification timelines.",
2156
+ "priority": "P1",
2157
+ "baseline": "high",
2158
+ "moderate_also": true
2159
+ },
2160
+ {
2161
+ "id": "FRM-H-IR-2",
2162
+ "family": "IR",
2163
+ "nist_control_id": "IR-2",
2164
+ "title": "Incident Response Training",
2165
+ "description": "Provide incident response training to system users consistent with assigned roles and responsibilities.",
2166
+ "fedramp_parameters": {
2167
+ "initial_training": "within 10 days of assuming incident response role",
2168
+ "refresher_frequency": "at least annually"
2169
+ },
2170
+ "fedramp_additional_requirements": "Training must include FedRAMP-specific incident reporting procedures and US-CERT notification requirements.",
2171
+ "priority": "P2",
2172
+ "baseline": "high",
2173
+ "moderate_also": true
2174
+ },
2175
+ {
2176
+ "id": "FRM-H-IR-2(1)",
2177
+ "family": "IR",
2178
+ "nist_control_id": "IR-2(1)",
2179
+ "title": "Incident Response Training | Simulated Events",
2180
+ "description": "Incorporate simulated events into incident response training to facilitate the required response by personnel in crisis situations.",
2181
+ "fedramp_parameters": {},
2182
+ "fedramp_additional_requirements": "Simulated incident exercises must be conducted at least annually. Scenarios must include data breach, ransomware, and insider threat.",
2183
+ "priority": "P2",
2184
+ "baseline": "high",
2185
+ "moderate_also": false
2186
+ },
2187
+ {
2188
+ "id": "FRM-H-IR-2(2)",
2189
+ "family": "IR",
2190
+ "nist_control_id": "IR-2(2)",
2191
+ "title": "Incident Response Training | Automated Training Environments",
2192
+ "description": "Provide an incident response training environment using automated mechanisms.",
2193
+ "fedramp_parameters": {},
2194
+ "fedramp_additional_requirements": "Automated training environment must simulate realistic attack scenarios and allow practice of containment and eradication procedures.",
2195
+ "priority": "P2",
2196
+ "baseline": "high",
2197
+ "moderate_also": false
2198
+ },
2199
+ {
2200
+ "id": "FRM-H-IR-3",
2201
+ "family": "IR",
2202
+ "nist_control_id": "IR-3",
2203
+ "title": "Incident Response Testing",
2204
+ "description": "Test the effectiveness of the incident response capability for the system at the FedRAMP-defined frequency using FedRAMP-defined tests.",
2205
+ "fedramp_parameters": {
2206
+ "test_frequency": "at least annually",
2207
+ "test_types": "tabletop exercises and functional testing"
2208
+ },
2209
+ "fedramp_additional_requirements": "Test results must be documented and deficiencies tracked in POA&M.",
2210
+ "priority": "P2",
2211
+ "baseline": "high",
2212
+ "moderate_also": true
2213
+ },
2214
+ {
2215
+ "id": "FRM-H-IR-4",
2216
+ "family": "IR",
2217
+ "nist_control_id": "IR-4",
2218
+ "title": "Incident Handling",
2219
+ "description": "Implement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery.",
2220
+ "fedramp_parameters": {},
2221
+ "fedramp_additional_requirements": "Incident handling must include automated detection and correlation. FedRAMP PMO and US-CERT must be notified within 1 hour of confirmed incident for High systems.",
2222
+ "priority": "P1",
2223
+ "baseline": "high",
2224
+ "moderate_also": true
2225
+ },
2226
+ {
2227
+ "id": "FRM-H-IR-4(1)",
2228
+ "family": "IR",
2229
+ "nist_control_id": "IR-4(1)",
2230
+ "title": "Incident Handling | Automated Incident Handling Processes",
2231
+ "description": "Employ automated mechanisms to support the incident handling process.",
2232
+ "fedramp_parameters": {},
2233
+ "fedramp_additional_requirements": "SOAR or equivalent automated incident response platform required for High systems. Automated containment actions for known attack patterns.",
2234
+ "priority": "P1",
2235
+ "baseline": "high",
2236
+ "moderate_also": false
2237
+ },
2238
+ {
2239
+ "id": "FRM-H-IR-4(4)",
2240
+ "family": "IR",
2241
+ "nist_control_id": "IR-4(4)",
2242
+ "title": "Incident Handling | Information Correlation",
2243
+ "description": "Correlate incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.",
2244
+ "fedramp_parameters": {},
2245
+ "fedramp_additional_requirements": "Incident correlation must integrate with SIEM and threat intelligence feeds. Cross-tenant incident correlation required for CSP-level awareness.",
2246
+ "priority": "P1",
2247
+ "baseline": "high",
2248
+ "moderate_also": false
2249
+ },
2250
+ {
2251
+ "id": "FRM-H-IR-4(11)",
2252
+ "family": "IR",
2253
+ "nist_control_id": "IR-4(11)",
2254
+ "title": "Incident Handling | Integrated Incident Response Team",
2255
+ "description": "Establish and maintain an integrated incident response team that can be deployed to any location identified by the organization in an organization-defined time period.",
2256
+ "fedramp_parameters": {
2257
+ "deployment_time": "within 4 hours of incident escalation"
2258
+ },
2259
+ "fedramp_additional_requirements": "Incident response team must include security, operations, legal, and communications representatives. Team must be available 24/7 for High systems.",
2260
+ "priority": "P1",
2261
+ "baseline": "high",
2262
+ "moderate_also": false
2263
+ },
2264
+ {
2265
+ "id": "FRM-H-IR-5",
2266
+ "family": "IR",
2267
+ "nist_control_id": "IR-5",
2268
+ "title": "Incident Monitoring",
2269
+ "description": "Track and document incidents on an ongoing basis.",
2270
+ "fedramp_parameters": {},
2271
+ "fedramp_additional_requirements": "Incident tracking system must maintain chain of custody for evidence. All incident data must be retained for at least 3 years.",
2272
+ "priority": "P1",
2273
+ "baseline": "high",
2274
+ "moderate_also": true
2275
+ },
2276
+ {
2277
+ "id": "FRM-H-IR-6",
2278
+ "family": "IR",
2279
+ "nist_control_id": "IR-6",
2280
+ "title": "Incident Reporting",
2281
+ "description": "Require personnel to report suspected incidents to the organizational incident response capability within the FedRAMP-defined time period.",
2282
+ "fedramp_parameters": {
2283
+ "reporting_period": "within 1 hour of discovery for High baseline"
2284
+ },
2285
+ "fedramp_additional_requirements": "US-CERT must be notified within 1 hour of confirmed incident. FedRAMP PMO notification required per FedRAMP Incident Communications Procedures.",
2286
+ "priority": "P1",
2287
+ "baseline": "high",
2288
+ "moderate_also": true
2289
+ },
2290
+ {
2291
+ "id": "FRM-H-IR-6(1)",
2292
+ "family": "IR",
2293
+ "nist_control_id": "IR-6(1)",
2294
+ "title": "Incident Reporting | Automated Reporting",
2295
+ "description": "Employ automated mechanisms to assist in the reporting of incidents.",
2296
+ "fedramp_parameters": {},
2297
+ "fedramp_additional_requirements": "Automated incident notification to FedRAMP PMO and US-CERT required. Incident reports must include IOCs and TTPs when available.",
2298
+ "priority": "P1",
2299
+ "baseline": "high",
2300
+ "moderate_also": false
2301
+ },
2302
+ {
2303
+ "id": "FRM-H-IR-6(3)",
2304
+ "family": "IR",
2305
+ "nist_control_id": "IR-6(3)",
2306
+ "title": "Incident Reporting | Supply Chain Coordination",
2307
+ "description": "Provide incident information to the provider of the product or service and other organizations involved in the supply chain for systems or system components related to the incident.",
2308
+ "fedramp_parameters": {},
2309
+ "fedramp_additional_requirements": "Supply chain incident coordination procedures must be documented. Vendor notification required for incidents involving third-party components.",
2310
+ "priority": "P1",
2311
+ "baseline": "high",
2312
+ "moderate_also": false
2313
+ },
2314
+ {
2315
+ "id": "FRM-H-IR-7",
2316
+ "family": "IR",
2317
+ "nist_control_id": "IR-7",
2318
+ "title": "Incident Response Assistance",
2319
+ "description": "Provide an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the system for the handling and reporting of incidents.",
2320
+ "fedramp_parameters": {},
2321
+ "fedramp_additional_requirements": "24/7 incident response support required for High systems. Contact information must be readily available to all system users.",
2322
+ "priority": "P2",
2323
+ "baseline": "high",
2324
+ "moderate_also": true
2325
+ },
2326
+ {
2327
+ "id": "FRM-H-IR-8",
2328
+ "family": "IR",
2329
+ "nist_control_id": "IR-8",
2330
+ "title": "Incident Response Plan",
2331
+ "description": "Develop an incident response plan that provides the organization with a roadmap for implementing its incident response capability.",
2332
+ "fedramp_parameters": {
2333
+ "plan_review_frequency": "at least annually"
2334
+ },
2335
+ "fedramp_additional_requirements": "Plan must address FedRAMP-specific reporting requirements, US-CERT coordination, and customer notification procedures.",
2336
+ "priority": "P1",
2337
+ "baseline": "high",
2338
+ "moderate_also": true
2339
+ },
2340
+ {
2341
+ "id": "FRM-H-MA-1",
2342
+ "family": "MA",
2343
+ "nist_control_id": "MA-1",
2344
+ "title": "System Maintenance Policy and Procedures",
2345
+ "description": "Develop, document, and disseminate a system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
2346
+ "fedramp_parameters": {
2347
+ "policy_review_frequency": "at least every 3 years",
2348
+ "procedure_review_frequency": "at least annually"
2349
+ },
2350
+ "fedramp_additional_requirements": "Policy must address cloud infrastructure maintenance windows, customer notification requirements, and patch management.",
2351
+ "priority": "P1",
2352
+ "baseline": "high",
2353
+ "moderate_also": true
2354
+ },
2355
+ {
2356
+ "id": "FRM-H-MA-2",
2357
+ "family": "MA",
2358
+ "nist_control_id": "MA-2",
2359
+ "title": "Controlled Maintenance",
2360
+ "description": "Schedule, document, and review records of maintenance, repair, and replacement on system components in accordance with manufacturer or vendor specifications and/or organizational requirements.",
2361
+ "fedramp_parameters": {},
2362
+ "fedramp_additional_requirements": "Maintenance activities must be approved and scheduled through change management. Emergency maintenance requires retrospective documentation within 24 hours.",
2363
+ "priority": "P2",
2364
+ "baseline": "high",
2365
+ "moderate_also": true
2366
+ },
2367
+ {
2368
+ "id": "FRM-H-MA-3",
2369
+ "family": "MA",
2370
+ "nist_control_id": "MA-3",
2371
+ "title": "Maintenance Tools",
2372
+ "description": "Approve, control, and monitor the use of system maintenance tools.",
2373
+ "fedramp_parameters": {},
2374
+ "fedramp_additional_requirements": "Maintenance tools must be inventoried and inspected before use. Remote maintenance tools must be authorized and logged.",
2375
+ "priority": "P3",
2376
+ "baseline": "high",
2377
+ "moderate_also": true
2378
+ },
2379
+ {
2380
+ "id": "FRM-H-MA-3(1)",
2381
+ "family": "MA",
2382
+ "nist_control_id": "MA-3(1)",
2383
+ "title": "Maintenance Tools | Inspect Tools",
2384
+ "description": "Inspect the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.",
2385
+ "fedramp_parameters": {},
2386
+ "fedramp_additional_requirements": "Tool inspection must be documented. Digital tools must be scanned for malware before connecting to production systems.",
2387
+ "priority": "P3",
2388
+ "baseline": "high",
2389
+ "moderate_also": true
2390
+ },
2391
+ {
2392
+ "id": "FRM-H-MA-3(2)",
2393
+ "family": "MA",
2394
+ "nist_control_id": "MA-3(2)",
2395
+ "title": "Maintenance Tools | Inspect Media",
2396
+ "description": "Check media containing diagnostic and test programs for malicious code before the media are used in the system.",
2397
+ "fedramp_parameters": {},
2398
+ "fedramp_additional_requirements": "All removable media must be scanned in a quarantine environment before use on production systems.",
2399
+ "priority": "P3",
2400
+ "baseline": "high",
2401
+ "moderate_also": true
2402
+ },
2403
+ {
2404
+ "id": "FRM-H-MA-4",
2405
+ "family": "MA",
2406
+ "nist_control_id": "MA-4",
2407
+ "title": "Nonlocal Maintenance",
2408
+ "description": "Approve and monitor nonlocal maintenance and diagnostic activities. Allow the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy. Employ strong authentication in the establishment of nonlocal maintenance and diagnostic sessions.",
2409
+ "fedramp_parameters": {},
2410
+ "fedramp_additional_requirements": "All nonlocal maintenance sessions must use MFA, encrypted channels, and session recording. Sessions must be terminated upon completion.",
2411
+ "priority": "P2",
2412
+ "baseline": "high",
2413
+ "moderate_also": true
2414
+ },
2415
+ {
2416
+ "id": "FRM-H-MA-5",
2417
+ "family": "MA",
2418
+ "nist_control_id": "MA-5",
2419
+ "title": "Maintenance Personnel",
2420
+ "description": "Establish a process for maintenance personnel authorization and maintain a list of authorized maintenance organizations or personnel. Verify that non-escorted personnel performing maintenance possess required access authorizations. Designate organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.",
2421
+ "fedramp_parameters": {},
2422
+ "fedramp_additional_requirements": "Maintenance personnel must have appropriate background checks and clearances for High systems. Foreign nationals performing maintenance require additional oversight.",
2423
+ "priority": "P2",
2424
+ "baseline": "high",
2425
+ "moderate_also": true
2426
+ },
2427
+ {
2428
+ "id": "FRM-H-MA-6",
2429
+ "family": "MA",
2430
+ "nist_control_id": "MA-6",
2431
+ "title": "Timely Maintenance",
2432
+ "description": "Obtain maintenance support and/or spare parts for system components within the FedRAMP-defined time period of failure.",
2433
+ "fedramp_parameters": {
2434
+ "maintenance_timeframe": "within 24 hours for critical components, 72 hours for non-critical"
2435
+ },
2436
+ "fedramp_additional_requirements": "Spare parts inventory or vendor SLAs must support defined maintenance timeframes. Hot-spare capability required for critical infrastructure.",
2437
+ "priority": "P2",
2438
+ "baseline": "high",
2439
+ "moderate_also": true
2440
+ },
2441
+ {
2442
+ "id": "FRM-H-MP-1",
2443
+ "family": "MP",
2444
+ "nist_control_id": "MP-1",
2445
+ "title": "Media Protection Policy and Procedures",
2446
+ "description": "Develop, document, and disseminate a media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
2447
+ "fedramp_parameters": {
2448
+ "policy_review_frequency": "at least every 3 years",
2449
+ "procedure_review_frequency": "at least annually"
2450
+ },
2451
+ "fedramp_additional_requirements": "Policy must address cloud storage media, virtual disk images, backup media, and CUI marking requirements for media.",
2452
+ "priority": "P1",
2453
+ "baseline": "high",
2454
+ "moderate_also": true
2455
+ },
2456
+ {
2457
+ "id": "FRM-H-MP-2",
2458
+ "family": "MP",
2459
+ "nist_control_id": "MP-2",
2460
+ "title": "Media Access",
2461
+ "description": "Restrict access to digital and non-digital media to authorized individuals using organization-defined controls.",
2462
+ "fedramp_parameters": {},
2463
+ "fedramp_additional_requirements": "Media containing CUI must be stored in controlled-access areas. Digital media access must be logged.",
2464
+ "priority": "P1",
2465
+ "baseline": "high",
2466
+ "moderate_also": true
2467
+ },
2468
+ {
2469
+ "id": "FRM-H-MP-3",
2470
+ "family": "MP",
2471
+ "nist_control_id": "MP-3",
2472
+ "title": "Media Marking",
2473
+ "description": "Mark system media indicating the distribution limitations, handling caveats, and applicable security markings of the information.",
2474
+ "fedramp_parameters": {},
2475
+ "fedramp_additional_requirements": "All media containing CUI must be marked with CUI banner and handling instructions. Digital media must include metadata markings.",
2476
+ "priority": "P2",
2477
+ "baseline": "high",
2478
+ "moderate_also": true
2479
+ },
2480
+ {
2481
+ "id": "FRM-H-MP-4",
2482
+ "family": "MP",
2483
+ "nist_control_id": "MP-4",
2484
+ "title": "Media Storage",
2485
+ "description": "Physically control and securely store digital and non-digital media within controlled areas using organization-defined controls.",
2486
+ "fedramp_parameters": {
2487
+ "controlled_areas": "locked rooms, safes, or containers with access limited to authorized personnel"
2488
+ },
2489
+ "fedramp_additional_requirements": "CUI media must be stored in GSA-approved security containers or equivalent. Encryption at rest required for all digital media.",
2490
+ "priority": "P1",
2491
+ "baseline": "high",
2492
+ "moderate_also": true
2493
+ },
2494
+ {
2495
+ "id": "FRM-H-MP-5",
2496
+ "family": "MP",
2497
+ "nist_control_id": "MP-5",
2498
+ "title": "Media Transport",
2499
+ "description": "Protect and control digital and non-digital media during transport outside of controlled areas using organization-defined controls.",
2500
+ "fedramp_parameters": {},
2501
+ "fedramp_additional_requirements": "CUI media in transit must be encrypted and tracked. Chain of custody documentation required.",
2502
+ "priority": "P1",
2503
+ "baseline": "high",
2504
+ "moderate_also": true
2505
+ },
2506
+ {
2507
+ "id": "FRM-H-MP-5(3)",
2508
+ "family": "MP",
2509
+ "nist_control_id": "MP-5(3)",
2510
+ "title": "Media Transport | Custodians",
2511
+ "description": "Employ an identified custodian during transport of system media outside of controlled areas.",
2512
+ "fedramp_parameters": {},
2513
+ "fedramp_additional_requirements": "Custodians must be cleared personnel. Media custody transfer must be documented with signatures.",
2514
+ "priority": "P1",
2515
+ "baseline": "high",
2516
+ "moderate_also": false
2517
+ },
2518
+ {
2519
+ "id": "FRM-H-MP-5(4)",
2520
+ "family": "MP",
2521
+ "nist_control_id": "MP-5(4)",
2522
+ "title": "Media Transport | Cryptographic Protection",
2523
+ "description": "Implement cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.",
2524
+ "fedramp_parameters": {
2525
+ "encryption_standard": "FIPS 140-2 validated, AES-256 or equivalent"
2526
+ },
2527
+ "fedramp_additional_requirements": "Full-disk encryption required for all transportable digital media. Encryption keys must be managed separately from encrypted media.",
2528
+ "priority": "P1",
2529
+ "baseline": "high",
2530
+ "moderate_also": false
2531
+ },
2532
+ {
2533
+ "id": "FRM-H-MP-6",
2534
+ "family": "MP",
2535
+ "nist_control_id": "MP-6",
2536
+ "title": "Media Sanitization",
2537
+ "description": "Sanitize system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures.",
2538
+ "fedramp_parameters": {
2539
+ "sanitization_standard": "NIST SP 800-88 Guidelines for Media Sanitization"
2540
+ },
2541
+ "fedramp_additional_requirements": "Sanitization must follow NIST SP 800-88 Rev 1. Certificates of sanitization required. CSP must document media sanitization procedures for cloud storage.",
2542
+ "priority": "P1",
2543
+ "baseline": "high",
2544
+ "moderate_also": true
2545
+ },
2546
+ {
2547
+ "id": "FRM-H-MP-6(1)",
2548
+ "family": "MP",
2549
+ "nist_control_id": "MP-6(1)",
2550
+ "title": "Media Sanitization | Review, Approve, Track, Document, and Verify",
2551
+ "description": "Review, approve, track, document, and verify media sanitization and disposal actions.",
2552
+ "fedramp_parameters": {},
2553
+ "fedramp_additional_requirements": "All sanitization actions must be tracked in audit trail. Third-party sanitization vendors must provide certificates of destruction.",
2554
+ "priority": "P1",
2555
+ "baseline": "high",
2556
+ "moderate_also": false
2557
+ },
2558
+ {
2559
+ "id": "FRM-H-MP-6(2)",
2560
+ "family": "MP",
2561
+ "nist_control_id": "MP-6(2)",
2562
+ "title": "Media Sanitization | Equipment Testing",
2563
+ "description": "Test sanitization equipment and procedures at the FedRAMP-defined frequency to ensure correct performance.",
2564
+ "fedramp_parameters": {
2565
+ "test_frequency": "at least annually"
2566
+ },
2567
+ "fedramp_additional_requirements": "Sanitization verification testing must confirm complete data removal. Results must be documented.",
2568
+ "priority": "P1",
2569
+ "baseline": "high",
2570
+ "moderate_also": false
2571
+ },
2572
+ {
2573
+ "id": "FRM-H-MP-6(3)",
2574
+ "family": "MP",
2575
+ "nist_control_id": "MP-6(3)",
2576
+ "title": "Media Sanitization | Nondestructive Techniques",
2577
+ "description": "Apply nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the system.",
2578
+ "fedramp_parameters": {},
2579
+ "fedramp_additional_requirements": "All portable storage devices must be sanitized and scanned before connection to High systems. Automated kiosk scanning recommended.",
2580
+ "priority": "P1",
2581
+ "baseline": "high",
2582
+ "moderate_also": false
2583
+ },
2584
+ {
2585
+ "id": "FRM-H-MP-7",
2586
+ "family": "MP",
2587
+ "nist_control_id": "MP-7",
2588
+ "title": "Media Use",
2589
+ "description": "Restrict the use of certain types of system media on systems or system components using organization-defined controls.",
2590
+ "fedramp_parameters": {
2591
+ "restricted_media": "removable media, personally-owned media, and unencrypted portable storage"
2592
+ },
2593
+ "fedramp_additional_requirements": "Use of removable media must be restricted and logged. USB mass storage must be disabled by default on High systems.",
2594
+ "priority": "P1",
2595
+ "baseline": "high",
2596
+ "moderate_also": true
2597
+ },
2598
+ {
2599
+ "id": "FRM-H-PE-1",
2600
+ "family": "PE",
2601
+ "nist_control_id": "PE-1",
2602
+ "title": "Physical and Environmental Protection Policy and Procedures",
2603
+ "description": "Develop, document, and disseminate a physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
2604
+ "fedramp_parameters": {
2605
+ "policy_review_frequency": "at least every 3 years",
2606
+ "procedure_review_frequency": "at least annually"
2607
+ },
2608
+ "fedramp_additional_requirements": "Policy must address data center physical security, visitor management, and environmental controls for cloud infrastructure.",
2609
+ "priority": "P1",
2610
+ "baseline": "high",
2611
+ "moderate_also": true
2612
+ },
2613
+ {
2614
+ "id": "FRM-H-PE-2",
2615
+ "family": "PE",
2616
+ "nist_control_id": "PE-2",
2617
+ "title": "Physical Access Authorizations",
2618
+ "description": "Develop, approve, and maintain a list of individuals with authorized access to the facility where the system resides. Issue authorization credentials for facility access. Review the access list detailing authorized facility access by individuals.",
2619
+ "fedramp_parameters": {
2620
+ "review_frequency": "at least annually"
2621
+ },
2622
+ "fedramp_additional_requirements": "Physical access list must be reviewed annually. Removed personnel must have access revoked within 24 hours.",
2623
+ "priority": "P1",
2624
+ "baseline": "high",
2625
+ "moderate_also": true
2626
+ },
2627
+ {
2628
+ "id": "FRM-H-PE-2(1)",
2629
+ "family": "PE",
2630
+ "nist_control_id": "PE-2(1)",
2631
+ "title": "Physical Access Authorizations | Access by Position or Role",
2632
+ "description": "Authorize physical access to the facility where the system resides based on position or role.",
2633
+ "fedramp_parameters": {},
2634
+ "fedramp_additional_requirements": "Role-based physical access must follow least privilege. Data center access limited to operations personnel only.",
2635
+ "priority": "P1",
2636
+ "baseline": "high",
2637
+ "moderate_also": false
2638
+ },
2639
+ {
2640
+ "id": "FRM-H-PE-3",
2641
+ "family": "PE",
2642
+ "nist_control_id": "PE-3",
2643
+ "title": "Physical Access Control",
2644
+ "description": "Enforce physical access authorizations at entry and exit points to the facility where the system resides by verifying individual access authorizations before granting access. Control ingress and egress using physical access control systems/devices or guards.",
2645
+ "fedramp_parameters": {},
2646
+ "fedramp_additional_requirements": "Multi-factor physical access control required (badge + biometric or badge + PIN). Mantrap/sally port required for data center access.",
2647
+ "priority": "P1",
2648
+ "baseline": "high",
2649
+ "moderate_also": true
2650
+ },
2651
+ {
2652
+ "id": "FRM-H-PE-3(1)",
2653
+ "family": "PE",
2654
+ "nist_control_id": "PE-3(1)",
2655
+ "title": "Physical Access Control | System Access",
2656
+ "description": "Enforce physical access authorizations to the system in addition to the physical access controls for the facility.",
2657
+ "fedramp_parameters": {},
2658
+ "fedramp_additional_requirements": "Individual server rack or cage locking required. Access to individual system components must be controlled and logged.",
2659
+ "priority": "P1",
2660
+ "baseline": "high",
2661
+ "moderate_also": false
2662
+ },
2663
+ {
2664
+ "id": "FRM-H-PE-3(2)",
2665
+ "family": "PE",
2666
+ "nist_control_id": "PE-3(2)",
2667
+ "title": "Physical Access Control | Facility and Systems",
2668
+ "description": "Perform security checks at the physical boundary of the facility or system for unauthorized exfiltration of information or removal of system components.",
2669
+ "fedramp_parameters": {
2670
+ "check_frequency": "at random intervals, at least daily"
2671
+ },
2672
+ "fedramp_additional_requirements": "Checks must include inspection for unauthorized recording devices, removable media, and system components.",
2673
+ "priority": "P1",
2674
+ "baseline": "high",
2675
+ "moderate_also": false
2676
+ },
2677
+ {
2678
+ "id": "FRM-H-PE-3(3)",
2679
+ "family": "PE",
2680
+ "nist_control_id": "PE-3(3)",
2681
+ "title": "Physical Access Control | Continuous Guards",
2682
+ "description": "Employ guards to control physical access to the facility where the system resides.",
2683
+ "fedramp_parameters": {},
2684
+ "fedramp_additional_requirements": "24/7 security guard presence required at data center facilities housing High systems.",
2685
+ "priority": "P1",
2686
+ "baseline": "high",
2687
+ "moderate_also": false
2688
+ },
2689
+ {
2690
+ "id": "FRM-H-PE-4",
2691
+ "family": "PE",
2692
+ "nist_control_id": "PE-4",
2693
+ "title": "Access Control for Transmission",
2694
+ "description": "Control physical access to system distribution and transmission lines within organizational facilities using organization-defined security controls.",
2695
+ "fedramp_parameters": {},
2696
+ "fedramp_additional_requirements": "Network cabling must be in secured conduit or plenum. Fiber optic preferred for inter-building connections. Wiretap detection capability required.",
2697
+ "priority": "P1",
2698
+ "baseline": "high",
2699
+ "moderate_also": false
2700
+ },
2701
+ {
2702
+ "id": "FRM-H-PE-5",
2703
+ "family": "PE",
2704
+ "nist_control_id": "PE-5",
2705
+ "title": "Access Control for Output Devices",
2706
+ "description": "Control physical access to output from output devices to prevent unauthorized individuals from obtaining the output.",
2707
+ "fedramp_parameters": {},
2708
+ "fedramp_additional_requirements": "Printers and displays in shared areas must require authentication for output. Screen privacy filters required in shared spaces.",
2709
+ "priority": "P2",
2710
+ "baseline": "high",
2711
+ "moderate_also": false
2712
+ },
2713
+ {
2714
+ "id": "FRM-H-PE-6",
2715
+ "family": "PE",
2716
+ "nist_control_id": "PE-6",
2717
+ "title": "Monitoring Physical Access",
2718
+ "description": "Monitor physical access to the facility where the system resides to detect and respond to physical security incidents.",
2719
+ "fedramp_parameters": {},
2720
+ "fedramp_additional_requirements": "CCTV coverage required at all entry points, server rooms, and sensitive areas. Video retained for at least 90 days.",
2721
+ "priority": "P1",
2722
+ "baseline": "high",
2723
+ "moderate_also": true
2724
+ },
2725
+ {
2726
+ "id": "FRM-H-PE-6(1)",
2727
+ "family": "PE",
2728
+ "nist_control_id": "PE-6(1)",
2729
+ "title": "Monitoring Physical Access | Intrusion Alarms and Surveillance Equipment",
2730
+ "description": "Monitor physical access to the facility where the system resides using physical intrusion alarms and surveillance equipment.",
2731
+ "fedramp_parameters": {},
2732
+ "fedramp_additional_requirements": "Intrusion detection systems with 24/7 monitoring center required. Alarm response within 15 minutes.",
2733
+ "priority": "P1",
2734
+ "baseline": "high",
2735
+ "moderate_also": false
2736
+ },
2737
+ {
2738
+ "id": "FRM-H-PE-6(4)",
2739
+ "family": "PE",
2740
+ "nist_control_id": "PE-6(4)",
2741
+ "title": "Monitoring Physical Access | Monitoring Physical Access to Systems",
2742
+ "description": "Monitor physical access to the system in addition to the physical access monitoring of the facility.",
2743
+ "fedramp_parameters": {},
2744
+ "fedramp_additional_requirements": "Individual rack/cage access must be monitored and logged with tamper detection.",
2745
+ "priority": "P1",
2746
+ "baseline": "high",
2747
+ "moderate_also": false
2748
+ },
2749
+ {
2750
+ "id": "FRM-H-PE-8",
2751
+ "family": "PE",
2752
+ "nist_control_id": "PE-8",
2753
+ "title": "Visitor Access Records",
2754
+ "description": "Maintain visitor access records to the facility where the system resides that include name, organization, badge number, date/time of access, escort, and purpose of visit. Review visitor access records.",
2755
+ "fedramp_parameters": {
2756
+ "record_retention": "at least 1 year",
2757
+ "review_frequency": "at least monthly"
2758
+ },
2759
+ "fedramp_additional_requirements": "Visitor logs must be maintained electronically. Visitor badges must be visually distinct from employee badges.",
2760
+ "priority": "P3",
2761
+ "baseline": "high",
2762
+ "moderate_also": true
2763
+ },
2764
+ {
2765
+ "id": "FRM-H-PE-9",
2766
+ "family": "PE",
2767
+ "nist_control_id": "PE-9",
2768
+ "title": "Power Equipment and Cabling",
2769
+ "description": "Protect power equipment and power cabling for the system from damage and destruction.",
2770
+ "fedramp_parameters": {},
2771
+ "fedramp_additional_requirements": "Power distribution must be redundant (A+B feeds). UPS and generator backup required with automatic transfer switches.",
2772
+ "priority": "P1",
2773
+ "baseline": "high",
2774
+ "moderate_also": false
2775
+ },
2776
+ {
2777
+ "id": "FRM-H-PE-10",
2778
+ "family": "PE",
2779
+ "nist_control_id": "PE-10",
2780
+ "title": "Emergency Shutoff",
2781
+ "description": "Provide the capability of shutting off power to the system or individual system components in emergency situations. Place emergency shutoff switches or devices in a location to facilitate safe and easy access for personnel. Protect emergency power shutoff capability from unauthorized activation.",
2782
+ "fedramp_parameters": {},
2783
+ "fedramp_additional_requirements": "Emergency power off (EPO) buttons must be clearly marked, protected from accidental activation, and tested annually.",
2784
+ "priority": "P1",
2785
+ "baseline": "high",
2786
+ "moderate_also": false
2787
+ },
2788
+ {
2789
+ "id": "FRM-H-PE-11",
2790
+ "family": "PE",
2791
+ "nist_control_id": "PE-11",
2792
+ "title": "Emergency Power",
2793
+ "description": "Provide an uninterruptible power supply to facilitate an orderly shutdown of the system in the event of a primary power source loss.",
2794
+ "fedramp_parameters": {
2795
+ "ups_capacity": "sufficient to support orderly shutdown or sustained operations for at least 72 hours with generator backup"
2796
+ },
2797
+ "fedramp_additional_requirements": "UPS must support system operations during generator transfer. Diesel generator with minimum 72-hour fuel supply required for High systems.",
2798
+ "priority": "P1",
2799
+ "baseline": "high",
2800
+ "moderate_also": true
2801
+ },
2802
+ {
2803
+ "id": "FRM-H-PE-12",
2804
+ "family": "PE",
2805
+ "nist_control_id": "PE-12",
2806
+ "title": "Emergency Lighting",
2807
+ "description": "Employ and maintain automatic emergency lighting for the system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.",
2808
+ "fedramp_parameters": {},
2809
+ "fedramp_additional_requirements": "Emergency lighting must cover all data center areas, not just evacuation routes. Battery backup for minimum 90 minutes.",
2810
+ "priority": "P1",
2811
+ "baseline": "high",
2812
+ "moderate_also": true
2813
+ },
2814
+ {
2815
+ "id": "FRM-H-PE-13",
2816
+ "family": "PE",
2817
+ "nist_control_id": "PE-13",
2818
+ "title": "Fire Protection",
2819
+ "description": "Employ and maintain fire detection and suppression systems for the system that are supported by an independent energy source.",
2820
+ "fedramp_parameters": {},
2821
+ "fedramp_additional_requirements": "Data centers must have pre-action dry-pipe or clean agent fire suppression. VESDA (Very Early Smoke Detection Apparatus) or equivalent required.",
2822
+ "priority": "P1",
2823
+ "baseline": "high",
2824
+ "moderate_also": true
2825
+ },
2826
+ {
2827
+ "id": "FRM-H-PE-13(1)",
2828
+ "family": "PE",
2829
+ "nist_control_id": "PE-13(1)",
2830
+ "title": "Fire Protection | Detection Systems \u2014 Automatic Activation and Notification",
2831
+ "description": "Employ fire detection systems that activate automatically and notify the organization and emergency responders in the event of a fire.",
2832
+ "fedramp_parameters": {},
2833
+ "fedramp_additional_requirements": "Fire detection must integrate with building management system and automatically notify local fire department.",
2834
+ "priority": "P1",
2835
+ "baseline": "high",
2836
+ "moderate_also": false
2837
+ },
2838
+ {
2839
+ "id": "FRM-H-PE-13(2)",
2840
+ "family": "PE",
2841
+ "nist_control_id": "PE-13(2)",
2842
+ "title": "Fire Protection | Suppression Systems \u2014 Automatic Activation and Notification",
2843
+ "description": "Employ fire suppression systems that activate automatically and notify the organization and emergency responders.",
2844
+ "fedramp_parameters": {},
2845
+ "fedramp_additional_requirements": "Clean agent suppression systems preferred to minimize equipment damage. Automatic notification to operations center required.",
2846
+ "priority": "P1",
2847
+ "baseline": "high",
2848
+ "moderate_also": false
2849
+ },
2850
+ {
2851
+ "id": "FRM-H-PE-13(3)",
2852
+ "family": "PE",
2853
+ "nist_control_id": "PE-13(3)",
2854
+ "title": "Fire Protection | Automatic Fire Suppression",
2855
+ "description": "Employ an automatic fire suppression capability when the facility is not staffed on a continuous basis.",
2856
+ "fedramp_parameters": {},
2857
+ "fedramp_additional_requirements": "For unmanned data center areas, automatic suppression is mandatory with remote monitoring.",
2858
+ "priority": "P1",
2859
+ "baseline": "high",
2860
+ "moderate_also": false
2861
+ },
2862
+ {
2863
+ "id": "FRM-H-PE-14",
2864
+ "family": "PE",
2865
+ "nist_control_id": "PE-14",
2866
+ "title": "Environmental Controls",
2867
+ "description": "Maintain temperature and humidity levels within the facility where the system resides at organization-defined acceptable levels. Monitor environmental conditions.",
2868
+ "fedramp_parameters": {
2869
+ "temperature_range": "64-75 degrees Fahrenheit (18-24 Celsius)",
2870
+ "humidity_range": "40-60% relative humidity"
2871
+ },
2872
+ "fedramp_additional_requirements": "Environmental monitoring must include hot/cold aisle containment temperature, humidity, and water leak detection. Alerting on threshold violation required.",
2873
+ "priority": "P1",
2874
+ "baseline": "high",
2875
+ "moderate_also": true
2876
+ },
2877
+ {
2878
+ "id": "FRM-H-PE-14(2)",
2879
+ "family": "PE",
2880
+ "nist_control_id": "PE-14(2)",
2881
+ "title": "Environmental Controls | Monitoring with Alarms and Notifications",
2882
+ "description": "Employ environmental monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.",
2883
+ "fedramp_parameters": {},
2884
+ "fedramp_additional_requirements": "Environmental alerts must be sent to 24/7 operations center. Automated HVAC failover required.",
2885
+ "priority": "P1",
2886
+ "baseline": "high",
2887
+ "moderate_also": false
2888
+ },
2889
+ {
2890
+ "id": "FRM-H-PE-15",
2891
+ "family": "PE",
2892
+ "nist_control_id": "PE-15",
2893
+ "title": "Water Damage Protection",
2894
+ "description": "Protect the system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.",
2895
+ "fedramp_parameters": {},
2896
+ "fedramp_additional_requirements": "Water leak detection sensors required under raised floors and above ceiling tiles. Automatic shutoff valves recommended.",
2897
+ "priority": "P1",
2898
+ "baseline": "high",
2899
+ "moderate_also": true
2900
+ },
2901
+ {
2902
+ "id": "FRM-H-PE-15(1)",
2903
+ "family": "PE",
2904
+ "nist_control_id": "PE-15(1)",
2905
+ "title": "Water Damage Protection | Automation Support",
2906
+ "description": "Detect the presence of water near the system and alert personnel using automated mechanisms.",
2907
+ "fedramp_parameters": {},
2908
+ "fedramp_additional_requirements": "Automated water detection with integration to building management system and operations center alerting.",
2909
+ "priority": "P1",
2910
+ "baseline": "high",
2911
+ "moderate_also": false
2912
+ },
2913
+ {
2914
+ "id": "FRM-H-PE-16",
2915
+ "family": "PE",
2916
+ "nist_control_id": "PE-16",
2917
+ "title": "Delivery and Removal",
2918
+ "description": "Authorize and control the entry and exit of system components and maintain records of the items.",
2919
+ "fedramp_parameters": {},
2920
+ "fedramp_additional_requirements": "All equipment delivery and removal must be logged with asset tracking. Verification of authorization required before equipment leaves facility.",
2921
+ "priority": "P2",
2922
+ "baseline": "high",
2923
+ "moderate_also": true
2924
+ },
2925
+ {
2926
+ "id": "FRM-H-PE-17",
2927
+ "family": "PE",
2928
+ "nist_control_id": "PE-17",
2929
+ "title": "Alternate Work Site",
2930
+ "description": "Employ management, operational, and technical controls at alternate work sites equivalent to those at the primary site.",
2931
+ "fedramp_parameters": {},
2932
+ "fedramp_additional_requirements": "Alternate work sites accessing High systems must meet equivalent security controls. VDI or equivalent required for remote access to CUI.",
2933
+ "priority": "P2",
2934
+ "baseline": "high",
2935
+ "moderate_also": false
2936
+ },
2937
+ {
2938
+ "id": "FRM-H-PE-18",
2939
+ "family": "PE",
2940
+ "nist_control_id": "PE-18",
2941
+ "title": "Location of System Components",
2942
+ "description": "Position system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access.",
2943
+ "fedramp_parameters": {},
2944
+ "fedramp_additional_requirements": "Critical systems must be located away from exterior walls, above ground floor, and away from loading docks. Electromagnetic shielding considerations required.",
2945
+ "priority": "P3",
2946
+ "baseline": "high",
2947
+ "moderate_also": false
2948
+ },
2949
+ {
2950
+ "id": "FRM-H-PL-1",
2951
+ "family": "PL",
2952
+ "nist_control_id": "PL-1",
2953
+ "title": "Planning Policy and Procedures",
2954
+ "description": "Develop, document, and disseminate a planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
2955
+ "fedramp_parameters": {
2956
+ "policy_review_frequency": "at least every 3 years",
2957
+ "procedure_review_frequency": "at least annually"
2958
+ },
2959
+ "fedramp_additional_requirements": "",
2960
+ "priority": "P1",
2961
+ "baseline": "high",
2962
+ "moderate_also": true
2963
+ },
2964
+ {
2965
+ "id": "FRM-H-PL-2",
2966
+ "family": "PL",
2967
+ "nist_control_id": "PL-2",
2968
+ "title": "System Security and Privacy Plans",
2969
+ "description": "Develop security and privacy plans for the system that are consistent with the organization's enterprise architecture, define the scope of the system, describe the operational context of the system in terms of mission and business processes, provide the security categorization of the system, and describe the current control implementation.",
2970
+ "fedramp_parameters": {
2971
+ "plan_review_frequency": "at least annually",
2972
+ "plan_update_frequency": "at least annually or upon significant change"
2973
+ },
2974
+ "fedramp_additional_requirements": "SSP must be submitted to FedRAMP PMO and updated annually. SSP must follow FedRAMP SSP template. All sections required for High baseline.",
2975
+ "priority": "P1",
2976
+ "baseline": "high",
2977
+ "moderate_also": true
2978
+ },
2979
+ {
2980
+ "id": "FRM-H-PL-4",
2981
+ "family": "PL",
2982
+ "nist_control_id": "PL-4",
2983
+ "title": "Rules of Behavior",
2984
+ "description": "Establish and provide to individuals requiring access to the system the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy.",
2985
+ "fedramp_parameters": {},
2986
+ "fedramp_additional_requirements": "Rules of behavior must include CUI handling requirements, acceptable use policy, and consequences for violations. Annual re-acknowledgment required.",
2987
+ "priority": "P2",
2988
+ "baseline": "high",
2989
+ "moderate_also": true
2990
+ },
2991
+ {
2992
+ "id": "FRM-H-PL-4(1)",
2993
+ "family": "PL",
2994
+ "nist_control_id": "PL-4(1)",
2995
+ "title": "Rules of Behavior | Social Media and External Site/Application Usage Restrictions",
2996
+ "description": "Include in the rules of behavior restrictions on the use of social media, social networking sites, and external sites/applications.",
2997
+ "fedramp_parameters": {},
2998
+ "fedramp_additional_requirements": "Social media usage restrictions must be clearly defined. Posting of CUI on social media platforms is prohibited.",
2999
+ "priority": "P2",
3000
+ "baseline": "high",
3001
+ "moderate_also": true
3002
+ },
3003
+ {
3004
+ "id": "FRM-H-PL-8",
3005
+ "family": "PL",
3006
+ "nist_control_id": "PL-8",
3007
+ "title": "Security and Privacy Architectures",
3008
+ "description": "Develop security and privacy architectures for the system that describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information, that are consistent with the organization's enterprise architecture, and that address requirements for segmentation, isolation, and defense-in-depth.",
3009
+ "fedramp_parameters": {},
3010
+ "fedramp_additional_requirements": "Architecture must document defense-in-depth strategy, network segmentation, data flow diagrams, and trust boundaries. Architecture review required annually.",
3011
+ "priority": "P1",
3012
+ "baseline": "high",
3013
+ "moderate_also": true
3014
+ },
3015
+ {
3016
+ "id": "FRM-H-PS-1",
3017
+ "family": "PS",
3018
+ "nist_control_id": "PS-1",
3019
+ "title": "Personnel Security Policy and Procedures",
3020
+ "description": "Develop, document, and disseminate a personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
3021
+ "fedramp_parameters": {
3022
+ "policy_review_frequency": "at least every 3 years",
3023
+ "procedure_review_frequency": "at least annually"
3024
+ },
3025
+ "fedramp_additional_requirements": "Policy must address cloud-specific personnel security including CSP employee vetting, clearance requirements, and separation procedures.",
3026
+ "priority": "P1",
3027
+ "baseline": "high",
3028
+ "moderate_also": true
3029
+ },
3030
+ {
3031
+ "id": "FRM-H-PS-2",
3032
+ "family": "PS",
3033
+ "nist_control_id": "PS-2",
3034
+ "title": "Position Risk Designation",
3035
+ "description": "Assign a risk designation to all organizational positions. Establish screening criteria for individuals filling those positions. Review and update position risk designations.",
3036
+ "fedramp_parameters": {
3037
+ "review_frequency": "at least every 3 years"
3038
+ },
3039
+ "fedramp_additional_requirements": "All CSP personnel with access to High systems must be designated at least moderate risk. Privileged access positions must be designated high risk.",
3040
+ "priority": "P1",
3041
+ "baseline": "high",
3042
+ "moderate_also": true
3043
+ },
3044
+ {
3045
+ "id": "FRM-H-PS-3",
3046
+ "family": "PS",
3047
+ "nist_control_id": "PS-3",
3048
+ "title": "Personnel Screening",
3049
+ "description": "Screen individuals prior to authorizing access to the system. Rescreen individuals in accordance with organization-defined conditions and frequencies.",
3050
+ "fedramp_parameters": {
3051
+ "rescreening_frequency": "at least every 5 years or upon position change"
3052
+ },
3053
+ "fedramp_additional_requirements": "Background investigations must be completed before granting access to High systems. For DoD IL5+, Secret clearance or higher required for privileged access.",
3054
+ "priority": "P1",
3055
+ "baseline": "high",
3056
+ "moderate_also": true
3057
+ },
3058
+ {
3059
+ "id": "FRM-H-PS-4",
3060
+ "family": "PS",
3061
+ "nist_control_id": "PS-4",
3062
+ "title": "Personnel Termination",
3063
+ "description": "Upon termination of individual employment, disable system access within the organization-defined time period, terminate or revoke authenticators and credentials, conduct exit interviews, retrieve all security-related property, and retain access to organizational information formerly controlled by the terminated individual.",
3064
+ "fedramp_parameters": {
3065
+ "access_disable_period": "same day as termination, within 4 hours for High systems"
3066
+ },
3067
+ "fedramp_additional_requirements": "For involuntary terminations, access must be disabled immediately (within 1 hour). All access credentials must be revoked. Exit interview must include reminder of NDA obligations.",
3068
+ "priority": "P1",
3069
+ "baseline": "high",
3070
+ "moderate_also": true
3071
+ },
3072
+ {
3073
+ "id": "FRM-H-PS-5",
3074
+ "family": "PS",
3075
+ "nist_control_id": "PS-5",
3076
+ "title": "Personnel Transfer",
3077
+ "description": "Review and confirm ongoing operational need for current logical and physical access authorizations to the system and facility when individuals are reassigned or transferred to other positions within the organization.",
3078
+ "fedramp_parameters": {
3079
+ "review_period": "within 5 business days of transfer"
3080
+ },
3081
+ "fedramp_additional_requirements": "Access from previous role must be removed before granting new role access. No accumulation of privileges across role changes.",
3082
+ "priority": "P2",
3083
+ "baseline": "high",
3084
+ "moderate_also": true
3085
+ },
3086
+ {
3087
+ "id": "FRM-H-PS-6",
3088
+ "family": "PS",
3089
+ "nist_control_id": "PS-6",
3090
+ "title": "Access Agreements",
3091
+ "description": "Develop and document access agreements for organizational systems. Review and update the access agreements. Verify that individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access.",
3092
+ "fedramp_parameters": {
3093
+ "review_frequency": "at least annually"
3094
+ },
3095
+ "fedramp_additional_requirements": "Access agreements must include NDA, acceptable use policy, and CUI handling acknowledgment. Agreements must be re-signed annually.",
3096
+ "priority": "P3",
3097
+ "baseline": "high",
3098
+ "moderate_also": true
3099
+ },
3100
+ {
3101
+ "id": "FRM-H-PS-7",
3102
+ "family": "PS",
3103
+ "nist_control_id": "PS-7",
3104
+ "title": "External Personnel Security",
3105
+ "description": "Establish personnel security requirements, including security roles and responsibilities, for external providers. Require external providers to comply with personnel security policies and procedures. Document personnel security requirements. Monitor provider compliance.",
3106
+ "fedramp_parameters": {},
3107
+ "fedramp_additional_requirements": "External providers must meet same background investigation requirements as organizational personnel. Subcontractor security requirements must be flowed down.",
3108
+ "priority": "P1",
3109
+ "baseline": "high",
3110
+ "moderate_also": true
3111
+ },
3112
+ {
3113
+ "id": "FRM-H-PS-8",
3114
+ "family": "PS",
3115
+ "nist_control_id": "PS-8",
3116
+ "title": "Personnel Sanctions",
3117
+ "description": "Employ a formal sanctions process for individuals failing to comply with established information security and privacy policies and procedures.",
3118
+ "fedramp_parameters": {},
3119
+ "fedramp_additional_requirements": "Sanctions process must be documented and consistently applied. Security violations must be reported to ISSO and documented in audit trail.",
3120
+ "priority": "P3",
3121
+ "baseline": "high",
3122
+ "moderate_also": true
3123
+ },
3124
+ {
3125
+ "id": "FRM-H-PS-9",
3126
+ "family": "PS",
3127
+ "nist_control_id": "PS-9",
3128
+ "title": "Position Descriptions",
3129
+ "description": "Incorporate security and privacy role responsibilities in organizational position descriptions.",
3130
+ "fedramp_parameters": {},
3131
+ "fedramp_additional_requirements": "All positions with system access must have documented security responsibilities. ISSO, ISSM, and AO roles must be explicitly defined.",
3132
+ "priority": "P1",
3133
+ "baseline": "high",
3134
+ "moderate_also": true
3135
+ },
3136
+ {
3137
+ "id": "FRM-H-RA-1",
3138
+ "family": "RA",
3139
+ "nist_control_id": "RA-1",
3140
+ "title": "Risk Assessment Policy and Procedures",
3141
+ "description": "Develop, document, and disseminate a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
3142
+ "fedramp_parameters": {
3143
+ "policy_review_frequency": "at least every 3 years",
3144
+ "procedure_review_frequency": "at least annually"
3145
+ },
3146
+ "fedramp_additional_requirements": "Policy must address cloud-specific risk assessment methodologies and continuous risk monitoring.",
3147
+ "priority": "P1",
3148
+ "baseline": "high",
3149
+ "moderate_also": true
3150
+ },
3151
+ {
3152
+ "id": "FRM-H-RA-2",
3153
+ "family": "RA",
3154
+ "nist_control_id": "RA-2",
3155
+ "title": "Security Categorization",
3156
+ "description": "Categorize the system and information it processes, stores, and transmits. Document the security categorization results in the security plan for the system.",
3157
+ "fedramp_parameters": {},
3158
+ "fedramp_additional_requirements": "Security categorization must follow FIPS 199 and CNSSI 1253 for DoD systems. High-water mark principle applied.",
3159
+ "priority": "P1",
3160
+ "baseline": "high",
3161
+ "moderate_also": true
3162
+ },
3163
+ {
3164
+ "id": "FRM-H-RA-3",
3165
+ "family": "RA",
3166
+ "nist_control_id": "RA-3",
3167
+ "title": "Risk Assessment",
3168
+ "description": "Conduct a risk assessment, including identifying threats to and vulnerabilities in the system, determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system and information, and determining the risk.",
3169
+ "fedramp_parameters": {
3170
+ "assessment_frequency": "at least annually",
3171
+ "update_frequency": "at least annually or when significant changes occur"
3172
+ },
3173
+ "fedramp_additional_requirements": "Risk assessment must address cloud-specific threats including multi-tenant risks, supply chain risks, and data sovereignty concerns.",
3174
+ "priority": "P1",
3175
+ "baseline": "high",
3176
+ "moderate_also": true
3177
+ },
3178
+ {
3179
+ "id": "FRM-H-RA-5",
3180
+ "family": "RA",
3181
+ "nist_control_id": "RA-5",
3182
+ "title": "Vulnerability Monitoring and Scanning",
3183
+ "description": "Monitor and scan for vulnerabilities in the system and hosted applications at the FedRAMP-defined frequency and when new vulnerabilities potentially affecting the system are identified and reported.",
3184
+ "fedramp_parameters": {
3185
+ "scan_frequency": "monthly for operating systems, monthly for web applications, monthly for databases",
3186
+ "remediation_high": "within 30 days",
3187
+ "remediation_moderate": "within 90 days"
3188
+ },
3189
+ "fedramp_additional_requirements": "Scanning must include OS, application, database, container, and infrastructure-as-code vulnerabilities. Results must be reported to FedRAMP PMO monthly.",
3190
+ "priority": "P1",
3191
+ "baseline": "high",
3192
+ "moderate_also": true
3193
+ },
3194
+ {
3195
+ "id": "FRM-H-RA-5(2)",
3196
+ "family": "RA",
3197
+ "nist_control_id": "RA-5(2)",
3198
+ "title": "Vulnerability Monitoring and Scanning | Update Vulnerabilities to Be Scanned",
3199
+ "description": "Update the system vulnerabilities to be scanned before conducting new scans or when new vulnerabilities are identified and reported.",
3200
+ "fedramp_parameters": {
3201
+ "update_frequency": "prior to each scan and within 24 hours of new vulnerability disclosure"
3202
+ },
3203
+ "fedramp_additional_requirements": "Vulnerability databases must be updated from NVD and vendor-specific advisories. Zero-day vulnerability scanning capability required.",
3204
+ "priority": "P1",
3205
+ "baseline": "high",
3206
+ "moderate_also": false
3207
+ },
3208
+ {
3209
+ "id": "FRM-H-RA-5(5)",
3210
+ "family": "RA",
3211
+ "nist_control_id": "RA-5(5)",
3212
+ "title": "Vulnerability Monitoring and Scanning | Privileged Access",
3213
+ "description": "Implement privileged access authorization to organization-defined system components for selected vulnerability scanning activities.",
3214
+ "fedramp_parameters": {
3215
+ "privileged_components": "all operating systems, databases, web applications, and network devices"
3216
+ },
3217
+ "fedramp_additional_requirements": "Credentialed/authenticated vulnerability scanning required for all system components. Non-credentialed scanning alone is insufficient for High baseline.",
3218
+ "priority": "P1",
3219
+ "baseline": "high",
3220
+ "moderate_also": false
3221
+ },
3222
+ {
3223
+ "id": "FRM-H-RA-7",
3224
+ "family": "RA",
3225
+ "nist_control_id": "RA-7",
3226
+ "title": "Risk Response",
3227
+ "description": "Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.",
3228
+ "fedramp_parameters": {},
3229
+ "fedramp_additional_requirements": "Risk response decisions must be documented with AO concurrence. Accepted risks must be tracked in POA&M with compensating controls.",
3230
+ "priority": "P1",
3231
+ "baseline": "high",
3232
+ "moderate_also": true
3233
+ },
3234
+ {
3235
+ "id": "FRM-H-SA-1",
3236
+ "family": "SA",
3237
+ "nist_control_id": "SA-1",
3238
+ "title": "System and Services Acquisition Policy and Procedures",
3239
+ "description": "Develop, document, and disseminate a system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
3240
+ "fedramp_parameters": {
3241
+ "policy_review_frequency": "at least every 3 years",
3242
+ "procedure_review_frequency": "at least annually"
3243
+ },
3244
+ "fedramp_additional_requirements": "Policy must address cloud service procurement, FedRAMP authorization requirements for third-party services, and supply chain risk management.",
3245
+ "priority": "P1",
3246
+ "baseline": "high",
3247
+ "moderate_also": true
3248
+ },
3249
+ {
3250
+ "id": "FRM-H-SA-2",
3251
+ "family": "SA",
3252
+ "nist_control_id": "SA-2",
3253
+ "title": "Allocation of Resources",
3254
+ "description": "Determine the high-level information security and privacy requirements for the system or system service in mission and business process planning. Determine, document, and allocate the resources required to protect the system as part of the organizational capital planning and investment control process.",
3255
+ "fedramp_parameters": {},
3256
+ "fedramp_additional_requirements": "Security resource allocation must include continuous monitoring, annual assessment, and incident response costs.",
3257
+ "priority": "P1",
3258
+ "baseline": "high",
3259
+ "moderate_also": true
3260
+ },
3261
+ {
3262
+ "id": "FRM-H-SA-3",
3263
+ "family": "SA",
3264
+ "nist_control_id": "SA-3",
3265
+ "title": "System Development Life Cycle",
3266
+ "description": "Acquire, develop, and manage the system using an organization-defined system development life cycle that incorporates information security and privacy considerations.",
3267
+ "fedramp_parameters": {},
3268
+ "fedramp_additional_requirements": "SDLC must include security requirements analysis, secure coding practices, security testing, and compliance verification at each phase.",
3269
+ "priority": "P1",
3270
+ "baseline": "high",
3271
+ "moderate_also": true
3272
+ },
3273
+ {
3274
+ "id": "FRM-H-SA-4",
3275
+ "family": "SA",
3276
+ "nist_control_id": "SA-4",
3277
+ "title": "Acquisition Process",
3278
+ "description": "Include security and privacy functional requirements, strength of mechanism requirements, security and privacy assurance requirements, controls needed to satisfy security and privacy requirements, and security and privacy documentation requirements in the acquisition contract.",
3279
+ "fedramp_parameters": {},
3280
+ "fedramp_additional_requirements": "Acquisition contracts must require FedRAMP authorization for cloud services. Supply chain risk management requirements must be included.",
3281
+ "priority": "P1",
3282
+ "baseline": "high",
3283
+ "moderate_also": true
3284
+ },
3285
+ {
3286
+ "id": "FRM-H-SA-4(1)",
3287
+ "family": "SA",
3288
+ "nist_control_id": "SA-4(1)",
3289
+ "title": "Acquisition Process | Functional Properties of Controls",
3290
+ "description": "Require the developer of the system, system component, or system service to provide a description of the functional properties of the security and privacy controls to be employed.",
3291
+ "fedramp_parameters": {},
3292
+ "fedramp_additional_requirements": "Functional properties documentation must be sufficient for independent verification of control effectiveness.",
3293
+ "priority": "P1",
3294
+ "baseline": "high",
3295
+ "moderate_also": false
3296
+ },
3297
+ {
3298
+ "id": "FRM-H-SA-4(2)",
3299
+ "family": "SA",
3300
+ "nist_control_id": "SA-4(2)",
3301
+ "title": "Acquisition Process | Design and Implementation Information for Controls",
3302
+ "description": "Require the developer of the system, system component, or system service to provide design and implementation information for the security and privacy controls.",
3303
+ "fedramp_parameters": {},
3304
+ "fedramp_additional_requirements": "Design documentation must include security architecture, threat model, and control implementation details sufficient for assessment.",
3305
+ "priority": "P1",
3306
+ "baseline": "high",
3307
+ "moderate_also": false
3308
+ },
3309
+ {
3310
+ "id": "FRM-H-SA-4(9)",
3311
+ "family": "SA",
3312
+ "nist_control_id": "SA-4(9)",
3313
+ "title": "Acquisition Process | Functions, Ports, Protocols, and Services in Use",
3314
+ "description": "Require the developer of the system, system component, or system service to identify the functions, ports, protocols, and services intended for organizational use.",
3315
+ "fedramp_parameters": {},
3316
+ "fedramp_additional_requirements": "Complete inventory of ports, protocols, and services must be provided and documented in SSP. Only documented PPS are authorized.",
3317
+ "priority": "P1",
3318
+ "baseline": "high",
3319
+ "moderate_also": false
3320
+ },
3321
+ {
3322
+ "id": "FRM-H-SA-4(10)",
3323
+ "family": "SA",
3324
+ "nist_control_id": "SA-4(10)",
3325
+ "title": "Acquisition Process | Use of Approved PIV Products",
3326
+ "description": "Employ only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational systems.",
3327
+ "fedramp_parameters": {},
3328
+ "fedramp_additional_requirements": "PIV/CAC products must be on GSA APL. FIPS 201 compliance required for all identity verification products.",
3329
+ "priority": "P1",
3330
+ "baseline": "high",
3331
+ "moderate_also": false
3332
+ },
3333
+ {
3334
+ "id": "FRM-H-SA-5",
3335
+ "family": "SA",
3336
+ "nist_control_id": "SA-5",
3337
+ "title": "System Documentation",
3338
+ "description": "Obtain or develop administrator documentation and user documentation for the system, system component, or system service that describes secure configuration, installation, and operation of the system.",
3339
+ "fedramp_parameters": {},
3340
+ "fedramp_additional_requirements": "Documentation must include security configuration guides, hardening procedures, and incident response procedures specific to the system.",
3341
+ "priority": "P2",
3342
+ "baseline": "high",
3343
+ "moderate_also": true
3344
+ },
3345
+ {
3346
+ "id": "FRM-H-SA-8",
3347
+ "family": "SA",
3348
+ "nist_control_id": "SA-8",
3349
+ "title": "Security and Privacy Engineering Principles",
3350
+ "description": "Apply systems security and privacy engineering principles in the specification, design, development, implementation, and modification of the system and system components.",
3351
+ "fedramp_parameters": {},
3352
+ "fedramp_additional_requirements": "Security engineering principles must include defense-in-depth, least privilege, fail-secure, separation of duties, and minimal attack surface.",
3353
+ "priority": "P1",
3354
+ "baseline": "high",
3355
+ "moderate_also": false
3356
+ },
3357
+ {
3358
+ "id": "FRM-H-SA-9",
3359
+ "family": "SA",
3360
+ "nist_control_id": "SA-9",
3361
+ "title": "External System Services",
3362
+ "description": "Require that providers of external system services comply with organizational security and privacy requirements and employ controls in accordance with applicable laws, policies, directives, regulations, and standards.",
3363
+ "fedramp_parameters": {},
3364
+ "fedramp_additional_requirements": "External services must be FedRAMP authorized at equal or higher impact level. Service-level agreements must include security requirements.",
3365
+ "priority": "P1",
3366
+ "baseline": "high",
3367
+ "moderate_also": true
3368
+ },
3369
+ {
3370
+ "id": "FRM-H-SA-9(2)",
3371
+ "family": "SA",
3372
+ "nist_control_id": "SA-9(2)",
3373
+ "title": "External System Services | Identification of Functions, Ports, Protocols, and Services",
3374
+ "description": "Require providers of external system services to identify the functions, ports, protocols, and other services required for the use of such services.",
3375
+ "fedramp_parameters": {},
3376
+ "fedramp_additional_requirements": "External service PPS documentation must be maintained current and reflected in system network diagrams and firewall rules.",
3377
+ "priority": "P1",
3378
+ "baseline": "high",
3379
+ "moderate_also": false
3380
+ },
3381
+ {
3382
+ "id": "FRM-H-SA-10",
3383
+ "family": "SA",
3384
+ "nist_control_id": "SA-10",
3385
+ "title": "Developer Configuration Management",
3386
+ "description": "Require the developer of the system, system component, or system service to perform configuration management during system, component, or service design, development, implementation, and operation.",
3387
+ "fedramp_parameters": {},
3388
+ "fedramp_additional_requirements": "Developer must use version control, track security-relevant changes, and maintain configuration baselines. Code signing required for releases.",
3389
+ "priority": "P1",
3390
+ "baseline": "high",
3391
+ "moderate_also": false
3392
+ },
3393
+ {
3394
+ "id": "FRM-H-SA-11",
3395
+ "family": "SA",
3396
+ "nist_control_id": "SA-11",
3397
+ "title": "Developer Testing and Evaluation",
3398
+ "description": "Require the developer of the system, system component, or system service to create and implement a security and privacy assessment plan. Perform unit, integration, system, and regression testing/evaluation. Produce evidence of the execution of the assessment plan and the results of the testing and evaluation.",
3399
+ "fedramp_parameters": {},
3400
+ "fedramp_additional_requirements": "Developer must provide security test results including SAST, DAST, and SCA findings. Test evidence must be available for 3PAO review.",
3401
+ "priority": "P1",
3402
+ "baseline": "high",
3403
+ "moderate_also": true
3404
+ },
3405
+ {
3406
+ "id": "FRM-H-SA-11(1)",
3407
+ "family": "SA",
3408
+ "nist_control_id": "SA-11(1)",
3409
+ "title": "Developer Testing and Evaluation | Static Code Analysis",
3410
+ "description": "Require the developer of the system, system component, or system service to employ static code analysis tools to identify common flaws and document the results of the analysis.",
3411
+ "fedramp_parameters": {},
3412
+ "fedramp_additional_requirements": "SAST must be integrated into CI/CD pipeline. All critical and high findings must be remediated before release.",
3413
+ "priority": "P1",
3414
+ "baseline": "high",
3415
+ "moderate_also": false
3416
+ },
3417
+ {
3418
+ "id": "FRM-H-SA-11(2)",
3419
+ "family": "SA",
3420
+ "nist_control_id": "SA-11(2)",
3421
+ "title": "Developer Testing and Evaluation | Threat Modeling and Vulnerability Analyses",
3422
+ "description": "Require the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development that uses the attack surface, threat modeling methodology, and analysis of all custom code.",
3423
+ "fedramp_parameters": {},
3424
+ "fedramp_additional_requirements": "Threat modeling must follow STRIDE or equivalent methodology. Results must inform security test plans and control selection.",
3425
+ "priority": "P1",
3426
+ "baseline": "high",
3427
+ "moderate_also": false
3428
+ },
3429
+ {
3430
+ "id": "FRM-H-SA-11(8)",
3431
+ "family": "SA",
3432
+ "nist_control_id": "SA-11(8)",
3433
+ "title": "Developer Testing and Evaluation | Dynamic Code Analysis",
3434
+ "description": "Require the developer of the system, system component, or system service to employ dynamic code analysis tools to identify common flaws and document the results.",
3435
+ "fedramp_parameters": {},
3436
+ "fedramp_additional_requirements": "DAST must be performed on deployed applications. OWASP Top 10 coverage required. Automated DAST in CI/CD pipeline recommended.",
3437
+ "priority": "P1",
3438
+ "baseline": "high",
3439
+ "moderate_also": false
3440
+ },
3441
+ {
3442
+ "id": "FRM-H-SA-15",
3443
+ "family": "SA",
3444
+ "nist_control_id": "SA-15",
3445
+ "title": "Development Process, Standards, and Tools",
3446
+ "description": "Require the developer of the system, system component, or system service to follow a documented development process that explicitly addresses security and privacy requirements, identifies the standards and tools used in the development process, and documents the specific tool options and tool configurations used.",
3447
+ "fedramp_parameters": {},
3448
+ "fedramp_additional_requirements": "Development standards must include secure coding guidelines (OWASP, CERT). Tool chain must include SAST, DAST, SCA, and secrets detection.",
3449
+ "priority": "P2",
3450
+ "baseline": "high",
3451
+ "moderate_also": true
3452
+ },
3453
+ {
3454
+ "id": "FRM-H-SA-15(1)",
3455
+ "family": "SA",
3456
+ "nist_control_id": "SA-15(1)",
3457
+ "title": "Development Process, Standards, and Tools | Quality Metrics",
3458
+ "description": "Require the developer of the system, system component, or system service to measure and document the quality of the development artifacts (e.g., code quality, test coverage, defect density).",
3459
+ "fedramp_parameters": {},
3460
+ "fedramp_additional_requirements": "Quality metrics must include code coverage (minimum 80%), defect density, and security finding density.",
3461
+ "priority": "P2",
3462
+ "baseline": "high",
3463
+ "moderate_also": false
3464
+ },
3465
+ {
3466
+ "id": "FRM-H-SA-17",
3467
+ "family": "SA",
3468
+ "nist_control_id": "SA-17",
3469
+ "title": "Developer Security and Privacy Architecture and Design",
3470
+ "description": "Require the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that is consistent with the organization's security and privacy architecture.",
3471
+ "fedramp_parameters": {},
3472
+ "fedramp_additional_requirements": "Architecture must document trust boundaries, data flow controls, and security mechanism placement. Architecture review by ISSO required.",
3473
+ "priority": "P1",
3474
+ "baseline": "high",
3475
+ "moderate_also": false
3476
+ },
3477
+ {
3478
+ "id": "FRM-H-SA-22",
3479
+ "family": "SA",
3480
+ "nist_control_id": "SA-22",
3481
+ "title": "Unsupported System Components",
3482
+ "description": "Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer. Provide options for alternative sources for continued support for unsupported components.",
3483
+ "fedramp_parameters": {},
3484
+ "fedramp_additional_requirements": "Unsupported/end-of-life components must have documented migration plans. Compensating controls required for any unsupported components remaining in production.",
3485
+ "priority": "P1",
3486
+ "baseline": "high",
3487
+ "moderate_also": false
3488
+ },
3489
+ {
3490
+ "id": "FRM-H-SC-1",
3491
+ "family": "SC",
3492
+ "nist_control_id": "SC-1",
3493
+ "title": "System and Communications Protection Policy and Procedures",
3494
+ "description": "Develop, document, and disseminate a system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
3495
+ "fedramp_parameters": {
3496
+ "policy_review_frequency": "at least every 3 years",
3497
+ "procedure_review_frequency": "at least annually"
3498
+ },
3499
+ "fedramp_additional_requirements": "Policy must address cloud network security, encryption requirements, and multi-tenant communications isolation.",
3500
+ "priority": "P1",
3501
+ "baseline": "high",
3502
+ "moderate_also": true
3503
+ },
3504
+ {
3505
+ "id": "FRM-H-SC-2",
3506
+ "family": "SC",
3507
+ "nist_control_id": "SC-2",
3508
+ "title": "Separation of System and User Functionality",
3509
+ "description": "Separate user functionality, including user interface services, from system management functionality.",
3510
+ "fedramp_parameters": {},
3511
+ "fedramp_additional_requirements": "Management interfaces must be on separate network segments from user-facing services. Administrative APIs must not be publicly accessible.",
3512
+ "priority": "P1",
3513
+ "baseline": "high",
3514
+ "moderate_also": true
3515
+ },
3516
+ {
3517
+ "id": "FRM-H-SC-3",
3518
+ "family": "SC",
3519
+ "nist_control_id": "SC-3",
3520
+ "title": "Security Function Isolation",
3521
+ "description": "Isolate security functions from nonsecurity functions.",
3522
+ "fedramp_parameters": {},
3523
+ "fedramp_additional_requirements": "Security services (authentication, authorization, audit, encryption) must run in isolated processes or containers with hardened configurations. Privilege separation enforced.",
3524
+ "priority": "P1",
3525
+ "baseline": "high",
3526
+ "moderate_also": false
3527
+ },
3528
+ {
3529
+ "id": "FRM-H-SC-4",
3530
+ "family": "SC",
3531
+ "nist_control_id": "SC-4",
3532
+ "title": "Information in Shared System Resources",
3533
+ "description": "Prevent unauthorized and unintended information transfer via shared system resources.",
3534
+ "fedramp_parameters": {},
3535
+ "fedramp_additional_requirements": "Object reuse protection required. Shared memory, disk space, and CPU cache must be cleared between tenant workloads. No information leakage between tenants.",
3536
+ "priority": "P1",
3537
+ "baseline": "high",
3538
+ "moderate_also": false
3539
+ },
3540
+ {
3541
+ "id": "FRM-H-SC-5",
3542
+ "family": "SC",
3543
+ "nist_control_id": "SC-5",
3544
+ "title": "Denial-of-Service Protection",
3545
+ "description": "Protect against or limit the effects of denial-of-service attacks by employing organization-defined controls.",
3546
+ "fedramp_parameters": {
3547
+ "dos_protections": "rate limiting, traffic filtering, automated scaling, and DDoS mitigation services"
3548
+ },
3549
+ "fedramp_additional_requirements": "DDoS mitigation service required (e.g., AWS Shield Advanced for GovCloud). Rate limiting on all API endpoints. Auto-scaling to absorb traffic spikes.",
3550
+ "priority": "P1",
3551
+ "baseline": "high",
3552
+ "moderate_also": true
3553
+ },
3554
+ {
3555
+ "id": "FRM-H-SC-5(3)",
3556
+ "family": "SC",
3557
+ "nist_control_id": "SC-5(3)",
3558
+ "title": "Denial-of-Service Protection | Detection and Monitoring",
3559
+ "description": "Employ monitoring tools to detect indicators of denial-of-service attacks against, or launched from, the system and take organization-defined actions.",
3560
+ "fedramp_parameters": {
3561
+ "monitoring_actions": "alert security operations, activate DDoS mitigation, and log the event"
3562
+ },
3563
+ "fedramp_additional_requirements": "Real-time DDoS detection and automated mitigation activation required. Monitoring must cover network, application, and DNS layers.",
3564
+ "priority": "P1",
3565
+ "baseline": "high",
3566
+ "moderate_also": false
3567
+ },
3568
+ {
3569
+ "id": "FRM-H-SC-7",
3570
+ "family": "SC",
3571
+ "nist_control_id": "SC-7",
3572
+ "title": "Boundary Protection",
3573
+ "description": "Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system. Implement subnetworks for publicly accessible system components that are physically or logically separated from internal organizational networks.",
3574
+ "fedramp_parameters": {},
3575
+ "fedramp_additional_requirements": "All external boundary interfaces must be protected by firewalls, IDS/IPS, and WAF. DMZ required for public-facing components. Defense-in-depth at all boundary layers.",
3576
+ "priority": "P1",
3577
+ "baseline": "high",
3578
+ "moderate_also": true
3579
+ },
3580
+ {
3581
+ "id": "FRM-H-SC-7(3)",
3582
+ "family": "SC",
3583
+ "nist_control_id": "SC-7(3)",
3584
+ "title": "Boundary Protection | Access Points",
3585
+ "description": "Limit the number of external network connections to the system.",
3586
+ "fedramp_parameters": {},
3587
+ "fedramp_additional_requirements": "Minimize external access points. All access points must be documented in SSP with justification. Unused access points must be disabled.",
3588
+ "priority": "P1",
3589
+ "baseline": "high",
3590
+ "moderate_also": false
3591
+ },
3592
+ {
3593
+ "id": "FRM-H-SC-7(4)",
3594
+ "family": "SC",
3595
+ "nist_control_id": "SC-7(4)",
3596
+ "title": "Boundary Protection | External Telecommunications Services",
3597
+ "description": "Implement a managed interface for each external telecommunication service. Establish a traffic flow policy for each managed interface.",
3598
+ "fedramp_parameters": {},
3599
+ "fedramp_additional_requirements": "Each external connection must have documented traffic flow policies. Stateful inspection firewalls required at all external interfaces.",
3600
+ "priority": "P1",
3601
+ "baseline": "high",
3602
+ "moderate_also": false
3603
+ },
3604
+ {
3605
+ "id": "FRM-H-SC-7(5)",
3606
+ "family": "SC",
3607
+ "nist_control_id": "SC-7(5)",
3608
+ "title": "Boundary Protection | Deny by Default \u2014 Allow by Exception",
3609
+ "description": "Deny network communications traffic by default and allow network communications traffic by exception at managed interfaces.",
3610
+ "fedramp_parameters": {},
3611
+ "fedramp_additional_requirements": "Default deny firewall rules required on all network boundaries. Security group and NACL rules must follow deny-all, permit-by-exception.",
3612
+ "priority": "P1",
3613
+ "baseline": "high",
3614
+ "moderate_also": false
3615
+ },
3616
+ {
3617
+ "id": "FRM-H-SC-7(7)",
3618
+ "family": "SC",
3619
+ "nist_control_id": "SC-7(7)",
3620
+ "title": "Boundary Protection | Split Tunneling for Remote Devices",
3621
+ "description": "Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned.",
3622
+ "fedramp_parameters": {},
3623
+ "fedramp_additional_requirements": "Split tunneling prohibited for connections to High systems unless explicitly approved with compensating controls. Full tunnel VPN required by default.",
3624
+ "priority": "P1",
3625
+ "baseline": "high",
3626
+ "moderate_also": false
3627
+ },
3628
+ {
3629
+ "id": "FRM-H-SC-7(8)",
3630
+ "family": "SC",
3631
+ "nist_control_id": "SC-7(8)",
3632
+ "title": "Boundary Protection | Route Traffic to Authenticated Proxy Servers",
3633
+ "description": "Route internal communications traffic to external networks through authenticated proxy servers at managed interfaces.",
3634
+ "fedramp_parameters": {},
3635
+ "fedramp_additional_requirements": "All outbound traffic must traverse an authenticated proxy or next-generation firewall. Direct internet access from production systems prohibited.",
3636
+ "priority": "P1",
3637
+ "baseline": "high",
3638
+ "moderate_also": false
3639
+ },
3640
+ {
3641
+ "id": "FRM-H-SC-7(18)",
3642
+ "family": "SC",
3643
+ "nist_control_id": "SC-7(18)",
3644
+ "title": "Boundary Protection | Fail Secure",
3645
+ "description": "Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.",
3646
+ "fedramp_parameters": {},
3647
+ "fedramp_additional_requirements": "Boundary protection devices must fail closed (deny all traffic) on failure. Automatic failover to redundant boundary devices required.",
3648
+ "priority": "P1",
3649
+ "baseline": "high",
3650
+ "moderate_also": false
3651
+ },
3652
+ {
3653
+ "id": "FRM-H-SC-7(21)",
3654
+ "family": "SC",
3655
+ "nist_control_id": "SC-7(21)",
3656
+ "title": "Boundary Protection | Isolation of System Components",
3657
+ "description": "Employ boundary protection mechanisms to isolate organization-defined system components supporting organization-defined missions and/or business functions.",
3658
+ "fedramp_parameters": {},
3659
+ "fedramp_additional_requirements": "Micro-segmentation required for High systems. Each application tier must be in separate network segments with controlled inter-segment communication.",
3660
+ "priority": "P1",
3661
+ "baseline": "high",
3662
+ "moderate_also": false
3663
+ },
3664
+ {
3665
+ "id": "FRM-H-SC-8",
3666
+ "family": "SC",
3667
+ "nist_control_id": "SC-8",
3668
+ "title": "Transmission Confidentiality and Integrity",
3669
+ "description": "Protect the confidentiality and integrity of transmitted information.",
3670
+ "fedramp_parameters": {},
3671
+ "fedramp_additional_requirements": "All data in transit must be encrypted using FIPS-validated cryptography. TLS 1.2 minimum, TLS 1.3 preferred.",
3672
+ "priority": "P1",
3673
+ "baseline": "high",
3674
+ "moderate_also": true
3675
+ },
3676
+ {
3677
+ "id": "FRM-H-SC-8(1)",
3678
+ "family": "SC",
3679
+ "nist_control_id": "SC-8(1)",
3680
+ "title": "Transmission Confidentiality and Integrity | Cryptographic Protection",
3681
+ "description": "Implement cryptographic mechanisms to prevent unauthorized disclosure of information and detect changes to information during transmission.",
3682
+ "fedramp_parameters": {
3683
+ "cryptographic_standard": "FIPS 140-2 validated modules, TLS 1.2 minimum with FIPS-approved cipher suites"
3684
+ },
3685
+ "fedramp_additional_requirements": "FIPS 140-2 validated cryptographic modules required. Perfect forward secrecy (PFS) cipher suites required. Certificate validation mandatory.",
3686
+ "priority": "P1",
3687
+ "baseline": "high",
3688
+ "moderate_also": true
3689
+ },
3690
+ {
3691
+ "id": "FRM-H-SC-10",
3692
+ "family": "SC",
3693
+ "nist_control_id": "SC-10",
3694
+ "title": "Network Disconnect",
3695
+ "description": "Terminate the network connection associated with a communications session at the end of the session or after the FedRAMP-defined time period of inactivity.",
3696
+ "fedramp_parameters": {
3697
+ "inactivity_timeout": "30 minutes for non-privileged, 15 minutes for privileged network sessions"
3698
+ },
3699
+ "fedramp_additional_requirements": "TCP keepalive must be configured appropriately. Idle connections must be terminated and resources released.",
3700
+ "priority": "P2",
3701
+ "baseline": "high",
3702
+ "moderate_also": false
3703
+ },
3704
+ {
3705
+ "id": "FRM-H-SC-12",
3706
+ "family": "SC",
3707
+ "nist_control_id": "SC-12",
3708
+ "title": "Cryptographic Key Establishment and Management",
3709
+ "description": "Establish and manage cryptographic keys when cryptography is employed within the system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction.",
3710
+ "fedramp_parameters": {},
3711
+ "fedramp_additional_requirements": "Key management must follow NIST SP 800-57. Keys must be stored in HSMs or AWS KMS (FIPS 140-2 Level 2+). Key rotation required at least annually.",
3712
+ "priority": "P1",
3713
+ "baseline": "high",
3714
+ "moderate_also": true
3715
+ },
3716
+ {
3717
+ "id": "FRM-H-SC-12(1)",
3718
+ "family": "SC",
3719
+ "nist_control_id": "SC-12(1)",
3720
+ "title": "Cryptographic Key Establishment and Management | Availability",
3721
+ "description": "Maintain availability of information in the event of the loss of cryptographic keys by users.",
3722
+ "fedramp_parameters": {},
3723
+ "fedramp_additional_requirements": "Key escrow or key recovery mechanisms required. Backup encryption keys must be stored securely in a separate location.",
3724
+ "priority": "P1",
3725
+ "baseline": "high",
3726
+ "moderate_also": false
3727
+ },
3728
+ {
3729
+ "id": "FRM-H-SC-13",
3730
+ "family": "SC",
3731
+ "nist_control_id": "SC-13",
3732
+ "title": "Cryptographic Protection",
3733
+ "description": "Determine the cryptographic uses and type of cryptography required for each use in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Implement the following types of cryptography required for each specified cryptographic use.",
3734
+ "fedramp_parameters": {
3735
+ "cryptographic_types": "FIPS-approved algorithms: AES-256 for symmetric, RSA-2048/ECDSA-256 minimum for asymmetric, SHA-256 minimum for hashing"
3736
+ },
3737
+ "fedramp_additional_requirements": "All cryptography must use FIPS 140-2 validated modules. CMVP certificate numbers must be documented. Non-FIPS algorithms prohibited for data protection.",
3738
+ "priority": "P1",
3739
+ "baseline": "high",
3740
+ "moderate_also": true
3741
+ },
3742
+ {
3743
+ "id": "FRM-H-SC-15",
3744
+ "family": "SC",
3745
+ "nist_control_id": "SC-15",
3746
+ "title": "Collaborative Computing Devices and Applications",
3747
+ "description": "Prohibit remote activation of collaborative computing devices and applications with exceptions for defined situations. Provide an explicit indication of use to users physically present at the devices.",
3748
+ "fedramp_parameters": {},
3749
+ "fedramp_additional_requirements": "Video/audio conferencing devices in sensitive areas must have physical disconnect capability. Remote activation of cameras/microphones prohibited.",
3750
+ "priority": "P1",
3751
+ "baseline": "high",
3752
+ "moderate_also": true
3753
+ },
3754
+ {
3755
+ "id": "FRM-H-SC-17",
3756
+ "family": "SC",
3757
+ "nist_control_id": "SC-17",
3758
+ "title": "Public Key Infrastructure Certificates",
3759
+ "description": "Issue public key certificates under an organization-defined certificate policy or obtain public key certificates from an approved service provider. Include only approved trust anchors in trust stores or certificate stores managed by the organization.",
3760
+ "fedramp_parameters": {},
3761
+ "fedramp_additional_requirements": "Certificates must be issued by DoD-approved or FedRAMP-approved CA. Certificate transparency logging required. Certificate lifecycle management automated.",
3762
+ "priority": "P1",
3763
+ "baseline": "high",
3764
+ "moderate_also": false
3765
+ },
3766
+ {
3767
+ "id": "FRM-H-SC-18",
3768
+ "family": "SC",
3769
+ "nist_control_id": "SC-18",
3770
+ "title": "Mobile Code",
3771
+ "description": "Define acceptable and unacceptable mobile code and mobile code technologies. Establish usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies. Authorize, monitor, and control the use of mobile code within the system.",
3772
+ "fedramp_parameters": {},
3773
+ "fedramp_additional_requirements": "JavaScript, ActiveX, and other mobile code technologies must be controlled. Content Security Policy (CSP) headers required for web applications.",
3774
+ "priority": "P2",
3775
+ "baseline": "high",
3776
+ "moderate_also": false
3777
+ },
3778
+ {
3779
+ "id": "FRM-H-SC-20",
3780
+ "family": "SC",
3781
+ "nist_control_id": "SC-20",
3782
+ "title": "Secure Name/Address Resolution Service (Authoritative Source)",
3783
+ "description": "Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.",
3784
+ "fedramp_parameters": {},
3785
+ "fedramp_additional_requirements": "DNSSEC required for authoritative DNS zones. DNS responses must be signed and verifiable.",
3786
+ "priority": "P1",
3787
+ "baseline": "high",
3788
+ "moderate_also": true
3789
+ },
3790
+ {
3791
+ "id": "FRM-H-SC-21",
3792
+ "family": "SC",
3793
+ "nist_control_id": "SC-21",
3794
+ "title": "Secure Name/Address Resolution Service (Recursive or Caching Resolver)",
3795
+ "description": "Request and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.",
3796
+ "fedramp_parameters": {},
3797
+ "fedramp_additional_requirements": "Recursive resolvers must validate DNSSEC signatures. DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) recommended for internal resolution.",
3798
+ "priority": "P1",
3799
+ "baseline": "high",
3800
+ "moderate_also": true
3801
+ },
3802
+ {
3803
+ "id": "FRM-H-SC-22",
3804
+ "family": "SC",
3805
+ "nist_control_id": "SC-22",
3806
+ "title": "Architecture and Provisioning for Name/Address Resolution Service",
3807
+ "description": "Ensure the systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.",
3808
+ "fedramp_parameters": {},
3809
+ "fedramp_additional_requirements": "DNS must be redundant across availability zones. Internal and external DNS must be separated. DNS query logging required.",
3810
+ "priority": "P1",
3811
+ "baseline": "high",
3812
+ "moderate_also": true
3813
+ },
3814
+ {
3815
+ "id": "FRM-H-SC-23",
3816
+ "family": "SC",
3817
+ "nist_control_id": "SC-23",
3818
+ "title": "Session Authenticity",
3819
+ "description": "Protect the authenticity of communications sessions.",
3820
+ "fedramp_parameters": {},
3821
+ "fedramp_additional_requirements": "Session tokens must be cryptographically random, transmitted over TLS, and validated server-side. Anti-CSRF tokens required for web applications.",
3822
+ "priority": "P1",
3823
+ "baseline": "high",
3824
+ "moderate_also": true
3825
+ },
3826
+ {
3827
+ "id": "FRM-H-SC-24",
3828
+ "family": "SC",
3829
+ "nist_control_id": "SC-24",
3830
+ "title": "Fail in Known State",
3831
+ "description": "Fail to an organization-defined known state for the organization-defined types of system failures. Preserve system state information in failure.",
3832
+ "fedramp_parameters": {
3833
+ "known_state": "fail secure \u2014 deny access and halt processing rather than allow unauthorized access"
3834
+ },
3835
+ "fedramp_additional_requirements": "Systems must fail closed (deny all access) rather than fail open. State information must be preserved for forensic analysis.",
3836
+ "priority": "P1",
3837
+ "baseline": "high",
3838
+ "moderate_also": false
3839
+ },
3840
+ {
3841
+ "id": "FRM-H-SC-28",
3842
+ "family": "SC",
3843
+ "nist_control_id": "SC-28",
3844
+ "title": "Protection of Information at Rest",
3845
+ "description": "Protect the confidentiality and integrity of information at rest.",
3846
+ "fedramp_parameters": {},
3847
+ "fedramp_additional_requirements": "All data at rest must be encrypted with FIPS-validated cryptography. Encryption must cover databases, file systems, backups, and object storage.",
3848
+ "priority": "P1",
3849
+ "baseline": "high",
3850
+ "moderate_also": true
3851
+ },
3852
+ {
3853
+ "id": "FRM-H-SC-28(1)",
3854
+ "family": "SC",
3855
+ "nist_control_id": "SC-28(1)",
3856
+ "title": "Protection of Information at Rest | Cryptographic Protection",
3857
+ "description": "Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of information at rest on organization-defined system components or media.",
3858
+ "fedramp_parameters": {
3859
+ "encryption_standard": "AES-256 with FIPS 140-2 validated modules, customer-managed keys preferred"
3860
+ },
3861
+ "fedramp_additional_requirements": "Customer-managed encryption keys (CMEK) required for High baseline. Key management through AWS KMS or equivalent FIPS 140-2 Level 2+ HSM-backed service.",
3862
+ "priority": "P1",
3863
+ "baseline": "high",
3864
+ "moderate_also": true
3865
+ },
3866
+ {
3867
+ "id": "FRM-H-SC-38",
3868
+ "family": "SC",
3869
+ "nist_control_id": "SC-38",
3870
+ "title": "Operations Security",
3871
+ "description": "Employ operations security controls to protect key organizational information throughout the system development life cycle.",
3872
+ "fedramp_parameters": {},
3873
+ "fedramp_additional_requirements": "OPSEC measures must prevent disclosure of system architecture, security mechanisms, and vulnerability information. Information classification and handling procedures required.",
3874
+ "priority": "P1",
3875
+ "baseline": "high",
3876
+ "moderate_also": false
3877
+ },
3878
+ {
3879
+ "id": "FRM-H-SI-1",
3880
+ "family": "SI",
3881
+ "nist_control_id": "SI-1",
3882
+ "title": "System and Information Integrity Policy and Procedures",
3883
+ "description": "Develop, document, and disseminate a system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
3884
+ "fedramp_parameters": {
3885
+ "policy_review_frequency": "at least every 3 years",
3886
+ "procedure_review_frequency": "at least annually"
3887
+ },
3888
+ "fedramp_additional_requirements": "Policy must address cloud-specific integrity protections including container image integrity, infrastructure-as-code validation, and supply chain integrity.",
3889
+ "priority": "P1",
3890
+ "baseline": "high",
3891
+ "moderate_also": true
3892
+ },
3893
+ {
3894
+ "id": "FRM-H-SI-2",
3895
+ "family": "SI",
3896
+ "nist_control_id": "SI-2",
3897
+ "title": "Flaw Remediation",
3898
+ "description": "Identify, report, and correct system flaws. Install security-relevant software and firmware updates within the FedRAMP-defined time period of the release of the updates.",
3899
+ "fedramp_parameters": {
3900
+ "critical_patch_timeline": "within 30 days for critical, 90 days for high, 180 days for moderate",
3901
+ "zero_day_timeline": "within 48 hours for actively exploited vulnerabilities"
3902
+ },
3903
+ "fedramp_additional_requirements": "Flaw remediation must include scanning verification post-patch. Emergency patching procedures must be documented for zero-day vulnerabilities.",
3904
+ "priority": "P1",
3905
+ "baseline": "high",
3906
+ "moderate_also": true
3907
+ },
3908
+ {
3909
+ "id": "FRM-H-SI-2(2)",
3910
+ "family": "SI",
3911
+ "nist_control_id": "SI-2(2)",
3912
+ "title": "Flaw Remediation | Automated Flaw Remediation Status",
3913
+ "description": "Determine the state of system components with regard to flaw remediation using automated mechanisms at the FedRAMP-defined frequency.",
3914
+ "fedramp_parameters": {
3915
+ "status_frequency": "at least monthly or continuously via automated patch management"
3916
+ },
3917
+ "fedramp_additional_requirements": "Automated patch compliance reporting required. Systems out of compliance must be flagged and tracked. Dashboard visibility for patch status.",
3918
+ "priority": "P1",
3919
+ "baseline": "high",
3920
+ "moderate_also": false
3921
+ },
3922
+ {
3923
+ "id": "FRM-H-SI-3",
3924
+ "family": "SI",
3925
+ "nist_control_id": "SI-3",
3926
+ "title": "Malicious Code Protection",
3927
+ "description": "Implement malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code. Update malicious code protection mechanisms as new releases are available.",
3928
+ "fedramp_parameters": {
3929
+ "signature_update_frequency": "at least daily or as signatures become available"
3930
+ },
3931
+ "fedramp_additional_requirements": "Anti-malware must cover endpoints, servers, email gateways, and web proxies. Behavioral analysis in addition to signature-based detection required for High systems.",
3932
+ "priority": "P1",
3933
+ "baseline": "high",
3934
+ "moderate_also": true
3935
+ },
3936
+ {
3937
+ "id": "FRM-H-SI-3(2)",
3938
+ "family": "SI",
3939
+ "nist_control_id": "SI-3(2)",
3940
+ "title": "Malicious Code Protection | Automatic Updates",
3941
+ "description": "Automatically update malicious code protection mechanisms.",
3942
+ "fedramp_parameters": {},
3943
+ "fedramp_additional_requirements": "Signature and engine updates must be automated. Failed updates must generate alerts to security operations.",
3944
+ "priority": "P1",
3945
+ "baseline": "high",
3946
+ "moderate_also": false
3947
+ },
3948
+ {
3949
+ "id": "FRM-H-SI-4",
3950
+ "family": "SI",
3951
+ "nist_control_id": "SI-4",
3952
+ "title": "System Monitoring",
3953
+ "description": "Monitor the system to detect attacks and indicators of potential attacks, unauthorized local, network, and remote connections, and identify unauthorized use of the system.",
3954
+ "fedramp_parameters": {},
3955
+ "fedramp_additional_requirements": "Continuous monitoring must include IDS/IPS, SIEM, file integrity monitoring, and network flow analysis. Monitoring coverage must include all system components.",
3956
+ "priority": "P1",
3957
+ "baseline": "high",
3958
+ "moderate_also": true
3959
+ },
3960
+ {
3961
+ "id": "FRM-H-SI-4(2)",
3962
+ "family": "SI",
3963
+ "nist_control_id": "SI-4(2)",
3964
+ "title": "System Monitoring | Automated Tools and Mechanisms for Real-Time Analysis",
3965
+ "description": "Employ automated tools and mechanisms to support near real-time analysis of events.",
3966
+ "fedramp_parameters": {},
3967
+ "fedramp_additional_requirements": "SIEM with real-time correlation and alerting required. Mean time to detect (MTTD) target: less than 15 minutes for critical events.",
3968
+ "priority": "P1",
3969
+ "baseline": "high",
3970
+ "moderate_also": false
3971
+ },
3972
+ {
3973
+ "id": "FRM-H-SI-4(4)",
3974
+ "family": "SI",
3975
+ "nist_control_id": "SI-4(4)",
3976
+ "title": "System Monitoring | Inbound and Outbound Communications Traffic",
3977
+ "description": "Monitor inbound and outbound communications traffic at the external managed interfaces to the system and at selected interior points within the system.",
3978
+ "fedramp_parameters": {},
3979
+ "fedramp_additional_requirements": "Full packet capture capability required at external boundaries. NetFlow/VPC Flow Logs required for internal traffic monitoring.",
3980
+ "priority": "P1",
3981
+ "baseline": "high",
3982
+ "moderate_also": false
3983
+ },
3984
+ {
3985
+ "id": "FRM-H-SI-4(5)",
3986
+ "family": "SI",
3987
+ "nist_control_id": "SI-4(5)",
3988
+ "title": "System Monitoring | System-Generated Alerts",
3989
+ "description": "Alert organization-defined personnel or roles when organization-defined indicators of compromise or potential compromise occur.",
3990
+ "fedramp_parameters": {
3991
+ "alert_recipients": "SOC analysts, ISSOs, and system administrators",
3992
+ "alert_timeline": "within 5 minutes of detection"
3993
+ },
3994
+ "fedramp_additional_requirements": "Automated alerting for IOCs must be integrated with threat intelligence feeds. Alert fatigue reduction through tuned detection rules required.",
3995
+ "priority": "P1",
3996
+ "baseline": "high",
3997
+ "moderate_also": false
3998
+ },
3999
+ {
4000
+ "id": "FRM-H-SI-4(12)",
4001
+ "family": "SI",
4002
+ "nist_control_id": "SI-4(12)",
4003
+ "title": "System Monitoring | Automated Organization-Generated Alerts",
4004
+ "description": "Employ automated mechanisms to alert security personnel of inappropriate or unusual activities with security or privacy implications.",
4005
+ "fedramp_parameters": {},
4006
+ "fedramp_additional_requirements": "UEBA (User and Entity Behavior Analytics) required for High systems. Automated detection of anomalous access patterns and data exfiltration attempts.",
4007
+ "priority": "P1",
4008
+ "baseline": "high",
4009
+ "moderate_also": false
4010
+ },
4011
+ {
4012
+ "id": "FRM-H-SI-4(14)",
4013
+ "family": "SI",
4014
+ "nist_control_id": "SI-4(14)",
4015
+ "title": "System Monitoring | Wireless Intrusion Detection",
4016
+ "description": "Employ a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises or breaches to the system.",
4017
+ "fedramp_parameters": {},
4018
+ "fedramp_additional_requirements": "WIDS required at all facilities housing High system components. Rogue AP detection with automated alerting.",
4019
+ "priority": "P1",
4020
+ "baseline": "high",
4021
+ "moderate_also": false
4022
+ },
4023
+ {
4024
+ "id": "FRM-H-SI-4(20)",
4025
+ "family": "SI",
4026
+ "nist_control_id": "SI-4(20)",
4027
+ "title": "System Monitoring | Privileged Users",
4028
+ "description": "Implement additional monitoring of privileged users.",
4029
+ "fedramp_parameters": {},
4030
+ "fedramp_additional_requirements": "All privileged user sessions must be monitored and recorded. Anomalous privileged user behavior must generate immediate alerts.",
4031
+ "priority": "P1",
4032
+ "baseline": "high",
4033
+ "moderate_also": false
4034
+ },
4035
+ {
4036
+ "id": "FRM-H-SI-4(22)",
4037
+ "family": "SI",
4038
+ "nist_control_id": "SI-4(22)",
4039
+ "title": "System Monitoring | Unauthorized Network Services",
4040
+ "description": "Detect network services that have not been authorized or approved by the organization and audit or alert organization-defined personnel.",
4041
+ "fedramp_parameters": {},
4042
+ "fedramp_additional_requirements": "Automated detection of unauthorized services, ports, and protocols. Network scanning for rogue services at least weekly.",
4043
+ "priority": "P1",
4044
+ "baseline": "high",
4045
+ "moderate_also": false
4046
+ },
4047
+ {
4048
+ "id": "FRM-H-SI-5",
4049
+ "family": "SI",
4050
+ "nist_control_id": "SI-5",
4051
+ "title": "Security Alerts, Advisories, and Directives",
4052
+ "description": "Receive system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis. Generate internal security alerts, advisories, and directives. Disseminate security alerts, advisories, and directives to designated personnel.",
4053
+ "fedramp_parameters": {
4054
+ "external_sources": "US-CERT, CISA, NVD, vendor security advisories, and FedRAMP PMO"
4055
+ },
4056
+ "fedramp_additional_requirements": "BODs (Binding Operational Directives) from CISA must be implemented within specified timelines. FedRAMP-specific advisories must be tracked.",
4057
+ "priority": "P1",
4058
+ "baseline": "high",
4059
+ "moderate_also": true
4060
+ },
4061
+ {
4062
+ "id": "FRM-H-SI-6",
4063
+ "family": "SI",
4064
+ "nist_control_id": "SI-6",
4065
+ "title": "Security and Privacy Function Verification",
4066
+ "description": "Verify the correct operation of organization-defined security and privacy functions. Perform the verification at the FedRAMP-defined frequency. Alert organization-defined personnel to failed verification tests.",
4067
+ "fedramp_parameters": {
4068
+ "verification_frequency": "upon system startup, restart, and at least monthly",
4069
+ "verification_functions": "authentication, access control, audit logging, encryption, and boundary protection"
4070
+ },
4071
+ "fedramp_additional_requirements": "Automated security function verification required. Failed security functions must trigger immediate alerts and incident response procedures.",
4072
+ "priority": "P1",
4073
+ "baseline": "high",
4074
+ "moderate_also": false
4075
+ },
4076
+ {
4077
+ "id": "FRM-H-SI-7",
4078
+ "family": "SI",
4079
+ "nist_control_id": "SI-7",
4080
+ "title": "Software, Firmware, and Information Integrity",
4081
+ "description": "Employ integrity verification tools to detect unauthorized changes to software, firmware, and information.",
4082
+ "fedramp_parameters": {},
4083
+ "fedramp_additional_requirements": "File integrity monitoring (FIM) required on all system components. Baseline integrity must be established and changes monitored in real-time.",
4084
+ "priority": "P1",
4085
+ "baseline": "high",
4086
+ "moderate_also": true
4087
+ },
4088
+ {
4089
+ "id": "FRM-H-SI-7(1)",
4090
+ "family": "SI",
4091
+ "nist_control_id": "SI-7(1)",
4092
+ "title": "Software, Firmware, and Information Integrity | Integrity Checks",
4093
+ "description": "Perform an integrity check of software, firmware, and information at the FedRAMP-defined frequency.",
4094
+ "fedramp_parameters": {
4095
+ "integrity_check_frequency": "at startup, at least daily, and upon detection of potential compromise"
4096
+ },
4097
+ "fedramp_additional_requirements": "Cryptographic hash verification required. Integrity check failures must trigger automated alerts and investigation.",
4098
+ "priority": "P1",
4099
+ "baseline": "high",
4100
+ "moderate_also": false
4101
+ },
4102
+ {
4103
+ "id": "FRM-H-SI-7(2)",
4104
+ "family": "SI",
4105
+ "nist_control_id": "SI-7(2)",
4106
+ "title": "Software, Firmware, and Information Integrity | Automated Notifications of Integrity Violations",
4107
+ "description": "Employ automated tools that provide notification to organization-defined personnel upon discovering discrepancies during integrity verification.",
4108
+ "fedramp_parameters": {
4109
+ "notification_recipients": "ISSOs, system administrators, and SOC within 15 minutes"
4110
+ },
4111
+ "fedramp_additional_requirements": "Automated notification must include details of the integrity violation including affected component, nature of change, and timestamp.",
4112
+ "priority": "P1",
4113
+ "baseline": "high",
4114
+ "moderate_also": false
4115
+ },
4116
+ {
4117
+ "id": "FRM-H-SI-7(5)",
4118
+ "family": "SI",
4119
+ "nist_control_id": "SI-7(5)",
4120
+ "title": "Software, Firmware, and Information Integrity | Automated Response to Integrity Violations",
4121
+ "description": "Automatically shut down the system, restart the system, or implement organization-defined controls when integrity violations are discovered.",
4122
+ "fedramp_parameters": {
4123
+ "response_actions": "isolate affected component, alert SOC, and initiate incident response"
4124
+ },
4125
+ "fedramp_additional_requirements": "Automated containment of compromised components required. Affected containers or VMs must be isolated and replaced from known-good images.",
4126
+ "priority": "P1",
4127
+ "baseline": "high",
4128
+ "moderate_also": false
4129
+ },
4130
+ {
4131
+ "id": "FRM-H-SI-7(7)",
4132
+ "family": "SI",
4133
+ "nist_control_id": "SI-7(7)",
4134
+ "title": "Software, Firmware, and Information Integrity | Integration of Detection and Response",
4135
+ "description": "Incorporate the detection of unauthorized changes to software, firmware, and information into the organizational incident response capability.",
4136
+ "fedramp_parameters": {},
4137
+ "fedramp_additional_requirements": "FIM alerts must be integrated with SIEM and incident response workflow. Integrity violations must be classified as security incidents.",
4138
+ "priority": "P1",
4139
+ "baseline": "high",
4140
+ "moderate_also": false
4141
+ },
4142
+ {
4143
+ "id": "FRM-H-SI-7(14)",
4144
+ "family": "SI",
4145
+ "nist_control_id": "SI-7(14)",
4146
+ "title": "Software, Firmware, and Information Integrity | Binary or Machine Executable Code",
4147
+ "description": "Prohibit the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code.",
4148
+ "fedramp_parameters": {},
4149
+ "fedramp_additional_requirements": "All binary code must come from trusted, verified sources. Code signing verification required before deployment. Third-party binaries require security review.",
4150
+ "priority": "P1",
4151
+ "baseline": "high",
4152
+ "moderate_also": false
4153
+ },
4154
+ {
4155
+ "id": "FRM-H-SI-7(15)",
4156
+ "family": "SI",
4157
+ "nist_control_id": "SI-7(15)",
4158
+ "title": "Software, Firmware, and Information Integrity | Code Authentication",
4159
+ "description": "Implement cryptographic mechanisms to authenticate software or firmware components prior to installation.",
4160
+ "fedramp_parameters": {},
4161
+ "fedramp_additional_requirements": "Code signing required for all deployable artifacts. Container image signing and verification required. Package signature verification mandatory.",
4162
+ "priority": "P1",
4163
+ "baseline": "high",
4164
+ "moderate_also": false
4165
+ },
4166
+ {
4167
+ "id": "FRM-H-SI-8",
4168
+ "family": "SI",
4169
+ "nist_control_id": "SI-8",
4170
+ "title": "Spam Protection",
4171
+ "description": "Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages.",
4172
+ "fedramp_parameters": {},
4173
+ "fedramp_additional_requirements": "Email filtering must include spam, phishing, and malware detection. Inbound and outbound email scanning required.",
4174
+ "priority": "P2",
4175
+ "baseline": "high",
4176
+ "moderate_also": true
4177
+ },
4178
+ {
4179
+ "id": "FRM-H-SI-10",
4180
+ "family": "SI",
4181
+ "nist_control_id": "SI-10",
4182
+ "title": "Information Input Validation",
4183
+ "description": "Check the validity of information inputs to the system.",
4184
+ "fedramp_parameters": {},
4185
+ "fedramp_additional_requirements": "All user inputs must be validated, sanitized, and encoded. OWASP input validation guidelines must be followed. Parameterized queries required for database access.",
4186
+ "priority": "P1",
4187
+ "baseline": "high",
4188
+ "moderate_also": true
4189
+ },
4190
+ {
4191
+ "id": "FRM-H-SI-10(1)",
4192
+ "family": "SI",
4193
+ "nist_control_id": "SI-10(1)",
4194
+ "title": "Information Input Validation | Manual Override Capability",
4195
+ "description": "Provide a manual override capability for input validation of organization-defined inputs. Restrict the use of the manual override capability to only organization-defined authorized individuals. Audit the use of the manual override capability.",
4196
+ "fedramp_parameters": {},
4197
+ "fedramp_additional_requirements": "Manual override of input validation must require ISSO approval and be logged in audit trail. Override usage must be reviewed quarterly.",
4198
+ "priority": "P1",
4199
+ "baseline": "high",
4200
+ "moderate_also": false
4201
+ },
4202
+ {
4203
+ "id": "FRM-H-SI-10(3)",
4204
+ "family": "SI",
4205
+ "nist_control_id": "SI-10(3)",
4206
+ "title": "Information Input Validation | Predictable Behavior",
4207
+ "description": "Verify that the system behaves in a predictable and documented manner when invalid inputs are received.",
4208
+ "fedramp_parameters": {},
4209
+ "fedramp_additional_requirements": "Error handling must not reveal system internals. Custom error pages required. Graceful degradation on invalid input mandatory.",
4210
+ "priority": "P1",
4211
+ "baseline": "high",
4212
+ "moderate_also": false
4213
+ },
4214
+ {
4215
+ "id": "FRM-H-SI-11",
4216
+ "family": "SI",
4217
+ "nist_control_id": "SI-11",
4218
+ "title": "Error Handling",
4219
+ "description": "Generate error messages that provide information necessary for corrective actions without revealing information that could be exploited. Reveal error messages only to designated personnel.",
4220
+ "fedramp_parameters": {},
4221
+ "fedramp_additional_requirements": "Detailed error messages must only appear in server-side logs, not in user-facing responses. Stack traces prohibited in production. Custom error pages required.",
4222
+ "priority": "P2",
4223
+ "baseline": "high",
4224
+ "moderate_also": true
4225
+ },
4226
+ {
4227
+ "id": "FRM-H-SI-12",
4228
+ "family": "SI",
4229
+ "nist_control_id": "SI-12",
4230
+ "title": "Information Management and Retention",
4231
+ "description": "Manage and retain information within the system and information output from the system in accordance with applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and operational requirements.",
4232
+ "fedramp_parameters": {},
4233
+ "fedramp_additional_requirements": "Data retention policies must comply with NARA requirements. CUI must be handled and retained per 32 CFR Part 2002.",
4234
+ "priority": "P2",
4235
+ "baseline": "high",
4236
+ "moderate_also": true
4237
+ },
4238
+ {
4239
+ "id": "FRM-H-SI-16",
4240
+ "family": "SI",
4241
+ "nist_control_id": "SI-16",
4242
+ "title": "Memory Protection",
4243
+ "description": "Implement organization-defined controls to protect the system memory from unauthorized code execution.",
4244
+ "fedramp_parameters": {
4245
+ "memory_protections": "DEP (Data Execution Prevention), ASLR (Address Space Layout Randomization), stack canaries, and control flow integrity"
4246
+ },
4247
+ "fedramp_additional_requirements": "All system components must enable hardware and software memory protections. Container runtime must enforce memory isolation between containers.",
4248
+ "priority": "P1",
4249
+ "baseline": "high",
4250
+ "moderate_also": false
4251
+ },
4252
+ {
4253
+ "id": "FRM-H-SR-1",
4254
+ "family": "SR",
4255
+ "nist_control_id": "SR-1",
4256
+ "title": "Supply Chain Risk Management Policy and Procedures",
4257
+ "description": "Develop, document, and disseminate a supply chain risk management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
4258
+ "fedramp_parameters": {
4259
+ "policy_review_frequency": "at least every 3 years",
4260
+ "procedure_review_frequency": "at least annually"
4261
+ },
4262
+ "fedramp_additional_requirements": "Policy must address cloud supply chain risks, third-party service dependencies, and open source component governance.",
4263
+ "priority": "P1",
4264
+ "baseline": "high",
4265
+ "moderate_also": true
4266
+ },
4267
+ {
4268
+ "id": "FRM-H-SR-2",
4269
+ "family": "SR",
4270
+ "nist_control_id": "SR-2",
4271
+ "title": "Supply Chain Risk Management Plan",
4272
+ "description": "Develop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of systems, system components, or system services.",
4273
+ "fedramp_parameters": {},
4274
+ "fedramp_additional_requirements": "SCRM plan must identify critical supply chain elements, assess risks, and define mitigation strategies. Plan must be reviewed annually.",
4275
+ "priority": "P1",
4276
+ "baseline": "high",
4277
+ "moderate_also": true
4278
+ },
4279
+ {
4280
+ "id": "FRM-H-SR-3",
4281
+ "family": "SR",
4282
+ "nist_control_id": "SR-3",
4283
+ "title": "Supply Chain Controls and Processes",
4284
+ "description": "Establish and apply a process for identifying and addressing weaknesses or deficiencies in the supply chain elements and processes.",
4285
+ "fedramp_parameters": {},
4286
+ "fedramp_additional_requirements": "Vendor security assessments required for critical suppliers. Software composition analysis (SCA) required for all third-party components.",
4287
+ "priority": "P1",
4288
+ "baseline": "high",
4289
+ "moderate_also": true
4290
+ },
4291
+ {
4292
+ "id": "FRM-H-SR-5",
4293
+ "family": "SR",
4294
+ "nist_control_id": "SR-5",
4295
+ "title": "Acquisition Strategies, Tools, and Methods",
4296
+ "description": "Employ acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks.",
4297
+ "fedramp_parameters": {},
4298
+ "fedramp_additional_requirements": "Acquisition contracts must include SCRM requirements. Vendor supply chain attestations required for critical components.",
4299
+ "priority": "P1",
4300
+ "baseline": "high",
4301
+ "moderate_also": true
4302
+ },
4303
+ {
4304
+ "id": "FRM-H-SR-6",
4305
+ "family": "SR",
4306
+ "nist_control_id": "SR-6",
4307
+ "title": "Supplier Assessments and Reviews",
4308
+ "description": "Assess and review the supply chain-related risks associated with suppliers or contractors and the system, system component, or system service they provide.",
4309
+ "fedramp_parameters": {
4310
+ "assessment_frequency": "at least annually for critical suppliers"
4311
+ },
4312
+ "fedramp_additional_requirements": "Critical supplier assessments must include security posture review, incident history, and business continuity capabilities.",
4313
+ "priority": "P1",
4314
+ "baseline": "high",
4315
+ "moderate_also": true
4316
+ },
4317
+ {
4318
+ "id": "FRM-H-SR-8",
4319
+ "family": "SR",
4320
+ "nist_control_id": "SR-8",
4321
+ "title": "Notification Agreements",
4322
+ "description": "Establish agreements and procedures with entities involved in the supply chain for the system, system component, or system service for the notification of supply chain compromises and results of assessments or audits.",
4323
+ "fedramp_parameters": {},
4324
+ "fedramp_additional_requirements": "Supply chain compromise notification must be received within 72 hours. Notification agreements must be included in vendor contracts.",
4325
+ "priority": "P1",
4326
+ "baseline": "high",
4327
+ "moderate_also": true
4328
+ },
4329
+ {
4330
+ "id": "FRM-H-SR-10",
4331
+ "family": "SR",
4332
+ "nist_control_id": "SR-10",
4333
+ "title": "Inspection of Systems or Components",
4334
+ "description": "Inspect the organization-defined systems or system components at random, at a defined frequency, or both, to detect tampering.",
4335
+ "fedramp_parameters": {
4336
+ "inspection_frequency": "at least annually or upon receipt of new hardware/firmware"
4337
+ },
4338
+ "fedramp_additional_requirements": "Hardware integrity verification required for new equipment. Firmware validation against vendor-provided hashes required.",
4339
+ "priority": "P1",
4340
+ "baseline": "high",
4341
+ "moderate_also": true
4342
+ },
4343
+ {
4344
+ "id": "FRM-H-SR-11",
4345
+ "family": "SR",
4346
+ "nist_control_id": "SR-11",
4347
+ "title": "Component Authenticity",
4348
+ "description": "Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system.",
4349
+ "fedramp_parameters": {},
4350
+ "fedramp_additional_requirements": "Hardware and software authenticity verification required. Trusted supplier programs and component provenance tracking required for High systems.",
4351
+ "priority": "P1",
4352
+ "baseline": "high",
4353
+ "moderate_also": true
4354
+ },
4355
+ {
4356
+ "id": "FRM-H-SR-12",
4357
+ "family": "SR",
4358
+ "nist_control_id": "SR-12",
4359
+ "title": "Component Disposal",
4360
+ "description": "Dispose of data, documentation, tools, or system components using organization-defined techniques and methods.",
4361
+ "fedramp_parameters": {
4362
+ "disposal_methods": "per NIST SP 800-88 for media, documented destruction for hardware"
4363
+ },
4364
+ "fedramp_additional_requirements": "Component disposal must follow NIST SP 800-88. Certificates of destruction required. Chain of custody maintained through disposal.",
4365
+ "priority": "P1",
4366
+ "baseline": "high",
4367
+ "moderate_also": true
4368
+ }
4369
+ ]
4370
+ }