SlideShare ist ein Scribd-Unternehmen logo
1 von 75
Federal Risk and Authorization
Management Program
(FedRAMP)

FedRAMP Security Authorization Package

September 2012
Agenda


•   Objectives
•   FedRAMP Process
•   Document Overview
•   Package Review Process
•   Control Examples




                             2
Federal CIO Memorandum: FedRAMP Goals


• Cost-effective, risk-based approach to cloud
  adoption
• Standardize security requirements
• Consistent, independent, third-party assessment
• Leverage security experts from DHS, DOD, and GSA
  to conduct a joint authorization
• Standardize contract language
• Repository of authorization packages



Source: VanRoekel, Steven. Federal CIO memorandum titled “Security Authorization
of Information Systems in Cloud Computing Environments” (Dec 8, 2011).

                                                                                   3
Objectives


• Understand federal security assessment
  documentation
• Clarify what makes a bad, good, or great
  description of a security control implementation
• Provide lessons learned in applying a risk-based
  approach to security control selection
• Ensure Cloud Service Providers (CSPs) have the
  knowledge to successfully implement FedRAMP




                                                     4
FedRAMP Process (CSP Perspective)

                                          • Initiation
                                             – Request FedRAMP Authorization
                                             – Define and agree on scope
                                          • Security Assessment
                                             – Document security controls
                                             – 3PAO assess security controls
                                          • Continuous Monitoring
                                             – Weakness Remediation
                                             – On-going control monitoring
                                             – Incident management
                                             – Data Feed Reporting



Source: Guide to Understanding FedRAMP,
Figure 2.1: FedRAMP Process

                                                                               5
Initiation: Starting the Process




http://www.fedramp.gov


                                    6
Initiation: Defining the Scope




FIPS 199 Categorization              Control Tailoring Workbook            Control Implementation Summary
• Define information types           • Define the security control         • Control implementation status
• Established security                 baseline                                    • In place
  categorization baseline            • Document unique control                     • Planned
      • Confidentiality                settings                                    • Somewhere in between
      • Integrity                    • Discuss exceptions and              • Clarify control implementation
      • Availability                   compensating controls                   roles and responsibilities
• Risk-based adjustments                                                           • Cloud service provider
                                                                                   • Customer
                                                                                   • Hybrid
                                                                                   • Inherited
                             Alternative Implementations: Enable innovation
                              and flexibility in addressing security controls.

                                                                                                              7
FIPS 199

                                                                                      NIST SP 800-60 Volume 1

• How do you intend for the cloud
  solution to be utilized?




                                                                  Risk-based
                                                                  Justification for   NIST SP 800-60 Volume 2
                                                                  deviating from
                                                                  recommendations



                                         CSP Selection

                                    Availability Recommendation
                        Integrity Recommendation
                Confidentiality Recommendation
       Information Type(s)




                                                                                                                8
Control Tailoring Workbook (CTW)

                                                       NIST SP 800-53 Revision 3

• Based on FIPS 199 Security Categorization
  (Low or Moderate)

• CSP intention in meeting or exceeding
  FedRAMP parameter settings
• CSP intention to deviate from control
  baseline
   • Unique and/or innovative control
      tailoring
                                                   FedRAMP Control Reference (Tri-Fold)
   • Exceptions and associated
      compensating control decisions


 Encouraging innovation by meeting the intent of
     a control if not the specific language.




                                                                                          9
Control Implementation Summary (CIS)

                            Control Origination       Definition                               Example

• Who is doing what?        Service Provider
                            Corporate
                                                      A control that originates from the CSP
                                                      corporate network.
                                                                                               DNS from the corporate network
                                                                                               provides address resolution
   • CSP                                                                                       services for the information
                                                                                               system and the service offering.
   • Customer               Service Provider          A control specific to a particular       A unique host based intrusion
   • Hybrid                 System Specific           system at the CSP and the control is
                                                      not part of the service provider
                                                                                               detection system (HIDs) is
                                                                                               available on the service offering
                                                      corporate controls.                      platform but is not available on the
                                                                                               corporate network.
• CSP responsibilities      Service Provider Hybrid   A control that makes use of both         Scans of the corporate network
  should be clearly                                   corporate controls and additional        infrastructure; scans of databases
                                                      controls specific to a particular        and web based application are
  described in the System                             system at the CSP.                       system specific.

  Security Plan (SSP) and   Configured by             A control where the customer needs       User profiles, policy/audit
                            Customer                  to apply a configuration in order to     configurations, enabling/disabling
  supporting plans and                                meet the control requirement.            key switches (e.g., enable/disable
                                                                                               http or https, etc.), entering an IP
  procedures                                                                                   range specific to their organization
                                                                                               are configurable by the customer.
                            Provided by Customer      A control where the customer needs       The customer provides a SAML
• Customer                                            to provide additional hardware or        SSO solution to implement two-
                                                      software in order to meet the control    factor authentication.
  responsibilities should                             requirement.
  be clearly described in   Shared                    A control that is managed and            Security awareness training must
                                                      implemented partially by the CSP and     be conducted by both the CSP and
  the User Guide (SSP,                                partially by the customer.               the customer.
  Appendix 2)               Inherited from pre-       A control that is inherited from         A PaaS or SaaS provider inherits PE
                            existing Provisional      another CSP system that has already      controls from an IaaS provider.
                            Authorization             received a Security Authorization.


                                                                                                                                      10
Control Implementation Summary (CIS)

• Current implementation
  status                   Implementation Status   Definition                         Example
• Elaborated on in the     Implemented             Control is implemented and         The control clearly states who,
  SSP                                              operating as intended.             what, when and how a control
                                                                                      is implemented.

                           Partially               Some elements of the control are   Not all elements of a control
                           Implemented             implemented and operating as       are met however compensating
                                                   intended.                          controls are in place and a plan
                                                                                      of action and milestone is in
                                                                                      place to address the gap.
                           Planned                 Control is scheduled for           A new operating system will be
                                                   implementation.                    available in 6 months which
                                                                                      may provide additional
                                                                                      functionality.
                           Alternative             Control may not be implemented     The CSP describes a solution
                           implementation          as stated by NIST and FedRAMP,     which they believes meets or
                                                   however, the CSP believes the      exceeds the control
                                                   intent of the control is meant.    requirement.


                           Not applicable          The control is not implemented     Wireless controls may not be
                                                   based on the cloud design.         applicable for a system that
                                                                                      does not use wireless
                                                                                      technology.




                                                                                                                         11
Kick-off Meeting




                                       • Establish points of
                                         contact/roles
                                       • Clarify
                                         Communication
                                       • Readiness Discussion
                                       • Process and Template
                                         Overview
                                       • Target Timeline




       Define the Boundary/Scope of the Solution


                                                                12
Kick-off Meeting: Boundary Definition


                      System Boundary
                                                                           Internet




                                                  Protection
                                                  Boundary
                                                                       Outside System Boundary




                                                  Protection
                                                  Boundary




Legend                          The boundary visual is important for putting
         System
                                     your security controls in context
         Not System


                                                                                                 13
Document Marking

Guide to Understanding FedRAMP, Section 5.2

Ensure that all documents have sensitivity markings on at least the cover
page and the footer of each document. You may change the existing
sensitivity marking on any template to match your official company
sensitivity nomenclature if it is different than what is on the template.
Optionally, you may also put your sensitivity markings on the headers or
footers of any documents and on any other places in the documents where
you feel sensitivity markings should be placed.




                                                                            14
Initiation: Deliverable Summary

Deliverable                               Description
FedRAMP Initiation Request                The FedRAMP request form is used by Federal agencies and CSPs to
(online link)                             request initiation of the FedRAMP security assessment process.

FIPS 199 Categorization                   The FIPS 199 Security categorization is used to determine the
(template available)                      impact level to be supported by the cloud information
                                          system/service. The provider categorizes their system based on the
                                          data types currently stored and not leveraging agency data.

Control Tailoring Workbook                This document is used by CSP to document their control
(template available)                      implementation and define their implementation settings for
                                          FedRAMP defined parameters and any compensating controls.

Control Implementation                    This document summarizes the control ownership and indicates
Summary                                   which controls are owned and managed by the CSP and which
(template available)                      controls are owned and managed by the leveraging agency.



Source: FedRAMP Concept of Operations (CONOPS), Table 6-1.

                                                                                                               15
Security Assessment: Overview




FedRAMP System Security Plan    Security Assessment Plan            Security Assessment Report
• Document what you are doing   • Test plan and procedures          • Test Results
• Optional: Document what you   • Tailored to cloud solution        • Statement of outstanding
  intend to do                  • Developed by 3PAO in                vulnerabilities and risk
• Completed by the CSP            collaboration CSP


                                           Third-party Assessment Organization (3PAO)
                                                           Deliverables

                                                    Not Covered in this training




                                                                                                 16
System Security Plan (SSP)


                         • Provides the big picture view
                         • Links the security
                           implementation into a
                           cohesive solution
                         • Clearly and consistently
                           documents security control
                           implementation
                         • Resource for the “boots on the
                           ground”
                         • Provides continuity for staff in
                           management of security
                           controls




                                                              17
Why 352 Page SSP Template?


• Eliminate variability in responses
     • Easier to document
     • Easier to read
     • Faster to evaluate
• Encourage federal-wide adoption
     • Leverage NIST standards
     • Existing federal education
     • Maximize re-use
• Eliminate common mistakes
     • Structure responses
     • Allow for detailed responses



                        Document what you are already doing.
                    Identify gaps in what you may have overlooked.


                                                                     18
SSP Overview


                                    Grouped into three (3) main areas


                  Scope                                   Controls                   Appendices

       • System                                 • 18 Control                      • Policies
         Description                              Families                        • Supporting plans
       • Points of Contact                      • Risk-based                        and procedures
       • Boundary                                 control selection               • Rules of
         Definition                             • Control tailoring                 Behavior
       • Interconnections



Note: Based on NIST Special Publication SP) 800-18 Rev. 1, Guide for Developing
Security Plans for Federal Information Systems

                                                                                                       19
SSP Scope

Initiation Deliverables                     Policies
• FIPS 199                                  • Supporting Policies
• Control Implementation
   Summary (CIS)                                         Leveraging existing vendor
• Control Tailoring Workbook                              policies and procedures
   (CTW)                                                    whenever possible.
                                    System
                                 Security Plan
                                     (SSP)


New Deliverables
                                           Supporting Plans and Procedures
• e-Authentication Worksheet (e-Auth)
                                           • Continuous Monitoring Plan and
• Draft Privacy Threshold Analysis
                                             Strategy
  (PTA)
                                           • Configuration Management Plan
• Draft Privacy Impact Assessment
                                           • Contingency Plan
  (PIA)
                                           • Incident Response Plan
• Rules of Behavior (RoB)
                                           • User Guide

                                                                                      20
E-Authentication Worksheet
                                                                       NIST SP 800-63



• Determine if e-Authentication
  requirements apply
• Determine applicable level of e-
  Authentication
Level 1: Little or no confidence in the asserted identity’s validity
Level 2: Some confidence in the asserted identity’s validity
Level 3: High confidence in the asserted identity’s validity
Level 4: Very high confidence in asserted identity’s validity


                                                                        OMB M-04-04




                                                                                        21
E-Authentication Worksheet

OMB M-04-04, Table 1: Maximum Potential Impacts for Each Assurance Level
                                                            Assurance Level Impact Profile

Potential Impact Categories for Authentication        1            2            3             4
Errors
Inconvenience, distress or damage to standing or     Low          Low          Mod           High
reputation

Financial loss or agency liability                   Low          Mod          Mod           High

Harm to agency programs or public interests          N/A          Low          Mod           High

Unauthorized release of sensitive information        N/A          Low          Mod           High

Personal Safety                                      N/A          N/A          Low       Mod, High

Civil or criminal violations                         N/A          Low          Mod           High



         Where does it affect
         the SSP?
         • Section 2.3
         • Section 17
              • IA-2
              • IA-5
              • IA-8                                       NIST SP 800-63



                                                                                                     22
SSP Points of Contact


• Information System Owner (ISO)
• Information System Security Officer (ISSO)
• Authorizing Official (AO)
• Others (depending on CSP approach)
     • Architect
     • Engineer
     • Manager
     • Technical




                                               23
SSP Descriptors

• Type of Cloud Implementation
• Leveraging any other Security Authorization Packages
  (inheriting controls)
• System Function/Purpose
     • Ensure alignment with the information types previously
       defined
• Types of Users
     • Be consistent with the roles defined in Section 9.3 and
       used throughout the SSP and supporting documents
• Boundary Discussion
     • Be consistent and complete in describing to ensure
       alignment throughout the SSP
     • If you can’t describe it, why should anyone believe you can
       protect it.
     • Should align to any diagrams presented previously             24
Describing the Boundary


                      System Boundary
                                                                     Internet
                                         Network
                                        Inventory

                                                    Ports,
                                                    Protocols
                                                    and Services
       Network
       Architecture                                                Outside System Boundary



           Hardware                Software
           Inventory               Inventory


                                                                   System Interconnections


• Understand where users fit within the boundary – e.g., end users,
  administrators, security operations, and remote maintenance.


                                                                                             25
Review Standards

• Each document is verified for compliance with FedRAMP
  policy and consistency with other package documents

• Review expects responses to be:
    • Unambiguous
    • Specific
    • Complete
    • Comprehensible

• The SSP Template is designed to help achieve expected results




                                                                  26
Grading Standard (Notional)

• Pass (P):
   – All applicable document criteria are satisfied
• Fail (F):
   – Only some (or zero) applicable document criteria are satisfied
• Pass with Comments (PC):
   – Document criteria are satisfied in principle, but additional detail would
       yield a more complete response
   – Reviewer will specify the additional information to be included
• Not Applicable (N/A)
   – Requirement does not apply based on system characteristics and
       accreditation boundary (e.g., some requirements of AC-18 are N/A for
       non-wireless systems)




                                                                                 27
Structure of a Good Response

Reviewer assesses submission content in the context of four (4) criteria :
    1. What is the documented solution?
    2. Who is the responsible party for solution management?
    3. When is the solution reviewed or monitored for effectiveness?
    4. How does the solution meet applicable security requirements?


Reference applicable documentation

• Policy, SOPs, Rules of Behavior, common control catalogs, waivers,
  exceptions, etc.
• Any referenced documentation should be appended to the SSP, with a
  rationale for their inclusion also clearly stated in the control implementation
  paragraph, ensure that the control language aligns with any referenced
  internal policies, procedures, and/or standards.



                                                                                    28
References


Internal References to another part of the same document are
   acceptable provided that each reference:
    • Includes section number
    • Is relevant to the referring section of the document

External References to other documents are acceptable provided that
   each reference:
    • Includes the full title, current version number, and release date
      of the referenced document
    • Briefly explains the rationale for the reference

    Note: If the reference does not pertain to the referring section, the
    corresponding checklist item will be graded “Fail”




                                                                            29
CONTROL EXAMPLES



 Please do not copy these examples into your system
 security plans verbatim. Copying these examples as
written is an early indicator that the proper due diligence
wasn’t applied in the analyzing and documenting security
                          controls.


                                                              30
AC-1: Access Control Policy and Procedures


The organization develops, disseminates, and reviews/updates [Assignment:
org-defined frequency]:

a. A formal, documented access control policy that addresses purpose,
   scope, roles, responsibilities, management commitment, coordination
   among organizational entities, and compliance; and

b. Formal, documented procedures to facilitate the implementation of the
   access control policy and associated controls.




                                                                            31
AC-1: Poor Response

Implementation:

System XX has an access control policy that is consistent with applicable federal laws,
directives, policies, regulations, standards, and guidance. It is updated annually.

The System Administrators and <CSP> management team personnel post notes and send
e-mail notifications to System XX users. System XX User and Administrator Guides are
periodically updated as new versions are released.




                                                                                          32
AC-1 : Good Response

Implementation:

(a) System XX’s Access Control Policy is listed in <CSP> Document ABC and includes
definitions of the purpose, scope, roles, responsibilities, and compliance requirements
for all <CSP> employees. Section 5.2 of Document ABC presents the <CSP> access
control policy. Section 5.2 of <CSP> handbook addresses roles and responsibilities.
Section 5.2 of Document ABC addresses the management commitment, coordination
among customer entities, and compliance related to access control.

The access control policy is consistent with the organization’s mission and functions
and with applicable laws, directives, policies, regulations, standards, and guidance.
The access control policy is reviewed and updated, when necessary, by the XX ISSO at
least annually.




                                                                                          33
AC-1: Good Response (continued)

(b) The access control procedures for System X are documented in organization
Document ABC, organization Document XYZ, and User Guide B; and are consistent with
applicable laws, Executive Orders, directives, policies, regulations, standards, and
guidance.

The access control procedures address all areas identified in the access control policy and
address achieving policy-compliance implementations of all associated controls. The
access control procedures are reviewed and updated, when necessary, by the XX ISSO at
least annually.

Access control policy and procedure documents are maintained on the <CSP> internal
SharePoint site, and are available for review up on request.




                                                                                              34
AC-7: Unsuccessful Login Attempts

The information system:

a. Enforces a limit of [Assignment: organization-defined number] consecutive
invalid login attempts by a user during a [Assignment: organization-defined time
period]; and

b. Automatically [Selection: locks the account/node for an [Assignment:
organization-defined time period]; locks the account/node until released by an
administrator; delays next login prompt according to [Assignment: organization-
defined delay algorithm]] when the maximum number of unsuccessful attempts
is exceeded. The control applies regardless of whether the login occurs via a
local or network connection.




                                                                                   35
AC-7: Poor Response

Implementation:
(a)(b) This control is partially inherited from the Data Center. Please see 'Appendix
A: Data Center Declaration of Controls' for implementation detail.

(a)(b) The XXX System Owner and ISSO ensures XXX system allows no more than
three (3) consecutive invalid access attempts by a user within a 24 hour time
period; and that the system automatically locks the account/node for 20 minutes
when the maximum number of unsuccessful attempts is exceeded.

The XXX ISSO is responsible for ensuring that the XXX system servers will
be configured in accordance with the Hardening Guidelines and lockout policy.




                                                                                    36
AC-7: Good Response

Data Center Implementation:
(a)(b) The <CSP> Data Center Application Team works with the <CSP> YYY System
Owner and YYY ISSO to determine acceptable configuration settings for the
implementation of this control on system servers/operating systems. The YYY
System Owner and YYY ISSO must provide the Data Center Application Team with
the following configuration setting requirements so they can be incorporated into
the final configuration for system servers: number of consecutive unsuccessful
login attempts before lockout, unsuccessful login count windows duration, and
unsuccessful login attempt lockout action type (with associated parameters).
Systems must provide required configuration settings in the form of a Group Policy
Object (GPO).




                                                                                     37
AC-7: Good Response (continued)

System Implementation:
(a)(b) The YYY default group policy limits unsuccessful login attempts to 3
unsuccessful login attempts in 120 minutes. When this limit is reached the
user is locked out for 20 minutes. The YYY System Owner is responsible for
provided these configuration requirements to the datacenter. The YYY
Administrators (YYY Software Services Team) are responsible for verifying
implementation. The GPO is implemented by the <CSP> Data Center
Application Team though Active Directory, and the GPO is applied to all
VMs within the domain. Group policy is maintained under configuration
control and any changes to this control are reviewed by the YYY ISSO. The
YYY ISSO reviews this control at least annually to ensure that it is
operating as intended by performing GPO review and testing.




                                                                              38
CM-7: Least Functionality



The organization configures the information system to provide only essential
capabilities and specifically prohibits or restricts the use of the following
functions, ports, protocols, and/or services: [Assignment: org-defined list of
prohibited or restricted functions, ports, protocols, and/or services]

(1) The organization reviews the information system [Assignment: org-defined
    frequency] to identify and eliminate unnecessary functions, ports,
    protocols, and/or services.




                                                                                 39
CM-7: Poor Response

The ISSO ensures annually that only those ports, protocols, and services
necessary for system mission are enabled.




                                                                           40
CM-7: Good Response

CM-7: Only the features and port traffic required by System W are configured and
enabled. Unnecessary features, services, protocols, or capabilities are disabled or
removed. The list of prohibited protocols and services can be found in the secure
baseline configurations followed by System W, most notably the <CSP> Windows Server
2003/Vista/XP Secure Baseline Configuration Guide.

The ISSO is responsible for ensuring that the configuration settings for System W are in
compliance with <CSP> hardening guidance; the ISSO verifies configuration settings
weekly. Please refer to table 10-4 of this SSP for permitted ports and protocols. The list of
permitted ports and protocols is reviewed annually by the ISSO.

CM-7(1): Organization M IA Division conducts monthly Nessus scans of Organization M
systems for compliance with Agency hardening guidelines. These scans identify all
unnecessary functions, ports, protocols, and services. The IT Security Audit Team
conducts monthly audits where the prohibited ports and services are identified to ensure
no future use. Monthly Audits Reports are archived and are available upon request.



                                                                                                41
MA-3: Maintenance Tools


The organization approves, controls, monitors the use of, and maintains on an
ongoing basis, information system maintenance tools

Enhancement 1: The organization inspects all maintenance tools carried into a facility
   by maintenance personnel for obvious improper modifications

Enhancement 2: The organization checks all media containing diagnostic and test
programs for malicious code before the media are used in the information system

Enhancement 3: The organization prevents the unauthorized removal of
maintenance equipment by one of the following: (i) verifying that there is no
organizational information contained on the equipment; (ii) sanitizing or destroying
the equipment; (iii) retaining the equipment within the facility; or (iv) obtaining an
exemption from a designated organization official explicitly authorizing removal of
the equipment from the facility.




                                                                                         42
MA-3: Poor Response

The System Administrator and the ISSO check all media containing diagnostic
and test programs for malicious code before the media are used within the
system. The SysAdmin checks all maintenance equipment with the capability of
retaining information so that no organizational information is written on the
equipment or the equipment is appropriately sanitized before release. If the
equipment cannot be sanitized, the equipment remains within the facility.
All tools approved for use on System Y are approved software according to the
Technical Reference Manual. Only individuals authorized to use these tools are
granted the necessary permissions. In the event an outside vendor is required
to perform maintenance activities, he or she is escorted at all times and all
equipment inspected.




                                                                                 43
MA-3: Good Response

The System Administrator has ultimate responsibility for all maintenance tools used within System
XX. Tools are selected from a predetermined tool set as documented in the Technical Reference
Manual. This list is updated and released annually by the XX system administrator. All system
maintenance activities follow standardized procedures, and all activities are pre-approved by the
system administrator. Tools must be signed out for a specified period of time prior to use and
signed back in upon completion. More detailed procedures may be found in Appendix D of this
document, “System XX Maintenance Procedures.”

(1) The facility housing System XX is guarded 24/7 by armed security guards. All visitors, including
maintenance personnel, are subjected to x-ray screening prior to being granted access. Once
through the initial entrance, maintenance personnel are sent to a separate room where all
materials are inspected by Person Y.

(2) System XX maintenance procedures include provisions for testing all media containing
diagnostic and test programs in a virtual environment prior to system use. This testing is performed
by the System Administrator.

(3) All maintenance equipment is contained within the facility at all times, and individuals are
subjected to bag search before leaving the premises. Property passes are required to remove
equipment from the building and security checks serial numbers on property passes each time
someone leaves the building.

                                                                                                       44
SA-12: Supply Chain Protection


The organization protects against supply chain threats by employing
[FedRAMP Parameter: List of measures to be approved by JAB but
determined by CSP] as part of a comprehensive, defense-in-breadth
information security strategy.




                                                                      45
SA-12: Poor Response

System XX uses due diligence to ensure supply chain protection by
employing the following measures by making sure all users are aware
of the rules. The System Owner verifies this control implementation at
least annually.




                                                                         46
SA-12: Good Response

System XX uses due diligence to ensure supply chain protection by employing the
following measures:
• Ensuring that all vendors have a positive performance record
• Ensuring that all vendors are in a secure financial position
• Reviewing suppliers and vendors to verify they are organizationally stable and have
     contingency plans in place
• Maintaining spares of critical information system components at two back-up sites
• Ensuring that all acquisitions are made through a federally approved contract
     process

<CSP> checks to ensure that all suppliers are financially secure by performing a credit
check through Dun & Bradstreet. <CSP> puts the following contract clause in all supplier
contracts to ensure that suppliers and vendors have a stable operating environment
“Supplier must have an IT Contingency Plan in place that is available to <CSP> upon
request.” The System Owner, no less than annually, performs a review of all vendor
performance records, vendor financials, and vendor stability in accordance with the
organization’s vendor review policy. The System Owner also reviews the acquisition
process to ensure compliance with federal requirements. Additionally, the System Owner
performs inventory of critical information system components at back-up sites to ensure
all redundancy requirements are met.


                                                                                           47
SC-9: Transmission Confidentiality

The information system protects the confidentiality of transmitted information.

Enhancement 1: The organization employs cryptographic mechanisms to prevent
unauthorized disclosure of information during transmission unless otherwise
protected by [FedRAMP Parameter: a hardened or alarmed carrier Protective
Distribution System (PDS)]




                                                                                  48
SC-9: Poor Response


The organization employs cryptographic mechanisms to prevent
unauthorized disclosure of information during transmission by
employing FIPS 140-2 compliant cryptographic modules.




                                                                49
SC-9: Good Response


System A’s transmission/session confidentiality is provided during remote
administration of the system via SSH with [third-party vendor] two-factor
authentication. System transmission/session confidentiality for portal access to
the system is accomplished via SSL with [third-party vendor] two-factor
authentication. All internal communication is on the private network and is not
accessible from outside the boundary. Please refer to control IA-2 for a detailed
description of access to all System A devices and protections in place to protect
system integrity and confidentiality.




                                                                                    50
SC-9: Good Response(continued)

SC-9 (1) All communications with System A occur over two-factor authenticated
encrypted SSL or SSH channel. System A uses [third-party vendor] two-factor
authentication to authenticate to the FIPS 140-2 certified SSH and SSL cryptographic
modules deployed within the system. All system servers run a [custom] operating
system and use the [third-party vendor’s product] for OpenSSH and OpenSSL (OpenSSL
0.9.8e-fips-rhel5 and OpenSSH 5.2p1). The OpenSSL module is a software only, security
level 1 cryptographic module, running on a multi-chip standalone platform. The module
supplies cryptographic support for the SSH protocol or the [vendor] Linux user space.
The [vendor product] version for the validated module is 5.2p1. All cryptographic
operations and the module integrity check are performed by the [third-party vendor]
Linux OpenSSL Cryptographic Module for the OpenSSH module. [Third-party vendor]
authentication uses a time-synchronous solution that automatically changes the user’s
password every 60 seconds. All portals are built on these [third-party vendor] and
<CSP> systems; thus, they utilize the same FIPS 140-2 certified cryptographic modules.




                                                                                         51
SC-13: Use of Cryptography


The information system implements required cryptographic protections using
cryptographic modules that comply with applicable federal laws, Executive
Orders, directives, policies, regulations, standards, and guidance.

Enhancement 1: The organization employs, at a minimum, FIPS-validated
cryptography to protect unclassified information.




                                                                             52
SC-13: Poor Response


System 15 currently uses [vendor] Java Cryptography Extension, which is
not FIPS-compliant. This is currently being rectified.




                                                                          53
SC-13: Good Response

The <CSP> system is protected by various cryptographic modules that are embedded into
network devices that are part of the <CSP> network infrastructure. Since the <CSP> system
resides on the <CSP> infrastructure, the <CSP> system indirectly makes use of these
cryptographic modules. The <CSP> network devices that use cryptography are:
•     F5 load balancers
•     Cisco PIX firewalls
•     Cisco VPN concentrator

The F5 load balancers use the Nitrox II security processor made by Cavium Networks. The
Nitrox II security processor is embedded in the F5 box and comes bundled with as part of the
F5 product. The FIPS 140-2 validation certificates are in the name of Cavium Networks are
shown below:




                                                                                               54
SC-13: Good Response (continued)

Cisco PIX firewalls are installed on the WAI network perimeter and protect the <CSP> system
by providing separation between the Web, application, and database layers. A FIPS 140-2
validation certificate for the PIX firewalls is shown below:




(1) All encryption within the <CSP> system is implemented using AES-256, which is FIPS 140-2
compliant. All certificates are issued by the Agency Certificate Authority and reviewed by the
ISSO on an annual basis.




                                                                                                 55
IR-4: Incident Handling

The organization:
a. Implements an incident handling capability for security incidents that includes
   preparation, detection and analysis, containment, eradication, and recovery;
b. Coordinates incident handling activities with contingency planning activities;
   and
c. Incorporates lessons learned from ongoing incident handling activities into
   incident response procedures, training, and testing/exercises, and implements
   the resulting changes accordingly.

Enhancement 1: The organization employs automated mechanisms to support the
   incident handling process.

Requirement: The service provider ensures that individuals conducting incident
   handling meet personnel security requirements commensurate with the
   criticality/sensitivity of the information being processed, stored, and
   transmitted by the information system.



                                                                                     56
IR-4: Poor Response

The organization:
a. System Y incident response handling is based on the System Y Incident Response
   Plan developed for reporting incidents. System security engineers facilitate access to
   the system’s infrastructure logs and devices and agency security incident
   investigators in the event of an incident. The system’s Incident Response Plan is
   adjusted annually based on operational experience and includes incident detection,
   team invocation, analysis, containment, forensic capture, eradication, and recovery
   phases.
b. The Incident Response Plan was created in tandem with the system Contingency
   Plan. Both documents can be found appended to this SSP.
c. System documentation is currently not updated, due to personnel restrictions.

(1) The ABC tool monitors System Y and detects any anomalous activities. The Help
    Desk monitors the system 24/7 to immediately respond to any suspected incidents.
    The ABC tool is administered by the System Administrator.




                                                                                            57
IR-4: Good Response

More detailed procedures may be found in the Incident Response Plan attached to this
document. All members of the Incident Response Team maintain clearances
commensurate with the sensitivity and criticality level of information they are
permitted to handle. Records of these cleared individuals are maintained by the
Security Office.

a. System Y incident response handling is based on the System Y Incident Response
Plan developed for reporting incidents. System security engineers facilitate access to
the system’s infrastructure logs and devices and agency security incident investigators in
the event of an incident. The system’s Incident Response Plan is adjusted annually
based on operational experience and includes incident detection, team invocation,
analysis, containment, forensic capture, eradication, and recovery phases. The system
ISSO is responsible for incident response plan maintenance.




                                                                                             58
IR-4: Good Response (continued)

b. Incident handling activities are coordinated with contingency planning activities. Both
plans are developed, tested, and updated in tandem every year. The ISSO, in conjunction
with <CSP> incident response and contingency planning teams, coordinates specific
activities for the information system.


c. Incident response activities, policies, and procedures are revised annually by the Incident
Response Team to incorporate lessons learned, testing and training results, and system
alterations. As new procedures are developed or existing plan procedures edited, the
incident response team lead updates the incident response plan, distributes to team
members, and upcoming training is tailored to include exercises designed to test the
updated or new material. Incident response support documentation is stored on the <CSP>
internal SharePoint site and is available for review upon request.




                                                                                                 59
IR-4: Good Response(continued)


(1) The ABC tool monitors System Y and detects any anomalous activities. The Help
    Desk monitors the system 24/7 to immediately respond to any suspected
    incidents. The ABC tool is administered by the System Administrator.




                                                                                    60
CA-7: Continuous Monitoring

The organization establishes a continuous monitoring strategy and implements a
continuous monitoring program that includes:
a. A configuration management process for the information system and its constituent
components;
b. A determination of the security impact of changes to the information system and
environment of operation;
c. Ongoing security control assessments in accordance with the organizational
continuous monitoring strategy; and
d. Reporting the security state of the information system to appropriate organizational
officials [FedRAMP Parameter: monthly].




                                                                                          61
CA-7: Poor Response

Security controls protecting the ABC system are reviewed and monitored on an
ongoing basis. These activities include configuration management and control of
information system components, security impact analyses of changes to the system,
ongoing assessment of security controls, and status reporting on a weekly basis.
Selection criteria have been established for control monitoring and subsequently, a
subset of the security controls employed within ABC have been selected for the
purpose of continuous monitoring.




                                                                                      62
CA-7: Good Response

Under the guidance of the CISO, <CSP> has developed a Continuous Monitoring
    Program that applies to System W. A copy of <CSP>’s Continuous Monitoring
    Strategy may be requested from the <CSP> CISO.
a. More information about the configuration management process for System W may
    be found in the CM-3 control response, found in section 7.5.2 of this document.
b. Any change requests dealing with System W must be approved by the Change
    Control Board, with a recommendation by the system ISSO, prior to
    implementation.
c. A specific subset of controls, determined by the ISSO at the end of the previous fiscal
    year, is assessed each year by the technical team. By the end of the three-year ATO
    cycle, each control has been assessed at least once.
d. The status of relevant POA&Ms are reported by the ISSO to the System Owner on a
    monthly basis, and the ISSO provides the System Owner with a verbal daily system
    summary report as well as a written weekly report. If necessary, the System Owner
    chooses to escalate any report to his or her manager.




                                                                                             63
CM-6: Configuration Settings

The organization:
a. Establishes and documents mandatory configuration settings for information technology
     products employed within the information system using [FedRAMP Parameter: USGCB or CIS
     Level 1 or personal configuration settings if USGCB unavailable] that reflect the most
     restrictive mode consistent with operational requirements;
b. Implements the configuration settings;
c. Identifies, documents, and approves exceptions from the mandatory configuration settings for
individual components within the information system based on explicit operational requirements;
and
d. Monitors and controls changes to the configuration settings in accordance with organizational
policies and procedures.

Enhancement 1: The organization employs automated mechanisms to centrally manage, apply,
   and verify configuration settings.

Enhancement 3: The organization incorporates detection of unauthorized, security-relevant
configuration changes into the organization’s incident response capability to ensure that such
detected events are tracked monitored, corrected, and available for historical purposes.




                                                                                                   64
CM-6: Poor Response


Security settings of information technology products used with the XX
system are set to the most restrictive mode consistent with information
system operational requirements. From NIST Special Publication 800-70,
guidance was received on necessary configuration settings for information
technology products.




                                                                            65
CM-6: Good Response

A. All servers, databases, and workstations are configured according to the Center for Internet
   Security (Level 1) guidelines. <CSP> maintains a internal repository of standard configurations
   settings for all products deployed. These baselines include required minimum settings as well as
   recommended settings.
B. Configuration settings are implemented and verified/updated weekly by the System
   Administrator.
C. No system component is exempt from mandatory minimum settings established in <CSP>
   baselines. Specific exemptions to recommended settigns may be submitted through the
   configuration exceptions process documented in <CSP>’s configuration management SOP.
   Exceptions are tracked and approved using <CSP>’s proprietary configuration tracking tool.
D. Team X monitors and controls changes to configuration settings by using ZZZ monitoring system.
   Any and all changes must go through the official change request process.

More information may be found in the Configuration Management Standard Operating Procedures
(SOP) appended to this document.

(1) In addition to controlling changes, ZZZ monitoring system is enabled to detect unauthorized
system changes.
(3) Upon detection of an unauthorized change or setting, a notice is automatically sent to the
Organization Y SOC to report and track the incident.


                                                                                                      66
POA&Ms

• All information security weaknesses which you intend to resolve must be
  documented in Plan of Action and Milestones (POA&Ms) and referenced in
  the appropriate sections. The POA&M indicates:
   • CSP is aware of the associated risk
   • CSP has a plan for mitigating
   • CSP is managing the weakness to closure
• Security controls identified as “planned”
   • As part of minimum security baseline require a POA&M
   • Enhancement above the baseline do not require a POA&M
• Security weaknesses which you do not intend to resolve reflect accepted
  risk.
   • CSP is only making a recommendation of accepted risk, the Joint
        Authorization Board (JAB) will determine if the level of risk is acceptable
        for issuing a Provisional Authorization.


                                                                                      67
Compensating Controls

• When a security control cannot be achieved as written, a compensating
  control may be sufficient for achieving the intent of the requirement.

• A compensating control may include additional management, technical or
  operational controls. For example,

    • Additional manual inspections may assist when a technical solution
      would be prohibitively expensive or not practical.
    • Additional technical monitoring may be an option if existing standard
      operating procedures an not being implemented properly.

• Apply professional judgment. You must understand the security control in
  the context of your solution. Remember to address the intent of the control
  if you cannot meet the specifics of the control.


                                                                                68
System Changes

• CA-6(c) define “Significant Change”

• List the types of changes which will require
notification versus updated documentation and/or
reauthorization. Change examples,
   • Points of Contact
   • Risk posture
   • Boundary

• Managed change is fine. Unmanaged change is not.


                                                     69
SSP Documents

Deliverable                           Description
System Security Plan                  This document describes how the controls are implemented within
(template available)                  the cloud information system and its environment of operation. The
                                      SSP is also used to describe the system boundaries.
Information Security Policies         This document describes the CSP’s Information Security Policy that
                                      governs the system described in the SSP.
User Guide                            This document describes how leveraging agencies use the system
Rules of Behavior                     This document is used to define the rules that describe the system
(sample available)                    user's responsibilities and expected behavior with regard to
                                      information and information system usage and access.
IT Contingency Plan                   This document is used to define and test interim measures to
(template available)                  recover information system services after a disruption. The ability to
                                      prove that system data can be routinely backed up and restored
                                      within agency specified parameters is necessary to limit the effects
                                      of any disaster and the subsequent recovery efforts.
Configuration Management Plan         This plan describes how changes to the system are managed and
(template available)                  tracked. The Configuration Management Plan should be consistent
                                      with NIST SP 800-128.

                       Source: FedRAMP Concept of Operations (CONOPS), Table 6-2.

                                                                                                           70
SSP Documents (continued)

Deliverable                          Description
Incident Response Plan               This plan documents how incidents are detected, reported, and
                                     escalated and should include timeframes, points of contact, and
                                     how incidents are handled and remediated. The Incident Response
                                     Plan should be consistent with NIST Special Publication 800-61.
E-Authentication Workbook            This template will be used to indicate if E-Authentication will be
(template available)                 used in the cloud system and defines the required authentication
                                     level (1-4) in terms of the consequences of the authentication
                                     errors and misuse of credentials. Authentication technology is
                                     selected based on the required assurance level.
Privacy Threshold Analysis           This questionnaire is used to help determine if a Privacy Impact
(template available)                 Assessment is required.
Privacy Impact Assessment            This document assesses what Personally Identifiable Information
(template available)                 (PII) is captured and if it is being properly safeguarded. This
                                     deliverable is not always necessary.




                         Source: FedRAMP Concept of Operations (CONOPS), Table 6-2.

                                                                                                          71
Tips


Avoid easy mistakes:
   • Incorrect document references
   • Non-applicable controls described as though implemented
   • Restating the control as the control implementation language
   • Lazily copied-and-pasted text
   • Misaligned expiration dates
   • Muddled POA&M numbering
   • Ensure all 4 questions are answered in a way that is clear to the reader
      which question you are answering.

Follow the structure of the control statement to ensure a complete response
    • A NIST base control typically enumerates several specific requirements, as
      well as one or more enhancements
    • Individually address each requirement and enhancement in the
      implementation response

                                                                                   72
Common Mistakes

• Maintenance (MA-2, MA-4):
   – Onsite
   – Offsite
   – Non-Local

• Flaw Remediation (SI-2):
   – Application/Database Level
   – Operating System Level
   – Network Infrastructure Level




                                    73
Common Mistakes

• Information Flow (AC-4, SC-7):
   – Internal Boundary vs. Perimeter
   – Mechanisms (VLAN, DMZ, RBAC)

• Encryption (SC-8, SC-9, SC-13, SC-28):
   – FIPS 140-2 / 197 Compliance
   – At-Rest vs. In-Motion
   – Transmission Confidentiality vs. Transmission Integrity

• Remote Access (AC-17):
   – Remote vs. Local
   – Virtual Private Network (VPN) Tunneling



                                                               74
For more information, please contact us or
visit us at any of the following websites:
http://FedRAMP.gov
http://gsa.gov/FedRAMP
               @FederalCloud

Weitere ähnliche Inhalte

Was ist angesagt?

INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe ÖnalNetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe ÖnalBGA Cyber Security
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphSqrrl
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsImperva
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESMPinewood
 
Clustering Malware Activity: How We Do Attribution
Clustering Malware Activity: How We Do AttributionClustering Malware Activity: How We Do Attribution
Clustering Malware Activity: How We Do AttributionBarberousse1
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANorth Texas Chapter of the ISSA
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...CloudVillage
 
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsLessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsPuma Security, LLC
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Sqrrl
 
ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...
ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...
ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...Pablo Castells
 
Azure Sentinel Tips
Azure Sentinel Tips Azure Sentinel Tips
Azure Sentinel Tips Mario Worwell
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...
추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...
추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...Amazon Web Services Korea
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryProlifics
 

Was ist angesagt? (19)

INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe ÖnalNetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
Clustering Malware Activity: How We Do Attribution
Clustering Malware Activity: How We Do AttributionClustering Malware Activity: How We Do Attribution
Clustering Malware Activity: How We Do Attribution
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
 
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsLessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...
ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...
ACM RecSys 2011 - Rank and Relevance in Novelty and Diversity Metrics for Rec...
 
Azure Sentinel Tips
Azure Sentinel Tips Azure Sentinel Tips
Azure Sentinel Tips
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...
추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...
추천, 개인화 그리고 물류 예측 - 어떻게 시작하고 무엇을 준비해야 하는가? - 김민성 솔루션즈 아키텍트, AWS / 경희정 부장, CJ대...
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
 

Andere mochten auch

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesTuan Phan
 
Getting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for cspGetting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for cspTuan Phan
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...James W. De Rienzo
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateGovCloud Network
 
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.finalMarch 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.finalTuan Phan
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0Valdez Ladd MBA, CISSP, CISA,
 
Guide to understanding_fed_ramp_042213
Guide to understanding_fed_ramp_042213Guide to understanding_fed_ramp_042213
Guide to understanding_fed_ramp_042213Tuan Phan
 
Wave 1 Implementation Summary
Wave 1 Implementation SummaryWave 1 Implementation Summary
Wave 1 Implementation SummaryHafizul Alam
 
Estimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an HourEstimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an HourPriyanka Aash
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTuan Phan
 
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - PanelFocus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - PanelAkamai Technologies
 
Conops v1.1 07162012_508
Conops v1.1 07162012_508Conops v1.1 07162012_508
Conops v1.1 07162012_508Tuan Phan
 
Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712Tuan Phan
 
323090341 camila-diaz-902-sistemas
323090341 camila-diaz-902-sistemas323090341 camila-diaz-902-sistemas
323090341 camila-diaz-902-sistemasCamila Diaz
 
20130529 apresentacao padrao-v46 (1)
20130529 apresentacao padrao-v46 (1)20130529 apresentacao padrao-v46 (1)
20130529 apresentacao padrao-v46 (1)Jose_Sergio_Gabrielli
 
Bookman.GIRLeadInstitute.2016.v3.distro
Bookman.GIRLeadInstitute.2016.v3.distroBookman.GIRLeadInstitute.2016.v3.distro
Bookman.GIRLeadInstitute.2016.v3.distroRichard Bookman
 

Andere mochten auch (20)

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
Getting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for cspGetting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for csp
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) Template
 
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.finalMarch 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
 
Guide to understanding_fed_ramp_042213
Guide to understanding_fed_ramp_042213Guide to understanding_fed_ramp_042213
Guide to understanding_fed_ramp_042213
 
Wave 1 Implementation Summary
Wave 1 Implementation SummaryWave 1 Implementation Summary
Wave 1 Implementation Summary
 
Estimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an HourEstimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an Hour
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security Authorization
 
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - PanelFocus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
 
A Closer Look on C&C Panels
A Closer Look on C&C PanelsA Closer Look on C&C Panels
A Closer Look on C&C Panels
 
Conops v1.1 07162012_508
Conops v1.1 07162012_508Conops v1.1 07162012_508
Conops v1.1 07162012_508
 
Azure gov march 15th
Azure gov march 15thAzure gov march 15th
Azure gov march 15th
 
Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712Continuous monitoring strategy_guide_072712
Continuous monitoring strategy_guide_072712
 
323090341 camila-diaz-902-sistemas
323090341 camila-diaz-902-sistemas323090341 camila-diaz-902-sistemas
323090341 camila-diaz-902-sistemas
 
20130529 apresentacao padrao-v46 (1)
20130529 apresentacao padrao-v46 (1)20130529 apresentacao padrao-v46 (1)
20130529 apresentacao padrao-v46 (1)
 
Palacio de ferrera
Palacio de ferreraPalacio de ferrera
Palacio de ferrera
 
Bookman.GIRLeadInstitute.2016.v3.distro
Bookman.GIRLeadInstitute.2016.v3.distroBookman.GIRLeadInstitute.2016.v3.distro
Bookman.GIRLeadInstitute.2016.v3.distro
 

Ähnlich wie FedRAMP CSP SSP Training

Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011commandersaini
 
Why do Hand-picked Cherries... (2009)
Why do Hand-picked Cherries... (2009)Why do Hand-picked Cherries... (2009)
Why do Hand-picked Cherries... (2009)Marc Jadoul
 
Amped for FedRAMP
Amped for FedRAMPAmped for FedRAMP
Amped for FedRAMPRay Potter
 
Nagios Conference 2012 - Andreas Ericsson - Merlin
Nagios Conference 2012 - Andreas Ericsson - MerlinNagios Conference 2012 - Andreas Ericsson - Merlin
Nagios Conference 2012 - Andreas Ericsson - MerlinNagios
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesHyTrust
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Naba Barkakati
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Splunk
 
Rob kloots auditoutsourcedit
Rob kloots auditoutsourceditRob kloots auditoutsourcedit
Rob kloots auditoutsourceditRobert Kloots
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...Khazret Sapenov
 
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTTaking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTqualisystems
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 

Ähnlich wie FedRAMP CSP SSP Training (20)

Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011Migrating To Cloud &amp; Security @ FOBE 2011
Migrating To Cloud &amp; Security @ FOBE 2011
 
Why do Hand-picked Cherries... (2009)
Why do Hand-picked Cherries... (2009)Why do Hand-picked Cherries... (2009)
Why do Hand-picked Cherries... (2009)
 
Amped for FedRAMP
Amped for FedRAMPAmped for FedRAMP
Amped for FedRAMP
 
Nagios Conference 2012 - Andreas Ericsson - Merlin
Nagios Conference 2012 - Andreas Ericsson - MerlinNagios Conference 2012 - Andreas Ericsson - Merlin
Nagios Conference 2012 - Andreas Ericsson - Merlin
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
Delivering Operational Intelligence at NAB with Splunk, Gartner Symposium ITX...
 
Rob kloots auditoutsourcedit
Rob kloots auditoutsourceditRob kloots auditoutsourcedit
Rob kloots auditoutsourcedit
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
 
System Center Configurations Manager 2012
System Center Configurations Manager 2012System Center Configurations Manager 2012
System Center Configurations Manager 2012
 
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTTaking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 

FedRAMP CSP SSP Training

  • 1. Federal Risk and Authorization Management Program (FedRAMP) FedRAMP Security Authorization Package September 2012
  • 2. Agenda • Objectives • FedRAMP Process • Document Overview • Package Review Process • Control Examples 2
  • 3. Federal CIO Memorandum: FedRAMP Goals • Cost-effective, risk-based approach to cloud adoption • Standardize security requirements • Consistent, independent, third-party assessment • Leverage security experts from DHS, DOD, and GSA to conduct a joint authorization • Standardize contract language • Repository of authorization packages Source: VanRoekel, Steven. Federal CIO memorandum titled “Security Authorization of Information Systems in Cloud Computing Environments” (Dec 8, 2011). 3
  • 4. Objectives • Understand federal security assessment documentation • Clarify what makes a bad, good, or great description of a security control implementation • Provide lessons learned in applying a risk-based approach to security control selection • Ensure Cloud Service Providers (CSPs) have the knowledge to successfully implement FedRAMP 4
  • 5. FedRAMP Process (CSP Perspective) • Initiation – Request FedRAMP Authorization – Define and agree on scope • Security Assessment – Document security controls – 3PAO assess security controls • Continuous Monitoring – Weakness Remediation – On-going control monitoring – Incident management – Data Feed Reporting Source: Guide to Understanding FedRAMP, Figure 2.1: FedRAMP Process 5
  • 6. Initiation: Starting the Process http://www.fedramp.gov 6
  • 7. Initiation: Defining the Scope FIPS 199 Categorization Control Tailoring Workbook Control Implementation Summary • Define information types • Define the security control • Control implementation status • Established security baseline • In place categorization baseline • Document unique control • Planned • Confidentiality settings • Somewhere in between • Integrity • Discuss exceptions and • Clarify control implementation • Availability compensating controls roles and responsibilities • Risk-based adjustments • Cloud service provider • Customer • Hybrid • Inherited Alternative Implementations: Enable innovation and flexibility in addressing security controls. 7
  • 8. FIPS 199 NIST SP 800-60 Volume 1 • How do you intend for the cloud solution to be utilized? Risk-based Justification for NIST SP 800-60 Volume 2 deviating from recommendations CSP Selection Availability Recommendation Integrity Recommendation Confidentiality Recommendation Information Type(s) 8
  • 9. Control Tailoring Workbook (CTW) NIST SP 800-53 Revision 3 • Based on FIPS 199 Security Categorization (Low or Moderate) • CSP intention in meeting or exceeding FedRAMP parameter settings • CSP intention to deviate from control baseline • Unique and/or innovative control tailoring FedRAMP Control Reference (Tri-Fold) • Exceptions and associated compensating control decisions Encouraging innovation by meeting the intent of a control if not the specific language. 9
  • 10. Control Implementation Summary (CIS) Control Origination Definition Example • Who is doing what? Service Provider Corporate A control that originates from the CSP corporate network. DNS from the corporate network provides address resolution • CSP services for the information system and the service offering. • Customer Service Provider A control specific to a particular A unique host based intrusion • Hybrid System Specific system at the CSP and the control is not part of the service provider detection system (HIDs) is available on the service offering corporate controls. platform but is not available on the corporate network. • CSP responsibilities Service Provider Hybrid A control that makes use of both Scans of the corporate network should be clearly corporate controls and additional infrastructure; scans of databases controls specific to a particular and web based application are described in the System system at the CSP. system specific. Security Plan (SSP) and Configured by A control where the customer needs User profiles, policy/audit Customer to apply a configuration in order to configurations, enabling/disabling supporting plans and meet the control requirement. key switches (e.g., enable/disable http or https, etc.), entering an IP procedures range specific to their organization are configurable by the customer. Provided by Customer A control where the customer needs The customer provides a SAML • Customer to provide additional hardware or SSO solution to implement two- software in order to meet the control factor authentication. responsibilities should requirement. be clearly described in Shared A control that is managed and Security awareness training must implemented partially by the CSP and be conducted by both the CSP and the User Guide (SSP, partially by the customer. the customer. Appendix 2) Inherited from pre- A control that is inherited from A PaaS or SaaS provider inherits PE existing Provisional another CSP system that has already controls from an IaaS provider. Authorization received a Security Authorization. 10
  • 11. Control Implementation Summary (CIS) • Current implementation status Implementation Status Definition Example • Elaborated on in the Implemented Control is implemented and The control clearly states who, SSP operating as intended. what, when and how a control is implemented. Partially Some elements of the control are Not all elements of a control Implemented implemented and operating as are met however compensating intended. controls are in place and a plan of action and milestone is in place to address the gap. Planned Control is scheduled for A new operating system will be implementation. available in 6 months which may provide additional functionality. Alternative Control may not be implemented The CSP describes a solution implementation as stated by NIST and FedRAMP, which they believes meets or however, the CSP believes the exceeds the control intent of the control is meant. requirement. Not applicable The control is not implemented Wireless controls may not be based on the cloud design. applicable for a system that does not use wireless technology. 11
  • 12. Kick-off Meeting • Establish points of contact/roles • Clarify Communication • Readiness Discussion • Process and Template Overview • Target Timeline Define the Boundary/Scope of the Solution 12
  • 13. Kick-off Meeting: Boundary Definition System Boundary Internet Protection Boundary Outside System Boundary Protection Boundary Legend The boundary visual is important for putting System your security controls in context Not System 13
  • 14. Document Marking Guide to Understanding FedRAMP, Section 5.2 Ensure that all documents have sensitivity markings on at least the cover page and the footer of each document. You may change the existing sensitivity marking on any template to match your official company sensitivity nomenclature if it is different than what is on the template. Optionally, you may also put your sensitivity markings on the headers or footers of any documents and on any other places in the documents where you feel sensitivity markings should be placed. 14
  • 15. Initiation: Deliverable Summary Deliverable Description FedRAMP Initiation Request The FedRAMP request form is used by Federal agencies and CSPs to (online link) request initiation of the FedRAMP security assessment process. FIPS 199 Categorization The FIPS 199 Security categorization is used to determine the (template available) impact level to be supported by the cloud information system/service. The provider categorizes their system based on the data types currently stored and not leveraging agency data. Control Tailoring Workbook This document is used by CSP to document their control (template available) implementation and define their implementation settings for FedRAMP defined parameters and any compensating controls. Control Implementation This document summarizes the control ownership and indicates Summary which controls are owned and managed by the CSP and which (template available) controls are owned and managed by the leveraging agency. Source: FedRAMP Concept of Operations (CONOPS), Table 6-1. 15
  • 16. Security Assessment: Overview FedRAMP System Security Plan Security Assessment Plan Security Assessment Report • Document what you are doing • Test plan and procedures • Test Results • Optional: Document what you • Tailored to cloud solution • Statement of outstanding intend to do • Developed by 3PAO in vulnerabilities and risk • Completed by the CSP collaboration CSP Third-party Assessment Organization (3PAO) Deliverables Not Covered in this training 16
  • 17. System Security Plan (SSP) • Provides the big picture view • Links the security implementation into a cohesive solution • Clearly and consistently documents security control implementation • Resource for the “boots on the ground” • Provides continuity for staff in management of security controls 17
  • 18. Why 352 Page SSP Template? • Eliminate variability in responses • Easier to document • Easier to read • Faster to evaluate • Encourage federal-wide adoption • Leverage NIST standards • Existing federal education • Maximize re-use • Eliminate common mistakes • Structure responses • Allow for detailed responses Document what you are already doing. Identify gaps in what you may have overlooked. 18
  • 19. SSP Overview Grouped into three (3) main areas Scope Controls Appendices • System • 18 Control • Policies Description Families • Supporting plans • Points of Contact • Risk-based and procedures • Boundary control selection • Rules of Definition • Control tailoring Behavior • Interconnections Note: Based on NIST Special Publication SP) 800-18 Rev. 1, Guide for Developing Security Plans for Federal Information Systems 19
  • 20. SSP Scope Initiation Deliverables Policies • FIPS 199 • Supporting Policies • Control Implementation Summary (CIS) Leveraging existing vendor • Control Tailoring Workbook policies and procedures (CTW) whenever possible. System Security Plan (SSP) New Deliverables Supporting Plans and Procedures • e-Authentication Worksheet (e-Auth) • Continuous Monitoring Plan and • Draft Privacy Threshold Analysis Strategy (PTA) • Configuration Management Plan • Draft Privacy Impact Assessment • Contingency Plan (PIA) • Incident Response Plan • Rules of Behavior (RoB) • User Guide 20
  • 21. E-Authentication Worksheet NIST SP 800-63 • Determine if e-Authentication requirements apply • Determine applicable level of e- Authentication Level 1: Little or no confidence in the asserted identity’s validity Level 2: Some confidence in the asserted identity’s validity Level 3: High confidence in the asserted identity’s validity Level 4: Very high confidence in asserted identity’s validity OMB M-04-04 21
  • 22. E-Authentication Worksheet OMB M-04-04, Table 1: Maximum Potential Impacts for Each Assurance Level Assurance Level Impact Profile Potential Impact Categories for Authentication 1 2 3 4 Errors Inconvenience, distress or damage to standing or Low Low Mod High reputation Financial loss or agency liability Low Mod Mod High Harm to agency programs or public interests N/A Low Mod High Unauthorized release of sensitive information N/A Low Mod High Personal Safety N/A N/A Low Mod, High Civil or criminal violations N/A Low Mod High Where does it affect the SSP? • Section 2.3 • Section 17 • IA-2 • IA-5 • IA-8 NIST SP 800-63 22
  • 23. SSP Points of Contact • Information System Owner (ISO) • Information System Security Officer (ISSO) • Authorizing Official (AO) • Others (depending on CSP approach) • Architect • Engineer • Manager • Technical 23
  • 24. SSP Descriptors • Type of Cloud Implementation • Leveraging any other Security Authorization Packages (inheriting controls) • System Function/Purpose • Ensure alignment with the information types previously defined • Types of Users • Be consistent with the roles defined in Section 9.3 and used throughout the SSP and supporting documents • Boundary Discussion • Be consistent and complete in describing to ensure alignment throughout the SSP • If you can’t describe it, why should anyone believe you can protect it. • Should align to any diagrams presented previously 24
  • 25. Describing the Boundary System Boundary Internet Network Inventory Ports, Protocols and Services Network Architecture Outside System Boundary Hardware Software Inventory Inventory System Interconnections • Understand where users fit within the boundary – e.g., end users, administrators, security operations, and remote maintenance. 25
  • 26. Review Standards • Each document is verified for compliance with FedRAMP policy and consistency with other package documents • Review expects responses to be: • Unambiguous • Specific • Complete • Comprehensible • The SSP Template is designed to help achieve expected results 26
  • 27. Grading Standard (Notional) • Pass (P): – All applicable document criteria are satisfied • Fail (F): – Only some (or zero) applicable document criteria are satisfied • Pass with Comments (PC): – Document criteria are satisfied in principle, but additional detail would yield a more complete response – Reviewer will specify the additional information to be included • Not Applicable (N/A) – Requirement does not apply based on system characteristics and accreditation boundary (e.g., some requirements of AC-18 are N/A for non-wireless systems) 27
  • 28. Structure of a Good Response Reviewer assesses submission content in the context of four (4) criteria : 1. What is the documented solution? 2. Who is the responsible party for solution management? 3. When is the solution reviewed or monitored for effectiveness? 4. How does the solution meet applicable security requirements? Reference applicable documentation • Policy, SOPs, Rules of Behavior, common control catalogs, waivers, exceptions, etc. • Any referenced documentation should be appended to the SSP, with a rationale for their inclusion also clearly stated in the control implementation paragraph, ensure that the control language aligns with any referenced internal policies, procedures, and/or standards. 28
  • 29. References Internal References to another part of the same document are acceptable provided that each reference: • Includes section number • Is relevant to the referring section of the document External References to other documents are acceptable provided that each reference: • Includes the full title, current version number, and release date of the referenced document • Briefly explains the rationale for the reference Note: If the reference does not pertain to the referring section, the corresponding checklist item will be graded “Fail” 29
  • 30. CONTROL EXAMPLES Please do not copy these examples into your system security plans verbatim. Copying these examples as written is an early indicator that the proper due diligence wasn’t applied in the analyzing and documenting security controls. 30
  • 31. AC-1: Access Control Policy and Procedures The organization develops, disseminates, and reviews/updates [Assignment: org-defined frequency]: a. A formal, documented access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and b. Formal, documented procedures to facilitate the implementation of the access control policy and associated controls. 31
  • 32. AC-1: Poor Response Implementation: System XX has an access control policy that is consistent with applicable federal laws, directives, policies, regulations, standards, and guidance. It is updated annually. The System Administrators and <CSP> management team personnel post notes and send e-mail notifications to System XX users. System XX User and Administrator Guides are periodically updated as new versions are released. 32
  • 33. AC-1 : Good Response Implementation: (a) System XX’s Access Control Policy is listed in <CSP> Document ABC and includes definitions of the purpose, scope, roles, responsibilities, and compliance requirements for all <CSP> employees. Section 5.2 of Document ABC presents the <CSP> access control policy. Section 5.2 of <CSP> handbook addresses roles and responsibilities. Section 5.2 of Document ABC addresses the management commitment, coordination among customer entities, and compliance related to access control. The access control policy is consistent with the organization’s mission and functions and with applicable laws, directives, policies, regulations, standards, and guidance. The access control policy is reviewed and updated, when necessary, by the XX ISSO at least annually. 33
  • 34. AC-1: Good Response (continued) (b) The access control procedures for System X are documented in organization Document ABC, organization Document XYZ, and User Guide B; and are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The access control procedures address all areas identified in the access control policy and address achieving policy-compliance implementations of all associated controls. The access control procedures are reviewed and updated, when necessary, by the XX ISSO at least annually. Access control policy and procedure documents are maintained on the <CSP> internal SharePoint site, and are available for review up on request. 34
  • 35. AC-7: Unsuccessful Login Attempts The information system: a. Enforces a limit of [Assignment: organization-defined number] consecutive invalid login attempts by a user during a [Assignment: organization-defined time period]; and b. Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next login prompt according to [Assignment: organization- defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded. The control applies regardless of whether the login occurs via a local or network connection. 35
  • 36. AC-7: Poor Response Implementation: (a)(b) This control is partially inherited from the Data Center. Please see 'Appendix A: Data Center Declaration of Controls' for implementation detail. (a)(b) The XXX System Owner and ISSO ensures XXX system allows no more than three (3) consecutive invalid access attempts by a user within a 24 hour time period; and that the system automatically locks the account/node for 20 minutes when the maximum number of unsuccessful attempts is exceeded. The XXX ISSO is responsible for ensuring that the XXX system servers will be configured in accordance with the Hardening Guidelines and lockout policy. 36
  • 37. AC-7: Good Response Data Center Implementation: (a)(b) The <CSP> Data Center Application Team works with the <CSP> YYY System Owner and YYY ISSO to determine acceptable configuration settings for the implementation of this control on system servers/operating systems. The YYY System Owner and YYY ISSO must provide the Data Center Application Team with the following configuration setting requirements so they can be incorporated into the final configuration for system servers: number of consecutive unsuccessful login attempts before lockout, unsuccessful login count windows duration, and unsuccessful login attempt lockout action type (with associated parameters). Systems must provide required configuration settings in the form of a Group Policy Object (GPO). 37
  • 38. AC-7: Good Response (continued) System Implementation: (a)(b) The YYY default group policy limits unsuccessful login attempts to 3 unsuccessful login attempts in 120 minutes. When this limit is reached the user is locked out for 20 minutes. The YYY System Owner is responsible for provided these configuration requirements to the datacenter. The YYY Administrators (YYY Software Services Team) are responsible for verifying implementation. The GPO is implemented by the <CSP> Data Center Application Team though Active Directory, and the GPO is applied to all VMs within the domain. Group policy is maintained under configuration control and any changes to this control are reviewed by the YYY ISSO. The YYY ISSO reviews this control at least annually to ensure that it is operating as intended by performing GPO review and testing. 38
  • 39. CM-7: Least Functionality The organization configures the information system to provide only essential capabilities and specifically prohibits or restricts the use of the following functions, ports, protocols, and/or services: [Assignment: org-defined list of prohibited or restricted functions, ports, protocols, and/or services] (1) The organization reviews the information system [Assignment: org-defined frequency] to identify and eliminate unnecessary functions, ports, protocols, and/or services. 39
  • 40. CM-7: Poor Response The ISSO ensures annually that only those ports, protocols, and services necessary for system mission are enabled. 40
  • 41. CM-7: Good Response CM-7: Only the features and port traffic required by System W are configured and enabled. Unnecessary features, services, protocols, or capabilities are disabled or removed. The list of prohibited protocols and services can be found in the secure baseline configurations followed by System W, most notably the <CSP> Windows Server 2003/Vista/XP Secure Baseline Configuration Guide. The ISSO is responsible for ensuring that the configuration settings for System W are in compliance with <CSP> hardening guidance; the ISSO verifies configuration settings weekly. Please refer to table 10-4 of this SSP for permitted ports and protocols. The list of permitted ports and protocols is reviewed annually by the ISSO. CM-7(1): Organization M IA Division conducts monthly Nessus scans of Organization M systems for compliance with Agency hardening guidelines. These scans identify all unnecessary functions, ports, protocols, and services. The IT Security Audit Team conducts monthly audits where the prohibited ports and services are identified to ensure no future use. Monthly Audits Reports are archived and are available upon request. 41
  • 42. MA-3: Maintenance Tools The organization approves, controls, monitors the use of, and maintains on an ongoing basis, information system maintenance tools Enhancement 1: The organization inspects all maintenance tools carried into a facility by maintenance personnel for obvious improper modifications Enhancement 2: The organization checks all media containing diagnostic and test programs for malicious code before the media are used in the information system Enhancement 3: The organization prevents the unauthorized removal of maintenance equipment by one of the following: (i) verifying that there is no organizational information contained on the equipment; (ii) sanitizing or destroying the equipment; (iii) retaining the equipment within the facility; or (iv) obtaining an exemption from a designated organization official explicitly authorizing removal of the equipment from the facility. 42
  • 43. MA-3: Poor Response The System Administrator and the ISSO check all media containing diagnostic and test programs for malicious code before the media are used within the system. The SysAdmin checks all maintenance equipment with the capability of retaining information so that no organizational information is written on the equipment or the equipment is appropriately sanitized before release. If the equipment cannot be sanitized, the equipment remains within the facility. All tools approved for use on System Y are approved software according to the Technical Reference Manual. Only individuals authorized to use these tools are granted the necessary permissions. In the event an outside vendor is required to perform maintenance activities, he or she is escorted at all times and all equipment inspected. 43
  • 44. MA-3: Good Response The System Administrator has ultimate responsibility for all maintenance tools used within System XX. Tools are selected from a predetermined tool set as documented in the Technical Reference Manual. This list is updated and released annually by the XX system administrator. All system maintenance activities follow standardized procedures, and all activities are pre-approved by the system administrator. Tools must be signed out for a specified period of time prior to use and signed back in upon completion. More detailed procedures may be found in Appendix D of this document, “System XX Maintenance Procedures.” (1) The facility housing System XX is guarded 24/7 by armed security guards. All visitors, including maintenance personnel, are subjected to x-ray screening prior to being granted access. Once through the initial entrance, maintenance personnel are sent to a separate room where all materials are inspected by Person Y. (2) System XX maintenance procedures include provisions for testing all media containing diagnostic and test programs in a virtual environment prior to system use. This testing is performed by the System Administrator. (3) All maintenance equipment is contained within the facility at all times, and individuals are subjected to bag search before leaving the premises. Property passes are required to remove equipment from the building and security checks serial numbers on property passes each time someone leaves the building. 44
  • 45. SA-12: Supply Chain Protection The organization protects against supply chain threats by employing [FedRAMP Parameter: List of measures to be approved by JAB but determined by CSP] as part of a comprehensive, defense-in-breadth information security strategy. 45
  • 46. SA-12: Poor Response System XX uses due diligence to ensure supply chain protection by employing the following measures by making sure all users are aware of the rules. The System Owner verifies this control implementation at least annually. 46
  • 47. SA-12: Good Response System XX uses due diligence to ensure supply chain protection by employing the following measures: • Ensuring that all vendors have a positive performance record • Ensuring that all vendors are in a secure financial position • Reviewing suppliers and vendors to verify they are organizationally stable and have contingency plans in place • Maintaining spares of critical information system components at two back-up sites • Ensuring that all acquisitions are made through a federally approved contract process <CSP> checks to ensure that all suppliers are financially secure by performing a credit check through Dun & Bradstreet. <CSP> puts the following contract clause in all supplier contracts to ensure that suppliers and vendors have a stable operating environment “Supplier must have an IT Contingency Plan in place that is available to <CSP> upon request.” The System Owner, no less than annually, performs a review of all vendor performance records, vendor financials, and vendor stability in accordance with the organization’s vendor review policy. The System Owner also reviews the acquisition process to ensure compliance with federal requirements. Additionally, the System Owner performs inventory of critical information system components at back-up sites to ensure all redundancy requirements are met. 47
  • 48. SC-9: Transmission Confidentiality The information system protects the confidentiality of transmitted information. Enhancement 1: The organization employs cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by [FedRAMP Parameter: a hardened or alarmed carrier Protective Distribution System (PDS)] 48
  • 49. SC-9: Poor Response The organization employs cryptographic mechanisms to prevent unauthorized disclosure of information during transmission by employing FIPS 140-2 compliant cryptographic modules. 49
  • 50. SC-9: Good Response System A’s transmission/session confidentiality is provided during remote administration of the system via SSH with [third-party vendor] two-factor authentication. System transmission/session confidentiality for portal access to the system is accomplished via SSL with [third-party vendor] two-factor authentication. All internal communication is on the private network and is not accessible from outside the boundary. Please refer to control IA-2 for a detailed description of access to all System A devices and protections in place to protect system integrity and confidentiality. 50
  • 51. SC-9: Good Response(continued) SC-9 (1) All communications with System A occur over two-factor authenticated encrypted SSL or SSH channel. System A uses [third-party vendor] two-factor authentication to authenticate to the FIPS 140-2 certified SSH and SSL cryptographic modules deployed within the system. All system servers run a [custom] operating system and use the [third-party vendor’s product] for OpenSSH and OpenSSL (OpenSSL 0.9.8e-fips-rhel5 and OpenSSH 5.2p1). The OpenSSL module is a software only, security level 1 cryptographic module, running on a multi-chip standalone platform. The module supplies cryptographic support for the SSH protocol or the [vendor] Linux user space. The [vendor product] version for the validated module is 5.2p1. All cryptographic operations and the module integrity check are performed by the [third-party vendor] Linux OpenSSL Cryptographic Module for the OpenSSH module. [Third-party vendor] authentication uses a time-synchronous solution that automatically changes the user’s password every 60 seconds. All portals are built on these [third-party vendor] and <CSP> systems; thus, they utilize the same FIPS 140-2 certified cryptographic modules. 51
  • 52. SC-13: Use of Cryptography The information system implements required cryptographic protections using cryptographic modules that comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Enhancement 1: The organization employs, at a minimum, FIPS-validated cryptography to protect unclassified information. 52
  • 53. SC-13: Poor Response System 15 currently uses [vendor] Java Cryptography Extension, which is not FIPS-compliant. This is currently being rectified. 53
  • 54. SC-13: Good Response The <CSP> system is protected by various cryptographic modules that are embedded into network devices that are part of the <CSP> network infrastructure. Since the <CSP> system resides on the <CSP> infrastructure, the <CSP> system indirectly makes use of these cryptographic modules. The <CSP> network devices that use cryptography are: • F5 load balancers • Cisco PIX firewalls • Cisco VPN concentrator The F5 load balancers use the Nitrox II security processor made by Cavium Networks. The Nitrox II security processor is embedded in the F5 box and comes bundled with as part of the F5 product. The FIPS 140-2 validation certificates are in the name of Cavium Networks are shown below: 54
  • 55. SC-13: Good Response (continued) Cisco PIX firewalls are installed on the WAI network perimeter and protect the <CSP> system by providing separation between the Web, application, and database layers. A FIPS 140-2 validation certificate for the PIX firewalls is shown below: (1) All encryption within the <CSP> system is implemented using AES-256, which is FIPS 140-2 compliant. All certificates are issued by the Agency Certificate Authority and reviewed by the ISSO on an annual basis. 55
  • 56. IR-4: Incident Handling The organization: a. Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery; b. Coordinates incident handling activities with contingency planning activities; and c. Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises, and implements the resulting changes accordingly. Enhancement 1: The organization employs automated mechanisms to support the incident handling process. Requirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system. 56
  • 57. IR-4: Poor Response The organization: a. System Y incident response handling is based on the System Y Incident Response Plan developed for reporting incidents. System security engineers facilitate access to the system’s infrastructure logs and devices and agency security incident investigators in the event of an incident. The system’s Incident Response Plan is adjusted annually based on operational experience and includes incident detection, team invocation, analysis, containment, forensic capture, eradication, and recovery phases. b. The Incident Response Plan was created in tandem with the system Contingency Plan. Both documents can be found appended to this SSP. c. System documentation is currently not updated, due to personnel restrictions. (1) The ABC tool monitors System Y and detects any anomalous activities. The Help Desk monitors the system 24/7 to immediately respond to any suspected incidents. The ABC tool is administered by the System Administrator. 57
  • 58. IR-4: Good Response More detailed procedures may be found in the Incident Response Plan attached to this document. All members of the Incident Response Team maintain clearances commensurate with the sensitivity and criticality level of information they are permitted to handle. Records of these cleared individuals are maintained by the Security Office. a. System Y incident response handling is based on the System Y Incident Response Plan developed for reporting incidents. System security engineers facilitate access to the system’s infrastructure logs and devices and agency security incident investigators in the event of an incident. The system’s Incident Response Plan is adjusted annually based on operational experience and includes incident detection, team invocation, analysis, containment, forensic capture, eradication, and recovery phases. The system ISSO is responsible for incident response plan maintenance. 58
  • 59. IR-4: Good Response (continued) b. Incident handling activities are coordinated with contingency planning activities. Both plans are developed, tested, and updated in tandem every year. The ISSO, in conjunction with <CSP> incident response and contingency planning teams, coordinates specific activities for the information system. c. Incident response activities, policies, and procedures are revised annually by the Incident Response Team to incorporate lessons learned, testing and training results, and system alterations. As new procedures are developed or existing plan procedures edited, the incident response team lead updates the incident response plan, distributes to team members, and upcoming training is tailored to include exercises designed to test the updated or new material. Incident response support documentation is stored on the <CSP> internal SharePoint site and is available for review upon request. 59
  • 60. IR-4: Good Response(continued) (1) The ABC tool monitors System Y and detects any anomalous activities. The Help Desk monitors the system 24/7 to immediately respond to any suspected incidents. The ABC tool is administered by the System Administrator. 60
  • 61. CA-7: Continuous Monitoring The organization establishes a continuous monitoring strategy and implements a continuous monitoring program that includes: a. A configuration management process for the information system and its constituent components; b. A determination of the security impact of changes to the information system and environment of operation; c. Ongoing security control assessments in accordance with the organizational continuous monitoring strategy; and d. Reporting the security state of the information system to appropriate organizational officials [FedRAMP Parameter: monthly]. 61
  • 62. CA-7: Poor Response Security controls protecting the ABC system are reviewed and monitored on an ongoing basis. These activities include configuration management and control of information system components, security impact analyses of changes to the system, ongoing assessment of security controls, and status reporting on a weekly basis. Selection criteria have been established for control monitoring and subsequently, a subset of the security controls employed within ABC have been selected for the purpose of continuous monitoring. 62
  • 63. CA-7: Good Response Under the guidance of the CISO, <CSP> has developed a Continuous Monitoring Program that applies to System W. A copy of <CSP>’s Continuous Monitoring Strategy may be requested from the <CSP> CISO. a. More information about the configuration management process for System W may be found in the CM-3 control response, found in section 7.5.2 of this document. b. Any change requests dealing with System W must be approved by the Change Control Board, with a recommendation by the system ISSO, prior to implementation. c. A specific subset of controls, determined by the ISSO at the end of the previous fiscal year, is assessed each year by the technical team. By the end of the three-year ATO cycle, each control has been assessed at least once. d. The status of relevant POA&Ms are reported by the ISSO to the System Owner on a monthly basis, and the ISSO provides the System Owner with a verbal daily system summary report as well as a written weekly report. If necessary, the System Owner chooses to escalate any report to his or her manager. 63
  • 64. CM-6: Configuration Settings The organization: a. Establishes and documents mandatory configuration settings for information technology products employed within the information system using [FedRAMP Parameter: USGCB or CIS Level 1 or personal configuration settings if USGCB unavailable] that reflect the most restrictive mode consistent with operational requirements; b. Implements the configuration settings; c. Identifies, documents, and approves exceptions from the mandatory configuration settings for individual components within the information system based on explicit operational requirements; and d. Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures. Enhancement 1: The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings. Enhancement 3: The organization incorporates detection of unauthorized, security-relevant configuration changes into the organization’s incident response capability to ensure that such detected events are tracked monitored, corrected, and available for historical purposes. 64
  • 65. CM-6: Poor Response Security settings of information technology products used with the XX system are set to the most restrictive mode consistent with information system operational requirements. From NIST Special Publication 800-70, guidance was received on necessary configuration settings for information technology products. 65
  • 66. CM-6: Good Response A. All servers, databases, and workstations are configured according to the Center for Internet Security (Level 1) guidelines. <CSP> maintains a internal repository of standard configurations settings for all products deployed. These baselines include required minimum settings as well as recommended settings. B. Configuration settings are implemented and verified/updated weekly by the System Administrator. C. No system component is exempt from mandatory minimum settings established in <CSP> baselines. Specific exemptions to recommended settigns may be submitted through the configuration exceptions process documented in <CSP>’s configuration management SOP. Exceptions are tracked and approved using <CSP>’s proprietary configuration tracking tool. D. Team X monitors and controls changes to configuration settings by using ZZZ monitoring system. Any and all changes must go through the official change request process. More information may be found in the Configuration Management Standard Operating Procedures (SOP) appended to this document. (1) In addition to controlling changes, ZZZ monitoring system is enabled to detect unauthorized system changes. (3) Upon detection of an unauthorized change or setting, a notice is automatically sent to the Organization Y SOC to report and track the incident. 66
  • 67. POA&Ms • All information security weaknesses which you intend to resolve must be documented in Plan of Action and Milestones (POA&Ms) and referenced in the appropriate sections. The POA&M indicates: • CSP is aware of the associated risk • CSP has a plan for mitigating • CSP is managing the weakness to closure • Security controls identified as “planned” • As part of minimum security baseline require a POA&M • Enhancement above the baseline do not require a POA&M • Security weaknesses which you do not intend to resolve reflect accepted risk. • CSP is only making a recommendation of accepted risk, the Joint Authorization Board (JAB) will determine if the level of risk is acceptable for issuing a Provisional Authorization. 67
  • 68. Compensating Controls • When a security control cannot be achieved as written, a compensating control may be sufficient for achieving the intent of the requirement. • A compensating control may include additional management, technical or operational controls. For example, • Additional manual inspections may assist when a technical solution would be prohibitively expensive or not practical. • Additional technical monitoring may be an option if existing standard operating procedures an not being implemented properly. • Apply professional judgment. You must understand the security control in the context of your solution. Remember to address the intent of the control if you cannot meet the specifics of the control. 68
  • 69. System Changes • CA-6(c) define “Significant Change” • List the types of changes which will require notification versus updated documentation and/or reauthorization. Change examples, • Points of Contact • Risk posture • Boundary • Managed change is fine. Unmanaged change is not. 69
  • 70. SSP Documents Deliverable Description System Security Plan This document describes how the controls are implemented within (template available) the cloud information system and its environment of operation. The SSP is also used to describe the system boundaries. Information Security Policies This document describes the CSP’s Information Security Policy that governs the system described in the SSP. User Guide This document describes how leveraging agencies use the system Rules of Behavior This document is used to define the rules that describe the system (sample available) user's responsibilities and expected behavior with regard to information and information system usage and access. IT Contingency Plan This document is used to define and test interim measures to (template available) recover information system services after a disruption. The ability to prove that system data can be routinely backed up and restored within agency specified parameters is necessary to limit the effects of any disaster and the subsequent recovery efforts. Configuration Management Plan This plan describes how changes to the system are managed and (template available) tracked. The Configuration Management Plan should be consistent with NIST SP 800-128. Source: FedRAMP Concept of Operations (CONOPS), Table 6-2. 70
  • 71. SSP Documents (continued) Deliverable Description Incident Response Plan This plan documents how incidents are detected, reported, and escalated and should include timeframes, points of contact, and how incidents are handled and remediated. The Incident Response Plan should be consistent with NIST Special Publication 800-61. E-Authentication Workbook This template will be used to indicate if E-Authentication will be (template available) used in the cloud system and defines the required authentication level (1-4) in terms of the consequences of the authentication errors and misuse of credentials. Authentication technology is selected based on the required assurance level. Privacy Threshold Analysis This questionnaire is used to help determine if a Privacy Impact (template available) Assessment is required. Privacy Impact Assessment This document assesses what Personally Identifiable Information (template available) (PII) is captured and if it is being properly safeguarded. This deliverable is not always necessary. Source: FedRAMP Concept of Operations (CONOPS), Table 6-2. 71
  • 72. Tips Avoid easy mistakes: • Incorrect document references • Non-applicable controls described as though implemented • Restating the control as the control implementation language • Lazily copied-and-pasted text • Misaligned expiration dates • Muddled POA&M numbering • Ensure all 4 questions are answered in a way that is clear to the reader which question you are answering. Follow the structure of the control statement to ensure a complete response • A NIST base control typically enumerates several specific requirements, as well as one or more enhancements • Individually address each requirement and enhancement in the implementation response 72
  • 73. Common Mistakes • Maintenance (MA-2, MA-4): – Onsite – Offsite – Non-Local • Flaw Remediation (SI-2): – Application/Database Level – Operating System Level – Network Infrastructure Level 73
  • 74. Common Mistakes • Information Flow (AC-4, SC-7): – Internal Boundary vs. Perimeter – Mechanisms (VLAN, DMZ, RBAC) • Encryption (SC-8, SC-9, SC-13, SC-28): – FIPS 140-2 / 197 Compliance – At-Rest vs. In-Motion – Transmission Confidentiality vs. Transmission Integrity • Remote Access (AC-17): – Remote vs. Local – Virtual Private Network (VPN) Tunneling 74
  • 75. For more information, please contact us or visit us at any of the following websites: http://FedRAMP.gov http://gsa.gov/FedRAMP @FederalCloud