icdev 1.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- icdev/__init__.py +18 -0
- icdev/_paths.py +85 -0
- icdev/_version.py +3 -0
- icdev/data/__init__.py +1 -0
- icdev/data/args/__init__.py +1 -0
- icdev/data/args/agent_authority.yaml +61 -0
- icdev/data/args/agent_config.yaml +355 -0
- icdev/data/args/agentic_fitness.yaml +31 -0
- icdev/data/args/ai_governance_config.yaml +137 -0
- icdev/data/args/atlas_critique_config.yaml +66 -0
- icdev/data/args/bedrock_models.yaml +63 -0
- icdev/data/args/cicd_config.yaml +82 -0
- icdev/data/args/classification_config.yaml +232 -0
- icdev/data/args/cli_config.yaml +154 -0
- icdev/data/args/cloud_config.yaml +63 -0
- icdev/data/args/code_pattern_config.yaml +151 -0
- icdev/data/args/code_quality_config.yaml +47 -0
- icdev/data/args/companion_registry.yaml +202 -0
- icdev/data/args/context_config.yaml +82 -0
- icdev/data/args/csp_monitor_config.yaml +268 -0
- icdev/data/args/cui_markings.yaml +35 -0
- icdev/data/args/db_config.yaml +40 -0
- icdev/data/args/deployment_profiles.yaml +248 -0
- icdev/data/args/dev_profile_config.yaml +144 -0
- icdev/data/args/devsecops_config.yaml +286 -0
- icdev/data/args/endpoint_security_config.yaml +137 -0
- icdev/data/args/extension_config.yaml +79 -0
- icdev/data/args/file_access_tiers.yaml +88 -0
- icdev/data/args/framework_registry.yaml +415 -0
- icdev/data/args/innovation_config.yaml +431 -0
- icdev/data/args/installation_manifest.yaml +1087 -0
- icdev/data/args/llm_config.yaml +495 -0
- icdev/data/args/maintenance_config.yaml +55 -0
- icdev/data/args/memory_config.yaml +83 -0
- icdev/data/args/monitoring_config.yaml +127 -0
- icdev/data/args/mosa_config.yaml +190 -0
- icdev/data/args/nlq_config.yaml +35 -0
- icdev/data/args/observability_config.yaml +39 -0
- icdev/data/args/observability_tracing_config.yaml +170 -0
- icdev/data/args/oscal_tools_config.yaml +43 -0
- icdev/data/args/owasp_agentic_config.yaml +171 -0
- icdev/data/args/phase_registry.yaml +618 -0
- icdev/data/args/project_defaults.yaml +235 -0
- icdev/data/args/prompt_chains.yaml +163 -0
- icdev/data/args/resilience_config.yaml +50 -0
- icdev/data/args/ricoas_config.yaml +191 -0
- icdev/data/args/role_personas.yaml +362 -0
- icdev/data/args/scaling_config.yaml +176 -0
- icdev/data/args/security_gates.yaml +685 -0
- icdev/data/args/skill_injection_config.yaml +322 -0
- icdev/data/args/spec_config.yaml +53 -0
- icdev/data/args/supply_chain_config.yaml +76 -0
- icdev/data/args/translation_config.yaml +228 -0
- icdev/data/args/workflow_templates/ato_acceleration.yaml +54 -0
- icdev/data/args/workflow_templates/build_deploy.yaml +63 -0
- icdev/data/args/workflow_templates/full_compliance.yaml +43 -0
- icdev/data/args/workflow_templates/security_hardening.yaml +55 -0
- icdev/data/args/worktree_config.yaml +34 -0
- icdev/data/args/zta_config.yaml +247 -0
- icdev/data/context/__init__.py +1 -0
- icdev/data/context/agent/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/debate_position.json +46 -0
- icdev/data/context/agent/response_schemas/fitness_scorecard.json +74 -0
- icdev/data/context/agent/response_schemas/review_decision.json +39 -0
- icdev/data/context/agent/response_schemas/task_decomposition.json +82 -0
- icdev/data/context/agent/response_schemas/veto_decision.json +40 -0
- icdev/data/context/agentic/__init__.py +1 -0
- icdev/data/context/agentic/architecture_patterns.md +269 -0
- icdev/data/context/agentic/capability_registry.yaml +202 -0
- icdev/data/context/agentic/csp_mcp_registry.yaml +280 -0
- icdev/data/context/agentic/fitness_rubric.md +56 -0
- icdev/data/context/agentic/governance_baseline.md +205 -0
- icdev/data/context/ci/__init__.py +1 -0
- icdev/data/context/ci/worktree_templates.json +44 -0
- icdev/data/context/cloud/__init__.py +1 -0
- icdev/data/context/cloud/csp_service_registry.json +739 -0
- icdev/data/context/compliance/__init__.py +1 -0
- icdev/data/context/compliance/atlas_mitigations.json +293 -0
- icdev/data/context/compliance/atlas_techniques.json +833 -0
- icdev/data/context/compliance/cisa_sbd_requirements.json +432 -0
- icdev/data/context/compliance/cjis_security_policy.json +522 -0
- icdev/data/context/compliance/cmmc_practices.json +2494 -0
- icdev/data/context/compliance/cmmc_report_template.md +142 -0
- icdev/data/context/compliance/cnssi_1253_overlay.json +109 -0
- icdev/data/context/compliance/control_crosswalk.json +1914 -0
- icdev/data/context/compliance/control_families/__init__.py +1 -0
- icdev/data/context/compliance/csp_certifications.json +251 -0
- icdev/data/context/compliance/cssp_report_template.md +193 -0
- icdev/data/context/compliance/cui_templates/__init__.py +1 -0
- icdev/data/context/compliance/cui_templates/banner_block.txt +4 -0
- icdev/data/context/compliance/cui_templates/code_header.txt +8 -0
- icdev/data/context/compliance/cui_templates/document_template.md +35 -0
- icdev/data/context/compliance/data_type_framework_map.json +321 -0
- icdev/data/context/compliance/data_type_registry.json +147 -0
- icdev/data/context/compliance/dod_cssp_8530.json +463 -0
- icdev/data/context/compliance/eu_ai_act_annex_iii.json +108 -0
- icdev/data/context/compliance/export_templates/__init__.py +1 -0
- icdev/data/context/compliance/export_templates/emass_controls.csv.j2 +4 -0
- icdev/data/context/compliance/export_templates/evidence_package.md.j2 +39 -0
- icdev/data/context/compliance/export_templates/executive_summary.md.j2 +55 -0
- icdev/data/context/compliance/export_templates/poam_tracking.csv.j2 +4 -0
- icdev/data/context/compliance/fedramp_20x_ksi_schemas.json +133 -0
- icdev/data/context/compliance/fedramp_high_baseline.json +4370 -0
- icdev/data/context/compliance/fedramp_moderate_baseline.json +2183 -0
- icdev/data/context/compliance/fedramp_report_template.md +181 -0
- icdev/data/context/compliance/fips_200_areas.json +362 -0
- icdev/data/context/compliance/gao_ai_accountability.json +262 -0
- icdev/data/context/compliance/hipaa_security_rule.json +720 -0
- icdev/data/context/compliance/hitrust_csf_v11.json +930 -0
- icdev/data/context/compliance/impact_level_profiles.json +251 -0
- icdev/data/context/compliance/incident_response_template.md +1110 -0
- icdev/data/context/compliance/iso27001_2022_controls.json +750 -0
- icdev/data/context/compliance/iso27001_nist_bridge.json +382 -0
- icdev/data/context/compliance/iso42001_controls.json +254 -0
- icdev/data/context/compliance/ivv_checklist_template.md +80 -0
- icdev/data/context/compliance/ivv_report_template.md +116 -0
- icdev/data/context/compliance/ivv_requirements.json +372 -0
- icdev/data/context/compliance/mosa_crosswalk.json +327 -0
- icdev/data/context/compliance/mosa_framework.json +250 -0
- icdev/data/context/compliance/narrative_templates/AC.md.j2 +101 -0
- icdev/data/context/compliance/narrative_templates/AU.md.j2 +106 -0
- icdev/data/context/compliance/narrative_templates/IA.md.j2 +104 -0
- icdev/data/context/compliance/narrative_templates/SC.md.j2 +102 -0
- icdev/data/context/compliance/narrative_templates/SI.md.j2 +111 -0
- icdev/data/context/compliance/narrative_templates/__init__.py +1 -0
- icdev/data/context/compliance/narrative_templates/default.md.j2 +50 -0
- icdev/data/context/compliance/narrative_templates/executive_summary.j2 +27 -0
- icdev/data/context/compliance/narrative_templates/poam_milestone.j2 +19 -0
- icdev/data/context/compliance/narrative_templates/ssp_section.j2 +11 -0
- icdev/data/context/compliance/nist_800_171_controls.json +1552 -0
- icdev/data/context/compliance/nist_800_207_crosswalk.json +399 -0
- icdev/data/context/compliance/nist_800_207_zta.json +258 -0
- icdev/data/context/compliance/nist_800_53.json +324 -0
- icdev/data/context/compliance/nist_ai_600_1_genai.json +326 -0
- icdev/data/context/compliance/nist_ai_rmf.json +206 -0
- icdev/data/context/compliance/nist_sp_800_60_types.json +1667 -0
- icdev/data/context/compliance/omb_m25_21_high_impact_ai.json +248 -0
- icdev/data/context/compliance/omb_m26_04_unbiased_ai.json +262 -0
- icdev/data/context/compliance/owasp_agentic_asi.json +133 -0
- icdev/data/context/compliance/owasp_agentic_threats.json +285 -0
- icdev/data/context/compliance/owasp_llm_top10.json +274 -0
- icdev/data/context/compliance/pci_dss_v4.json +510 -0
- icdev/data/context/compliance/poam_template.md +117 -0
- icdev/data/context/compliance/safeai_controls.json +512 -0
- icdev/data/context/compliance/sbd_report_template.md +77 -0
- icdev/data/context/compliance/siem_config_templates/__init__.py +1 -0
- icdev/data/context/compliance/siem_config_templates/filebeat.yml +213 -0
- icdev/data/context/compliance/siem_config_templates/log_sources.json +208 -0
- icdev/data/context/compliance/soc2_trust_criteria.json +661 -0
- icdev/data/context/compliance/ssp_template.md +432 -0
- icdev/data/context/compliance/stig_templates/__init__.py +1 -0
- icdev/data/context/compliance/stig_templates/webapp_stig.json +139 -0
- icdev/data/context/compliance/xai_requirements.json +108 -0
- icdev/data/context/dashboard/__init__.py +1 -0
- icdev/data/context/dashboard/nlq_examples.json +50 -0
- icdev/data/context/dashboard/schema_descriptions.json +23 -0
- icdev/data/context/integration/__init__.py +1 -0
- icdev/data/context/integration/approval_workflows.json +32 -0
- icdev/data/context/integration/gitlab_field_mappings.json +33 -0
- icdev/data/context/integration/jira_field_mappings.json +32 -0
- icdev/data/context/integration/reqif_export_schema.json +23 -0
- icdev/data/context/integration/servicenow_field_mappings.json +22 -0
- icdev/data/context/languages/__init__.py +1 -0
- icdev/data/context/languages/framework_patterns.json +205 -0
- icdev/data/context/languages/language_registry.json +279 -0
- icdev/data/context/llm/__init__.py +1 -0
- icdev/data/context/llm/example_provider.py +86 -0
- icdev/data/context/mbse/__init__.py +1 -0
- icdev/data/context/mbse/des_report_template.md +162 -0
- icdev/data/context/mbse/des_requirements.json +411 -0
- icdev/data/context/mbse/digital_thread_patterns.json +403 -0
- icdev/data/context/mbse/reqif_schema.json +280 -0
- icdev/data/context/mbse/sysml_element_types.json +432 -0
- icdev/data/context/modernization/__init__.py +1 -0
- icdev/data/context/modernization/db_type_mappings.json +148 -0
- icdev/data/context/modernization/decomposition_patterns.json +284 -0
- icdev/data/context/modernization/framework_migration_patterns.json +359 -0
- icdev/data/context/modernization/migration_report_template.md +168 -0
- icdev/data/context/modernization/seven_rs_catalog.json +369 -0
- icdev/data/context/modernization/version_upgrade_rules.json +279 -0
- icdev/data/context/oscal/NIST_SP-800-53_rev5_catalog.json +254987 -0
- icdev/data/context/oscal/README.md +43 -0
- icdev/data/context/patterns/__init__.py +1 -0
- icdev/data/context/profiles/__init__.py +1 -0
- icdev/data/context/profiles/dod_baseline_v1.yaml +145 -0
- icdev/data/context/profiles/fedramp_baseline_v1.yaml +143 -0
- icdev/data/context/profiles/financial_baseline_v1.yaml +142 -0
- icdev/data/context/profiles/healthcare_baseline_v1.yaml +135 -0
- icdev/data/context/profiles/law_enforcement_v1.yaml +129 -0
- icdev/data/context/profiles/startup_v1.yaml +134 -0
- icdev/data/context/requirements/__init__.py +1 -0
- icdev/data/context/requirements/ambiguity_patterns.json +97 -0
- icdev/data/context/requirements/boundary_impact_rules.json +123 -0
- icdev/data/context/requirements/default_constitutions.json +67 -0
- icdev/data/context/requirements/document_extraction_rules.json +58 -0
- icdev/data/context/requirements/gap_patterns.json +108 -0
- icdev/data/context/requirements/readiness_rubric.json +78 -0
- icdev/data/context/requirements/red_alternative_patterns.json +210 -0
- icdev/data/context/requirements/safe_templates.json +72 -0
- icdev/data/context/requirements/spec_quality_checklist.json +122 -0
- icdev/data/context/simulation/__init__.py +1 -0
- icdev/data/context/simulation/architecture_patterns.json +36 -0
- icdev/data/context/simulation/coa_templates.json +38 -0
- icdev/data/context/simulation/cost_models.json +23 -0
- icdev/data/context/simulation/risk_categories.json +46 -0
- icdev/data/context/supply_chain/__init__.py +1 -0
- icdev/data/context/supply_chain/isa_templates.json +129 -0
- icdev/data/context/supply_chain/nist_800_161_controls.json +247 -0
- icdev/data/context/supply_chain/scrm_risk_matrix.json +147 -0
- icdev/data/context/templates/__init__.py +1 -0
- icdev/data/context/templates/ansible/__init__.py +1 -0
- icdev/data/context/templates/ansible/playbooks/__init__.py +1 -0
- icdev/data/context/templates/ansible/roles/__init__.py +1 -0
- icdev/data/context/templates/gitlab_ci/__init__.py +1 -0
- icdev/data/context/templates/grafana/__init__.py +1 -0
- icdev/data/context/templates/kubernetes/__init__.py +1 -0
- icdev/data/context/templates/project/__init__.py +1 -0
- icdev/data/context/templates/project/api/__init__.py +1 -0
- icdev/data/context/templates/project/cli/__init__.py +1 -0
- icdev/data/context/templates/project/data_pipeline/__init__.py +1 -0
- icdev/data/context/templates/project/iac/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/src/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/microservice/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/src/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/features/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/steps/__init__.py +1 -0
- icdev/data/context/templates/terraform/__init__.py +1 -0
- icdev/data/context/templates/terraform/govcloud_base/__init__.py +1 -0
- icdev/data/context/templates/terraform/modules/__init__.py +1 -0
- icdev/data/context/tone/__init__.py +1 -0
- icdev/data/context/translation/dependency_mappings.json +186 -0
- icdev/data/context/translation/type_mappings.json +149 -0
- icdev/data/docs/README.md +187 -0
- icdev/data/docs/__init__.py +1 -0
- icdev/data/docs/admin/gateway-guide.md +338 -0
- icdev/data/docs/admin/marketplace-guide.md +396 -0
- icdev/data/docs/admin/monitoring-guide.md +509 -0
- icdev/data/docs/architecture/compliance-framework.md +764 -0
- icdev/data/docs/architecture/database-schema.md +689 -0
- icdev/data/docs/architecture/gotcha-framework.md +518 -0
- icdev/data/docs/architecture/multi-agent-system.md +603 -0
- icdev/data/docs/dx/README.md +106 -0
- icdev/data/docs/dx/__init__.py +1 -0
- icdev/data/docs/dx/ci-cd-integration.md +378 -0
- icdev/data/docs/dx/claude-code-guide.md +213 -0
- icdev/data/docs/dx/companion-guide.md +232 -0
- icdev/data/docs/dx/dev-profiles.md +309 -0
- icdev/data/docs/dx/icdev-yaml-spec.md +219 -0
- icdev/data/docs/dx/integration-tiers.md +279 -0
- icdev/data/docs/dx/llm-routing-guide.md +456 -0
- icdev/data/docs/dx/quickstart.md +192 -0
- icdev/data/docs/dx/sdk-reference.md +356 -0
- icdev/data/docs/dx/unified-mcp-setup.md +525 -0
- icdev/data/docs/features/__init__.py +1 -0
- icdev/data/docs/features/phase-01-gotcha-framework.md +249 -0
- icdev/data/docs/features/phase-02-atlas-build-workflow.md +223 -0
- icdev/data/docs/features/phase-03-tdd-bdd-testing.md +261 -0
- icdev/data/docs/features/phase-04-nist-compliance.md +255 -0
- icdev/data/docs/features/phase-05-security-scanning.md +229 -0
- icdev/data/docs/features/phase-06-infrastructure-deployment.md +288 -0
- icdev/data/docs/features/phase-07-code-review-gates.md +276 -0
- icdev/data/docs/features/phase-08-self-healing.md +223 -0
- icdev/data/docs/features/phase-09-monitoring-observability.md +230 -0
- icdev/data/docs/features/phase-10-dashboard-web-ui.md +218 -0
- icdev/data/docs/features/phase-11-multi-agent-architecture.md +272 -0
- icdev/data/docs/features/phase-12-integration-testing.md +228 -0
- icdev/data/docs/features/phase-13-cicd-integration.md +257 -0
- icdev/data/docs/features/phase-14-secure-by-design-ivv.md +240 -0
- icdev/data/docs/features/phase-15-maintenance-audit.md +192 -0
- icdev/data/docs/features/phase-16-ato-acceleration.md +228 -0
- icdev/data/docs/features/phase-17-multi-framework-compliance.md +223 -0
- icdev/data/docs/features/phase-18-mbse-integration.md +242 -0
- icdev/data/docs/features/phase-19-agentic-generation.md +202 -0
- icdev/data/docs/features/phase-20-fips-security-categorization.md +198 -0
- icdev/data/docs/features/phase-21-saas-multi-tenancy.md +273 -0
- icdev/data/docs/features/phase-22-federated-gotcha-marketplace.md +242 -0
- icdev/data/docs/features/phase-23-universal-compliance-platform.md +238 -0
- icdev/data/docs/features/phase-24-devsecops-pipeline-security.md +198 -0
- icdev/data/docs/features/phase-25-zero-trust-architecture.md +220 -0
- icdev/data/docs/features/phase-26-dod-mosa.md +205 -0
- icdev/data/docs/features/phase-27-cli-capabilities.md +222 -0
- icdev/data/docs/features/phase-28-remote-command-gateway.md +235 -0
- icdev/data/docs/features/phase-29-proactive-monitoring.md +212 -0
- icdev/data/docs/features/phase-30-dashboard-auth.md +215 -0
- icdev/data/docs/features/phase-31-dashboard-ux-low-impact.md +188 -0
- icdev/data/docs/features/phase-32-dashboard-ux-medium-impact.md +223 -0
- icdev/data/docs/features/phase-33-modular-installation.md +218 -0
- icdev/data/docs/features/phase-34-dev-profiles.md +239 -0
- icdev/data/docs/features/phase-35-innovation-engine.md +257 -0
- icdev/data/docs/features/phase-36-evolutionary-intelligence.md +351 -0
- icdev/data/docs/features/phase-37-mitre-atlas-integration.md +485 -0
- icdev/data/docs/features/phase-38-cloud-agnostic-architecture.md +1033 -0
- icdev/data/docs/features/phase-39-observability-operations.md +178 -0
- icdev/data/docs/features/phase-40-nlq-compliance-queries.md +176 -0
- icdev/data/docs/features/phase-41-parallel-cicd.md +169 -0
- icdev/data/docs/features/phase-42-framework-planning.md +177 -0
- icdev/data/docs/features/phase-43-cross-language-translation.md +225 -0
- icdev/data/docs/features/phase-44-innovation-adaptation.md +227 -0
- icdev/data/docs/features/phase-45-owasp-agentic-security.md +239 -0
- icdev/data/docs/features/phase-46-observability-traceability-xai.md +240 -0
- icdev/data/docs/features/phase-47-unified-mcp-gateway.md +257 -0
- icdev/data/docs/features/phase-48-ai-transparency.md +203 -0
- icdev/data/docs/features/phase-49-ai-accountability.md +243 -0
- icdev/data/docs/features/phase-50-ai-governance-intake-chat.md +195 -0
- icdev/data/docs/features/phase-51-unified-chat-dashboard.md +240 -0
- icdev/data/docs/features/phase-52-code-intelligence.md +244 -0
- icdev/data/docs/features/phase-53-fedramp-20x-owasp-asi.md +359 -0
- icdev/data/docs/features/phase-54-slsa-swft-orchestration.md +379 -0
- icdev/data/docs/features/phase-55-a2a-v03-mcp-oauth.md +322 -0
- icdev/data/docs/features/phase-56-evidence-lineage.md +352 -0
- icdev/data/docs/features/phase-57-eu-ai-act-iron-bank.md +319 -0
- icdev/data/docs/features/phase-58-creative-engine.md +370 -0
- icdev/data/docs/features/phase-59-govcon-intelligence.md +535 -0
- icdev/data/docs/features/phase-60-cpmp.md +528 -0
- icdev/data/docs/features/phase-61-orchestration-improvements.md +534 -0
- icdev/data/docs/operations/dashboard-guide.md +354 -0
- icdev/data/docs/operations/deployment-guide.md +556 -0
- icdev/data/docs/operations/saas-admin-guide.md +439 -0
- icdev/data/docs/operations/security-operations-guide.md +733 -0
- icdev/data/docs/runbooks/backup-restore.md +412 -0
- icdev/data/docs/runbooks/troubleshooting.md +499 -0
- icdev/data/features/__init__.py +1 -0
- icdev/data/features/cicd_integration.feature +41 -0
- icdev/data/features/compliance_gates.feature +46 -0
- icdev/data/features/dashboard.feature +72 -0
- icdev/data/features/environment.py +25 -0
- icdev/data/features/project_management.feature +32 -0
- icdev/data/features/requirements_intake.feature +42 -0
- icdev/data/features/saas_platform.feature +53 -0
- icdev/data/features/security_scanning.feature +36 -0
- icdev/data/features/steps/__init__.py +1 -0
- icdev/data/features/steps/cicd_steps.py +465 -0
- icdev/data/features/steps/compliance_steps.py +308 -0
- icdev/data/features/steps/dashboard_steps.py +88 -0
- icdev/data/features/steps/project_steps.py +126 -0
- icdev/data/features/steps/requirements_intake_steps.py +689 -0
- icdev/data/features/steps/saas_platform_steps.py +572 -0
- icdev/data/features/steps/security_steps.py +236 -0
- icdev/data/features/steps/testing_steps.py +226 -0
- icdev/data/features/testing_pipeline.feature +42 -0
- icdev/data/goals/__init__.py +1 -0
- icdev/data/goals/agent_management.md +144 -0
- icdev/data/goals/agentic_generation.md +345 -0
- icdev/data/goals/agentic_threat_model.md +309 -0
- icdev/data/goals/ai_accountability.md +90 -0
- icdev/data/goals/ai_governance_intake.md +132 -0
- icdev/data/goals/ai_transparency.md +76 -0
- icdev/data/goals/atlas_integration.md +405 -0
- icdev/data/goals/ato_acceleration.md +139 -0
- icdev/data/goals/boundary_supply_chain.md +206 -0
- icdev/data/goals/build_app.md +544 -0
- icdev/data/goals/cicd_integration.md +86 -0
- icdev/data/goals/claude_dir_maintenance.md +77 -0
- icdev/data/goals/cli_capabilities.md +340 -0
- icdev/data/goals/cloud_agnostic.md +312 -0
- icdev/data/goals/code_intelligence.md +197 -0
- icdev/data/goals/code_review.md +94 -0
- icdev/data/goals/compliance_workflow.md +858 -0
- icdev/data/goals/continuous_harmonization.md +140 -0
- icdev/data/goals/cross_language_translation.md +171 -0
- icdev/data/goals/dashboard.md +142 -0
- icdev/data/goals/deploy_workflow.md +390 -0
- icdev/data/goals/devsecops_workflow.md +408 -0
- icdev/data/goals/evolutionary_intelligence.md +305 -0
- icdev/data/goals/external_integration.md +113 -0
- icdev/data/goals/framework_planning.md +63 -0
- icdev/data/goals/init_project.md +235 -0
- icdev/data/goals/innovation_engine.md +199 -0
- icdev/data/goals/integration_testing.md +189 -0
- icdev/data/goals/maintenance_audit.md +196 -0
- icdev/data/goals/manifest.md +56 -0
- icdev/data/goals/mbse_integration.md +504 -0
- icdev/data/goals/modernization_workflow.md +618 -0
- icdev/data/goals/monitoring.md +126 -0
- icdev/data/goals/mosa_workflow.md +463 -0
- icdev/data/goals/multi_agent_orchestration.md +68 -0
- icdev/data/goals/nlq_compliance.md +63 -0
- icdev/data/goals/observability.md +64 -0
- icdev/data/goals/observability_traceability_xai.md +154 -0
- icdev/data/goals/owasp_agentic_security.md +395 -0
- icdev/data/goals/parallel_cicd.md +61 -0
- icdev/data/goals/requirements_intake.md +213 -0
- icdev/data/goals/sbd_ivv_workflow.md +195 -0
- icdev/data/goals/security_categorization.md +133 -0
- icdev/data/goals/security_scan.md +381 -0
- icdev/data/goals/self_healing.md +120 -0
- icdev/data/goals/simulation_engine.md +111 -0
- icdev/data/goals/tdd_workflow.md +403 -0
- icdev/data/goals/zero_trust_architecture.md +403 -0
- icdev/data/hardprompts/__init__.py +1 -0
- icdev/data/hardprompts/agent/__init__.py +1 -0
- icdev/data/hardprompts/agent/agentic_architect.md +100 -0
- icdev/data/hardprompts/agent/debate_prompt.md +32 -0
- icdev/data/hardprompts/agent/fitness_evaluation.md +48 -0
- icdev/data/hardprompts/agent/governance_review.md +214 -0
- icdev/data/hardprompts/agent/reviewer_prompt.md +34 -0
- icdev/data/hardprompts/agent/skill_design.md +172 -0
- icdev/data/hardprompts/agent/task_decomposition.md +275 -0
- icdev/data/hardprompts/agent/veto_check_prompt.md +33 -0
- icdev/data/hardprompts/architect/__init__.py +1 -0
- icdev/data/hardprompts/architect/api_design.md +283 -0
- icdev/data/hardprompts/architect/data_model.md +277 -0
- icdev/data/hardprompts/architect/system_design.md +180 -0
- icdev/data/hardprompts/builder/__init__.py +1 -0
- icdev/data/hardprompts/builder/code_generation.md +59 -0
- icdev/data/hardprompts/builder/refactor.md +58 -0
- icdev/data/hardprompts/builder/scaffold_project.md +69 -0
- icdev/data/hardprompts/builder/test_generation.md +87 -0
- icdev/data/hardprompts/ci/__init__.py +1 -0
- icdev/data/hardprompts/ci/worktree_setup.md +35 -0
- icdev/data/hardprompts/compliance/__init__.py +1 -0
- icdev/data/hardprompts/compliance/cmmc_assessment.md +63 -0
- icdev/data/hardprompts/compliance/cssp_assessment.md +75 -0
- icdev/data/hardprompts/compliance/cui_marking.md +86 -0
- icdev/data/hardprompts/compliance/fedramp_assessment.md +55 -0
- icdev/data/hardprompts/compliance/ivv_assessment.md +96 -0
- icdev/data/hardprompts/compliance/poam_generation.md +57 -0
- icdev/data/hardprompts/compliance/sbd_assessment.md +101 -0
- icdev/data/hardprompts/compliance/security_categorization.md +74 -0
- icdev/data/hardprompts/compliance/ssp_generation.md +56 -0
- icdev/data/hardprompts/compliance/stig_evaluation.md +63 -0
- icdev/data/hardprompts/dashboard/__init__.py +1 -0
- icdev/data/hardprompts/dashboard/nlq_system_prompt.md +26 -0
- icdev/data/hardprompts/infra/__init__.py +1 -0
- icdev/data/hardprompts/infra/k8s_manifests.md +118 -0
- icdev/data/hardprompts/infra/pipeline_generation.md +160 -0
- icdev/data/hardprompts/infra/terraform_generation.md +92 -0
- icdev/data/hardprompts/integration/__init__.py +1 -0
- icdev/data/hardprompts/integration/approval_review.md +17 -0
- icdev/data/hardprompts/integration/jira_mapping.md +25 -0
- icdev/data/hardprompts/integration/servicenow_mapping.md +14 -0
- icdev/data/hardprompts/knowledge/__init__.py +1 -0
- icdev/data/hardprompts/knowledge/pattern_detection.md +73 -0
- icdev/data/hardprompts/knowledge/recommendation_engine.md +90 -0
- icdev/data/hardprompts/knowledge/root_cause_analysis.md +91 -0
- icdev/data/hardprompts/maintenance/__init__.py +1 -0
- icdev/data/hardprompts/maintenance/maintenance_assessment.md +82 -0
- icdev/data/hardprompts/mbse/__init__.py +1 -0
- icdev/data/hardprompts/mbse/digital_thread.md +67 -0
- icdev/data/hardprompts/mbse/model_import.md +62 -0
- icdev/data/hardprompts/mbse/model_to_code.md +65 -0
- icdev/data/hardprompts/modernization/__init__.py +1 -0
- icdev/data/hardprompts/modernization/legacy_analysis.md +93 -0
- icdev/data/hardprompts/modernization/migration_planning.md +150 -0
- icdev/data/hardprompts/modernization/seven_r_assessment.md +107 -0
- icdev/data/hardprompts/requirements/__init__.py +1 -0
- icdev/data/hardprompts/requirements/bdd_generation.md +35 -0
- icdev/data/hardprompts/requirements/clarification_prioritization.md +29 -0
- icdev/data/hardprompts/requirements/decomposition.md +60 -0
- icdev/data/hardprompts/requirements/document_extraction.md +45 -0
- icdev/data/hardprompts/requirements/gap_detection.md +70 -0
- icdev/data/hardprompts/requirements/intake_conversation.md +101 -0
- icdev/data/hardprompts/requirements/readiness_assessment.md +39 -0
- icdev/data/hardprompts/requirements/spec_quality.md +33 -0
- icdev/data/hardprompts/requirements/traceability_analysis.md +23 -0
- icdev/data/hardprompts/security/__init__.py +1 -0
- icdev/data/hardprompts/security/endpoint_security.md +78 -0
- icdev/data/hardprompts/security/threat_model.md +70 -0
- icdev/data/hardprompts/security/vulnerability_assessment.md +81 -0
- icdev/data/hardprompts/simulation/__init__.py +1 -0
- icdev/data/hardprompts/simulation/architecture_impact.md +27 -0
- icdev/data/hardprompts/simulation/coa_alternative.md +27 -0
- icdev/data/hardprompts/simulation/coa_generation.md +25 -0
- icdev/data/hardprompts/simulation/compliance_impact.md +28 -0
- icdev/data/hardprompts/simulation/cost_estimation.md +33 -0
- icdev/data/hardprompts/simulation/risk_assessment.md +28 -0
- icdev/data/hardprompts/translation/code_translation.md +68 -0
- icdev/data/hardprompts/translation/dependency_suggestion.md +44 -0
- icdev/data/hardprompts/translation/test_translation.md +64 -0
- icdev/data/hardprompts/translation/translation_repair.md +59 -0
- icdev/py.typed +0 -0
- icdev/tools/__init__.py +1 -0
- icdev/tools/_gen_formatter.py +12 -0
- icdev/tools/a2a/__init__.py +1 -0
- icdev/tools/a2a/agent_cards/architect.json +43 -0
- icdev/tools/a2a/agent_cards/builder.json +50 -0
- icdev/tools/a2a/agent_cards/compliance.json +57 -0
- icdev/tools/a2a/agent_cards/devsecops.json +71 -0
- icdev/tools/a2a/agent_cards/infra.json +57 -0
- icdev/tools/a2a/agent_cards/integration.json +57 -0
- icdev/tools/a2a/agent_cards/knowledge.json +43 -0
- icdev/tools/a2a/agent_cards/mbse.json +57 -0
- icdev/tools/a2a/agent_cards/modernization.json +50 -0
- icdev/tools/a2a/agent_cards/monitor.json +43 -0
- icdev/tools/a2a/agent_cards/orchestrator.json +36 -0
- icdev/tools/a2a/agent_cards/requirements_analyst.json +64 -0
- icdev/tools/a2a/agent_cards/security.json +50 -0
- icdev/tools/a2a/agent_cards/simulation.json +57 -0
- icdev/tools/a2a/agent_cards/supply_chain.json +50 -0
- icdev/tools/a2a/agent_client.py +349 -0
- icdev/tools/a2a/agent_registry.py +412 -0
- icdev/tools/a2a/agent_server.py +579 -0
- icdev/tools/a2a/task.py +200 -0
- icdev/tools/agent/__init__.py +2 -0
- icdev/tools/agent/a2a_agent_card_generator.py +285 -0
- icdev/tools/agent/a2a_discovery_server.py +250 -0
- icdev/tools/agent/agent_executor.py +529 -0
- icdev/tools/agent/agent_memory.py +557 -0
- icdev/tools/agent/agent_models.py +51 -0
- icdev/tools/agent/atlas_critique.py +908 -0
- icdev/tools/agent/authority.py +443 -0
- icdev/tools/agent/bedrock_client.py +1075 -0
- icdev/tools/agent/collaboration.py +871 -0
- icdev/tools/agent/dispatcher_mode.py +665 -0
- icdev/tools/agent/mailbox.py +575 -0
- icdev/tools/agent/prompt_chain_executor.py +1064 -0
- icdev/tools/agent/session_purpose.py +350 -0
- icdev/tools/agent/skill_router.py +638 -0
- icdev/tools/agent/skill_selector.py +486 -0
- icdev/tools/agent/team_orchestrator.py +1108 -0
- icdev/tools/agent/token_tracker.py +290 -0
- icdev/tools/analysis/__init__.py +1 -0
- icdev/tools/analysis/code_analyzer.py +780 -0
- icdev/tools/analysis/runtime_feedback.py +389 -0
- icdev/tools/audit/__init__.py +1 -0
- icdev/tools/audit/audit_logger.py +196 -0
- icdev/tools/audit/audit_query.py +157 -0
- icdev/tools/audit/decision_recorder.py +72 -0
- icdev/tools/builder/__init__.py +1 -0
- icdev/tools/builder/agentic_fitness.py +534 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_callback.py +117 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_lifecycle.feature +52 -0
- icdev/tools/builder/agentic_test_templates/test_agent_card.feature +37 -0
- icdev/tools/builder/agentic_test_templates/test_agent_health.py +128 -0
- icdev/tools/builder/agentic_test_templates/test_memory_system.feature +50 -0
- icdev/tools/builder/agentic_test_templates/test_skill_execution.feature +40 -0
- icdev/tools/builder/app_blueprint.py +1583 -0
- icdev/tools/builder/child_app_generator.py +2852 -0
- icdev/tools/builder/claude_md_generator.py +1734 -0
- icdev/tools/builder/code_generator.py +3703 -0
- icdev/tools/builder/db_init_generator.py +1709 -0
- icdev/tools/builder/dev_profile_manager.py +954 -0
- icdev/tools/builder/formatter.py +768 -0
- icdev/tools/builder/goal_adapter.py +592 -0
- icdev/tools/builder/gotcha_validator.py +812 -0
- icdev/tools/builder/language_support.py +441 -0
- icdev/tools/builder/linter.py +976 -0
- icdev/tools/builder/profile_detector.py +657 -0
- icdev/tools/builder/profile_md_generator.py +723 -0
- icdev/tools/builder/scaffolder.py +1590 -0
- icdev/tools/builder/scaffolder_extended.py +1771 -0
- icdev/tools/builder/test_writer.py +950 -0
- icdev/tools/ci/__init__.py +2 -0
- icdev/tools/ci/connectors/__init__.py +2 -0
- icdev/tools/ci/connectors/base_connector.py +80 -0
- icdev/tools/ci/connectors/connector_registry.py +188 -0
- icdev/tools/ci/connectors/mattermost_connector.py +159 -0
- icdev/tools/ci/connectors/slack_connector.py +197 -0
- icdev/tools/ci/core/__init__.py +2 -0
- icdev/tools/ci/core/air_gap_detector.py +115 -0
- icdev/tools/ci/core/comment_handler.py +192 -0
- icdev/tools/ci/core/conversation_manager.py +479 -0
- icdev/tools/ci/core/event_envelope.py +500 -0
- icdev/tools/ci/core/event_router.py +443 -0
- icdev/tools/ci/core/failure_parser.py +397 -0
- icdev/tools/ci/core/recovery_engine.py +527 -0
- icdev/tools/ci/modules/__init__.py +2 -0
- icdev/tools/ci/modules/agent.py +271 -0
- icdev/tools/ci/modules/git_ops.py +175 -0
- icdev/tools/ci/modules/state.py +117 -0
- icdev/tools/ci/modules/vcs.py +303 -0
- icdev/tools/ci/modules/workflow_ops.py +295 -0
- icdev/tools/ci/modules/worktree.py +340 -0
- icdev/tools/ci/pipeline_config_generator.py +558 -0
- icdev/tools/ci/triggers/__init__.py +2 -0
- icdev/tools/ci/triggers/gitlab_task_monitor.py +330 -0
- icdev/tools/ci/triggers/poll_trigger.py +237 -0
- icdev/tools/ci/triggers/webhook_server.py +356 -0
- icdev/tools/ci/workflows/__init__.py +2 -0
- icdev/tools/ci/workflows/icdev_build.py +140 -0
- icdev/tools/ci/workflows/icdev_comply.py +284 -0
- icdev/tools/ci/workflows/icdev_document.py +152 -0
- icdev/tools/ci/workflows/icdev_e2e.py +188 -0
- icdev/tools/ci/workflows/icdev_patch.py +186 -0
- icdev/tools/ci/workflows/icdev_plan.py +202 -0
- icdev/tools/ci/workflows/icdev_plan_build.py +41 -0
- icdev/tools/ci/workflows/icdev_plan_build_test.py +46 -0
- icdev/tools/ci/workflows/icdev_plan_build_test_review.py +47 -0
- icdev/tools/ci/workflows/icdev_review.py +126 -0
- icdev/tools/ci/workflows/icdev_sdlc.py +261 -0
- icdev/tools/ci/workflows/icdev_test.py +240 -0
- icdev/tools/cli/__init__.py +1 -0
- icdev/tools/cli/output_formatter.py +756 -0
- icdev/tools/cli_formatter.py +42 -0
- icdev/tools/cloud/__init__.py +11 -0
- icdev/tools/cloud/cloud_mode_manager.py +364 -0
- icdev/tools/cloud/csp_changelog.py +383 -0
- icdev/tools/cloud/csp_health_checker.py +268 -0
- icdev/tools/cloud/csp_monitor.py +951 -0
- icdev/tools/cloud/iam_provider.py +593 -0
- icdev/tools/cloud/kms_provider.py +346 -0
- icdev/tools/cloud/monitoring_provider.py +628 -0
- icdev/tools/cloud/provider_factory.py +376 -0
- icdev/tools/cloud/region_validator.py +345 -0
- icdev/tools/cloud/registry_provider.py +563 -0
- icdev/tools/cloud/secrets_provider.py +486 -0
- icdev/tools/cloud/storage_provider.py +446 -0
- icdev/tools/compat/__init__.py +21 -0
- icdev/tools/compat/cli_harmonizer.py +251 -0
- icdev/tools/compat/datetime_utils.py +18 -0
- icdev/tools/compat/db_utils.py +160 -0
- icdev/tools/compat/platform_utils.py +123 -0
- icdev/tools/compliance/__init__.py +1 -0
- icdev/tools/compliance/accountability_manager.py +397 -0
- icdev/tools/compliance/ai_accountability_audit.py +294 -0
- icdev/tools/compliance/ai_impact_assessor.py +273 -0
- icdev/tools/compliance/ai_incident_response.py +301 -0
- icdev/tools/compliance/ai_inventory_manager.py +239 -0
- icdev/tools/compliance/ai_reassessment_scheduler.py +256 -0
- icdev/tools/compliance/ai_transparency_audit.py +248 -0
- icdev/tools/compliance/atlas_assessor.py +278 -0
- icdev/tools/compliance/atlas_report_generator.py +1211 -0
- icdev/tools/compliance/base_assessor.py +597 -0
- icdev/tools/compliance/cato_monitor.py +1385 -0
- icdev/tools/compliance/cato_scheduler.py +699 -0
- icdev/tools/compliance/cjis_assessor.py +76 -0
- icdev/tools/compliance/classification_manager.py +1353 -0
- icdev/tools/compliance/cmmc_assessor.py +1491 -0
- icdev/tools/compliance/cmmc_report_generator.py +1100 -0
- icdev/tools/compliance/compliance_detector.py +463 -0
- icdev/tools/compliance/compliance_exporter.py +427 -0
- icdev/tools/compliance/compliance_status.py +825 -0
- icdev/tools/compliance/control_mapper.py +505 -0
- icdev/tools/compliance/crosswalk_engine.py +1203 -0
- icdev/tools/compliance/cssp_assessor.py +1045 -0
- icdev/tools/compliance/cssp_evidence_collector.py +729 -0
- icdev/tools/compliance/cssp_report_generator.py +1116 -0
- icdev/tools/compliance/cui_marker.py +388 -0
- icdev/tools/compliance/diagram_validator.py +600 -0
- icdev/tools/compliance/emass/__init__.py +2 -0
- icdev/tools/compliance/emass/emass_client.py +840 -0
- icdev/tools/compliance/emass/emass_export.py +777 -0
- icdev/tools/compliance/emass/emass_sync.py +826 -0
- icdev/tools/compliance/eu_ai_act_classifier.py +194 -0
- icdev/tools/compliance/evidence_collector.py +468 -0
- icdev/tools/compliance/fairness_assessor.py +316 -0
- icdev/tools/compliance/fedramp_assessor.py +1808 -0
- icdev/tools/compliance/fedramp_authorization_packager.py +137 -0
- icdev/tools/compliance/fedramp_ksi_generator.py +355 -0
- icdev/tools/compliance/fedramp_report_generator.py +1128 -0
- icdev/tools/compliance/fips199_categorizer.py +881 -0
- icdev/tools/compliance/fips200_validator.py +315 -0
- icdev/tools/compliance/gao_ai_assessor.py +231 -0
- icdev/tools/compliance/gao_evidence_builder.py +308 -0
- icdev/tools/compliance/hipaa_assessor.py +78 -0
- icdev/tools/compliance/hitrust_assessor.py +49 -0
- icdev/tools/compliance/incident_response_plan.py +718 -0
- icdev/tools/compliance/iso27001_assessor.py +92 -0
- icdev/tools/compliance/iso42001_assessor.py +114 -0
- icdev/tools/compliance/ivv_assessor.py +2327 -0
- icdev/tools/compliance/ivv_report_generator.py +1662 -0
- icdev/tools/compliance/model_card_generator.py +297 -0
- icdev/tools/compliance/mosa_assessor.py +117 -0
- icdev/tools/compliance/multi_regime_assessor.py +451 -0
- icdev/tools/compliance/narrative_generator.py +1013 -0
- icdev/tools/compliance/nist_800_207_assessor.py +191 -0
- icdev/tools/compliance/nist_ai_600_1_assessor.py +188 -0
- icdev/tools/compliance/nist_ai_rmf_assessor.py +110 -0
- icdev/tools/compliance/nist_lookup.py +245 -0
- icdev/tools/compliance/omb_m25_21_assessor.py +228 -0
- icdev/tools/compliance/omb_m26_04_assessor.py +188 -0
- icdev/tools/compliance/oscal_catalog_adapter.py +395 -0
- icdev/tools/compliance/oscal_generator.py +2170 -0
- icdev/tools/compliance/oscal_tools.py +1182 -0
- icdev/tools/compliance/owasp_agentic_assessor.py +226 -0
- icdev/tools/compliance/owasp_asi_assessor.py +200 -0
- icdev/tools/compliance/owasp_llm_assessor.py +244 -0
- icdev/tools/compliance/pci_dss_assessor.py +80 -0
- icdev/tools/compliance/pi_compliance_tracker.py +1461 -0
- icdev/tools/compliance/poam_generator.py +405 -0
- icdev/tools/compliance/resolve_marking.py +283 -0
- icdev/tools/compliance/sbd_assessor.py +2068 -0
- icdev/tools/compliance/sbd_report_generator.py +1236 -0
- icdev/tools/compliance/sbom_generator.py +1008 -0
- icdev/tools/compliance/siem_config_generator.py +674 -0
- icdev/tools/compliance/slsa_attestation_generator.py +490 -0
- icdev/tools/compliance/soc2_assessor.py +77 -0
- icdev/tools/compliance/ssp_generator.py +573 -0
- icdev/tools/compliance/stig_checker.py +727 -0
- icdev/tools/compliance/swft_evidence_bundler.py +337 -0
- icdev/tools/compliance/system_card_generator.py +309 -0
- icdev/tools/compliance/traceability_matrix.py +1281 -0
- icdev/tools/compliance/universal_classification_manager.py +1172 -0
- icdev/tools/compliance/xacta/__init__.py +2 -0
- icdev/tools/compliance/xacta/xacta_client.py +449 -0
- icdev/tools/compliance/xacta/xacta_export.py +557 -0
- icdev/tools/compliance/xacta/xacta_sync.py +333 -0
- icdev/tools/compliance/xai_assessor.py +231 -0
- icdev/tools/dashboard/__init__.py +1 -0
- icdev/tools/dashboard/api/__init__.py +1 -0
- icdev/tools/dashboard/api/_pipeline_state.py +17 -0
- icdev/tools/dashboard/api/activity.py +206 -0
- icdev/tools/dashboard/api/admin.py +176 -0
- icdev/tools/dashboard/api/agents.py +53 -0
- icdev/tools/dashboard/api/ai_accountability.py +163 -0
- icdev/tools/dashboard/api/ai_transparency.py +198 -0
- icdev/tools/dashboard/api/audit.py +58 -0
- icdev/tools/dashboard/api/batch.py +666 -0
- icdev/tools/dashboard/api/chat.py +241 -0
- icdev/tools/dashboard/api/cicd.py +219 -0
- icdev/tools/dashboard/api/code_quality.py +223 -0
- icdev/tools/dashboard/api/compliance.py +171 -0
- icdev/tools/dashboard/api/cpmp.py +915 -0
- icdev/tools/dashboard/api/diagrams.py +65 -0
- icdev/tools/dashboard/api/events.py +250 -0
- icdev/tools/dashboard/api/evidence.py +99 -0
- icdev/tools/dashboard/api/fedramp_20x.py +77 -0
- icdev/tools/dashboard/api/govcon.py +1095 -0
- icdev/tools/dashboard/api/intake.py +1171 -0
- icdev/tools/dashboard/api/lineage.py +163 -0
- icdev/tools/dashboard/api/metrics.py +155 -0
- icdev/tools/dashboard/api/nlq.py +72 -0
- icdev/tools/dashboard/api/orchestration.py +472 -0
- icdev/tools/dashboard/api/oscal.py +183 -0
- icdev/tools/dashboard/api/prod_audit.py +183 -0
- icdev/tools/dashboard/api/projects.py +191 -0
- icdev/tools/dashboard/api/proposals.py +1084 -0
- icdev/tools/dashboard/api/traces.py +363 -0
- icdev/tools/dashboard/api/usage.py +234 -0
- icdev/tools/dashboard/app.py +1986 -0
- icdev/tools/dashboard/auth.py +500 -0
- icdev/tools/dashboard/byok.py +245 -0
- icdev/tools/dashboard/chat_manager.py +675 -0
- icdev/tools/dashboard/config.py +116 -0
- icdev/tools/dashboard/diagram_definitions.py +642 -0
- icdev/tools/dashboard/nlq_processor.py +323 -0
- icdev/tools/dashboard/phase_loader.py +136 -0
- icdev/tools/dashboard/sse_manager.py +89 -0
- icdev/tools/dashboard/state_tracker.py +267 -0
- icdev/tools/dashboard/static/css/style.css +706 -0
- icdev/tools/dashboard/static/css/ux.css +2047 -0
- icdev/tools/dashboard/static/js/activity.js +322 -0
- icdev/tools/dashboard/static/js/api.js +161 -0
- icdev/tools/dashboard/static/js/batch.js +814 -0
- icdev/tools/dashboard/static/js/charts.js +618 -0
- icdev/tools/dashboard/static/js/chat.js +1514 -0
- icdev/tools/dashboard/static/js/kanban.js +113 -0
- icdev/tools/dashboard/static/js/live.js +569 -0
- icdev/tools/dashboard/static/js/mermaid-icdev.js +332 -0
- icdev/tools/dashboard/static/js/proposals.js +588 -0
- icdev/tools/dashboard/static/js/shortcuts.js +544 -0
- icdev/tools/dashboard/static/js/tables.js +652 -0
- icdev/tools/dashboard/static/js/tour.js +524 -0
- icdev/tools/dashboard/static/js/ux.js +942 -0
- icdev/tools/dashboard/templates/404.html +10 -0
- icdev/tools/dashboard/templates/activity.html +80 -0
- icdev/tools/dashboard/templates/admin/users.html +144 -0
- icdev/tools/dashboard/templates/ai_accountability.html +235 -0
- icdev/tools/dashboard/templates/ai_transparency.html +263 -0
- icdev/tools/dashboard/templates/base.html +104 -0
- icdev/tools/dashboard/templates/batch.html +23 -0
- icdev/tools/dashboard/templates/chat.html +332 -0
- icdev/tools/dashboard/templates/children.html +149 -0
- icdev/tools/dashboard/templates/cicd.html +253 -0
- icdev/tools/dashboard/templates/code_quality.html +214 -0
- icdev/tools/dashboard/templates/cpmp/cor_detail.html +220 -0
- icdev/tools/dashboard/templates/cpmp/cor_portal.html +91 -0
- icdev/tools/dashboard/templates/cpmp/deliverable_detail.html +197 -0
- icdev/tools/dashboard/templates/cpmp/detail.html +578 -0
- icdev/tools/dashboard/templates/cpmp/portfolio.html +202 -0
- icdev/tools/dashboard/templates/dev_profiles.html +304 -0
- icdev/tools/dashboard/templates/diagrams.html +224 -0
- icdev/tools/dashboard/templates/events/timeline.html +232 -0
- icdev/tools/dashboard/templates/evidence.html +134 -0
- icdev/tools/dashboard/templates/fedramp_20x.html +207 -0
- icdev/tools/dashboard/templates/gateway.html +244 -0
- icdev/tools/dashboard/templates/govcon/capabilities.html +135 -0
- icdev/tools/dashboard/templates/govcon/pipeline.html +214 -0
- icdev/tools/dashboard/templates/govcon/requirements.html +120 -0
- icdev/tools/dashboard/templates/index.html +254 -0
- icdev/tools/dashboard/templates/lineage.html +141 -0
- icdev/tools/dashboard/templates/login.html +51 -0
- icdev/tools/dashboard/templates/monitoring/overview.html +193 -0
- icdev/tools/dashboard/templates/orchestration/dashboard.html +545 -0
- icdev/tools/dashboard/templates/oscal.html +263 -0
- icdev/tools/dashboard/templates/phases.html +150 -0
- icdev/tools/dashboard/templates/prod_audit.html +280 -0
- icdev/tools/dashboard/templates/profile.html +183 -0
- icdev/tools/dashboard/templates/projects/detail.html +583 -0
- icdev/tools/dashboard/templates/projects/list.html +47 -0
- icdev/tools/dashboard/templates/proposals/detail.html +1253 -0
- icdev/tools/dashboard/templates/proposals/list.html +179 -0
- icdev/tools/dashboard/templates/proposals/section_detail.html +193 -0
- icdev/tools/dashboard/templates/provenance.html +181 -0
- icdev/tools/dashboard/templates/query/nlq.html +234 -0
- icdev/tools/dashboard/templates/quick_paths.html +69 -0
- icdev/tools/dashboard/templates/traces.html +155 -0
- icdev/tools/dashboard/templates/translation_detail.html +199 -0
- icdev/tools/dashboard/templates/translations.html +162 -0
- icdev/tools/dashboard/templates/usage.html +225 -0
- icdev/tools/dashboard/templates/wizard.html +539 -0
- icdev/tools/dashboard/templates/xai.html +208 -0
- icdev/tools/dashboard/ux_helpers.py +962 -0
- icdev/tools/dashboard/websocket.py +81 -0
- icdev/tools/db/__init__.py +1 -0
- icdev/tools/db/backup.py +312 -0
- icdev/tools/db/backup_manager.py +832 -0
- icdev/tools/db/init_icdev_db.py +5900 -0
- icdev/tools/db/migrate.py +178 -0
- icdev/tools/db/migration_runner.py +549 -0
- icdev/tools/db/migrations/001_baseline/meta.json +9 -0
- icdev/tools/db/migrations/001_baseline/up.py +68 -0
- icdev/tools/db/migrations/002_memory_enhancements/down.sql +8 -0
- icdev/tools/db/migrations/002_memory_enhancements/meta.json +9 -0
- icdev/tools/db/migrations/002_memory_enhancements/up.py +118 -0
- icdev/tools/db/migrations/003_dev_profiles/meta.json +8 -0
- icdev/tools/db/migrations/003_dev_profiles/up.py +93 -0
- icdev/tools/db/migrations/004_innovation_engine/down.py +19 -0
- icdev/tools/db/migrations/004_innovation_engine/up.py +227 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/down.py +19 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/up.py +258 -0
- icdev/tools/db/migrations/006_phase_36_evolution/down.py +21 -0
- icdev/tools/db/migrations/006_phase_36_evolution/up.py +323 -0
- icdev/tools/db/migrations/007_phase_38_cloud/down.py +14 -0
- icdev/tools/db/migrations/007_phase_38_cloud/up.py +110 -0
- icdev/tools/db/migrations/008_phase36_37_integration/up.py +55 -0
- icdev/tools/db/migrations/__init__.py +2 -0
- icdev/tools/devsecops/__init__.py +2 -0
- icdev/tools/devsecops/attestation_manager.py +458 -0
- icdev/tools/devsecops/network_segmentation_generator.py +614 -0
- icdev/tools/devsecops/pdp_config_generator.py +1256 -0
- icdev/tools/devsecops/pipeline_security_generator.py +484 -0
- icdev/tools/devsecops/policy_generator.py +653 -0
- icdev/tools/devsecops/profile_manager.py +388 -0
- icdev/tools/devsecops/service_mesh_generator.py +1073 -0
- icdev/tools/devsecops/zta_maturity_scorer.py +368 -0
- icdev/tools/devsecops/zta_terraform_generator.py +1303 -0
- icdev/tools/dx/__init__.py +3 -0
- icdev/tools/dx/companion.py +266 -0
- icdev/tools/dx/instruction_generator.py +753 -0
- icdev/tools/dx/mcp_config_generator.py +282 -0
- icdev/tools/dx/skill_translator.py +425 -0
- icdev/tools/dx/tool_detector.py +144 -0
- icdev/tools/extensions/__init__.py +21 -0
- icdev/tools/extensions/builtins/010_ai_governance_chat.py +277 -0
- icdev/tools/extensions/builtins/__init__.py +2 -0
- icdev/tools/extensions/extension_manager.py +455 -0
- icdev/tools/infra/__init__.py +1 -0
- icdev/tools/infra/ansible_generator.py +869 -0
- icdev/tools/infra/dockerfile_generator.py +361 -0
- icdev/tools/infra/infra_status.py +393 -0
- icdev/tools/infra/ironbank_metadata_generator.py +411 -0
- icdev/tools/infra/k8s_generator.py +1002 -0
- icdev/tools/infra/pipeline_generator.py +832 -0
- icdev/tools/infra/rollback.py +400 -0
- icdev/tools/infra/terraform_generator.py +1142 -0
- icdev/tools/infra/terraform_generator_azure.py +1254 -0
- icdev/tools/infra/terraform_generator_gcp.py +953 -0
- icdev/tools/infra/terraform_generator_ibm.py +360 -0
- icdev/tools/infra/terraform_generator_oci.py +919 -0
- icdev/tools/infra/terraform_generator_onprem.py +319 -0
- icdev/tools/innovation/__init__.py +8 -0
- icdev/tools/innovation/competitive_intel.py +492 -0
- icdev/tools/innovation/innovation_manager.py +681 -0
- icdev/tools/innovation/introspective_analyzer.py +774 -0
- icdev/tools/innovation/register_external_patterns.py +440 -0
- icdev/tools/innovation/signal_ranker.py +1038 -0
- icdev/tools/innovation/solution_generator.py +697 -0
- icdev/tools/innovation/standards_monitor.py +466 -0
- icdev/tools/innovation/trend_detector.py +1046 -0
- icdev/tools/innovation/triage_engine.py +1149 -0
- icdev/tools/innovation/web_scanner.py +894 -0
- icdev/tools/installer/__init__.py +1 -0
- icdev/tools/installer/compliance_configurator.py +637 -0
- icdev/tools/installer/installer.py +1711 -0
- icdev/tools/installer/module_registry.py +805 -0
- icdev/tools/installer/platform_setup.py +961 -0
- icdev/tools/integration/__init__.py +2 -0
- icdev/tools/integration/approval_manager.py +561 -0
- icdev/tools/integration/doors_exporter.py +627 -0
- icdev/tools/integration/gitlab_connector.py +784 -0
- icdev/tools/integration/jira_connector.py +774 -0
- icdev/tools/integration/servicenow_connector.py +693 -0
- icdev/tools/knowledge/__init__.py +1 -0
- icdev/tools/knowledge/knowledge_ingest.py +293 -0
- icdev/tools/knowledge/pattern_detector.py +693 -0
- icdev/tools/knowledge/recommendation_engine.py +461 -0
- icdev/tools/knowledge/self_heal_analyzer.py +504 -0
- icdev/tools/llm/__init__.py +72 -0
- icdev/tools/llm/anthropic_provider.py +170 -0
- icdev/tools/llm/azure_openai_provider.py +338 -0
- icdev/tools/llm/bedrock_provider.py +315 -0
- icdev/tools/llm/embedding_provider.py +438 -0
- icdev/tools/llm/gemini_provider.py +381 -0
- icdev/tools/llm/ibm_watsonx_provider.py +232 -0
- icdev/tools/llm/oci_genai_provider.py +462 -0
- icdev/tools/llm/ollama_provider.py +340 -0
- icdev/tools/llm/openai_provider.py +225 -0
- icdev/tools/llm/provider.py +355 -0
- icdev/tools/llm/provider_sdk.py +175 -0
- icdev/tools/llm/router.py +780 -0
- icdev/tools/llm/vertex_ai_provider.py +374 -0
- icdev/tools/maintenance/__init__.py +2 -0
- icdev/tools/maintenance/dependency_scanner.py +1030 -0
- icdev/tools/maintenance/maintenance_auditor.py +815 -0
- icdev/tools/maintenance/remediation_engine.py +966 -0
- icdev/tools/maintenance/vulnerability_checker.py +987 -0
- icdev/tools/mbse/__init__.py +3 -0
- icdev/tools/mbse/des_assessor.py +1186 -0
- icdev/tools/mbse/des_report_generator.py +800 -0
- icdev/tools/mbse/diagram_extractor.py +811 -0
- icdev/tools/mbse/digital_thread.py +1665 -0
- icdev/tools/mbse/model_code_generator.py +1122 -0
- icdev/tools/mbse/model_control_mapper.py +420 -0
- icdev/tools/mbse/pi_model_tracker.py +1093 -0
- icdev/tools/mbse/reqif_parser.py +1483 -0
- icdev/tools/mbse/sync_engine.py +1805 -0
- icdev/tools/mbse/xmi_parser.py +1573 -0
- icdev/tools/mcp/__init__.py +1 -0
- icdev/tools/mcp/base_server.py +535 -0
- icdev/tools/mcp/builder_server.py +725 -0
- icdev/tools/mcp/compliance_server.py +1407 -0
- icdev/tools/mcp/context_indexer.py +199 -0
- icdev/tools/mcp/context_server.py +305 -0
- icdev/tools/mcp/core_server.py +679 -0
- icdev/tools/mcp/devsecops_server.py +432 -0
- icdev/tools/mcp/gap_handlers.py +1079 -0
- icdev/tools/mcp/gateway_server.py +339 -0
- icdev/tools/mcp/generate_registry.py +623 -0
- icdev/tools/mcp/infra_server.py +264 -0
- icdev/tools/mcp/innovation_server.py +316 -0
- icdev/tools/mcp/integration_server.py +527 -0
- icdev/tools/mcp/knowledge_server.py +429 -0
- icdev/tools/mcp/maintenance_server.py +248 -0
- icdev/tools/mcp/marketplace_server.py +499 -0
- icdev/tools/mcp/mbse_server.py +398 -0
- icdev/tools/mcp/modernization_server.py +496 -0
- icdev/tools/mcp/observability_server.py +354 -0
- icdev/tools/mcp/requirements_server.py +415 -0
- icdev/tools/mcp/simulation_server.py +468 -0
- icdev/tools/mcp/standalone/__init__.py +2 -0
- icdev/tools/mcp/standalone/builder.py +59 -0
- icdev/tools/mcp/standalone/compliance.py +59 -0
- icdev/tools/mcp/standalone/core.py +59 -0
- icdev/tools/mcp/standalone/knowledge.py +59 -0
- icdev/tools/mcp/standalone/maintenance.py +59 -0
- icdev/tools/mcp/supply_chain_server.py +476 -0
- icdev/tools/mcp/tool_registry.py +2008 -0
- icdev/tools/mcp/unified_server.py +158 -0
- icdev/tools/memory/__init__.py +2 -0
- icdev/tools/memory/auto_capture.py +347 -0
- icdev/tools/memory/embed_memory.py +158 -0
- icdev/tools/memory/history_compressor.py +334 -0
- icdev/tools/memory/hybrid_search.py +236 -0
- icdev/tools/memory/maintenance_cron.py +289 -0
- icdev/tools/memory/memory_consolidation.py +444 -0
- icdev/tools/memory/memory_db.py +133 -0
- icdev/tools/memory/memory_read.py +102 -0
- icdev/tools/memory/memory_write.py +222 -0
- icdev/tools/memory/semantic_search.py +139 -0
- icdev/tools/memory/time_decay.py +435 -0
- icdev/tools/modernization/__init__.py +3 -0
- icdev/tools/modernization/architecture_extractor.py +734 -0
- icdev/tools/modernization/compliance_bridge.py +1499 -0
- icdev/tools/modernization/db_migration_planner.py +1385 -0
- icdev/tools/modernization/doc_generator.py +1428 -0
- icdev/tools/modernization/framework_migrator.py +1525 -0
- icdev/tools/modernization/legacy_analyzer.py +1948 -0
- icdev/tools/modernization/migration_code_generator.py +1639 -0
- icdev/tools/modernization/migration_report_generator.py +1653 -0
- icdev/tools/modernization/migration_tracker.py +1726 -0
- icdev/tools/modernization/monolith_decomposer.py +1508 -0
- icdev/tools/modernization/seven_r_assessor.py +1658 -0
- icdev/tools/modernization/strangler_fig_manager.py +1705 -0
- icdev/tools/modernization/ui_analyzer.py +771 -0
- icdev/tools/modernization/version_migrator.py +1392 -0
- icdev/tools/monitor/__init__.py +1 -0
- icdev/tools/monitor/alert_correlator.py +495 -0
- icdev/tools/monitor/auto_resolver.py +612 -0
- icdev/tools/monitor/health_checker.py +509 -0
- icdev/tools/monitor/heartbeat_daemon.py +792 -0
- icdev/tools/monitor/log_analyzer.py +516 -0
- icdev/tools/monitor/metric_collector.py +496 -0
- icdev/tools/mosa/__init__.py +10 -0
- icdev/tools/mosa/icd_generator.py +370 -0
- icdev/tools/mosa/modular_design_analyzer.py +683 -0
- icdev/tools/mosa/mosa_code_enforcer.py +349 -0
- icdev/tools/mosa/tsp_generator.py +265 -0
- icdev/tools/observability/__init__.py +100 -0
- icdev/tools/observability/genai_attributes.py +88 -0
- icdev/tools/observability/instrumentation.py +140 -0
- icdev/tools/observability/mlflow_exporter.py +194 -0
- icdev/tools/observability/otel_tracer.py +168 -0
- icdev/tools/observability/provenance/__init__.py +3 -0
- icdev/tools/observability/provenance/prov_recorder.py +324 -0
- icdev/tools/observability/shap/__init__.py +3 -0
- icdev/tools/observability/shap/agent_shap.py +275 -0
- icdev/tools/observability/sqlite_tracer.py +361 -0
- icdev/tools/observability/trace_context.py +205 -0
- icdev/tools/observability/tracer.py +230 -0
- icdev/tools/orchestration/__init__.py +2 -0
- icdev/tools/orchestration/workflow_composer.py +361 -0
- icdev/tools/project/__init__.py +1 -0
- icdev/tools/project/manifest_loader.py +418 -0
- icdev/tools/project/project_create.py +350 -0
- icdev/tools/project/project_list.py +174 -0
- icdev/tools/project/project_scaffold.py +1715 -0
- icdev/tools/project/project_status.py +479 -0
- icdev/tools/project/session_context_builder.py +757 -0
- icdev/tools/project/validate_manifest.py +55 -0
- icdev/tools/registry/__init__.py +10 -0
- icdev/tools/registry/absorption_engine.py +832 -0
- icdev/tools/registry/capability_evaluator.py +668 -0
- icdev/tools/registry/child_registry.py +617 -0
- icdev/tools/registry/cross_pollinator.py +1065 -0
- icdev/tools/registry/genome_manager.py +671 -0
- icdev/tools/registry/learning_collector.py +912 -0
- icdev/tools/registry/propagation_manager.py +942 -0
- icdev/tools/registry/staging_manager.py +742 -0
- icdev/tools/registry/telemetry_collector.py +423 -0
- icdev/tools/requirements/__init__.py +1 -0
- icdev/tools/requirements/ai_governance_scorer.py +208 -0
- icdev/tools/requirements/boundary_analyzer.py +1293 -0
- icdev/tools/requirements/clarification_engine.py +618 -0
- icdev/tools/requirements/complexity_scorer.py +387 -0
- icdev/tools/requirements/consistency_analyzer.py +803 -0
- icdev/tools/requirements/constitution_manager.py +605 -0
- icdev/tools/requirements/decomposition_engine.py +778 -0
- icdev/tools/requirements/document_extractor.py +1016 -0
- icdev/tools/requirements/elicitation_techniques.py +519 -0
- icdev/tools/requirements/gap_detector.py +271 -0
- icdev/tools/requirements/intake_engine.py +2188 -0
- icdev/tools/requirements/prd_generator.py +847 -0
- icdev/tools/requirements/prd_validator.py +595 -0
- icdev/tools/requirements/readiness_scorer.py +313 -0
- icdev/tools/requirements/spec_organizer.py +1029 -0
- icdev/tools/requirements/spec_quality_checker.py +1097 -0
- icdev/tools/requirements/traceability_builder.py +579 -0
- icdev/tools/resilience/__init__.py +34 -0
- icdev/tools/resilience/circuit_breaker.py +340 -0
- icdev/tools/resilience/correlation.py +150 -0
- icdev/tools/resilience/errors.py +81 -0
- icdev/tools/resilience/retry.py +95 -0
- icdev/tools/schemas/__init__.py +27 -0
- icdev/tools/schemas/chat.py +61 -0
- icdev/tools/schemas/compliance.py +56 -0
- icdev/tools/schemas/core.py +85 -0
- icdev/tools/schemas/innovation.py +37 -0
- icdev/tools/schemas/validation.py +109 -0
- icdev/tools/sdk/__init__.py +3 -0
- icdev/tools/sdk/icdev_client.py +218 -0
- icdev/tools/security/__init__.py +1 -0
- icdev/tools/security/agent_output_validator.py +330 -0
- icdev/tools/security/agent_trust_scorer.py +466 -0
- icdev/tools/security/ai_bom_generator.py +725 -0
- icdev/tools/security/ai_telemetry_logger.py +469 -0
- icdev/tools/security/atlas_red_team.py +543 -0
- icdev/tools/security/code_pattern_scanner.py +378 -0
- icdev/tools/security/confabulation_detector.py +271 -0
- icdev/tools/security/container_scanner.py +491 -0
- icdev/tools/security/dependency_auditor.py +944 -0
- icdev/tools/security/endpoint_security_scanner.py +579 -0
- icdev/tools/security/mcp_tool_authorizer.py +243 -0
- icdev/tools/security/prompt_injection_detector.py +737 -0
- icdev/tools/security/sast_runner.py +948 -0
- icdev/tools/security/secret_detector.py +378 -0
- icdev/tools/security/tool_chain_validator.py +357 -0
- icdev/tools/security/vuln_scanner.py +539 -0
- icdev/tools/simulation/__init__.py +2 -0
- icdev/tools/simulation/coa_generator.py +1552 -0
- icdev/tools/simulation/monte_carlo.py +758 -0
- icdev/tools/simulation/scenario_manager.py +1073 -0
- icdev/tools/simulation/simulation_engine.py +1104 -0
- icdev/tools/supply_chain/__init__.py +2 -0
- icdev/tools/supply_chain/cve_triager.py +705 -0
- icdev/tools/supply_chain/dependency_graph.py +645 -0
- icdev/tools/supply_chain/isa_manager.py +540 -0
- icdev/tools/supply_chain/scrm_assessor.py +546 -0
- icdev/tools/testing/__init__.py +2 -0
- icdev/tools/testing/acceptance_validator.py +411 -0
- icdev/tools/testing/claude_dir_validator.py +831 -0
- icdev/tools/testing/data_types.py +199 -0
- icdev/tools/testing/e2e_runner.py +715 -0
- icdev/tools/testing/fuzz_cli.py +306 -0
- icdev/tools/testing/health_check.py +483 -0
- icdev/tools/testing/platform_check.py +143 -0
- icdev/tools/testing/production_audit.py +1862 -0
- icdev/tools/testing/production_remediate.py +804 -0
- icdev/tools/testing/screenshot_validator.py +539 -0
- icdev/tools/testing/smoke_test.py +283 -0
- icdev/tools/testing/test_agent_models.py +117 -0
- icdev/tools/testing/test_orchestrator.py +957 -0
- icdev/tools/testing/utils.py +229 -0
- icdev/tools/translation/__init__.py +17 -0
- icdev/tools/translation/code_translator.py +550 -0
- icdev/tools/translation/dependency_mapper.py +277 -0
- icdev/tools/translation/feature_map.py +395 -0
- icdev/tools/translation/project_assembler.py +439 -0
- icdev/tools/translation/source_extractor.py +609 -0
- icdev/tools/translation/test_translator.py +333 -0
- icdev/tools/translation/translation_manager.py +582 -0
- icdev/tools/translation/translation_validator.py +662 -0
- icdev/tools/translation/type_checker.py +371 -0
- icdev-1.0.0.dist-info/METADATA +868 -0
- icdev-1.0.0.dist-info/RECORD +1105 -0
- icdev-1.0.0.dist-info/WHEEL +5 -0
- icdev-1.0.0.dist-info/entry_points.txt +9 -0
- icdev-1.0.0.dist-info/licenses/LICENSE +254 -0
- icdev-1.0.0.dist-info/licenses/NOTICE +268 -0
- icdev-1.0.0.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,2183 @@
|
|
|
1
|
+
{
|
|
2
|
+
"metadata": {
|
|
3
|
+
"title": "FedRAMP Rev 5 Moderate Baseline Controls",
|
|
4
|
+
"source": "FedRAMP Rev 5 Moderate Baseline (2023), NIST SP 800-53 Rev 5",
|
|
5
|
+
"classification": "CUI // SP-CTI",
|
|
6
|
+
"version": "1.0",
|
|
7
|
+
"last_updated": "2026-02-15",
|
|
8
|
+
"description": "FedRAMP Moderate baseline control catalog for cloud service provider authorization"
|
|
9
|
+
},
|
|
10
|
+
"controls": [
|
|
11
|
+
{
|
|
12
|
+
"id": "FRM-AC-1",
|
|
13
|
+
"family": "AC",
|
|
14
|
+
"nist_control_id": "AC-1",
|
|
15
|
+
"title": "Access Control Policy and Procedures",
|
|
16
|
+
"description": "Develop, document, and disseminate an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance. Review and update the current access control policy and procedures in accordance with FedRAMP-defined frequencies.",
|
|
17
|
+
"fedramp_parameters": {
|
|
18
|
+
"policy_review_frequency": "at least every 3 years",
|
|
19
|
+
"procedure_review_frequency": "at least annually"
|
|
20
|
+
},
|
|
21
|
+
"fedramp_additional_requirements": "Policy must explicitly address cloud-specific access control requirements including API access, multi-tenancy isolation, and CSP administrative access.",
|
|
22
|
+
"priority": "P1",
|
|
23
|
+
"baseline": "moderate"
|
|
24
|
+
},
|
|
25
|
+
{
|
|
26
|
+
"id": "FRM-AC-2",
|
|
27
|
+
"family": "AC",
|
|
28
|
+
"nist_control_id": "AC-2",
|
|
29
|
+
"title": "Account Management",
|
|
30
|
+
"description": "Define and document account types, establish conditions for group and role membership, specify authorized users and access authorizations, require approvals for account creation, create/enable/modify/disable/remove accounts in accordance with policy, monitor accounts, and review accounts for compliance.",
|
|
31
|
+
"fedramp_parameters": {
|
|
32
|
+
"account_review_frequency": "at least annually",
|
|
33
|
+
"inactivity_disable_period": "90 days",
|
|
34
|
+
"notification_period": "notify account managers within 24 hours when accounts are no longer required, users are terminated or transferred, or system usage changes"
|
|
35
|
+
},
|
|
36
|
+
"fedramp_additional_requirements": "CSP must implement automated mechanisms to support account management functions. Shared/group accounts are prohibited for privileged access. Guest/anonymous accounts must be disabled.",
|
|
37
|
+
"priority": "P1",
|
|
38
|
+
"baseline": "moderate"
|
|
39
|
+
},
|
|
40
|
+
{
|
|
41
|
+
"id": "FRM-AC-2(1)",
|
|
42
|
+
"family": "AC",
|
|
43
|
+
"nist_control_id": "AC-2(1)",
|
|
44
|
+
"title": "Account Management | Automated System Account Management",
|
|
45
|
+
"description": "Employ automated mechanisms to support the management of system accounts including creation, modification, enabling, disabling, and removal of accounts.",
|
|
46
|
+
"fedramp_parameters": {},
|
|
47
|
+
"fedramp_additional_requirements": "Automated account management must integrate with CSP identity provider and support SCIM or equivalent provisioning protocols.",
|
|
48
|
+
"priority": "P1",
|
|
49
|
+
"baseline": "moderate"
|
|
50
|
+
},
|
|
51
|
+
{
|
|
52
|
+
"id": "FRM-AC-2(2)",
|
|
53
|
+
"family": "AC",
|
|
54
|
+
"nist_control_id": "AC-2(2)",
|
|
55
|
+
"title": "Account Management | Automated Temporary and Emergency Account Management",
|
|
56
|
+
"description": "Automatically remove or disable temporary and emergency accounts after a FedRAMP-defined time period.",
|
|
57
|
+
"fedramp_parameters": {
|
|
58
|
+
"temporary_account_duration": "no more than 72 hours",
|
|
59
|
+
"emergency_account_duration": "no more than 72 hours"
|
|
60
|
+
},
|
|
61
|
+
"fedramp_additional_requirements": "Emergency accounts must be logged and reviewed. Notification to ISSO required upon emergency account activation.",
|
|
62
|
+
"priority": "P1",
|
|
63
|
+
"baseline": "moderate"
|
|
64
|
+
},
|
|
65
|
+
{
|
|
66
|
+
"id": "FRM-AC-2(3)",
|
|
67
|
+
"family": "AC",
|
|
68
|
+
"nist_control_id": "AC-2(3)",
|
|
69
|
+
"title": "Account Management | Disable Accounts",
|
|
70
|
+
"description": "Disable accounts when the accounts have been inactive for a FedRAMP-defined time period.",
|
|
71
|
+
"fedramp_parameters": {
|
|
72
|
+
"inactivity_period": "90 days for user accounts, 35 days for non-interactive service accounts"
|
|
73
|
+
},
|
|
74
|
+
"fedramp_additional_requirements": "",
|
|
75
|
+
"priority": "P1",
|
|
76
|
+
"baseline": "moderate"
|
|
77
|
+
},
|
|
78
|
+
{
|
|
79
|
+
"id": "FRM-AC-2(4)",
|
|
80
|
+
"family": "AC",
|
|
81
|
+
"nist_control_id": "AC-2(4)",
|
|
82
|
+
"title": "Account Management | Automated Audit Actions",
|
|
83
|
+
"description": "Automatically audit account creation, modification, enabling, disabling, and removal actions and notify appropriate personnel.",
|
|
84
|
+
"fedramp_parameters": {
|
|
85
|
+
"notification_recipients": "system administrators and ISSOs"
|
|
86
|
+
},
|
|
87
|
+
"fedramp_additional_requirements": "",
|
|
88
|
+
"priority": "P1",
|
|
89
|
+
"baseline": "moderate"
|
|
90
|
+
},
|
|
91
|
+
{
|
|
92
|
+
"id": "FRM-AC-3",
|
|
93
|
+
"family": "AC",
|
|
94
|
+
"nist_control_id": "AC-3",
|
|
95
|
+
"title": "Access Enforcement",
|
|
96
|
+
"description": "Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.",
|
|
97
|
+
"fedramp_parameters": {},
|
|
98
|
+
"fedramp_additional_requirements": "Access enforcement must address multi-tenant isolation ensuring one tenant cannot access another tenant's data or resources. API-level access enforcement is required.",
|
|
99
|
+
"priority": "P1",
|
|
100
|
+
"baseline": "moderate"
|
|
101
|
+
},
|
|
102
|
+
{
|
|
103
|
+
"id": "FRM-AC-4",
|
|
104
|
+
"family": "AC",
|
|
105
|
+
"nist_control_id": "AC-4",
|
|
106
|
+
"title": "Information Flow Enforcement",
|
|
107
|
+
"description": "Enforce approved authorizations for controlling the flow of information within the system and between connected systems based on FedRAMP-defined information flow control policies.",
|
|
108
|
+
"fedramp_parameters": {
|
|
109
|
+
"flow_control_policies": "policies defined by the organization and approved by the JAB/AO"
|
|
110
|
+
},
|
|
111
|
+
"fedramp_additional_requirements": "Information flow enforcement must prevent data exfiltration between authorization boundaries and enforce tenant data isolation in multi-tenant architectures.",
|
|
112
|
+
"priority": "P1",
|
|
113
|
+
"baseline": "moderate"
|
|
114
|
+
},
|
|
115
|
+
{
|
|
116
|
+
"id": "FRM-AC-5",
|
|
117
|
+
"family": "AC",
|
|
118
|
+
"nist_control_id": "AC-5",
|
|
119
|
+
"title": "Separation of Duties",
|
|
120
|
+
"description": "Identify and document duties of individuals requiring separation. Define system access authorizations to support separation of duties.",
|
|
121
|
+
"fedramp_parameters": {
|
|
122
|
+
"separation_duties": "at minimum: security administration, system administration, audit administration, and application administration"
|
|
123
|
+
},
|
|
124
|
+
"fedramp_additional_requirements": "CSP must document separation of duties between CSP operations and customer tenant administration.",
|
|
125
|
+
"priority": "P1",
|
|
126
|
+
"baseline": "moderate"
|
|
127
|
+
},
|
|
128
|
+
{
|
|
129
|
+
"id": "FRM-AC-6",
|
|
130
|
+
"family": "AC",
|
|
131
|
+
"nist_control_id": "AC-6",
|
|
132
|
+
"title": "Least Privilege",
|
|
133
|
+
"description": "Employ the principle of least privilege, allowing only authorized accesses for users and processes which are necessary to accomplish assigned organizational tasks.",
|
|
134
|
+
"fedramp_parameters": {},
|
|
135
|
+
"fedramp_additional_requirements": "Least privilege must be enforced for CSP administrative access to customer tenants. Just-in-time access provisioning is recommended for privileged functions.",
|
|
136
|
+
"priority": "P1",
|
|
137
|
+
"baseline": "moderate"
|
|
138
|
+
},
|
|
139
|
+
{
|
|
140
|
+
"id": "FRM-AC-6(1)",
|
|
141
|
+
"family": "AC",
|
|
142
|
+
"nist_control_id": "AC-6(1)",
|
|
143
|
+
"title": "Least Privilege | Authorize Access to Security Functions",
|
|
144
|
+
"description": "Authorize access to security functions and security-relevant information for only those personnel explicitly designated by the organization.",
|
|
145
|
+
"fedramp_parameters": {},
|
|
146
|
+
"fedramp_additional_requirements": "",
|
|
147
|
+
"priority": "P1",
|
|
148
|
+
"baseline": "moderate"
|
|
149
|
+
},
|
|
150
|
+
{
|
|
151
|
+
"id": "FRM-AC-6(2)",
|
|
152
|
+
"family": "AC",
|
|
153
|
+
"nist_control_id": "AC-6(2)",
|
|
154
|
+
"title": "Least Privilege | Non-Privileged Access for Nonsecurity Functions",
|
|
155
|
+
"description": "Require that users of system accounts or roles with access to security functions or security-relevant information use non-privileged accounts or roles when accessing nonsecurity functions.",
|
|
156
|
+
"fedramp_parameters": {},
|
|
157
|
+
"fedramp_additional_requirements": "",
|
|
158
|
+
"priority": "P1",
|
|
159
|
+
"baseline": "moderate"
|
|
160
|
+
},
|
|
161
|
+
{
|
|
162
|
+
"id": "FRM-AC-6(5)",
|
|
163
|
+
"family": "AC",
|
|
164
|
+
"nist_control_id": "AC-6(5)",
|
|
165
|
+
"title": "Least Privilege | Privileged Accounts",
|
|
166
|
+
"description": "Restrict privileged accounts on the system to specific personnel or roles designated by the organization.",
|
|
167
|
+
"fedramp_parameters": {},
|
|
168
|
+
"fedramp_additional_requirements": "CSP must maintain a list of all privileged accounts and review quarterly.",
|
|
169
|
+
"priority": "P1",
|
|
170
|
+
"baseline": "moderate"
|
|
171
|
+
},
|
|
172
|
+
{
|
|
173
|
+
"id": "FRM-AC-6(9)",
|
|
174
|
+
"family": "AC",
|
|
175
|
+
"nist_control_id": "AC-6(9)",
|
|
176
|
+
"title": "Least Privilege | Log Use of Privileged Functions",
|
|
177
|
+
"description": "Log the execution of privileged functions.",
|
|
178
|
+
"fedramp_parameters": {},
|
|
179
|
+
"fedramp_additional_requirements": "Logs of privileged function execution must be retained for at least one year and available for review within 72 hours.",
|
|
180
|
+
"priority": "P1",
|
|
181
|
+
"baseline": "moderate"
|
|
182
|
+
},
|
|
183
|
+
{
|
|
184
|
+
"id": "FRM-AC-6(10)",
|
|
185
|
+
"family": "AC",
|
|
186
|
+
"nist_control_id": "AC-6(10)",
|
|
187
|
+
"title": "Least Privilege | Prohibit Non-Privileged Users from Executing Privileged Functions",
|
|
188
|
+
"description": "Prevent non-privileged users from executing privileged functions.",
|
|
189
|
+
"fedramp_parameters": {},
|
|
190
|
+
"fedramp_additional_requirements": "",
|
|
191
|
+
"priority": "P1",
|
|
192
|
+
"baseline": "moderate"
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
"id": "FRM-AC-7",
|
|
196
|
+
"family": "AC",
|
|
197
|
+
"nist_control_id": "AC-7",
|
|
198
|
+
"title": "Unsuccessful Logon Attempts",
|
|
199
|
+
"description": "Enforce a limit of consecutive invalid logon attempts by a user during a FedRAMP-defined time period and automatically lock the account or delay the next logon prompt for a FedRAMP-defined time period when the maximum number of unsuccessful attempts is exceeded.",
|
|
200
|
+
"fedramp_parameters": {
|
|
201
|
+
"max_unsuccessful_attempts": "not more than 3",
|
|
202
|
+
"time_period": "15 minutes",
|
|
203
|
+
"lockout_duration": "lock account for at least 30 minutes or until released by an administrator"
|
|
204
|
+
},
|
|
205
|
+
"fedramp_additional_requirements": "",
|
|
206
|
+
"priority": "P1",
|
|
207
|
+
"baseline": "moderate"
|
|
208
|
+
},
|
|
209
|
+
{
|
|
210
|
+
"id": "FRM-AC-8",
|
|
211
|
+
"family": "AC",
|
|
212
|
+
"nist_control_id": "AC-8",
|
|
213
|
+
"title": "System Use Notification",
|
|
214
|
+
"description": "Display a system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable laws, policies, and standards.",
|
|
215
|
+
"fedramp_parameters": {
|
|
216
|
+
"banner_content": "US Government system notice with unauthorized use warning and monitoring consent"
|
|
217
|
+
},
|
|
218
|
+
"fedramp_additional_requirements": "Banner must be displayed for all interactive sessions including web, SSH, API console, and administrative interfaces.",
|
|
219
|
+
"priority": "P1",
|
|
220
|
+
"baseline": "moderate"
|
|
221
|
+
},
|
|
222
|
+
{
|
|
223
|
+
"id": "FRM-AC-11",
|
|
224
|
+
"family": "AC",
|
|
225
|
+
"nist_control_id": "AC-11",
|
|
226
|
+
"title": "Device Lock",
|
|
227
|
+
"description": "Prevent further access to the system by initiating a device lock after a FedRAMP-defined time period of inactivity, and retain the device lock until the user re-authenticates.",
|
|
228
|
+
"fedramp_parameters": {
|
|
229
|
+
"inactivity_timeout": "15 minutes"
|
|
230
|
+
},
|
|
231
|
+
"fedramp_additional_requirements": "",
|
|
232
|
+
"priority": "P3",
|
|
233
|
+
"baseline": "moderate"
|
|
234
|
+
},
|
|
235
|
+
{
|
|
236
|
+
"id": "FRM-AC-11(1)",
|
|
237
|
+
"family": "AC",
|
|
238
|
+
"nist_control_id": "AC-11(1)",
|
|
239
|
+
"title": "Device Lock | Pattern-Hiding Displays",
|
|
240
|
+
"description": "Conceal information previously visible on the display with a publicly viewable image via a pattern-hiding display.",
|
|
241
|
+
"fedramp_parameters": {},
|
|
242
|
+
"fedramp_additional_requirements": "",
|
|
243
|
+
"priority": "P3",
|
|
244
|
+
"baseline": "moderate"
|
|
245
|
+
},
|
|
246
|
+
{
|
|
247
|
+
"id": "FRM-AC-12",
|
|
248
|
+
"family": "AC",
|
|
249
|
+
"nist_control_id": "AC-12",
|
|
250
|
+
"title": "Session Termination",
|
|
251
|
+
"description": "Automatically terminate a user session after FedRAMP-defined conditions or trigger events.",
|
|
252
|
+
"fedramp_parameters": {
|
|
253
|
+
"session_timeout": "30 minutes of inactivity for non-privileged sessions",
|
|
254
|
+
"privileged_session_timeout": "15 minutes of inactivity for privileged sessions"
|
|
255
|
+
},
|
|
256
|
+
"fedramp_additional_requirements": "Session tokens must be invalidated server-side upon termination. Re-authentication required after session timeout.",
|
|
257
|
+
"priority": "P2",
|
|
258
|
+
"baseline": "moderate"
|
|
259
|
+
},
|
|
260
|
+
{
|
|
261
|
+
"id": "FRM-AC-14",
|
|
262
|
+
"family": "AC",
|
|
263
|
+
"nist_control_id": "AC-14",
|
|
264
|
+
"title": "Permitted Actions Without Identification or Authentication",
|
|
265
|
+
"description": "Identify user actions that can be performed on the system without identification or authentication consistent with organizational mission and business functions and document and justify such actions.",
|
|
266
|
+
"fedramp_parameters": {},
|
|
267
|
+
"fedramp_additional_requirements": "CSP must document all unauthenticated access paths and ensure no CUI is accessible without authentication.",
|
|
268
|
+
"priority": "P3",
|
|
269
|
+
"baseline": "moderate"
|
|
270
|
+
},
|
|
271
|
+
{
|
|
272
|
+
"id": "FRM-AC-17",
|
|
273
|
+
"family": "AC",
|
|
274
|
+
"nist_control_id": "AC-17",
|
|
275
|
+
"title": "Remote Access",
|
|
276
|
+
"description": "Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed. Authorize each type of remote access to the system prior to allowing such connections.",
|
|
277
|
+
"fedramp_parameters": {},
|
|
278
|
+
"fedramp_additional_requirements": "All remote administrative access must use encrypted channels (FIPS-validated cryptography) and multi-factor authentication.",
|
|
279
|
+
"priority": "P1",
|
|
280
|
+
"baseline": "moderate"
|
|
281
|
+
},
|
|
282
|
+
{
|
|
283
|
+
"id": "FRM-AC-17(1)",
|
|
284
|
+
"family": "AC",
|
|
285
|
+
"nist_control_id": "AC-17(1)",
|
|
286
|
+
"title": "Remote Access | Monitoring and Control",
|
|
287
|
+
"description": "Employ automated mechanisms to monitor and control remote access methods.",
|
|
288
|
+
"fedramp_parameters": {},
|
|
289
|
+
"fedramp_additional_requirements": "",
|
|
290
|
+
"priority": "P1",
|
|
291
|
+
"baseline": "moderate"
|
|
292
|
+
},
|
|
293
|
+
{
|
|
294
|
+
"id": "FRM-AC-17(2)",
|
|
295
|
+
"family": "AC",
|
|
296
|
+
"nist_control_id": "AC-17(2)",
|
|
297
|
+
"title": "Remote Access | Protection of Confidentiality and Integrity Using Encryption",
|
|
298
|
+
"description": "Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.",
|
|
299
|
+
"fedramp_parameters": {
|
|
300
|
+
"encryption_standard": "FIPS-validated cryptography, TLS 1.2 minimum"
|
|
301
|
+
},
|
|
302
|
+
"fedramp_additional_requirements": "",
|
|
303
|
+
"priority": "P1",
|
|
304
|
+
"baseline": "moderate"
|
|
305
|
+
},
|
|
306
|
+
{
|
|
307
|
+
"id": "FRM-AC-18",
|
|
308
|
+
"family": "AC",
|
|
309
|
+
"nist_control_id": "AC-18",
|
|
310
|
+
"title": "Wireless Access",
|
|
311
|
+
"description": "Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access. Authorize each type of wireless access to the system prior to allowing such connections.",
|
|
312
|
+
"fedramp_parameters": {},
|
|
313
|
+
"fedramp_additional_requirements": "Wireless access to CSP infrastructure handling federal data must use enterprise-grade authentication (WPA3-Enterprise or equivalent).",
|
|
314
|
+
"priority": "P1",
|
|
315
|
+
"baseline": "moderate"
|
|
316
|
+
},
|
|
317
|
+
{
|
|
318
|
+
"id": "FRM-AC-19",
|
|
319
|
+
"family": "AC",
|
|
320
|
+
"nist_control_id": "AC-19",
|
|
321
|
+
"title": "Access Control for Mobile Devices",
|
|
322
|
+
"description": "Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices and authorize the connection of mobile devices to organizational systems.",
|
|
323
|
+
"fedramp_parameters": {},
|
|
324
|
+
"fedramp_additional_requirements": "Mobile devices used to administer CSP infrastructure must be enrolled in an MDM solution and comply with STIG requirements.",
|
|
325
|
+
"priority": "P1",
|
|
326
|
+
"baseline": "moderate"
|
|
327
|
+
},
|
|
328
|
+
{
|
|
329
|
+
"id": "FRM-AC-20",
|
|
330
|
+
"family": "AC",
|
|
331
|
+
"nist_control_id": "AC-20",
|
|
332
|
+
"title": "Use of External Systems",
|
|
333
|
+
"description": "Establish terms and conditions for authorized individuals to access the system from external systems, and enforce those terms and conditions.",
|
|
334
|
+
"fedramp_parameters": {},
|
|
335
|
+
"fedramp_additional_requirements": "External system connections must be documented in the SSP and approved by the AO. Interconnection Security Agreements (ISAs) required for system-to-system connections.",
|
|
336
|
+
"priority": "P1",
|
|
337
|
+
"baseline": "moderate"
|
|
338
|
+
},
|
|
339
|
+
{
|
|
340
|
+
"id": "FRM-AC-22",
|
|
341
|
+
"family": "AC",
|
|
342
|
+
"nist_control_id": "AC-22",
|
|
343
|
+
"title": "Publicly Accessible Content",
|
|
344
|
+
"description": "Designate individuals authorized to post information onto a publicly accessible system. Train authorized individuals on publicly accessible content requirements. Review proposed content prior to posting. Review content on the publicly accessible system for nonpublic information and remove such information if discovered.",
|
|
345
|
+
"fedramp_parameters": {
|
|
346
|
+
"review_frequency": "at least quarterly"
|
|
347
|
+
},
|
|
348
|
+
"fedramp_additional_requirements": "",
|
|
349
|
+
"priority": "P3",
|
|
350
|
+
"baseline": "moderate"
|
|
351
|
+
},
|
|
352
|
+
{
|
|
353
|
+
"id": "FRM-AT-1",
|
|
354
|
+
"family": "AT",
|
|
355
|
+
"nist_control_id": "AT-1",
|
|
356
|
+
"title": "Awareness and Training Policy and Procedures",
|
|
357
|
+
"description": "Develop, document, and disseminate an awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.",
|
|
358
|
+
"fedramp_parameters": {
|
|
359
|
+
"policy_review_frequency": "at least every 3 years",
|
|
360
|
+
"procedure_review_frequency": "at least annually"
|
|
361
|
+
},
|
|
362
|
+
"fedramp_additional_requirements": "",
|
|
363
|
+
"priority": "P1",
|
|
364
|
+
"baseline": "moderate"
|
|
365
|
+
},
|
|
366
|
+
{
|
|
367
|
+
"id": "FRM-AT-2",
|
|
368
|
+
"family": "AT",
|
|
369
|
+
"nist_control_id": "AT-2",
|
|
370
|
+
"title": "Literacy Training and Awareness",
|
|
371
|
+
"description": "Provide security and privacy literacy training to system users including initial training for new users and refresher training at a FedRAMP-defined frequency. Training must cover recognition and reporting of potential indicators of insider threat.",
|
|
372
|
+
"fedramp_parameters": {
|
|
373
|
+
"training_frequency": "at least annually",
|
|
374
|
+
"initial_training": "before granting access"
|
|
375
|
+
},
|
|
376
|
+
"fedramp_additional_requirements": "Training must include cloud-specific security topics including shared responsibility model, data handling in cloud, and incident reporting procedures.",
|
|
377
|
+
"priority": "P1",
|
|
378
|
+
"baseline": "moderate"
|
|
379
|
+
},
|
|
380
|
+
{
|
|
381
|
+
"id": "FRM-AT-2(2)",
|
|
382
|
+
"family": "AT",
|
|
383
|
+
"nist_control_id": "AT-2(2)",
|
|
384
|
+
"title": "Literacy Training and Awareness | Insider Threat",
|
|
385
|
+
"description": "Provide literacy training on recognizing and reporting potential indicators of insider threat.",
|
|
386
|
+
"fedramp_parameters": {},
|
|
387
|
+
"fedramp_additional_requirements": "",
|
|
388
|
+
"priority": "P1",
|
|
389
|
+
"baseline": "moderate"
|
|
390
|
+
},
|
|
391
|
+
{
|
|
392
|
+
"id": "FRM-AT-3",
|
|
393
|
+
"family": "AT",
|
|
394
|
+
"nist_control_id": "AT-3",
|
|
395
|
+
"title": "Role-Based Training",
|
|
396
|
+
"description": "Provide role-based security and privacy training to personnel with assigned security roles and responsibilities before authorizing access and at a FedRAMP-defined frequency thereafter.",
|
|
397
|
+
"fedramp_parameters": {
|
|
398
|
+
"training_frequency": "at least annually",
|
|
399
|
+
"initial_training": "before assuming role"
|
|
400
|
+
},
|
|
401
|
+
"fedramp_additional_requirements": "Role-based training must include CSP-specific operational security procedures and incident response roles.",
|
|
402
|
+
"priority": "P1",
|
|
403
|
+
"baseline": "moderate"
|
|
404
|
+
},
|
|
405
|
+
{
|
|
406
|
+
"id": "FRM-AT-4",
|
|
407
|
+
"family": "AT",
|
|
408
|
+
"nist_control_id": "AT-4",
|
|
409
|
+
"title": "Training Records",
|
|
410
|
+
"description": "Document and monitor individual security and privacy training activities including initial and refresher training. Retain individual training records for a FedRAMP-defined time period.",
|
|
411
|
+
"fedramp_parameters": {
|
|
412
|
+
"retention_period": "at least 3 years"
|
|
413
|
+
},
|
|
414
|
+
"fedramp_additional_requirements": "",
|
|
415
|
+
"priority": "P3",
|
|
416
|
+
"baseline": "moderate"
|
|
417
|
+
},
|
|
418
|
+
{
|
|
419
|
+
"id": "FRM-AU-1",
|
|
420
|
+
"family": "AU",
|
|
421
|
+
"nist_control_id": "AU-1",
|
|
422
|
+
"title": "Audit and Accountability Policy and Procedures",
|
|
423
|
+
"description": "Develop, document, and disseminate an audit and accountability policy and associated procedures.",
|
|
424
|
+
"fedramp_parameters": {
|
|
425
|
+
"policy_review_frequency": "at least every 3 years",
|
|
426
|
+
"procedure_review_frequency": "at least annually"
|
|
427
|
+
},
|
|
428
|
+
"fedramp_additional_requirements": "",
|
|
429
|
+
"priority": "P1",
|
|
430
|
+
"baseline": "moderate"
|
|
431
|
+
},
|
|
432
|
+
{
|
|
433
|
+
"id": "FRM-AU-2",
|
|
434
|
+
"family": "AU",
|
|
435
|
+
"nist_control_id": "AU-2",
|
|
436
|
+
"title": "Event Logging",
|
|
437
|
+
"description": "Identify the types of events that the system is capable of logging in support of the audit function. Coordinate the event logging function with other organizational entities requiring audit-related information.",
|
|
438
|
+
"fedramp_parameters": {
|
|
439
|
+
"auditable_events": "successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, system events, all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes"
|
|
440
|
+
},
|
|
441
|
+
"fedramp_additional_requirements": "Audit events must include API calls, tenant provisioning/deprovisioning, and infrastructure change events in cloud environments.",
|
|
442
|
+
"priority": "P1",
|
|
443
|
+
"baseline": "moderate"
|
|
444
|
+
},
|
|
445
|
+
{
|
|
446
|
+
"id": "FRM-AU-3",
|
|
447
|
+
"family": "AU",
|
|
448
|
+
"nist_control_id": "AU-3",
|
|
449
|
+
"title": "Content of Audit Records",
|
|
450
|
+
"description": "Ensure that audit records contain information that establishes what type of event occurred, when it occurred, where it occurred, the source of the event, the outcome of the event, and the identity of any individuals, subjects, or objects/entities associated with the event.",
|
|
451
|
+
"fedramp_parameters": {},
|
|
452
|
+
"fedramp_additional_requirements": "Audit records must include tenant identifier for multi-tenant environments to enable per-tenant audit trails.",
|
|
453
|
+
"priority": "P1",
|
|
454
|
+
"baseline": "moderate"
|
|
455
|
+
},
|
|
456
|
+
{
|
|
457
|
+
"id": "FRM-AU-3(1)",
|
|
458
|
+
"family": "AU",
|
|
459
|
+
"nist_control_id": "AU-3(1)",
|
|
460
|
+
"title": "Content of Audit Records | Additional Audit Information",
|
|
461
|
+
"description": "Generate audit records containing additional information including session identifiers, transaction identifiers, and full-text recording of privileged commands.",
|
|
462
|
+
"fedramp_parameters": {
|
|
463
|
+
"additional_information": "session ID, transaction ID, user ID, source/destination IP, command text for privileged commands"
|
|
464
|
+
},
|
|
465
|
+
"fedramp_additional_requirements": "",
|
|
466
|
+
"priority": "P1",
|
|
467
|
+
"baseline": "moderate"
|
|
468
|
+
},
|
|
469
|
+
{
|
|
470
|
+
"id": "FRM-AU-4",
|
|
471
|
+
"family": "AU",
|
|
472
|
+
"nist_control_id": "AU-4",
|
|
473
|
+
"title": "Audit Log Storage Capacity",
|
|
474
|
+
"description": "Allocate audit log storage capacity to accommodate the anticipated volume of audit records and reduce the likelihood of capacity being exceeded.",
|
|
475
|
+
"fedramp_parameters": {
|
|
476
|
+
"minimum_online_retention": "at least 90 days online",
|
|
477
|
+
"minimum_total_retention": "at least 1 year total"
|
|
478
|
+
},
|
|
479
|
+
"fedramp_additional_requirements": "CSP must notify customers at least 30 days before any change to audit log retention capabilities.",
|
|
480
|
+
"priority": "P1",
|
|
481
|
+
"baseline": "moderate"
|
|
482
|
+
},
|
|
483
|
+
{
|
|
484
|
+
"id": "FRM-AU-5",
|
|
485
|
+
"family": "AU",
|
|
486
|
+
"nist_control_id": "AU-5",
|
|
487
|
+
"title": "Response to Audit Logging Process Failures",
|
|
488
|
+
"description": "Alert designated personnel in the event of an audit logging process failure and take FedRAMP-defined additional actions.",
|
|
489
|
+
"fedramp_parameters": {
|
|
490
|
+
"alert_recipients": "system administrators and ISSOs within 1 hour",
|
|
491
|
+
"additional_actions": "overwrite oldest audit records when storage capacity is reached"
|
|
492
|
+
},
|
|
493
|
+
"fedramp_additional_requirements": "",
|
|
494
|
+
"priority": "P1",
|
|
495
|
+
"baseline": "moderate"
|
|
496
|
+
},
|
|
497
|
+
{
|
|
498
|
+
"id": "FRM-AU-6",
|
|
499
|
+
"family": "AU",
|
|
500
|
+
"nist_control_id": "AU-6",
|
|
501
|
+
"title": "Audit Record Review, Analysis, and Reporting",
|
|
502
|
+
"description": "Review and analyze system audit records for indications of inappropriate or unusual activity and report findings to designated personnel.",
|
|
503
|
+
"fedramp_parameters": {
|
|
504
|
+
"review_frequency": "at least weekly",
|
|
505
|
+
"report_recipients": "ISSO and system owner"
|
|
506
|
+
},
|
|
507
|
+
"fedramp_additional_requirements": "Audit review must leverage automated tools (SIEM) to correlate events across system components and tenants.",
|
|
508
|
+
"priority": "P1",
|
|
509
|
+
"baseline": "moderate"
|
|
510
|
+
},
|
|
511
|
+
{
|
|
512
|
+
"id": "FRM-AU-6(1)",
|
|
513
|
+
"family": "AU",
|
|
514
|
+
"nist_control_id": "AU-6(1)",
|
|
515
|
+
"title": "Audit Record Review, Analysis, and Reporting | Automated Process Integration",
|
|
516
|
+
"description": "Integrate audit record review, analysis, and reporting processes using automated mechanisms to support organizational processes for investigation and response to suspicious activities.",
|
|
517
|
+
"fedramp_parameters": {},
|
|
518
|
+
"fedramp_additional_requirements": "",
|
|
519
|
+
"priority": "P1",
|
|
520
|
+
"baseline": "moderate"
|
|
521
|
+
},
|
|
522
|
+
{
|
|
523
|
+
"id": "FRM-AU-6(3)",
|
|
524
|
+
"family": "AU",
|
|
525
|
+
"nist_control_id": "AU-6(3)",
|
|
526
|
+
"title": "Audit Record Review, Analysis, and Reporting | Correlate Audit Record Repositories",
|
|
527
|
+
"description": "Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.",
|
|
528
|
+
"fedramp_parameters": {},
|
|
529
|
+
"fedramp_additional_requirements": "",
|
|
530
|
+
"priority": "P1",
|
|
531
|
+
"baseline": "moderate"
|
|
532
|
+
},
|
|
533
|
+
{
|
|
534
|
+
"id": "FRM-AU-7",
|
|
535
|
+
"family": "AU",
|
|
536
|
+
"nist_control_id": "AU-7",
|
|
537
|
+
"title": "Audit Record Reduction and Report Generation",
|
|
538
|
+
"description": "Provide and implement an audit record reduction and report generation capability that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents.",
|
|
539
|
+
"fedramp_parameters": {},
|
|
540
|
+
"fedramp_additional_requirements": "",
|
|
541
|
+
"priority": "P2",
|
|
542
|
+
"baseline": "moderate"
|
|
543
|
+
},
|
|
544
|
+
{
|
|
545
|
+
"id": "FRM-AU-7(1)",
|
|
546
|
+
"family": "AU",
|
|
547
|
+
"nist_control_id": "AU-7(1)",
|
|
548
|
+
"title": "Audit Record Reduction and Report Generation | Automatic Processing",
|
|
549
|
+
"description": "Provide and implement the capability to process, sort, and search audit records for events of interest based on content of audit fields.",
|
|
550
|
+
"fedramp_parameters": {},
|
|
551
|
+
"fedramp_additional_requirements": "",
|
|
552
|
+
"priority": "P2",
|
|
553
|
+
"baseline": "moderate"
|
|
554
|
+
},
|
|
555
|
+
{
|
|
556
|
+
"id": "FRM-AU-8",
|
|
557
|
+
"family": "AU",
|
|
558
|
+
"nist_control_id": "AU-8",
|
|
559
|
+
"title": "Time Stamps",
|
|
560
|
+
"description": "Use internal system clocks to generate time stamps for audit records and record time stamps that can be mapped to Coordinated Universal Time (UTC).",
|
|
561
|
+
"fedramp_parameters": {
|
|
562
|
+
"granularity": "at least milliseconds",
|
|
563
|
+
"synchronization": "synchronized to authoritative time source (NTP/GPS)"
|
|
564
|
+
},
|
|
565
|
+
"fedramp_additional_requirements": "",
|
|
566
|
+
"priority": "P1",
|
|
567
|
+
"baseline": "moderate"
|
|
568
|
+
},
|
|
569
|
+
{
|
|
570
|
+
"id": "FRM-AU-9",
|
|
571
|
+
"family": "AU",
|
|
572
|
+
"nist_control_id": "AU-9",
|
|
573
|
+
"title": "Protection of Audit Information",
|
|
574
|
+
"description": "Protect audit information and audit logging tools from unauthorized access, modification, and deletion.",
|
|
575
|
+
"fedramp_parameters": {},
|
|
576
|
+
"fedramp_additional_requirements": "Audit information must be stored in a separate security domain from the systems being audited. Write-once or append-only storage recommended.",
|
|
577
|
+
"priority": "P1",
|
|
578
|
+
"baseline": "moderate"
|
|
579
|
+
},
|
|
580
|
+
{
|
|
581
|
+
"id": "FRM-AU-9(4)",
|
|
582
|
+
"family": "AU",
|
|
583
|
+
"nist_control_id": "AU-9(4)",
|
|
584
|
+
"title": "Protection of Audit Information | Access by Subset of Privileged Users",
|
|
585
|
+
"description": "Authorize access to management of audit logging functionality to only a subset of privileged users or roles.",
|
|
586
|
+
"fedramp_parameters": {},
|
|
587
|
+
"fedramp_additional_requirements": "",
|
|
588
|
+
"priority": "P1",
|
|
589
|
+
"baseline": "moderate"
|
|
590
|
+
},
|
|
591
|
+
{
|
|
592
|
+
"id": "FRM-AU-11",
|
|
593
|
+
"family": "AU",
|
|
594
|
+
"nist_control_id": "AU-11",
|
|
595
|
+
"title": "Audit Record Retention",
|
|
596
|
+
"description": "Retain audit records for a FedRAMP-defined time period to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.",
|
|
597
|
+
"fedramp_parameters": {
|
|
598
|
+
"online_retention": "at least 90 days",
|
|
599
|
+
"total_retention": "at least 1 year"
|
|
600
|
+
},
|
|
601
|
+
"fedramp_additional_requirements": "CSP must support customer export of audit records for the full retention period.",
|
|
602
|
+
"priority": "P3",
|
|
603
|
+
"baseline": "moderate"
|
|
604
|
+
},
|
|
605
|
+
{
|
|
606
|
+
"id": "FRM-AU-12",
|
|
607
|
+
"family": "AU",
|
|
608
|
+
"nist_control_id": "AU-12",
|
|
609
|
+
"title": "Audit Record Generation",
|
|
610
|
+
"description": "Provide audit record generation capability for the event types the system is capable of auditing. Allow designated personnel to select the event types to be logged. Generate audit records for the selected event types.",
|
|
611
|
+
"fedramp_parameters": {},
|
|
612
|
+
"fedramp_additional_requirements": "Audit record generation must cover all layers of the cloud service stack (IaaS, PaaS, SaaS) relevant to the CSP's offering.",
|
|
613
|
+
"priority": "P1",
|
|
614
|
+
"baseline": "moderate"
|
|
615
|
+
},
|
|
616
|
+
{
|
|
617
|
+
"id": "FRM-CA-1",
|
|
618
|
+
"family": "CA",
|
|
619
|
+
"nist_control_id": "CA-1",
|
|
620
|
+
"title": "Assessment, Authorization, and Monitoring Policy and Procedures",
|
|
621
|
+
"description": "Develop, document, and disseminate a security assessment and authorization policy and associated procedures.",
|
|
622
|
+
"fedramp_parameters": {
|
|
623
|
+
"policy_review_frequency": "at least every 3 years",
|
|
624
|
+
"procedure_review_frequency": "at least annually"
|
|
625
|
+
},
|
|
626
|
+
"fedramp_additional_requirements": "",
|
|
627
|
+
"priority": "P1",
|
|
628
|
+
"baseline": "moderate"
|
|
629
|
+
},
|
|
630
|
+
{
|
|
631
|
+
"id": "FRM-CA-2",
|
|
632
|
+
"family": "CA",
|
|
633
|
+
"nist_control_id": "CA-2",
|
|
634
|
+
"title": "Control Assessments",
|
|
635
|
+
"description": "Develop a control assessment plan, assess the controls in the system at a FedRAMP-defined frequency, produce a security assessment report, and provide the results to designated personnel.",
|
|
636
|
+
"fedramp_parameters": {
|
|
637
|
+
"assessment_frequency": "at least annually"
|
|
638
|
+
},
|
|
639
|
+
"fedramp_additional_requirements": "Annual assessment must be conducted by a FedRAMP-recognized Third Party Assessment Organization (3PAO). Assessment must include penetration testing.",
|
|
640
|
+
"priority": "P2",
|
|
641
|
+
"baseline": "moderate"
|
|
642
|
+
},
|
|
643
|
+
{
|
|
644
|
+
"id": "FRM-CA-2(1)",
|
|
645
|
+
"family": "CA",
|
|
646
|
+
"nist_control_id": "CA-2(1)",
|
|
647
|
+
"title": "Control Assessments | Independent Assessors",
|
|
648
|
+
"description": "Employ independent assessors or assessment teams to conduct control assessments.",
|
|
649
|
+
"fedramp_parameters": {},
|
|
650
|
+
"fedramp_additional_requirements": "Independent assessors must be FedRAMP-recognized 3PAOs.",
|
|
651
|
+
"priority": "P2",
|
|
652
|
+
"baseline": "moderate"
|
|
653
|
+
},
|
|
654
|
+
{
|
|
655
|
+
"id": "FRM-CA-3",
|
|
656
|
+
"family": "CA",
|
|
657
|
+
"nist_control_id": "CA-3",
|
|
658
|
+
"title": "Information Exchange",
|
|
659
|
+
"description": "Approve and manage the exchange of information between the system and other systems using interconnection security agreements, information exchange security agreements, or other means.",
|
|
660
|
+
"fedramp_parameters": {},
|
|
661
|
+
"fedramp_additional_requirements": "All external system interconnections must be documented in the SSP. ISAs must be reviewed and updated at least annually.",
|
|
662
|
+
"priority": "P1",
|
|
663
|
+
"baseline": "moderate"
|
|
664
|
+
},
|
|
665
|
+
{
|
|
666
|
+
"id": "FRM-CA-5",
|
|
667
|
+
"family": "CA",
|
|
668
|
+
"nist_control_id": "CA-5",
|
|
669
|
+
"title": "Plan of Action and Milestones",
|
|
670
|
+
"description": "Develop a plan of action and milestones for the system to document planned remedial actions to correct weaknesses or deficiencies. Update the plan at a FedRAMP-defined frequency.",
|
|
671
|
+
"fedramp_parameters": {
|
|
672
|
+
"update_frequency": "at least quarterly"
|
|
673
|
+
},
|
|
674
|
+
"fedramp_additional_requirements": "POA&M must be submitted to FedRAMP PMO and maintained in the FedRAMP repository. Deviations must include risk acceptance documentation.",
|
|
675
|
+
"priority": "P3",
|
|
676
|
+
"baseline": "moderate"
|
|
677
|
+
},
|
|
678
|
+
{
|
|
679
|
+
"id": "FRM-CA-6",
|
|
680
|
+
"family": "CA",
|
|
681
|
+
"nist_control_id": "CA-6",
|
|
682
|
+
"title": "Authorization",
|
|
683
|
+
"description": "Assign a senior official as the authorizing official for the system. Ensure that the authorizing official authorizes the system for processing before commencing operations and updates the authorization at a FedRAMP-defined frequency.",
|
|
684
|
+
"fedramp_parameters": {
|
|
685
|
+
"reauthorization_frequency": "at least every 3 years or upon significant change"
|
|
686
|
+
},
|
|
687
|
+
"fedramp_additional_requirements": "Authorization must follow the FedRAMP authorization process (JAB P-ATO or Agency ATO). Continuous monitoring satisfies ongoing authorization requirements.",
|
|
688
|
+
"priority": "P1",
|
|
689
|
+
"baseline": "moderate"
|
|
690
|
+
},
|
|
691
|
+
{
|
|
692
|
+
"id": "FRM-CA-7",
|
|
693
|
+
"family": "CA",
|
|
694
|
+
"nist_control_id": "CA-7",
|
|
695
|
+
"title": "Continuous Monitoring",
|
|
696
|
+
"description": "Develop a system-level continuous monitoring strategy and implement the continuous monitoring program including establishing metrics, frequencies, and assessment methods.",
|
|
697
|
+
"fedramp_parameters": {
|
|
698
|
+
"os_scan_frequency": "monthly",
|
|
699
|
+
"database_scan_frequency": "monthly",
|
|
700
|
+
"web_application_scan_frequency": "monthly",
|
|
701
|
+
"penetration_test_frequency": "annually"
|
|
702
|
+
},
|
|
703
|
+
"fedramp_additional_requirements": "Monthly vulnerability scanning results, annual penetration test results, annual assessment findings, and POA&M updates must be submitted to FedRAMP PMO per the Continuous Monitoring Strategy Guide.",
|
|
704
|
+
"priority": "P1",
|
|
705
|
+
"baseline": "moderate"
|
|
706
|
+
},
|
|
707
|
+
{
|
|
708
|
+
"id": "FRM-CA-9",
|
|
709
|
+
"family": "CA",
|
|
710
|
+
"nist_control_id": "CA-9",
|
|
711
|
+
"title": "Internal System Connections",
|
|
712
|
+
"description": "Authorize internal connections of system components and document for each internal connection the interface characteristics, security and privacy requirements, and the nature of the information communicated.",
|
|
713
|
+
"fedramp_parameters": {},
|
|
714
|
+
"fedramp_additional_requirements": "",
|
|
715
|
+
"priority": "P2",
|
|
716
|
+
"baseline": "moderate"
|
|
717
|
+
},
|
|
718
|
+
{
|
|
719
|
+
"id": "FRM-CM-1",
|
|
720
|
+
"family": "CM",
|
|
721
|
+
"nist_control_id": "CM-1",
|
|
722
|
+
"title": "Configuration Management Policy and Procedures",
|
|
723
|
+
"description": "Develop, document, and disseminate a configuration management policy and associated procedures.",
|
|
724
|
+
"fedramp_parameters": {
|
|
725
|
+
"policy_review_frequency": "at least every 3 years",
|
|
726
|
+
"procedure_review_frequency": "at least annually"
|
|
727
|
+
},
|
|
728
|
+
"fedramp_additional_requirements": "",
|
|
729
|
+
"priority": "P1",
|
|
730
|
+
"baseline": "moderate"
|
|
731
|
+
},
|
|
732
|
+
{
|
|
733
|
+
"id": "FRM-CM-2",
|
|
734
|
+
"family": "CM",
|
|
735
|
+
"nist_control_id": "CM-2",
|
|
736
|
+
"title": "Baseline Configuration",
|
|
737
|
+
"description": "Develop, document, and maintain under configuration control a current baseline configuration of the system.",
|
|
738
|
+
"fedramp_parameters": {
|
|
739
|
+
"review_frequency": "at least annually and upon significant changes"
|
|
740
|
+
},
|
|
741
|
+
"fedramp_additional_requirements": "Baseline configuration must include all cloud infrastructure components, virtual machines, containers, and network configurations.",
|
|
742
|
+
"priority": "P1",
|
|
743
|
+
"baseline": "moderate"
|
|
744
|
+
},
|
|
745
|
+
{
|
|
746
|
+
"id": "FRM-CM-2(2)",
|
|
747
|
+
"family": "CM",
|
|
748
|
+
"nist_control_id": "CM-2(2)",
|
|
749
|
+
"title": "Baseline Configuration | Automation Support for Accuracy and Currency",
|
|
750
|
+
"description": "Maintain the currency, completeness, accuracy, and availability of the baseline configuration of the system using automated mechanisms.",
|
|
751
|
+
"fedramp_parameters": {},
|
|
752
|
+
"fedramp_additional_requirements": "Infrastructure as Code (IaC) is an acceptable automated mechanism for maintaining baseline configurations.",
|
|
753
|
+
"priority": "P1",
|
|
754
|
+
"baseline": "moderate"
|
|
755
|
+
},
|
|
756
|
+
{
|
|
757
|
+
"id": "FRM-CM-3",
|
|
758
|
+
"family": "CM",
|
|
759
|
+
"nist_control_id": "CM-3",
|
|
760
|
+
"title": "Configuration Change Control",
|
|
761
|
+
"description": "Determine and document types of changes to the system that are configuration-controlled. Review proposed configuration-controlled changes and approve or disapprove such changes. Document configuration change decisions associated with the system.",
|
|
762
|
+
"fedramp_parameters": {
|
|
763
|
+
"change_review_frequency": "before implementation",
|
|
764
|
+
"documentation_requirements": "all changes logged with date, description, rationale, and approver"
|
|
765
|
+
},
|
|
766
|
+
"fedramp_additional_requirements": "Configuration changes that affect security posture must be reported in monthly ConMon deliverables.",
|
|
767
|
+
"priority": "P1",
|
|
768
|
+
"baseline": "moderate"
|
|
769
|
+
},
|
|
770
|
+
{
|
|
771
|
+
"id": "FRM-CM-4",
|
|
772
|
+
"family": "CM",
|
|
773
|
+
"nist_control_id": "CM-4",
|
|
774
|
+
"title": "Impact Analyses",
|
|
775
|
+
"description": "Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.",
|
|
776
|
+
"fedramp_parameters": {},
|
|
777
|
+
"fedramp_additional_requirements": "Significant changes must be reported to FedRAMP PMO and may require 3PAO assessment before implementation.",
|
|
778
|
+
"priority": "P2",
|
|
779
|
+
"baseline": "moderate"
|
|
780
|
+
},
|
|
781
|
+
{
|
|
782
|
+
"id": "FRM-CM-5",
|
|
783
|
+
"family": "CM",
|
|
784
|
+
"nist_control_id": "CM-5",
|
|
785
|
+
"title": "Access Restrictions for Change",
|
|
786
|
+
"description": "Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.",
|
|
787
|
+
"fedramp_parameters": {},
|
|
788
|
+
"fedramp_additional_requirements": "Change access must be restricted using role-based access. All changes must be traceable to an authorized individual.",
|
|
789
|
+
"priority": "P1",
|
|
790
|
+
"baseline": "moderate"
|
|
791
|
+
},
|
|
792
|
+
{
|
|
793
|
+
"id": "FRM-CM-6",
|
|
794
|
+
"family": "CM",
|
|
795
|
+
"nist_control_id": "CM-6",
|
|
796
|
+
"title": "Configuration Settings",
|
|
797
|
+
"description": "Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using FedRAMP-approved security configuration checklists.",
|
|
798
|
+
"fedramp_parameters": {
|
|
799
|
+
"configuration_guides": "DISA STIGs, CIS Benchmarks, or vendor-recommended hardening guides"
|
|
800
|
+
},
|
|
801
|
+
"fedramp_additional_requirements": "STIG compliance is required for all applicable components. Deviations must be documented and risk-accepted.",
|
|
802
|
+
"priority": "P1",
|
|
803
|
+
"baseline": "moderate"
|
|
804
|
+
},
|
|
805
|
+
{
|
|
806
|
+
"id": "FRM-CM-7",
|
|
807
|
+
"family": "CM",
|
|
808
|
+
"nist_control_id": "CM-7",
|
|
809
|
+
"title": "Least Functionality",
|
|
810
|
+
"description": "Configure the system to provide only mission-essential capabilities. Prohibit or restrict the use of functions, ports, protocols, and services as defined by the organization.",
|
|
811
|
+
"fedramp_parameters": {
|
|
812
|
+
"restricted_functions": "peer-to-peer networking, instant messaging not approved by the organization"
|
|
813
|
+
},
|
|
814
|
+
"fedramp_additional_requirements": "",
|
|
815
|
+
"priority": "P1",
|
|
816
|
+
"baseline": "moderate"
|
|
817
|
+
},
|
|
818
|
+
{
|
|
819
|
+
"id": "FRM-CM-7(1)",
|
|
820
|
+
"family": "CM",
|
|
821
|
+
"nist_control_id": "CM-7(1)",
|
|
822
|
+
"title": "Least Functionality | Periodic Review",
|
|
823
|
+
"description": "Review the system at a FedRAMP-defined frequency to identify unnecessary and/or nonsecure functions, ports, protocols, software, and services and disable or remove them.",
|
|
824
|
+
"fedramp_parameters": {
|
|
825
|
+
"review_frequency": "at least monthly"
|
|
826
|
+
},
|
|
827
|
+
"fedramp_additional_requirements": "",
|
|
828
|
+
"priority": "P1",
|
|
829
|
+
"baseline": "moderate"
|
|
830
|
+
},
|
|
831
|
+
{
|
|
832
|
+
"id": "FRM-CM-7(5)",
|
|
833
|
+
"family": "CM",
|
|
834
|
+
"nist_control_id": "CM-7(5)",
|
|
835
|
+
"title": "Least Functionality | Authorized Software — Allow-by-Exception",
|
|
836
|
+
"description": "Identify software programs authorized to execute on the system. Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. Review and update the list of authorized software programs at a FedRAMP-defined frequency.",
|
|
837
|
+
"fedramp_parameters": {
|
|
838
|
+
"review_frequency": "at least annually"
|
|
839
|
+
},
|
|
840
|
+
"fedramp_additional_requirements": "",
|
|
841
|
+
"priority": "P1",
|
|
842
|
+
"baseline": "moderate"
|
|
843
|
+
},
|
|
844
|
+
{
|
|
845
|
+
"id": "FRM-CM-8",
|
|
846
|
+
"family": "CM",
|
|
847
|
+
"nist_control_id": "CM-8",
|
|
848
|
+
"title": "System Component Inventory",
|
|
849
|
+
"description": "Develop and document an inventory of system components that accurately reflects the system, is at the level of granularity deemed necessary for tracking and reporting, and is reviewed and updated at a FedRAMP-defined frequency.",
|
|
850
|
+
"fedramp_parameters": {
|
|
851
|
+
"update_frequency": "at least monthly or upon significant change"
|
|
852
|
+
},
|
|
853
|
+
"fedramp_additional_requirements": "Inventory must include all virtual machines, containers, serverless functions, databases, and network components.",
|
|
854
|
+
"priority": "P1",
|
|
855
|
+
"baseline": "moderate"
|
|
856
|
+
},
|
|
857
|
+
{
|
|
858
|
+
"id": "FRM-CM-8(1)",
|
|
859
|
+
"family": "CM",
|
|
860
|
+
"nist_control_id": "CM-8(1)",
|
|
861
|
+
"title": "System Component Inventory | Updates During Installation and Removal",
|
|
862
|
+
"description": "Update the inventory of system components as part of component installations, removals, and system updates.",
|
|
863
|
+
"fedramp_parameters": {},
|
|
864
|
+
"fedramp_additional_requirements": "",
|
|
865
|
+
"priority": "P1",
|
|
866
|
+
"baseline": "moderate"
|
|
867
|
+
},
|
|
868
|
+
{
|
|
869
|
+
"id": "FRM-CM-10",
|
|
870
|
+
"family": "CM",
|
|
871
|
+
"nist_control_id": "CM-10",
|
|
872
|
+
"title": "Software Usage Restrictions",
|
|
873
|
+
"description": "Use software and associated documentation in accordance with contract agreements and copyright laws. Track the use of software and associated documentation protected by quantity licenses. Control and document the use of peer-to-peer file sharing technology.",
|
|
874
|
+
"fedramp_parameters": {},
|
|
875
|
+
"fedramp_additional_requirements": "",
|
|
876
|
+
"priority": "P2",
|
|
877
|
+
"baseline": "moderate"
|
|
878
|
+
},
|
|
879
|
+
{
|
|
880
|
+
"id": "FRM-CM-11",
|
|
881
|
+
"family": "CM",
|
|
882
|
+
"nist_control_id": "CM-11",
|
|
883
|
+
"title": "User-Installed Software",
|
|
884
|
+
"description": "Establish and enforce policies governing the installation of software by users. Monitor policy compliance at a FedRAMP-defined frequency.",
|
|
885
|
+
"fedramp_parameters": {
|
|
886
|
+
"monitoring_frequency": "continuously via automated mechanisms"
|
|
887
|
+
},
|
|
888
|
+
"fedramp_additional_requirements": "",
|
|
889
|
+
"priority": "P1",
|
|
890
|
+
"baseline": "moderate"
|
|
891
|
+
},
|
|
892
|
+
{
|
|
893
|
+
"id": "FRM-CP-1",
|
|
894
|
+
"family": "CP",
|
|
895
|
+
"nist_control_id": "CP-1",
|
|
896
|
+
"title": "Contingency Planning Policy and Procedures",
|
|
897
|
+
"description": "Develop, document, and disseminate a contingency planning policy and associated procedures.",
|
|
898
|
+
"fedramp_parameters": {
|
|
899
|
+
"policy_review_frequency": "at least every 3 years",
|
|
900
|
+
"procedure_review_frequency": "at least annually"
|
|
901
|
+
},
|
|
902
|
+
"fedramp_additional_requirements": "",
|
|
903
|
+
"priority": "P1",
|
|
904
|
+
"baseline": "moderate"
|
|
905
|
+
},
|
|
906
|
+
{
|
|
907
|
+
"id": "FRM-CP-2",
|
|
908
|
+
"family": "CP",
|
|
909
|
+
"nist_control_id": "CP-2",
|
|
910
|
+
"title": "Contingency Plan",
|
|
911
|
+
"description": "Develop a contingency plan that identifies essential mission and business functions, provides recovery objectives, restoration priorities, metrics, roles and responsibilities, and personnel contact information.",
|
|
912
|
+
"fedramp_parameters": {
|
|
913
|
+
"review_frequency": "at least annually",
|
|
914
|
+
"plan_update": "after contingency plan test, significant change, or at least annually"
|
|
915
|
+
},
|
|
916
|
+
"fedramp_additional_requirements": "Contingency plan must address multi-region failover for cloud services and data recovery from CSP-managed backups.",
|
|
917
|
+
"priority": "P1",
|
|
918
|
+
"baseline": "moderate"
|
|
919
|
+
},
|
|
920
|
+
{
|
|
921
|
+
"id": "FRM-CP-3",
|
|
922
|
+
"family": "CP",
|
|
923
|
+
"nist_control_id": "CP-3",
|
|
924
|
+
"title": "Contingency Training",
|
|
925
|
+
"description": "Provide contingency training to system users consistent with assigned roles and responsibilities within a FedRAMP-defined time period of assuming a contingency role or responsibility and at a FedRAMP-defined frequency thereafter.",
|
|
926
|
+
"fedramp_parameters": {
|
|
927
|
+
"initial_training": "within 10 days of assuming role",
|
|
928
|
+
"refresher_frequency": "at least annually"
|
|
929
|
+
},
|
|
930
|
+
"fedramp_additional_requirements": "",
|
|
931
|
+
"priority": "P2",
|
|
932
|
+
"baseline": "moderate"
|
|
933
|
+
},
|
|
934
|
+
{
|
|
935
|
+
"id": "FRM-CP-4",
|
|
936
|
+
"family": "CP",
|
|
937
|
+
"nist_control_id": "CP-4",
|
|
938
|
+
"title": "Contingency Plan Testing",
|
|
939
|
+
"description": "Test the contingency plan at a FedRAMP-defined frequency using FedRAMP-defined tests to determine effectiveness and organizational readiness.",
|
|
940
|
+
"fedramp_parameters": {
|
|
941
|
+
"test_frequency": "at least annually",
|
|
942
|
+
"test_type": "functional exercise or tabletop"
|
|
943
|
+
},
|
|
944
|
+
"fedramp_additional_requirements": "Test results must be documented and provided to FedRAMP PMO as part of annual assessment deliverables.",
|
|
945
|
+
"priority": "P2",
|
|
946
|
+
"baseline": "moderate"
|
|
947
|
+
},
|
|
948
|
+
{
|
|
949
|
+
"id": "FRM-CP-6",
|
|
950
|
+
"family": "CP",
|
|
951
|
+
"nist_control_id": "CP-6",
|
|
952
|
+
"title": "Alternate Storage Site",
|
|
953
|
+
"description": "Establish an alternate storage site that provides equivalent security safeguards as the primary site. Ensure the alternate storage site is geographically separated from the primary storage site.",
|
|
954
|
+
"fedramp_parameters": {
|
|
955
|
+
"geographic_separation": "at least 100 miles or in a separate AWS region"
|
|
956
|
+
},
|
|
957
|
+
"fedramp_additional_requirements": "Alternate storage site must be within the FedRAMP authorization boundary or be a separately authorized system.",
|
|
958
|
+
"priority": "P1",
|
|
959
|
+
"baseline": "moderate"
|
|
960
|
+
},
|
|
961
|
+
{
|
|
962
|
+
"id": "FRM-CP-7",
|
|
963
|
+
"family": "CP",
|
|
964
|
+
"nist_control_id": "CP-7",
|
|
965
|
+
"title": "Alternate Processing Site",
|
|
966
|
+
"description": "Establish an alternate processing site that provides equivalent security safeguards as the primary processing site and that is available for use as the operational site supporting essential mission and business functions.",
|
|
967
|
+
"fedramp_parameters": {
|
|
968
|
+
"activation_time": "within the RTO defined in the contingency plan"
|
|
969
|
+
},
|
|
970
|
+
"fedramp_additional_requirements": "Alternate processing site must be within the FedRAMP authorization boundary.",
|
|
971
|
+
"priority": "P1",
|
|
972
|
+
"baseline": "moderate"
|
|
973
|
+
},
|
|
974
|
+
{
|
|
975
|
+
"id": "FRM-CP-9",
|
|
976
|
+
"family": "CP",
|
|
977
|
+
"nist_control_id": "CP-9",
|
|
978
|
+
"title": "System Backup",
|
|
979
|
+
"description": "Conduct backups of user-level, system-level, and system documentation information at a FedRAMP-defined frequency consistent with recovery time and recovery point objectives.",
|
|
980
|
+
"fedramp_parameters": {
|
|
981
|
+
"full_backup_frequency": "at least weekly",
|
|
982
|
+
"incremental_backup_frequency": "at least daily",
|
|
983
|
+
"backup_testing_frequency": "at least annually"
|
|
984
|
+
},
|
|
985
|
+
"fedramp_additional_requirements": "Backups must be encrypted using FIPS-validated cryptography. Backup media must be stored at the alternate storage site.",
|
|
986
|
+
"priority": "P1",
|
|
987
|
+
"baseline": "moderate"
|
|
988
|
+
},
|
|
989
|
+
{
|
|
990
|
+
"id": "FRM-CP-10",
|
|
991
|
+
"family": "CP",
|
|
992
|
+
"nist_control_id": "CP-10",
|
|
993
|
+
"title": "System Recovery and Reconstitution",
|
|
994
|
+
"description": "Provide for the recovery and reconstitution of the system to a known state within a FedRAMP-defined time period after a disruption, compromise, or failure.",
|
|
995
|
+
"fedramp_parameters": {
|
|
996
|
+
"recovery_time": "consistent with the RTO in the contingency plan"
|
|
997
|
+
},
|
|
998
|
+
"fedramp_additional_requirements": "",
|
|
999
|
+
"priority": "P1",
|
|
1000
|
+
"baseline": "moderate"
|
|
1001
|
+
},
|
|
1002
|
+
{
|
|
1003
|
+
"id": "FRM-IA-1",
|
|
1004
|
+
"family": "IA",
|
|
1005
|
+
"nist_control_id": "IA-1",
|
|
1006
|
+
"title": "Identification and Authentication Policy and Procedures",
|
|
1007
|
+
"description": "Develop, document, and disseminate an identification and authentication policy and associated procedures.",
|
|
1008
|
+
"fedramp_parameters": {
|
|
1009
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1010
|
+
"procedure_review_frequency": "at least annually"
|
|
1011
|
+
},
|
|
1012
|
+
"fedramp_additional_requirements": "",
|
|
1013
|
+
"priority": "P1",
|
|
1014
|
+
"baseline": "moderate"
|
|
1015
|
+
},
|
|
1016
|
+
{
|
|
1017
|
+
"id": "FRM-IA-2",
|
|
1018
|
+
"family": "IA",
|
|
1019
|
+
"nist_control_id": "IA-2",
|
|
1020
|
+
"title": "Identification and Authentication (Organizational Users)",
|
|
1021
|
+
"description": "Uniquely identify and authenticate organizational users or processes acting on behalf of organizational users.",
|
|
1022
|
+
"fedramp_parameters": {},
|
|
1023
|
+
"fedramp_additional_requirements": "Shared or group authenticators are prohibited for individual user access. Service accounts must be uniquely identified.",
|
|
1024
|
+
"priority": "P1",
|
|
1025
|
+
"baseline": "moderate"
|
|
1026
|
+
},
|
|
1027
|
+
{
|
|
1028
|
+
"id": "FRM-IA-2(1)",
|
|
1029
|
+
"family": "IA",
|
|
1030
|
+
"nist_control_id": "IA-2(1)",
|
|
1031
|
+
"title": "Identification and Authentication | Multi-Factor Authentication to Privileged Accounts",
|
|
1032
|
+
"description": "Implement multi-factor authentication for access to privileged accounts.",
|
|
1033
|
+
"fedramp_parameters": {
|
|
1034
|
+
"mfa_methods": "hardware token, software OTP, PIV/CAC, or FIDO2"
|
|
1035
|
+
},
|
|
1036
|
+
"fedramp_additional_requirements": "MFA is required for all CSP administrative access and any access to the management/control plane.",
|
|
1037
|
+
"priority": "P1",
|
|
1038
|
+
"baseline": "moderate"
|
|
1039
|
+
},
|
|
1040
|
+
{
|
|
1041
|
+
"id": "FRM-IA-2(2)",
|
|
1042
|
+
"family": "IA",
|
|
1043
|
+
"nist_control_id": "IA-2(2)",
|
|
1044
|
+
"title": "Identification and Authentication | Multi-Factor Authentication to Non-Privileged Accounts",
|
|
1045
|
+
"description": "Implement multi-factor authentication for access to non-privileged accounts.",
|
|
1046
|
+
"fedramp_parameters": {
|
|
1047
|
+
"mfa_methods": "hardware token, software OTP, PIV/CAC, or FIDO2"
|
|
1048
|
+
},
|
|
1049
|
+
"fedramp_additional_requirements": "MFA is required for all user-facing interactive access to the cloud service.",
|
|
1050
|
+
"priority": "P1",
|
|
1051
|
+
"baseline": "moderate"
|
|
1052
|
+
},
|
|
1053
|
+
{
|
|
1054
|
+
"id": "FRM-IA-2(8)",
|
|
1055
|
+
"family": "IA",
|
|
1056
|
+
"nist_control_id": "IA-2(8)",
|
|
1057
|
+
"title": "Identification and Authentication | Access to Accounts — Replay Resistant",
|
|
1058
|
+
"description": "Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts.",
|
|
1059
|
+
"fedramp_parameters": {},
|
|
1060
|
+
"fedramp_additional_requirements": "",
|
|
1061
|
+
"priority": "P1",
|
|
1062
|
+
"baseline": "moderate"
|
|
1063
|
+
},
|
|
1064
|
+
{
|
|
1065
|
+
"id": "FRM-IA-2(12)",
|
|
1066
|
+
"family": "IA",
|
|
1067
|
+
"nist_control_id": "IA-2(12)",
|
|
1068
|
+
"title": "Identification and Authentication | Acceptance of PIV Credentials",
|
|
1069
|
+
"description": "Accept and electronically verify Personal Identity Verification (PIV) or Common Access Card (CAC) credentials.",
|
|
1070
|
+
"fedramp_parameters": {},
|
|
1071
|
+
"fedramp_additional_requirements": "PIV/CAC support is required for agency user authentication where applicable.",
|
|
1072
|
+
"priority": "P1",
|
|
1073
|
+
"baseline": "moderate"
|
|
1074
|
+
},
|
|
1075
|
+
{
|
|
1076
|
+
"id": "FRM-IA-4",
|
|
1077
|
+
"family": "IA",
|
|
1078
|
+
"nist_control_id": "IA-4",
|
|
1079
|
+
"title": "Identifier Management",
|
|
1080
|
+
"description": "Manage system identifiers by receiving authorization for identifier assignment, selecting and assigning individual, group, role, service, or device identifiers, preventing reuse of identifiers for a FedRAMP-defined time period, and disabling identifiers after a FedRAMP-defined time period of inactivity.",
|
|
1081
|
+
"fedramp_parameters": {
|
|
1082
|
+
"identifier_reuse_prevention": "at least 2 years",
|
|
1083
|
+
"inactivity_disable_period": "90 days"
|
|
1084
|
+
},
|
|
1085
|
+
"fedramp_additional_requirements": "",
|
|
1086
|
+
"priority": "P1",
|
|
1087
|
+
"baseline": "moderate"
|
|
1088
|
+
},
|
|
1089
|
+
{
|
|
1090
|
+
"id": "FRM-IA-5",
|
|
1091
|
+
"family": "IA",
|
|
1092
|
+
"nist_control_id": "IA-5",
|
|
1093
|
+
"title": "Authenticator Management",
|
|
1094
|
+
"description": "Manage system authenticators by verifying the identity of the individual, group, role, service, or device receiving the authenticator. Establish initial authenticator content, administrative procedures for lost/compromised or damaged authenticators, and requirements for protecting authenticators.",
|
|
1095
|
+
"fedramp_parameters": {},
|
|
1096
|
+
"fedramp_additional_requirements": "Password-based authenticators are subject to FedRAMP-specific complexity and history requirements per IA-5(1).",
|
|
1097
|
+
"priority": "P1",
|
|
1098
|
+
"baseline": "moderate"
|
|
1099
|
+
},
|
|
1100
|
+
{
|
|
1101
|
+
"id": "FRM-IA-5(1)",
|
|
1102
|
+
"family": "IA",
|
|
1103
|
+
"nist_control_id": "IA-5(1)",
|
|
1104
|
+
"title": "Authenticator Management | Password-Based Authentication",
|
|
1105
|
+
"description": "For password-based authentication, enforce minimum password complexity, change, and history requirements per FedRAMP-defined parameters.",
|
|
1106
|
+
"fedramp_parameters": {
|
|
1107
|
+
"minimum_length": "12 characters",
|
|
1108
|
+
"complexity": "at least one uppercase, one lowercase, one numeric, one special character",
|
|
1109
|
+
"password_lifetime": "60 days maximum",
|
|
1110
|
+
"password_history": "24 passwords remembered",
|
|
1111
|
+
"temporary_password_lifetime": "first use or 24 hours maximum"
|
|
1112
|
+
},
|
|
1113
|
+
"fedramp_additional_requirements": "Passwords must be stored using approved hashing algorithms (bcrypt, scrypt, Argon2, or PBKDF2). Passwords must not be transmitted in clear text.",
|
|
1114
|
+
"priority": "P1",
|
|
1115
|
+
"baseline": "moderate"
|
|
1116
|
+
},
|
|
1117
|
+
{
|
|
1118
|
+
"id": "FRM-IA-5(2)",
|
|
1119
|
+
"family": "IA",
|
|
1120
|
+
"nist_control_id": "IA-5(2)",
|
|
1121
|
+
"title": "Authenticator Management | PKI-Based Authentication",
|
|
1122
|
+
"description": "For PKI-based authentication, validate certificates by constructing and verifying a certification path to an accepted trust anchor, enforce authorized access to the corresponding private key, and map the authenticated identity to the account of the individual or group.",
|
|
1123
|
+
"fedramp_parameters": {},
|
|
1124
|
+
"fedramp_additional_requirements": "PKI certificates must be issued by a DoD-approved or FedRAMP-approved Certificate Authority.",
|
|
1125
|
+
"priority": "P1",
|
|
1126
|
+
"baseline": "moderate"
|
|
1127
|
+
},
|
|
1128
|
+
{
|
|
1129
|
+
"id": "FRM-IA-6",
|
|
1130
|
+
"family": "IA",
|
|
1131
|
+
"nist_control_id": "IA-6",
|
|
1132
|
+
"title": "Authentication Feedback",
|
|
1133
|
+
"description": "Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation or use by unauthorized individuals.",
|
|
1134
|
+
"fedramp_parameters": {},
|
|
1135
|
+
"fedramp_additional_requirements": "",
|
|
1136
|
+
"priority": "P2",
|
|
1137
|
+
"baseline": "moderate"
|
|
1138
|
+
},
|
|
1139
|
+
{
|
|
1140
|
+
"id": "FRM-IA-7",
|
|
1141
|
+
"family": "IA",
|
|
1142
|
+
"nist_control_id": "IA-7",
|
|
1143
|
+
"title": "Cryptographic Module Authentication",
|
|
1144
|
+
"description": "Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication.",
|
|
1145
|
+
"fedramp_parameters": {
|
|
1146
|
+
"fips_level": "FIPS 140-2 Level 1 minimum"
|
|
1147
|
+
},
|
|
1148
|
+
"fedramp_additional_requirements": "",
|
|
1149
|
+
"priority": "P1",
|
|
1150
|
+
"baseline": "moderate"
|
|
1151
|
+
},
|
|
1152
|
+
{
|
|
1153
|
+
"id": "FRM-IA-8",
|
|
1154
|
+
"family": "IA",
|
|
1155
|
+
"nist_control_id": "IA-8",
|
|
1156
|
+
"title": "Identification and Authentication (Non-Organizational Users)",
|
|
1157
|
+
"description": "Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.",
|
|
1158
|
+
"fedramp_parameters": {},
|
|
1159
|
+
"fedramp_additional_requirements": "Non-organizational users must be uniquely identified and authenticated. Anonymous access must be documented and restricted to public-facing content only.",
|
|
1160
|
+
"priority": "P1",
|
|
1161
|
+
"baseline": "moderate"
|
|
1162
|
+
},
|
|
1163
|
+
{
|
|
1164
|
+
"id": "FRM-IR-1",
|
|
1165
|
+
"family": "IR",
|
|
1166
|
+
"nist_control_id": "IR-1",
|
|
1167
|
+
"title": "Incident Response Policy and Procedures",
|
|
1168
|
+
"description": "Develop, document, and disseminate an incident response policy and associated procedures.",
|
|
1169
|
+
"fedramp_parameters": {
|
|
1170
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1171
|
+
"procedure_review_frequency": "at least annually"
|
|
1172
|
+
},
|
|
1173
|
+
"fedramp_additional_requirements": "",
|
|
1174
|
+
"priority": "P1",
|
|
1175
|
+
"baseline": "moderate"
|
|
1176
|
+
},
|
|
1177
|
+
{
|
|
1178
|
+
"id": "FRM-IR-2",
|
|
1179
|
+
"family": "IR",
|
|
1180
|
+
"nist_control_id": "IR-2",
|
|
1181
|
+
"title": "Incident Response Training",
|
|
1182
|
+
"description": "Provide incident response training to system users consistent with assigned roles and responsibilities within a FedRAMP-defined time period and at a FedRAMP-defined frequency thereafter.",
|
|
1183
|
+
"fedramp_parameters": {
|
|
1184
|
+
"initial_training": "within 10 days of assuming role",
|
|
1185
|
+
"refresher_frequency": "at least annually"
|
|
1186
|
+
},
|
|
1187
|
+
"fedramp_additional_requirements": "",
|
|
1188
|
+
"priority": "P2",
|
|
1189
|
+
"baseline": "moderate"
|
|
1190
|
+
},
|
|
1191
|
+
{
|
|
1192
|
+
"id": "FRM-IR-4",
|
|
1193
|
+
"family": "IR",
|
|
1194
|
+
"nist_control_id": "IR-4",
|
|
1195
|
+
"title": "Incident Handling",
|
|
1196
|
+
"description": "Implement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery.",
|
|
1197
|
+
"fedramp_parameters": {},
|
|
1198
|
+
"fedramp_additional_requirements": "CSP must report incidents to US-CERT within 1 hour of determination that an incident has occurred. Customer notification must occur within 72 hours.",
|
|
1199
|
+
"priority": "P1",
|
|
1200
|
+
"baseline": "moderate"
|
|
1201
|
+
},
|
|
1202
|
+
{
|
|
1203
|
+
"id": "FRM-IR-4(1)",
|
|
1204
|
+
"family": "IR",
|
|
1205
|
+
"nist_control_id": "IR-4(1)",
|
|
1206
|
+
"title": "Incident Handling | Automated Incident Handling Processes",
|
|
1207
|
+
"description": "Employ automated mechanisms to support the incident handling process.",
|
|
1208
|
+
"fedramp_parameters": {},
|
|
1209
|
+
"fedramp_additional_requirements": "Automated incident handling must integrate with SIEM and ticketing systems for tracking and escalation.",
|
|
1210
|
+
"priority": "P1",
|
|
1211
|
+
"baseline": "moderate"
|
|
1212
|
+
},
|
|
1213
|
+
{
|
|
1214
|
+
"id": "FRM-IR-5",
|
|
1215
|
+
"family": "IR",
|
|
1216
|
+
"nist_control_id": "IR-5",
|
|
1217
|
+
"title": "Incident Monitoring",
|
|
1218
|
+
"description": "Track and document incidents on an ongoing basis.",
|
|
1219
|
+
"fedramp_parameters": {},
|
|
1220
|
+
"fedramp_additional_requirements": "Incident tracking must support FedRAMP continuous monitoring reporting requirements.",
|
|
1221
|
+
"priority": "P1",
|
|
1222
|
+
"baseline": "moderate"
|
|
1223
|
+
},
|
|
1224
|
+
{
|
|
1225
|
+
"id": "FRM-IR-6",
|
|
1226
|
+
"family": "IR",
|
|
1227
|
+
"nist_control_id": "IR-6",
|
|
1228
|
+
"title": "Incident Reporting",
|
|
1229
|
+
"description": "Require personnel to report suspected incidents to the organizational incident response capability within a FedRAMP-defined time period.",
|
|
1230
|
+
"fedramp_parameters": {
|
|
1231
|
+
"reporting_time": "within 1 hour of discovery for US-CERT reportable incidents"
|
|
1232
|
+
},
|
|
1233
|
+
"fedramp_additional_requirements": "CSP must report to US-CERT, FedRAMP PMO, and affected agencies per FedRAMP Incident Communications Procedures.",
|
|
1234
|
+
"priority": "P1",
|
|
1235
|
+
"baseline": "moderate"
|
|
1236
|
+
},
|
|
1237
|
+
{
|
|
1238
|
+
"id": "FRM-IR-7",
|
|
1239
|
+
"family": "IR",
|
|
1240
|
+
"nist_control_id": "IR-7",
|
|
1241
|
+
"title": "Incident Response Assistance",
|
|
1242
|
+
"description": "Provide an incident response support resource integral to the organizational incident response capability that offers advice and assistance to users for the handling and reporting of incidents.",
|
|
1243
|
+
"fedramp_parameters": {},
|
|
1244
|
+
"fedramp_additional_requirements": "",
|
|
1245
|
+
"priority": "P2",
|
|
1246
|
+
"baseline": "moderate"
|
|
1247
|
+
},
|
|
1248
|
+
{
|
|
1249
|
+
"id": "FRM-IR-8",
|
|
1250
|
+
"family": "IR",
|
|
1251
|
+
"nist_control_id": "IR-8",
|
|
1252
|
+
"title": "Incident Response Plan",
|
|
1253
|
+
"description": "Develop an incident response plan and review the plan at a FedRAMP-defined frequency and update as needed.",
|
|
1254
|
+
"fedramp_parameters": {
|
|
1255
|
+
"review_frequency": "at least annually"
|
|
1256
|
+
},
|
|
1257
|
+
"fedramp_additional_requirements": "Incident response plan must include FedRAMP-specific reporting requirements, US-CERT contact information, and escalation procedures for multi-tenant incidents.",
|
|
1258
|
+
"priority": "P1",
|
|
1259
|
+
"baseline": "moderate"
|
|
1260
|
+
},
|
|
1261
|
+
{
|
|
1262
|
+
"id": "FRM-MA-1",
|
|
1263
|
+
"family": "MA",
|
|
1264
|
+
"nist_control_id": "MA-1",
|
|
1265
|
+
"title": "Maintenance Policy and Procedures",
|
|
1266
|
+
"description": "Develop, document, and disseminate a system maintenance policy and associated procedures.",
|
|
1267
|
+
"fedramp_parameters": {
|
|
1268
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1269
|
+
"procedure_review_frequency": "at least annually"
|
|
1270
|
+
},
|
|
1271
|
+
"fedramp_additional_requirements": "",
|
|
1272
|
+
"priority": "P1",
|
|
1273
|
+
"baseline": "moderate"
|
|
1274
|
+
},
|
|
1275
|
+
{
|
|
1276
|
+
"id": "FRM-MA-2",
|
|
1277
|
+
"family": "MA",
|
|
1278
|
+
"nist_control_id": "MA-2",
|
|
1279
|
+
"title": "Controlled Maintenance",
|
|
1280
|
+
"description": "Schedule, document, and review records of maintenance and repair on system components in accordance with manufacturer or vendor specifications and/or organizational requirements.",
|
|
1281
|
+
"fedramp_parameters": {},
|
|
1282
|
+
"fedramp_additional_requirements": "Maintenance activities must be logged in the audit trail. Non-local maintenance must be conducted over encrypted channels.",
|
|
1283
|
+
"priority": "P2",
|
|
1284
|
+
"baseline": "moderate"
|
|
1285
|
+
},
|
|
1286
|
+
{
|
|
1287
|
+
"id": "FRM-MA-4",
|
|
1288
|
+
"family": "MA",
|
|
1289
|
+
"nist_control_id": "MA-4",
|
|
1290
|
+
"title": "Nonlocal Maintenance",
|
|
1291
|
+
"description": "Approve and monitor nonlocal maintenance and diagnostic activities. Allow the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan.",
|
|
1292
|
+
"fedramp_parameters": {},
|
|
1293
|
+
"fedramp_additional_requirements": "All nonlocal maintenance sessions must use MFA, encrypted channels, and be logged. Session recording is recommended for privileged maintenance.",
|
|
1294
|
+
"priority": "P2",
|
|
1295
|
+
"baseline": "moderate"
|
|
1296
|
+
},
|
|
1297
|
+
{
|
|
1298
|
+
"id": "FRM-MA-5",
|
|
1299
|
+
"family": "MA",
|
|
1300
|
+
"nist_control_id": "MA-5",
|
|
1301
|
+
"title": "Maintenance Personnel",
|
|
1302
|
+
"description": "Establish a process for maintenance personnel authorization and maintain a list of authorized maintenance organizations or personnel.",
|
|
1303
|
+
"fedramp_parameters": {},
|
|
1304
|
+
"fedramp_additional_requirements": "Maintenance personnel must meet personnel security requirements per PS controls. Foreign nationals performing maintenance must be escorted.",
|
|
1305
|
+
"priority": "P2",
|
|
1306
|
+
"baseline": "moderate"
|
|
1307
|
+
},
|
|
1308
|
+
{
|
|
1309
|
+
"id": "FRM-MP-1",
|
|
1310
|
+
"family": "MP",
|
|
1311
|
+
"nist_control_id": "MP-1",
|
|
1312
|
+
"title": "Media Protection Policy and Procedures",
|
|
1313
|
+
"description": "Develop, document, and disseminate a media protection policy and associated procedures.",
|
|
1314
|
+
"fedramp_parameters": {
|
|
1315
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1316
|
+
"procedure_review_frequency": "at least annually"
|
|
1317
|
+
},
|
|
1318
|
+
"fedramp_additional_requirements": "",
|
|
1319
|
+
"priority": "P1",
|
|
1320
|
+
"baseline": "moderate"
|
|
1321
|
+
},
|
|
1322
|
+
{
|
|
1323
|
+
"id": "FRM-MP-2",
|
|
1324
|
+
"family": "MP",
|
|
1325
|
+
"nist_control_id": "MP-2",
|
|
1326
|
+
"title": "Media Access",
|
|
1327
|
+
"description": "Restrict access to digital and non-digital media to authorized individuals using FedRAMP-defined controls.",
|
|
1328
|
+
"fedramp_parameters": {
|
|
1329
|
+
"access_controls": "physical access controls, encryption, and access logging"
|
|
1330
|
+
},
|
|
1331
|
+
"fedramp_additional_requirements": "",
|
|
1332
|
+
"priority": "P1",
|
|
1333
|
+
"baseline": "moderate"
|
|
1334
|
+
},
|
|
1335
|
+
{
|
|
1336
|
+
"id": "FRM-MP-6",
|
|
1337
|
+
"family": "MP",
|
|
1338
|
+
"nist_control_id": "MP-6",
|
|
1339
|
+
"title": "Media Sanitization",
|
|
1340
|
+
"description": "Sanitize system media prior to disposal, release out of organizational control, or release for reuse using FedRAMP-defined sanitization techniques and procedures.",
|
|
1341
|
+
"fedramp_parameters": {
|
|
1342
|
+
"sanitization_standard": "NIST SP 800-88 Guidelines for Media Sanitization"
|
|
1343
|
+
},
|
|
1344
|
+
"fedramp_additional_requirements": "Media containing CUI must be sanitized per NIST 800-88 Purge or Destroy methods. Clear is not sufficient for CUI media.",
|
|
1345
|
+
"priority": "P1",
|
|
1346
|
+
"baseline": "moderate"
|
|
1347
|
+
},
|
|
1348
|
+
{
|
|
1349
|
+
"id": "FRM-MP-7",
|
|
1350
|
+
"family": "MP",
|
|
1351
|
+
"nist_control_id": "MP-7",
|
|
1352
|
+
"title": "Media Use",
|
|
1353
|
+
"description": "Restrict or prohibit the use of FedRAMP-defined types of system media on FedRAMP-defined systems or system components.",
|
|
1354
|
+
"fedramp_parameters": {
|
|
1355
|
+
"restricted_media": "removable media including USB drives, external hard drives, and optical media"
|
|
1356
|
+
},
|
|
1357
|
+
"fedramp_additional_requirements": "",
|
|
1358
|
+
"priority": "P1",
|
|
1359
|
+
"baseline": "moderate"
|
|
1360
|
+
},
|
|
1361
|
+
{
|
|
1362
|
+
"id": "FRM-PE-1",
|
|
1363
|
+
"family": "PE",
|
|
1364
|
+
"nist_control_id": "PE-1",
|
|
1365
|
+
"title": "Physical and Environmental Protection Policy and Procedures",
|
|
1366
|
+
"description": "Develop, document, and disseminate a physical and environmental protection policy and associated procedures.",
|
|
1367
|
+
"fedramp_parameters": {
|
|
1368
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1369
|
+
"procedure_review_frequency": "at least annually"
|
|
1370
|
+
},
|
|
1371
|
+
"fedramp_additional_requirements": "",
|
|
1372
|
+
"priority": "P1",
|
|
1373
|
+
"baseline": "moderate"
|
|
1374
|
+
},
|
|
1375
|
+
{
|
|
1376
|
+
"id": "FRM-PE-2",
|
|
1377
|
+
"family": "PE",
|
|
1378
|
+
"nist_control_id": "PE-2",
|
|
1379
|
+
"title": "Physical Access Authorizations",
|
|
1380
|
+
"description": "Develop, approve, and maintain a list of individuals with authorized access to the facility. Issue authorization credentials for facility access. Review the access list at a FedRAMP-defined frequency.",
|
|
1381
|
+
"fedramp_parameters": {
|
|
1382
|
+
"review_frequency": "at least annually"
|
|
1383
|
+
},
|
|
1384
|
+
"fedramp_additional_requirements": "CSP data center access lists must include all personnel with unescorted access. Visitor logs must be maintained for at least 1 year.",
|
|
1385
|
+
"priority": "P1",
|
|
1386
|
+
"baseline": "moderate"
|
|
1387
|
+
},
|
|
1388
|
+
{
|
|
1389
|
+
"id": "FRM-PE-3",
|
|
1390
|
+
"family": "PE",
|
|
1391
|
+
"nist_control_id": "PE-3",
|
|
1392
|
+
"title": "Physical Access Control",
|
|
1393
|
+
"description": "Enforce physical access authorizations at entry and exit points to the facility by verifying individual access authorizations before granting access, controlling ingress and egress using physical access control systems, and maintaining physical access audit logs.",
|
|
1394
|
+
"fedramp_parameters": {
|
|
1395
|
+
"audit_log_review_frequency": "at least monthly"
|
|
1396
|
+
},
|
|
1397
|
+
"fedramp_additional_requirements": "Data center physical access must include multi-factor authentication (badge + biometric or badge + PIN). Man-trap or equivalent anti-tailgating controls required.",
|
|
1398
|
+
"priority": "P1",
|
|
1399
|
+
"baseline": "moderate"
|
|
1400
|
+
},
|
|
1401
|
+
{
|
|
1402
|
+
"id": "FRM-PE-6",
|
|
1403
|
+
"family": "PE",
|
|
1404
|
+
"nist_control_id": "PE-6",
|
|
1405
|
+
"title": "Monitoring Physical Access",
|
|
1406
|
+
"description": "Monitor physical access to the facility where the system resides to detect and respond to physical security incidents.",
|
|
1407
|
+
"fedramp_parameters": {
|
|
1408
|
+
"monitoring": "24x7 video surveillance with at least 90 days retention"
|
|
1409
|
+
},
|
|
1410
|
+
"fedramp_additional_requirements": "",
|
|
1411
|
+
"priority": "P1",
|
|
1412
|
+
"baseline": "moderate"
|
|
1413
|
+
},
|
|
1414
|
+
{
|
|
1415
|
+
"id": "FRM-PE-8",
|
|
1416
|
+
"family": "PE",
|
|
1417
|
+
"nist_control_id": "PE-8",
|
|
1418
|
+
"title": "Visitor Access Records",
|
|
1419
|
+
"description": "Maintain visitor access records to the facility where the system resides for a FedRAMP-defined time period and review visitor access records at a FedRAMP-defined frequency.",
|
|
1420
|
+
"fedramp_parameters": {
|
|
1421
|
+
"retention_period": "at least 1 year",
|
|
1422
|
+
"review_frequency": "at least monthly"
|
|
1423
|
+
},
|
|
1424
|
+
"fedramp_additional_requirements": "",
|
|
1425
|
+
"priority": "P3",
|
|
1426
|
+
"baseline": "moderate"
|
|
1427
|
+
},
|
|
1428
|
+
{
|
|
1429
|
+
"id": "FRM-PL-1",
|
|
1430
|
+
"family": "PL",
|
|
1431
|
+
"nist_control_id": "PL-1",
|
|
1432
|
+
"title": "Planning Policy and Procedures",
|
|
1433
|
+
"description": "Develop, document, and disseminate a planning policy and associated procedures.",
|
|
1434
|
+
"fedramp_parameters": {
|
|
1435
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1436
|
+
"procedure_review_frequency": "at least annually"
|
|
1437
|
+
},
|
|
1438
|
+
"fedramp_additional_requirements": "",
|
|
1439
|
+
"priority": "P1",
|
|
1440
|
+
"baseline": "moderate"
|
|
1441
|
+
},
|
|
1442
|
+
{
|
|
1443
|
+
"id": "FRM-PL-2",
|
|
1444
|
+
"family": "PL",
|
|
1445
|
+
"nist_control_id": "PL-2",
|
|
1446
|
+
"title": "System Security and Privacy Plans",
|
|
1447
|
+
"description": "Develop security and privacy plans for the system that are consistent with the organization's enterprise architecture, define the authorization boundary, describe the operational context, include the security categorization, describe the operational environment, identify security and privacy requirements, and describe the controls in place or planned.",
|
|
1448
|
+
"fedramp_parameters": {
|
|
1449
|
+
"review_frequency": "at least annually"
|
|
1450
|
+
},
|
|
1451
|
+
"fedramp_additional_requirements": "SSP must follow the FedRAMP SSP template and be submitted to FedRAMP PMO. All appendices required by the template must be completed.",
|
|
1452
|
+
"priority": "P1",
|
|
1453
|
+
"baseline": "moderate"
|
|
1454
|
+
},
|
|
1455
|
+
{
|
|
1456
|
+
"id": "FRM-PL-4",
|
|
1457
|
+
"family": "PL",
|
|
1458
|
+
"nist_control_id": "PL-4",
|
|
1459
|
+
"title": "Rules of Behavior",
|
|
1460
|
+
"description": "Establish and provide to individuals requiring access to the system the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy.",
|
|
1461
|
+
"fedramp_parameters": {
|
|
1462
|
+
"acknowledgment_frequency": "at least annually"
|
|
1463
|
+
},
|
|
1464
|
+
"fedramp_additional_requirements": "Rules of behavior must include acceptable use of cloud resources, data handling requirements, and incident reporting obligations.",
|
|
1465
|
+
"priority": "P2",
|
|
1466
|
+
"baseline": "moderate"
|
|
1467
|
+
},
|
|
1468
|
+
{
|
|
1469
|
+
"id": "FRM-PM-9",
|
|
1470
|
+
"family": "PM",
|
|
1471
|
+
"nist_control_id": "PM-9",
|
|
1472
|
+
"title": "Risk Management Strategy",
|
|
1473
|
+
"description": "Develop a comprehensive strategy to manage security and privacy risk to organizational operations and assets, individuals, other organizations, and the Nation.",
|
|
1474
|
+
"fedramp_parameters": {},
|
|
1475
|
+
"fedramp_additional_requirements": "Risk management strategy must align with NIST Risk Management Framework and address cloud-specific risk factors.",
|
|
1476
|
+
"priority": "P1",
|
|
1477
|
+
"baseline": "moderate"
|
|
1478
|
+
},
|
|
1479
|
+
{
|
|
1480
|
+
"id": "FRM-PM-10",
|
|
1481
|
+
"family": "PM",
|
|
1482
|
+
"nist_control_id": "PM-10",
|
|
1483
|
+
"title": "Authorization Process",
|
|
1484
|
+
"description": "Manage the security and privacy state of organizational systems through authorization processes.",
|
|
1485
|
+
"fedramp_parameters": {},
|
|
1486
|
+
"fedramp_additional_requirements": "Authorization process must follow FedRAMP authorization framework (JAB P-ATO or Agency ATO pathway).",
|
|
1487
|
+
"priority": "P1",
|
|
1488
|
+
"baseline": "moderate"
|
|
1489
|
+
},
|
|
1490
|
+
{
|
|
1491
|
+
"id": "FRM-PS-1",
|
|
1492
|
+
"family": "PS",
|
|
1493
|
+
"nist_control_id": "PS-1",
|
|
1494
|
+
"title": "Personnel Security Policy and Procedures",
|
|
1495
|
+
"description": "Develop, document, and disseminate a personnel security policy and associated procedures.",
|
|
1496
|
+
"fedramp_parameters": {
|
|
1497
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1498
|
+
"procedure_review_frequency": "at least annually"
|
|
1499
|
+
},
|
|
1500
|
+
"fedramp_additional_requirements": "",
|
|
1501
|
+
"priority": "P1",
|
|
1502
|
+
"baseline": "moderate"
|
|
1503
|
+
},
|
|
1504
|
+
{
|
|
1505
|
+
"id": "FRM-PS-2",
|
|
1506
|
+
"family": "PS",
|
|
1507
|
+
"nist_control_id": "PS-2",
|
|
1508
|
+
"title": "Position Risk Designation",
|
|
1509
|
+
"description": "Assign a risk designation to all organizational positions. Establish screening criteria for individuals filling those positions. Review and update position risk designations at a FedRAMP-defined frequency.",
|
|
1510
|
+
"fedramp_parameters": {
|
|
1511
|
+
"review_frequency": "at least every 3 years"
|
|
1512
|
+
},
|
|
1513
|
+
"fedramp_additional_requirements": "CSP personnel with access to federal data or systems must have risk designations commensurate with the sensitivity of the data.",
|
|
1514
|
+
"priority": "P1",
|
|
1515
|
+
"baseline": "moderate"
|
|
1516
|
+
},
|
|
1517
|
+
{
|
|
1518
|
+
"id": "FRM-PS-3",
|
|
1519
|
+
"family": "PS",
|
|
1520
|
+
"nist_control_id": "PS-3",
|
|
1521
|
+
"title": "Personnel Screening",
|
|
1522
|
+
"description": "Screen individuals prior to authorizing access to the system and rescreen individuals at a FedRAMP-defined frequency.",
|
|
1523
|
+
"fedramp_parameters": {
|
|
1524
|
+
"rescreen_frequency": "at least every 5 years for Moderate systems",
|
|
1525
|
+
"screening_type": "at minimum, National Agency Check with Written Inquiries (NACI) or equivalent"
|
|
1526
|
+
},
|
|
1527
|
+
"fedramp_additional_requirements": "CSP must ensure background investigations are completed for all personnel with logical or physical access to CSP infrastructure supporting FedRAMP systems.",
|
|
1528
|
+
"priority": "P1",
|
|
1529
|
+
"baseline": "moderate"
|
|
1530
|
+
},
|
|
1531
|
+
{
|
|
1532
|
+
"id": "FRM-PS-4",
|
|
1533
|
+
"family": "PS",
|
|
1534
|
+
"nist_control_id": "PS-4",
|
|
1535
|
+
"title": "Personnel Termination",
|
|
1536
|
+
"description": "Upon termination of individual employment, disable system access within a FedRAMP-defined time period, terminate or revoke authenticators and credentials, conduct exit interviews, retrieve all security-related organizational system-related property, and retain access to organizational information formerly controlled by the terminated individual.",
|
|
1537
|
+
"fedramp_parameters": {
|
|
1538
|
+
"access_disable_time": "same day as termination"
|
|
1539
|
+
},
|
|
1540
|
+
"fedramp_additional_requirements": "",
|
|
1541
|
+
"priority": "P1",
|
|
1542
|
+
"baseline": "moderate"
|
|
1543
|
+
},
|
|
1544
|
+
{
|
|
1545
|
+
"id": "FRM-PS-5",
|
|
1546
|
+
"family": "PS",
|
|
1547
|
+
"nist_control_id": "PS-5",
|
|
1548
|
+
"title": "Personnel Transfer",
|
|
1549
|
+
"description": "Review and confirm ongoing operational need for current logical and physical access authorizations to systems and facilities when individuals are reassigned or transferred to other positions.",
|
|
1550
|
+
"fedramp_parameters": {
|
|
1551
|
+
"review_time": "within 5 days of transfer action"
|
|
1552
|
+
},
|
|
1553
|
+
"fedramp_additional_requirements": "",
|
|
1554
|
+
"priority": "P2",
|
|
1555
|
+
"baseline": "moderate"
|
|
1556
|
+
},
|
|
1557
|
+
{
|
|
1558
|
+
"id": "FRM-PS-6",
|
|
1559
|
+
"family": "PS",
|
|
1560
|
+
"nist_control_id": "PS-6",
|
|
1561
|
+
"title": "Access Agreements",
|
|
1562
|
+
"description": "Develop and document access agreements for organizational systems. Review and update the access agreements at a FedRAMP-defined frequency. Verify that individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access.",
|
|
1563
|
+
"fedramp_parameters": {
|
|
1564
|
+
"review_frequency": "at least annually"
|
|
1565
|
+
},
|
|
1566
|
+
"fedramp_additional_requirements": "Access agreements must include non-disclosure provisions, acceptable use, and acknowledgment of monitoring.",
|
|
1567
|
+
"priority": "P3",
|
|
1568
|
+
"baseline": "moderate"
|
|
1569
|
+
},
|
|
1570
|
+
{
|
|
1571
|
+
"id": "FRM-PS-7",
|
|
1572
|
+
"family": "PS",
|
|
1573
|
+
"nist_control_id": "PS-7",
|
|
1574
|
+
"title": "External Personnel Security",
|
|
1575
|
+
"description": "Establish personnel security requirements including security roles and responsibilities for external providers. Require external providers to comply with personnel security policies and procedures established by the organization.",
|
|
1576
|
+
"fedramp_parameters": {},
|
|
1577
|
+
"fedramp_additional_requirements": "Third-party personnel with access to FedRAMP systems must undergo equivalent background screening. Contracts must include security requirements and right-to-audit clauses.",
|
|
1578
|
+
"priority": "P1",
|
|
1579
|
+
"baseline": "moderate"
|
|
1580
|
+
},
|
|
1581
|
+
{
|
|
1582
|
+
"id": "FRM-RA-1",
|
|
1583
|
+
"family": "RA",
|
|
1584
|
+
"nist_control_id": "RA-1",
|
|
1585
|
+
"title": "Risk Assessment Policy and Procedures",
|
|
1586
|
+
"description": "Develop, document, and disseminate a risk assessment policy and associated procedures.",
|
|
1587
|
+
"fedramp_parameters": {
|
|
1588
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1589
|
+
"procedure_review_frequency": "at least annually"
|
|
1590
|
+
},
|
|
1591
|
+
"fedramp_additional_requirements": "",
|
|
1592
|
+
"priority": "P1",
|
|
1593
|
+
"baseline": "moderate"
|
|
1594
|
+
},
|
|
1595
|
+
{
|
|
1596
|
+
"id": "FRM-RA-2",
|
|
1597
|
+
"family": "RA",
|
|
1598
|
+
"nist_control_id": "RA-2",
|
|
1599
|
+
"title": "Security Categorization",
|
|
1600
|
+
"description": "Categorize the system and information processed, stored, and transmitted. Document the security categorization results in the security plan.",
|
|
1601
|
+
"fedramp_parameters": {
|
|
1602
|
+
"categorization_standard": "FIPS 199 and NIST SP 800-60"
|
|
1603
|
+
},
|
|
1604
|
+
"fedramp_additional_requirements": "FIPS 199 categorization must be documented in the FedRAMP SSP using the FedRAMP FIPS 199 template.",
|
|
1605
|
+
"priority": "P1",
|
|
1606
|
+
"baseline": "moderate"
|
|
1607
|
+
},
|
|
1608
|
+
{
|
|
1609
|
+
"id": "FRM-RA-3",
|
|
1610
|
+
"family": "RA",
|
|
1611
|
+
"nist_control_id": "RA-3",
|
|
1612
|
+
"title": "Risk Assessment",
|
|
1613
|
+
"description": "Conduct a risk assessment to identify threats to and vulnerabilities of the system. Determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction. Update the risk assessment at a FedRAMP-defined frequency.",
|
|
1614
|
+
"fedramp_parameters": {
|
|
1615
|
+
"update_frequency": "at least annually or when significant change occurs"
|
|
1616
|
+
},
|
|
1617
|
+
"fedramp_additional_requirements": "Risk assessment must include cloud-specific threats such as data co-mingling, insecure interfaces, and shared technology vulnerabilities.",
|
|
1618
|
+
"priority": "P1",
|
|
1619
|
+
"baseline": "moderate"
|
|
1620
|
+
},
|
|
1621
|
+
{
|
|
1622
|
+
"id": "FRM-RA-5",
|
|
1623
|
+
"family": "RA",
|
|
1624
|
+
"nist_control_id": "RA-5",
|
|
1625
|
+
"title": "Vulnerability Monitoring and Scanning",
|
|
1626
|
+
"description": "Monitor and scan for vulnerabilities in the system at a FedRAMP-defined frequency and when new vulnerabilities potentially affecting the system are identified and reported.",
|
|
1627
|
+
"fedramp_parameters": {
|
|
1628
|
+
"os_scan_frequency": "at least monthly",
|
|
1629
|
+
"web_app_scan_frequency": "at least monthly",
|
|
1630
|
+
"database_scan_frequency": "at least monthly",
|
|
1631
|
+
"remediation_high": "within 30 days",
|
|
1632
|
+
"remediation_moderate": "within 90 days",
|
|
1633
|
+
"remediation_low": "within 180 days"
|
|
1634
|
+
},
|
|
1635
|
+
"fedramp_additional_requirements": "Scanning must use a FedRAMP-approved scanner (DISA ACAS/Nessus/Qualys/equivalent). Monthly scan results must be submitted as part of continuous monitoring deliverables. Unique vulnerabilities with CVSS score >= 7 must be tracked in POA&M.",
|
|
1636
|
+
"priority": "P1",
|
|
1637
|
+
"baseline": "moderate"
|
|
1638
|
+
},
|
|
1639
|
+
{
|
|
1640
|
+
"id": "FRM-SA-1",
|
|
1641
|
+
"family": "SA",
|
|
1642
|
+
"nist_control_id": "SA-1",
|
|
1643
|
+
"title": "System and Services Acquisition Policy and Procedures",
|
|
1644
|
+
"description": "Develop, document, and disseminate a system and services acquisition policy and associated procedures.",
|
|
1645
|
+
"fedramp_parameters": {
|
|
1646
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1647
|
+
"procedure_review_frequency": "at least annually"
|
|
1648
|
+
},
|
|
1649
|
+
"fedramp_additional_requirements": "",
|
|
1650
|
+
"priority": "P1",
|
|
1651
|
+
"baseline": "moderate"
|
|
1652
|
+
},
|
|
1653
|
+
{
|
|
1654
|
+
"id": "FRM-SA-2",
|
|
1655
|
+
"family": "SA",
|
|
1656
|
+
"nist_control_id": "SA-2",
|
|
1657
|
+
"title": "Allocation of Resources",
|
|
1658
|
+
"description": "Determine the high-level security and privacy requirements for the system. Determine, document, and allocate resources required to protect the system as part of the organizational capital planning and investment control process.",
|
|
1659
|
+
"fedramp_parameters": {},
|
|
1660
|
+
"fedramp_additional_requirements": "",
|
|
1661
|
+
"priority": "P1",
|
|
1662
|
+
"baseline": "moderate"
|
|
1663
|
+
},
|
|
1664
|
+
{
|
|
1665
|
+
"id": "FRM-SA-3",
|
|
1666
|
+
"family": "SA",
|
|
1667
|
+
"nist_control_id": "SA-3",
|
|
1668
|
+
"title": "System Development Life Cycle",
|
|
1669
|
+
"description": "Acquire, develop, and manage the system using an organization-defined system development life cycle that incorporates information security and privacy considerations.",
|
|
1670
|
+
"fedramp_parameters": {},
|
|
1671
|
+
"fedramp_additional_requirements": "SDLC must include security activities at each phase including threat modeling, secure code review, and security testing.",
|
|
1672
|
+
"priority": "P1",
|
|
1673
|
+
"baseline": "moderate"
|
|
1674
|
+
},
|
|
1675
|
+
{
|
|
1676
|
+
"id": "FRM-SA-4",
|
|
1677
|
+
"family": "SA",
|
|
1678
|
+
"nist_control_id": "SA-4",
|
|
1679
|
+
"title": "Acquisition Process",
|
|
1680
|
+
"description": "Include security and privacy functional requirements, strength requirements, security and privacy assurance requirements, controls, and documentation requirements in system acquisition contracts.",
|
|
1681
|
+
"fedramp_parameters": {},
|
|
1682
|
+
"fedramp_additional_requirements": "Acquisition contracts for cloud services must require FedRAMP authorization or equivalent. SBOM delivery requirements should be included.",
|
|
1683
|
+
"priority": "P1",
|
|
1684
|
+
"baseline": "moderate"
|
|
1685
|
+
},
|
|
1686
|
+
{
|
|
1687
|
+
"id": "FRM-SA-5",
|
|
1688
|
+
"family": "SA",
|
|
1689
|
+
"nist_control_id": "SA-5",
|
|
1690
|
+
"title": "System Documentation",
|
|
1691
|
+
"description": "Obtain or develop administrator documentation and user documentation for the system. Document attempts to obtain unavailable documentation.",
|
|
1692
|
+
"fedramp_parameters": {},
|
|
1693
|
+
"fedramp_additional_requirements": "",
|
|
1694
|
+
"priority": "P2",
|
|
1695
|
+
"baseline": "moderate"
|
|
1696
|
+
},
|
|
1697
|
+
{
|
|
1698
|
+
"id": "FRM-SA-9",
|
|
1699
|
+
"family": "SA",
|
|
1700
|
+
"nist_control_id": "SA-9",
|
|
1701
|
+
"title": "External System Services",
|
|
1702
|
+
"description": "Require that providers of external system services comply with organizational information security and privacy requirements. Define and document organizational oversight and user roles for external system services.",
|
|
1703
|
+
"fedramp_parameters": {},
|
|
1704
|
+
"fedramp_additional_requirements": "External services leveraged by the CSP that process, store, or transmit federal data must be FedRAMP authorized or documented as leveraged services in the SSP.",
|
|
1705
|
+
"priority": "P1",
|
|
1706
|
+
"baseline": "moderate"
|
|
1707
|
+
},
|
|
1708
|
+
{
|
|
1709
|
+
"id": "FRM-SA-11",
|
|
1710
|
+
"family": "SA",
|
|
1711
|
+
"nist_control_id": "SA-11",
|
|
1712
|
+
"title": "Developer Testing and Evaluation",
|
|
1713
|
+
"description": "Require the developer of the system to create and implement a security and privacy assessment plan. Perform testing and evaluation at a depth and coverage sufficient to confirm the system meets security and privacy requirements.",
|
|
1714
|
+
"fedramp_parameters": {},
|
|
1715
|
+
"fedramp_additional_requirements": "Developer testing must include SAST, DAST, and SCA. Test results must be available for 3PAO review.",
|
|
1716
|
+
"priority": "P1",
|
|
1717
|
+
"baseline": "moderate"
|
|
1718
|
+
},
|
|
1719
|
+
{
|
|
1720
|
+
"id": "FRM-SC-1",
|
|
1721
|
+
"family": "SC",
|
|
1722
|
+
"nist_control_id": "SC-1",
|
|
1723
|
+
"title": "System and Communications Protection Policy and Procedures",
|
|
1724
|
+
"description": "Develop, document, and disseminate a system and communications protection policy and associated procedures.",
|
|
1725
|
+
"fedramp_parameters": {
|
|
1726
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1727
|
+
"procedure_review_frequency": "at least annually"
|
|
1728
|
+
},
|
|
1729
|
+
"fedramp_additional_requirements": "",
|
|
1730
|
+
"priority": "P1",
|
|
1731
|
+
"baseline": "moderate"
|
|
1732
|
+
},
|
|
1733
|
+
{
|
|
1734
|
+
"id": "FRM-SC-5",
|
|
1735
|
+
"family": "SC",
|
|
1736
|
+
"nist_control_id": "SC-5",
|
|
1737
|
+
"title": "Denial-of-Service Protection",
|
|
1738
|
+
"description": "Protect against or limit the effects of denial-of-service attacks by employing security safeguards or leveraging external service providers.",
|
|
1739
|
+
"fedramp_parameters": {},
|
|
1740
|
+
"fedramp_additional_requirements": "CSP must implement DDoS mitigation capabilities (e.g., AWS Shield, CloudFlare, or equivalent).",
|
|
1741
|
+
"priority": "P1",
|
|
1742
|
+
"baseline": "moderate"
|
|
1743
|
+
},
|
|
1744
|
+
{
|
|
1745
|
+
"id": "FRM-SC-7",
|
|
1746
|
+
"family": "SC",
|
|
1747
|
+
"nist_control_id": "SC-7",
|
|
1748
|
+
"title": "Boundary Protection",
|
|
1749
|
+
"description": "Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system. Implement subnetworks for publicly accessible system components that are physically or logically separated from internal organizational networks.",
|
|
1750
|
+
"fedramp_parameters": {},
|
|
1751
|
+
"fedramp_additional_requirements": "CSP must implement WAF for web-facing components. Network architecture must enforce DMZ or equivalent segmentation between public-facing and internal components.",
|
|
1752
|
+
"priority": "P1",
|
|
1753
|
+
"baseline": "moderate"
|
|
1754
|
+
},
|
|
1755
|
+
{
|
|
1756
|
+
"id": "FRM-SC-7(3)",
|
|
1757
|
+
"family": "SC",
|
|
1758
|
+
"nist_control_id": "SC-7(3)",
|
|
1759
|
+
"title": "Boundary Protection | Access Points",
|
|
1760
|
+
"description": "Limit the number of external network connections to the system.",
|
|
1761
|
+
"fedramp_parameters": {},
|
|
1762
|
+
"fedramp_additional_requirements": "",
|
|
1763
|
+
"priority": "P1",
|
|
1764
|
+
"baseline": "moderate"
|
|
1765
|
+
},
|
|
1766
|
+
{
|
|
1767
|
+
"id": "FRM-SC-7(4)",
|
|
1768
|
+
"family": "SC",
|
|
1769
|
+
"nist_control_id": "SC-7(4)",
|
|
1770
|
+
"title": "Boundary Protection | External Telecommunications Services",
|
|
1771
|
+
"description": "Implement a managed interface for each external telecommunication service. Establish a traffic flow policy for each managed interface.",
|
|
1772
|
+
"fedramp_parameters": {},
|
|
1773
|
+
"fedramp_additional_requirements": "",
|
|
1774
|
+
"priority": "P1",
|
|
1775
|
+
"baseline": "moderate"
|
|
1776
|
+
},
|
|
1777
|
+
{
|
|
1778
|
+
"id": "FRM-SC-7(5)",
|
|
1779
|
+
"family": "SC",
|
|
1780
|
+
"nist_control_id": "SC-7(5)",
|
|
1781
|
+
"title": "Boundary Protection | Deny by Default — Allow by Exception",
|
|
1782
|
+
"description": "Deny network communications traffic by default and allow network communications traffic by exception at managed interfaces.",
|
|
1783
|
+
"fedramp_parameters": {},
|
|
1784
|
+
"fedramp_additional_requirements": "Default-deny firewall rules must be in place for all managed interfaces including cloud security groups and NACLs.",
|
|
1785
|
+
"priority": "P1",
|
|
1786
|
+
"baseline": "moderate"
|
|
1787
|
+
},
|
|
1788
|
+
{
|
|
1789
|
+
"id": "FRM-SC-8",
|
|
1790
|
+
"family": "SC",
|
|
1791
|
+
"nist_control_id": "SC-8",
|
|
1792
|
+
"title": "Transmission Confidentiality and Integrity",
|
|
1793
|
+
"description": "Protect the confidentiality and integrity of transmitted information.",
|
|
1794
|
+
"fedramp_parameters": {
|
|
1795
|
+
"encryption_standard": "FIPS-validated TLS 1.2 or higher"
|
|
1796
|
+
},
|
|
1797
|
+
"fedramp_additional_requirements": "All data in transit must be encrypted. This includes internal service-to-service communications within the authorization boundary.",
|
|
1798
|
+
"priority": "P1",
|
|
1799
|
+
"baseline": "moderate"
|
|
1800
|
+
},
|
|
1801
|
+
{
|
|
1802
|
+
"id": "FRM-SC-8(1)",
|
|
1803
|
+
"family": "SC",
|
|
1804
|
+
"nist_control_id": "SC-8(1)",
|
|
1805
|
+
"title": "Transmission Confidentiality and Integrity | Cryptographic Protection",
|
|
1806
|
+
"description": "Implement cryptographic mechanisms to prevent unauthorized disclosure and detect changes to information during transmission.",
|
|
1807
|
+
"fedramp_parameters": {
|
|
1808
|
+
"cryptographic_standard": "FIPS 140-2 validated modules"
|
|
1809
|
+
},
|
|
1810
|
+
"fedramp_additional_requirements": "",
|
|
1811
|
+
"priority": "P1",
|
|
1812
|
+
"baseline": "moderate"
|
|
1813
|
+
},
|
|
1814
|
+
{
|
|
1815
|
+
"id": "FRM-SC-12",
|
|
1816
|
+
"family": "SC",
|
|
1817
|
+
"nist_control_id": "SC-12",
|
|
1818
|
+
"title": "Cryptographic Key Establishment and Management",
|
|
1819
|
+
"description": "Establish and manage cryptographic keys when cryptography is employed within the system in accordance with applicable laws, policies, and standards.",
|
|
1820
|
+
"fedramp_parameters": {},
|
|
1821
|
+
"fedramp_additional_requirements": "Key management must use FIPS-validated key management technology. AWS KMS or equivalent HSM-backed key management is acceptable.",
|
|
1822
|
+
"priority": "P1",
|
|
1823
|
+
"baseline": "moderate"
|
|
1824
|
+
},
|
|
1825
|
+
{
|
|
1826
|
+
"id": "FRM-SC-13",
|
|
1827
|
+
"family": "SC",
|
|
1828
|
+
"nist_control_id": "SC-13",
|
|
1829
|
+
"title": "Cryptographic Protection",
|
|
1830
|
+
"description": "Determine the cryptographic uses and type of cryptography required for each use in accordance with applicable laws, executive orders, directives, policies, regulations, and standards.",
|
|
1831
|
+
"fedramp_parameters": {
|
|
1832
|
+
"standard": "FIPS 140-2 Level 1 minimum for all cryptographic modules"
|
|
1833
|
+
},
|
|
1834
|
+
"fedramp_additional_requirements": "All cryptographic operations must use FIPS-validated cryptographic modules. Non-FIPS cryptography is not permitted for protecting federal data.",
|
|
1835
|
+
"priority": "P1",
|
|
1836
|
+
"baseline": "moderate"
|
|
1837
|
+
},
|
|
1838
|
+
{
|
|
1839
|
+
"id": "FRM-SC-15",
|
|
1840
|
+
"family": "SC",
|
|
1841
|
+
"nist_control_id": "SC-15",
|
|
1842
|
+
"title": "Collaborative Computing Devices and Applications",
|
|
1843
|
+
"description": "Prohibit remote activation of collaborative computing devices and applications and provide an explicit indication of use to users physically present at the devices.",
|
|
1844
|
+
"fedramp_parameters": {},
|
|
1845
|
+
"fedramp_additional_requirements": "",
|
|
1846
|
+
"priority": "P1",
|
|
1847
|
+
"baseline": "moderate"
|
|
1848
|
+
},
|
|
1849
|
+
{
|
|
1850
|
+
"id": "FRM-SC-20",
|
|
1851
|
+
"family": "SC",
|
|
1852
|
+
"nist_control_id": "SC-20",
|
|
1853
|
+
"title": "Secure Name/Address Resolution Service (Authoritative Source)",
|
|
1854
|
+
"description": "Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.",
|
|
1855
|
+
"fedramp_parameters": {},
|
|
1856
|
+
"fedramp_additional_requirements": "DNSSEC must be implemented for all authoritative DNS zones.",
|
|
1857
|
+
"priority": "P1",
|
|
1858
|
+
"baseline": "moderate"
|
|
1859
|
+
},
|
|
1860
|
+
{
|
|
1861
|
+
"id": "FRM-SC-21",
|
|
1862
|
+
"family": "SC",
|
|
1863
|
+
"nist_control_id": "SC-21",
|
|
1864
|
+
"title": "Secure Name/Address Resolution Service (Recursive or Caching Resolver)",
|
|
1865
|
+
"description": "Request and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.",
|
|
1866
|
+
"fedramp_parameters": {},
|
|
1867
|
+
"fedramp_additional_requirements": "",
|
|
1868
|
+
"priority": "P1",
|
|
1869
|
+
"baseline": "moderate"
|
|
1870
|
+
},
|
|
1871
|
+
{
|
|
1872
|
+
"id": "FRM-SC-22",
|
|
1873
|
+
"family": "SC",
|
|
1874
|
+
"nist_control_id": "SC-22",
|
|
1875
|
+
"title": "Architecture and Provisioning for Name/Address Resolution Service",
|
|
1876
|
+
"description": "Ensure the systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.",
|
|
1877
|
+
"fedramp_parameters": {},
|
|
1878
|
+
"fedramp_additional_requirements": "",
|
|
1879
|
+
"priority": "P1",
|
|
1880
|
+
"baseline": "moderate"
|
|
1881
|
+
},
|
|
1882
|
+
{
|
|
1883
|
+
"id": "FRM-SC-28",
|
|
1884
|
+
"family": "SC",
|
|
1885
|
+
"nist_control_id": "SC-28",
|
|
1886
|
+
"title": "Protection of Information at Rest",
|
|
1887
|
+
"description": "Protect the confidentiality and integrity of information at rest.",
|
|
1888
|
+
"fedramp_parameters": {
|
|
1889
|
+
"encryption_standard": "AES-256 or equivalent FIPS-validated encryption"
|
|
1890
|
+
},
|
|
1891
|
+
"fedramp_additional_requirements": "All data at rest containing federal information must be encrypted. This includes databases, object storage, block storage, and backups.",
|
|
1892
|
+
"priority": "P1",
|
|
1893
|
+
"baseline": "moderate"
|
|
1894
|
+
},
|
|
1895
|
+
{
|
|
1896
|
+
"id": "FRM-SC-28(1)",
|
|
1897
|
+
"family": "SC",
|
|
1898
|
+
"nist_control_id": "SC-28(1)",
|
|
1899
|
+
"title": "Protection of Information at Rest | Cryptographic Protection",
|
|
1900
|
+
"description": "Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of information at rest on FedRAMP-defined system components.",
|
|
1901
|
+
"fedramp_parameters": {
|
|
1902
|
+
"cryptographic_standard": "FIPS 140-2 validated modules"
|
|
1903
|
+
},
|
|
1904
|
+
"fedramp_additional_requirements": "",
|
|
1905
|
+
"priority": "P1",
|
|
1906
|
+
"baseline": "moderate"
|
|
1907
|
+
},
|
|
1908
|
+
{
|
|
1909
|
+
"id": "FRM-SC-39",
|
|
1910
|
+
"family": "SC",
|
|
1911
|
+
"nist_control_id": "SC-39",
|
|
1912
|
+
"title": "Process Isolation",
|
|
1913
|
+
"description": "Maintain a separate execution domain for each executing system process.",
|
|
1914
|
+
"fedramp_parameters": {},
|
|
1915
|
+
"fedramp_additional_requirements": "Process isolation must extend to tenant workload isolation in multi-tenant environments using container isolation, VM isolation, or equivalent mechanisms.",
|
|
1916
|
+
"priority": "P1",
|
|
1917
|
+
"baseline": "moderate"
|
|
1918
|
+
},
|
|
1919
|
+
{
|
|
1920
|
+
"id": "FRM-SI-1",
|
|
1921
|
+
"family": "SI",
|
|
1922
|
+
"nist_control_id": "SI-1",
|
|
1923
|
+
"title": "System and Information Integrity Policy and Procedures",
|
|
1924
|
+
"description": "Develop, document, and disseminate a system and information integrity policy and associated procedures.",
|
|
1925
|
+
"fedramp_parameters": {
|
|
1926
|
+
"policy_review_frequency": "at least every 3 years",
|
|
1927
|
+
"procedure_review_frequency": "at least annually"
|
|
1928
|
+
},
|
|
1929
|
+
"fedramp_additional_requirements": "",
|
|
1930
|
+
"priority": "P1",
|
|
1931
|
+
"baseline": "moderate"
|
|
1932
|
+
},
|
|
1933
|
+
{
|
|
1934
|
+
"id": "FRM-SI-2",
|
|
1935
|
+
"family": "SI",
|
|
1936
|
+
"nist_control_id": "SI-2",
|
|
1937
|
+
"title": "Flaw Remediation",
|
|
1938
|
+
"description": "Identify, report, and correct system flaws. Install security-relevant software and firmware updates within a FedRAMP-defined time period of the release of the updates.",
|
|
1939
|
+
"fedramp_parameters": {
|
|
1940
|
+
"critical_patch_time": "within 30 days of release",
|
|
1941
|
+
"high_patch_time": "within 30 days of release",
|
|
1942
|
+
"moderate_patch_time": "within 90 days of release"
|
|
1943
|
+
},
|
|
1944
|
+
"fedramp_additional_requirements": "Patch compliance must be reported monthly as part of continuous monitoring deliverables.",
|
|
1945
|
+
"priority": "P1",
|
|
1946
|
+
"baseline": "moderate"
|
|
1947
|
+
},
|
|
1948
|
+
{
|
|
1949
|
+
"id": "FRM-SI-2(2)",
|
|
1950
|
+
"family": "SI",
|
|
1951
|
+
"nist_control_id": "SI-2(2)",
|
|
1952
|
+
"title": "Flaw Remediation | Automated Flaw Remediation Status",
|
|
1953
|
+
"description": "Determine if system components have applicable security-relevant software and firmware updates installed using automated mechanisms at a FedRAMP-defined frequency.",
|
|
1954
|
+
"fedramp_parameters": {
|
|
1955
|
+
"check_frequency": "at least monthly"
|
|
1956
|
+
},
|
|
1957
|
+
"fedramp_additional_requirements": "",
|
|
1958
|
+
"priority": "P1",
|
|
1959
|
+
"baseline": "moderate"
|
|
1960
|
+
},
|
|
1961
|
+
{
|
|
1962
|
+
"id": "FRM-SI-3",
|
|
1963
|
+
"family": "SI",
|
|
1964
|
+
"nist_control_id": "SI-3",
|
|
1965
|
+
"title": "Malicious Code Protection",
|
|
1966
|
+
"description": "Implement signature-based and non-signature-based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.",
|
|
1967
|
+
"fedramp_parameters": {
|
|
1968
|
+
"signature_update_frequency": "at least daily or as updates become available"
|
|
1969
|
+
},
|
|
1970
|
+
"fedramp_additional_requirements": "Anti-malware must cover all endpoints including servers and workstations. Container image scanning for malware is required.",
|
|
1971
|
+
"priority": "P1",
|
|
1972
|
+
"baseline": "moderate"
|
|
1973
|
+
},
|
|
1974
|
+
{
|
|
1975
|
+
"id": "FRM-SI-4",
|
|
1976
|
+
"family": "SI",
|
|
1977
|
+
"nist_control_id": "SI-4",
|
|
1978
|
+
"title": "System Monitoring",
|
|
1979
|
+
"description": "Monitor the system to detect attacks and indicators of potential attacks, unauthorized local, network, and remote connections, and to identify unauthorized use of the system.",
|
|
1980
|
+
"fedramp_parameters": {},
|
|
1981
|
+
"fedramp_additional_requirements": "System monitoring must include IDS/IPS capabilities at authorization boundary. Monitoring alerts must be integrated with incident response procedures.",
|
|
1982
|
+
"priority": "P1",
|
|
1983
|
+
"baseline": "moderate"
|
|
1984
|
+
},
|
|
1985
|
+
{
|
|
1986
|
+
"id": "FRM-SI-4(2)",
|
|
1987
|
+
"family": "SI",
|
|
1988
|
+
"nist_control_id": "SI-4(2)",
|
|
1989
|
+
"title": "System Monitoring | Automated Tools and Mechanisms for Real-Time Analysis",
|
|
1990
|
+
"description": "Employ automated tools and mechanisms to support near real-time analysis of events.",
|
|
1991
|
+
"fedramp_parameters": {},
|
|
1992
|
+
"fedramp_additional_requirements": "SIEM or equivalent automated analysis tool is required. Real-time alerting for critical events must be implemented.",
|
|
1993
|
+
"priority": "P1",
|
|
1994
|
+
"baseline": "moderate"
|
|
1995
|
+
},
|
|
1996
|
+
{
|
|
1997
|
+
"id": "FRM-SI-4(4)",
|
|
1998
|
+
"family": "SI",
|
|
1999
|
+
"nist_control_id": "SI-4(4)",
|
|
2000
|
+
"title": "System Monitoring | Inbound and Outbound Communications Traffic",
|
|
2001
|
+
"description": "Analyze inbound and outbound communications traffic to identify unusual or unauthorized activities or conditions.",
|
|
2002
|
+
"fedramp_parameters": {},
|
|
2003
|
+
"fedramp_additional_requirements": "",
|
|
2004
|
+
"priority": "P1",
|
|
2005
|
+
"baseline": "moderate"
|
|
2006
|
+
},
|
|
2007
|
+
{
|
|
2008
|
+
"id": "FRM-SI-4(5)",
|
|
2009
|
+
"family": "SI",
|
|
2010
|
+
"nist_control_id": "SI-4(5)",
|
|
2011
|
+
"title": "System Monitoring | System-Generated Alerts",
|
|
2012
|
+
"description": "Alert personnel or roles when system-generated indications of compromise or potential compromise occur.",
|
|
2013
|
+
"fedramp_parameters": {
|
|
2014
|
+
"alert_recipients": "ISSO and SOC within 15 minutes of detection"
|
|
2015
|
+
},
|
|
2016
|
+
"fedramp_additional_requirements": "",
|
|
2017
|
+
"priority": "P1",
|
|
2018
|
+
"baseline": "moderate"
|
|
2019
|
+
},
|
|
2020
|
+
{
|
|
2021
|
+
"id": "FRM-SI-5",
|
|
2022
|
+
"family": "SI",
|
|
2023
|
+
"nist_control_id": "SI-5",
|
|
2024
|
+
"title": "Security Alerts, Advisories, and Directives",
|
|
2025
|
+
"description": "Receive system security alerts, advisories, and directives from designated external organizations on an ongoing basis. Generate internal security alerts, advisories, and directives. Disseminate to designated personnel, roles, and/or organizational elements.",
|
|
2026
|
+
"fedramp_parameters": {},
|
|
2027
|
+
"fedramp_additional_requirements": "CSP must monitor US-CERT alerts and apply relevant directives. FedRAMP operational requirements directives must be implemented within specified timeframes.",
|
|
2028
|
+
"priority": "P1",
|
|
2029
|
+
"baseline": "moderate"
|
|
2030
|
+
},
|
|
2031
|
+
{
|
|
2032
|
+
"id": "FRM-SI-10",
|
|
2033
|
+
"family": "SI",
|
|
2034
|
+
"nist_control_id": "SI-10",
|
|
2035
|
+
"title": "Information Input Validation",
|
|
2036
|
+
"description": "Check the validity of information inputs to the system.",
|
|
2037
|
+
"fedramp_parameters": {},
|
|
2038
|
+
"fedramp_additional_requirements": "All web application inputs must be validated. Input validation must include protection against injection attacks (SQL, LDAP, OS command, XSS).",
|
|
2039
|
+
"priority": "P1",
|
|
2040
|
+
"baseline": "moderate"
|
|
2041
|
+
},
|
|
2042
|
+
{
|
|
2043
|
+
"id": "FRM-SI-11",
|
|
2044
|
+
"family": "SI",
|
|
2045
|
+
"nist_control_id": "SI-11",
|
|
2046
|
+
"title": "Error Handling",
|
|
2047
|
+
"description": "Generate error messages that provide information necessary for corrective actions without revealing information that could be exploited.",
|
|
2048
|
+
"fedramp_parameters": {},
|
|
2049
|
+
"fedramp_additional_requirements": "Error messages must not reveal internal system architecture, software versions, stack traces, or database query structures.",
|
|
2050
|
+
"priority": "P2",
|
|
2051
|
+
"baseline": "moderate"
|
|
2052
|
+
},
|
|
2053
|
+
{
|
|
2054
|
+
"id": "FRM-SI-12",
|
|
2055
|
+
"family": "SI",
|
|
2056
|
+
"nist_control_id": "SI-12",
|
|
2057
|
+
"title": "Information Management and Retention",
|
|
2058
|
+
"description": "Manage and retain information within the system and information output from the system in accordance with applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and operational requirements.",
|
|
2059
|
+
"fedramp_parameters": {},
|
|
2060
|
+
"fedramp_additional_requirements": "Data retention policies must address federal record-keeping requirements and be documented in the SSP.",
|
|
2061
|
+
"priority": "P2",
|
|
2062
|
+
"baseline": "moderate"
|
|
2063
|
+
},
|
|
2064
|
+
{
|
|
2065
|
+
"id": "FRM-SI-16",
|
|
2066
|
+
"family": "SI",
|
|
2067
|
+
"nist_control_id": "SI-16",
|
|
2068
|
+
"title": "Memory Protection",
|
|
2069
|
+
"description": "Implement the following controls to protect the system memory from unauthorized code execution: data execution prevention, address space layout randomization, and other FedRAMP-approved memory protection mechanisms.",
|
|
2070
|
+
"fedramp_parameters": {
|
|
2071
|
+
"protection_mechanisms": "DEP, ASLR, stack canaries"
|
|
2072
|
+
},
|
|
2073
|
+
"fedramp_additional_requirements": "",
|
|
2074
|
+
"priority": "P1",
|
|
2075
|
+
"baseline": "moderate"
|
|
2076
|
+
},
|
|
2077
|
+
{
|
|
2078
|
+
"id": "FRM-SR-1",
|
|
2079
|
+
"family": "SR",
|
|
2080
|
+
"nist_control_id": "SR-1",
|
|
2081
|
+
"title": "Supply Chain Risk Management Policy and Procedures",
|
|
2082
|
+
"description": "Develop, document, and disseminate a supply chain risk management policy and associated procedures.",
|
|
2083
|
+
"fedramp_parameters": {
|
|
2084
|
+
"policy_review_frequency": "at least every 3 years",
|
|
2085
|
+
"procedure_review_frequency": "at least annually"
|
|
2086
|
+
},
|
|
2087
|
+
"fedramp_additional_requirements": "",
|
|
2088
|
+
"priority": "P1",
|
|
2089
|
+
"baseline": "moderate"
|
|
2090
|
+
},
|
|
2091
|
+
{
|
|
2092
|
+
"id": "FRM-SR-2",
|
|
2093
|
+
"family": "SR",
|
|
2094
|
+
"nist_control_id": "SR-2",
|
|
2095
|
+
"title": "Supply Chain Risk Management Plan",
|
|
2096
|
+
"description": "Develop a plan for managing supply chain risks associated with the development, acquisition, maintenance, and disposal of systems, system components, and system services.",
|
|
2097
|
+
"fedramp_parameters": {},
|
|
2098
|
+
"fedramp_additional_requirements": "Supply chain risk management plan must address software supply chain risks including open source dependencies and third-party libraries.",
|
|
2099
|
+
"priority": "P1",
|
|
2100
|
+
"baseline": "moderate"
|
|
2101
|
+
},
|
|
2102
|
+
{
|
|
2103
|
+
"id": "FRM-SR-3",
|
|
2104
|
+
"family": "SR",
|
|
2105
|
+
"nist_control_id": "SR-3",
|
|
2106
|
+
"title": "Supply Chain Controls and Processes",
|
|
2107
|
+
"description": "Establish and apply a process for identifying and addressing weaknesses or deficiencies in the supply chain elements and processes.",
|
|
2108
|
+
"fedramp_parameters": {},
|
|
2109
|
+
"fedramp_additional_requirements": "CSP must maintain a software bill of materials (SBOM) for the cloud service offering.",
|
|
2110
|
+
"priority": "P1",
|
|
2111
|
+
"baseline": "moderate"
|
|
2112
|
+
},
|
|
2113
|
+
{
|
|
2114
|
+
"id": "FRM-SR-5",
|
|
2115
|
+
"family": "SR",
|
|
2116
|
+
"nist_control_id": "SR-5",
|
|
2117
|
+
"title": "Acquisition Strategies, Tools, and Methods",
|
|
2118
|
+
"description": "Employ acquisition strategies, contract tools, and procurement methods directed at reducing supply chain risk.",
|
|
2119
|
+
"fedramp_parameters": {},
|
|
2120
|
+
"fedramp_additional_requirements": "",
|
|
2121
|
+
"priority": "P1",
|
|
2122
|
+
"baseline": "moderate"
|
|
2123
|
+
},
|
|
2124
|
+
{
|
|
2125
|
+
"id": "FRM-SR-11",
|
|
2126
|
+
"family": "SR",
|
|
2127
|
+
"nist_control_id": "SR-11",
|
|
2128
|
+
"title": "Component Authenticity",
|
|
2129
|
+
"description": "Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system.",
|
|
2130
|
+
"fedramp_parameters": {},
|
|
2131
|
+
"fedramp_additional_requirements": "Software integrity verification (code signing, checksum validation) must be implemented for all software components.",
|
|
2132
|
+
"priority": "P2",
|
|
2133
|
+
"baseline": "moderate"
|
|
2134
|
+
},
|
|
2135
|
+
{
|
|
2136
|
+
"id": "FRM-PT-1",
|
|
2137
|
+
"family": "PT",
|
|
2138
|
+
"nist_control_id": "PT-1",
|
|
2139
|
+
"title": "Policy and Procedures for Personally Identifiable Information Processing and Transparency",
|
|
2140
|
+
"description": "Develop, document, and disseminate a policy for personally identifiable information processing and transparency and associated procedures.",
|
|
2141
|
+
"fedramp_parameters": {
|
|
2142
|
+
"policy_review_frequency": "at least every 3 years",
|
|
2143
|
+
"procedure_review_frequency": "at least annually"
|
|
2144
|
+
},
|
|
2145
|
+
"fedramp_additional_requirements": "",
|
|
2146
|
+
"priority": "P1",
|
|
2147
|
+
"baseline": "moderate"
|
|
2148
|
+
},
|
|
2149
|
+
{
|
|
2150
|
+
"id": "FRM-PT-2",
|
|
2151
|
+
"family": "PT",
|
|
2152
|
+
"nist_control_id": "PT-2",
|
|
2153
|
+
"title": "Authority to Process Personally Identifiable Information",
|
|
2154
|
+
"description": "Determine and document the legal authority that permits the collection, use, maintenance, and sharing of personally identifiable information (PII).",
|
|
2155
|
+
"fedramp_parameters": {},
|
|
2156
|
+
"fedramp_additional_requirements": "CSP must document all PII processing activities and their legal basis. Privacy Impact Assessment (PIA) required where applicable.",
|
|
2157
|
+
"priority": "P1",
|
|
2158
|
+
"baseline": "moderate"
|
|
2159
|
+
},
|
|
2160
|
+
{
|
|
2161
|
+
"id": "FRM-PT-3",
|
|
2162
|
+
"family": "PT",
|
|
2163
|
+
"nist_control_id": "PT-3",
|
|
2164
|
+
"title": "Personally Identifiable Information Processing Purposes",
|
|
2165
|
+
"description": "Identify and document the purposes for processing personally identifiable information.",
|
|
2166
|
+
"fedramp_parameters": {},
|
|
2167
|
+
"fedramp_additional_requirements": "Processing purposes must be limited to those explicitly authorized and documented. Purpose limitation must be technically enforced where feasible.",
|
|
2168
|
+
"priority": "P1",
|
|
2169
|
+
"baseline": "moderate"
|
|
2170
|
+
},
|
|
2171
|
+
{
|
|
2172
|
+
"id": "FRM-PT-4",
|
|
2173
|
+
"family": "PT",
|
|
2174
|
+
"nist_control_id": "PT-4",
|
|
2175
|
+
"title": "Consent",
|
|
2176
|
+
"description": "Implement mechanisms to obtain consent from individuals for the processing of their personally identifiable information.",
|
|
2177
|
+
"fedramp_parameters": {},
|
|
2178
|
+
"fedramp_additional_requirements": "Consent mechanisms must comply with applicable federal privacy requirements and be documented in the system's Privacy Impact Assessment.",
|
|
2179
|
+
"priority": "P1",
|
|
2180
|
+
"baseline": "moderate"
|
|
2181
|
+
}
|
|
2182
|
+
]
|
|
2183
|
+
}
|