, \
, or \
Cell A1 | +Cell B1 | +
Cell A2 | +Cell B2 | +
More detail
+ +Policy Document.
+[EXAMPLE]An example component representing a policy.
+Describe how statement a is satisfied by this policy.
+Policy Document.
+Description
FedRAMP Logo
Description
Peparer Logo
Description
CSP Logo
The CSP for FedRAMP SSP, SAP, SAR, and POA&M.
CSP Logo
Initial publication.
Updated for annual assessment.
The primary authorization boundary diagram.
+Set system-characteristics/authorization-boundary/diagram/link/@href = "#diag-boundary-1"
at least every six months
+The service provider retains audit records on-line for at 180 days and further preserves audit records off-line for a period that is in accordance with NARA requirements.
+The organization that prepared this SSP.
+The organization for which this SSP was prepared
+This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SAP (rev 4 or rev 5) this OSCAL document is for.
+The FedRAMP Extension, "POAM-ID" captures the traditional CSP-assigned unique POA&M identifier.
+Optional pointer to the raw scanner output that generated + this POA&M entry.
A virtual component.
+An instance of the above component.
This is the Weakness Description.
This is the tool-provided statement about the identified risk.
+If no risk statement from tool, set to 'No Risk Statement'.
+This is the Weakness Description.
This is the tool-provided statement about the identified risk.
+If no risk statement from tool, set to 'No Risk Statement'.
+Tool-provided recommendation.
Assessor-provided recommendation.
Describe the CSP's intended approach to remediating this risk.
+Describe required resources.
Describe the CSP's intended approach to remediating this risk.
+Describe required resources.
Optional description
Optional description
Description of the result of the vendor check-in.
+Describe what action(s) the CSP took to close the risk.
+[EXAMPLE]Applied patch. Vulnerability no longer found in subsequent + scan.
+Describe the false positive here.
A screen shot showing the setting is correct
Vendor detail describing why this happens.
Vulnerability description
Risk statement.
Provide the justification for the OR.
A screen shot showing impact when patch is applied.
+Vendor detail describing why this happens.
Vulnerability description
Risk statement.
Describe the risk adjustment evidence here.
+Explain why likelihood was adjusted.
+Explain why impact was adjusted.
+Describe mitigating factor
Describe the vendor dependency here.
A screen shot showing the setting is correct
Vendor detail describing why this happens.
Vulnerability description
Risk statement.
Describe the closure evidence here.
A screen shot showing the setting is correct
Vendor detail describing why this happens.
Describe what action(s) the CSP took to close the risk.
+[EXAMPLE]Applied patch. Vulnerability no longer found in subsequent scan.
+Briefly describe the system. This will appear in the SAR.
+This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SAP (rev 4 or rev 5) this OSCAL document is for.
+Insert text from FedRAMP template
+Insert text from FedRAMP template
+Insert text from FedRAMP template
+This SAP has been developed by [IA Name] and is for [an initial assessment/an annual assessment/an annual assessment and significant change assessment/a significant change assessment] of the [CSP Name], [CSO Name]. The SAP provides the goals for the assessment and details how the assessment will be conducted.
+The FedRAMP-applicable laws, regulations, standards and guidance is included in the [CSO Name] SSP section – System Security Plan Approvals. Additionally, in Appendix L of the SSP, the [CSP Name] has included laws, regulations, standards, and guidance that apply specifically to this system.
+A description of the locations.
+Briefly describe the components at this location.
+Briefly describe the components at this location.
+A description of the included component.
Description of the included inventory.
Description of the included inventory.
A Windows laptop, not defined in the SSP inventory.
+A subnet not defined in the SSP inventory.
Description of the included inventory.
Describe this web application test.
A description of the included roles.
+A description of an excluded role.
+This SAP is based on
The
The
The
Security controls that ... on these security controls.
+[IA Name] will ...
+[IA Name] data gathering activities will ...
+The sampling methodology for evidence/artifact gathering, related to controls assessment, is described in Appendix B.
+[IA Name] [will/will not] ...
+The Penetration Test Plan and Methodology is attached in Appendix C.
+The sampling methodology for evidence/artifact gathering, related to controls assessment, is described in Appendix B.
+[IA Name] [will/will not] ...
+Include all controls in the baseline.
+Then exclude any specific controls if necessary.
+Provide rationale/justification for control exclusion here.
+Describe the purpose of the tool here.
+Describe the purpose of the tool here.
+Description of the manual test
+Describe test step #1
Describe test step #2
Describe test step #3
We will login as a customer ...cut... browser to various URLs
+Test ID | +Test Name | +Description | +
---|---|---|
[Insert test ID] | +[Insert test name] | +[Insert test description text] | +
optional description here
+optional description here
+Cites assessment laptop.
Cites assessment laptop.
Cites Vulnerability Scanning Tool
Cites Database Scanning Tool
Any testing will be performed according to terms and conditions designed to minimize risk exposure that could occur during security testing.
+A disclosure statement
+The following activities are to be included as part of the FedRAMP assessment.
+Port scans and other network service interaction and queries
+Network sniffing, traffic monitoring, traffic analysis, and host discovery
+Attempted logins or other use of systems, with any account name/password
+Attempted structured query language (SQL) injection and other forms of input + parameter testing
+The following activities are explicitly excluded from the assessment.
+Changes to assigned user passwords
+Modification of user files or system files
+Telephone modem probes and scans (active and passive)
+Intentional viewing of [CSP Name] staff email, Internet caches, and/or personnel + cookie files
+Denial of service attacks
+Exploits that will introduce new weaknesses to the system
+Intentional introduction of malicious code (viruses, Trojans, worms, etc.)
+Signed SAP
Embed or reference copies of the sampling methodology for security controls assessment and vulnerability scanning (if applicable).
+. . . /p> + +
Include | +Mandatory Attack Vectors | +Include | +Threat Models | +Include | +Attack Models | +
---|---|---|---|---|---|
x | +External to Corporate | ++ | Internet based (untrusted) | ++ | Enterprise | +
Role Name | +Test User ID | +Associated Functions | +
---|---|---|
This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SAR (rev 4 or rev 5) this OSCAL document is for.
+Brief assessment description.
Brief assessment description.
Brief assessment description.
Statement about satisfaction of this objective.
+Statement about satisfaction of this objective.
+[EXAMPLE]The AC policy existed, and had all the required elements.
+If the policy is defined in the SSP as a component.
Reviewed Policy
If the policy is not an SSP component.
[EXAMPLE]The person interviewed knew about the policy and where to find it.
+describe the evidence.
Contents of the Observations and Evidence cell in the TCW.
+Policy describes procedure, which could not be found.
[EXAMPLE]There is an issue with an SSP Statement.
This is a general description of the identified risk.
+This is a statement about the identified risk in the context of this system.
+cut.
This is a description of the identified risk.
+This is a statement about the identified risk.
+A description of the recommended remediation.
+TCW: Assessor's recommended remediation + (lifecycle='recommendation').
+Undocumented devices found on network.
+Raw scanner tool output - discovery scan.
+Undocumented hosts are entered into the SAR's local-definitions.
+The results of the discovery scan.
Undocumented devices found on network.
+Raw scanner tool output - discovery scan.
+Undocumented hosts are entered into the SAR's result/local-definitions section as inventory-items or components.
+Undocumented hosts are listed in the observations assembly as subjects.
+The origin must contain the UUID of the tool used to perform the scan.
+The results of the discovery scan.
This is a description of the identified risk.
+ +Scans: Vulnerability Description.
+ + +This is a statement about the identified risk.
+ +Scans: N/A.
+ + +A description of the recommended remediation.
+ +Scans: Tool's recommended remediation (type='recommendation')
+ + + +This is a description of the vulnerability provided by the tool.
+This is a statement about the identified risk as provided by the tool.
+Penetration Testing
A finding from penetration testing activities.
If a penetration test result is favorable, such as to say the SOC detected the activities appropriately, no risk is required.
+If a penetration test result identifies a vulnerability or deficiency, the risk assembly is required.
+This is a description of the issue found by the penetration testing team.
+Statement about the risk identified by penetration testing.
+A description of the recommended remediation as provided by the assessor.
+The assessor may add their recommendation.
+False positive justification.
A screen shot showing the setting is correct
Vendor detail describing why this happens.
Justification for the OR.
Screen shot showing impact when patched.
+Vendor detail describing why this happens.
+Justify the risk.
cut
cut
A description of the recommended remediation as provided by the tool.
+A description of the recommended remediation as provided by the assessor.
+Describe what action(s) the CSP took to close the risk.
+Applied patch. Vulnerability no longer found in subsequent scan.
+[3PAO] attests to the accuracy of the information provided in this FedRAMP Security Assessment Report for the annual assessment + of [Information System Name]
+This [Information System Name] SAR provides a complete assessment of the applicable FedRAMP controls defined in the SAP. + Evidence to validate the successful implementation of the security controls has been collected and validated, and will be made + available upon request.
+Based on the remaining risk noted in the [Information System Abbreviation] Risk Exposure Table, and the continuous improvement + of security related processes and controls, [3PAO Name] [recommends |does not recommend | provisionally recommends] + continued authorization be granted for [Information System Name].
+This is a description of the vulnerability provided by the tool.
+This is a statement about the identified risk as provided by the tool.
+This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SSP (rev 4 or rev 5) this OSCAL document is for.
+Remarks are required if service model is "other". Optional otherwise.
+Remarks are required if service model is "other". Optional otherwise.
+Remarks are required if deployment model is "hybrid". Optional otherwise.
+Remarks are optional if status/state is "operational".
+Remarks are required otherwise.
+Describe the purpose and functions of this system here.
+ + +Briefly describe leveraged system.
+Briefly describe the interconnection details.
+A holistic, top-level explanation of the FedRAMP authorization boundary.
+A diagram-specific explanation.
The primary authorization boundary diagram.
A holistic, top-level explanation of the system's network.
+A diagram-specific explanation.
The primary network architecture diagram.
A holistic, top-level explanation of the system's data flows.
+A diagram-specific explanation.
The primary data flow diagram.
Describe the service
FIPS 140-2 Validated Module
A product with a cryptographic module.
FIPS 140-3 Validated Module
A product with a cryptographic module.
Flat-File Example (No implemented-component).
If no, explain why. If yes, omit remarks field.
COMMENTS: Additional information about this item.
If no, explain why. If yes, omit remarks field.
Optional, longer, formatted description.
If needed, describe this instance.
COMMENTS: Additional information about this item.
This field required by OSCAL, but may be left blank.
+FedRAMP requires no specific content here.
+Description of the component.
+Description of the component.
+Describe how is the software component satisfying the control.
+Describe how is the process satisfies the control.
+Description of the component.
+Describe how individual components are working together.
+Describe how the system - as a whole - is satisfying this statement.
+This can include policy, procedures, hardware, software, etc.
+Describe how Part a is satisfied within the system.
+An example component representing a policy.
+Describe how this policy satisfies Part a.
+Describe how the system - as a whole - is satisfying this statement.
+Leveraging system's responsibilities in satisfaction of AC-2.
+Not linked to inheritance, so this is always required.
+Describe how the software is satisfying this statement.
+Customer appropriate description of what may be inherited.
+Customer responsibilities if inheriting this capability.
+Describe what is satisfied by this system.
Describe what is inherited from the leveraged system in satisfaction + of this control statement.
+Optional: Information provided by leveraged system.
+Description of how the responsibility was satisfied.
++ The entire system as depicted in the system authorization boundary. +
Describe the service
FIPS 140 Validated Module
Component representing the entire system.
+FedRAMP SSP Template Section 13
Describe how Part a is satisfied within the system.
+Describe how Part b 1 is satisfied within the system.
+Describe how Part b 2 is satisfied within the system.
+personnel screening criteria – as required by specific information
+personnel screening criteria - as required by specific information
Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually.
-Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually.
+CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (ConMon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSOs authorized via the Agency path as each agency customer is responsible for performing ConMon oversight. It does not apply to CSOs authorized via the JAB path because the JAB performs ConMon oversight.
Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP’s Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
+Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.
FedRAMP does not provide a template for the Configuration Management Plan. However, NIST SP 800-128, Guide for Security-Focused Configuration Management of Information Systems, provides guidelines for the implementation of CM controls as well as a sample CMP outline in Appendix D of the Guide
If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be utilized.
"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
+"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.
For cases where technology doesn’t allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
+For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.
The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
+The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
Second parameter not-applicable
-The service provider defines controlled areas within facilities where the information and information system reside.
-The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.
-Must comply with NIST SP 800-88
-Equipment and procedures may be tested or validated for effectiveness
-Must comply with NIST SP 800-88
+Second parameter not-applicable
The service provider measures temperature at server inlets and humidity levels by dew point.
+The service provider defines controlled areas within facilities where the information and information system reside.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
+The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.
Select the appropriate FedRAMP Baseline
+Must comply with NIST SP 800-88
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
-Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
+Equipment and procedures may be tested or validated for effectiveness
See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
-an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
-If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
-to include all Authorizing Officials; for JAB authorizations to include FedRAMP
-Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
-Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
-Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a “warning” as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on “Tracking of Compliance Scans” in FAQs.
+Must comply with NIST SP 800-88
The service provider measures temperature at server inlets and humidity levels by dew point.
+Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
+Select the appropriate FedRAMP Baseline
+Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
+Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
+See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
+an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
+If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
+to include all Authorizing Officials; for JAB authorizations to include FedRAMP
+Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
+Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
+Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.
+This enhancement is required for all high (or critical) vulnerability scan findings.
+The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).
+The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
+See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.
+track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.
+The service provider must document its methodology for reviewing newly developed code for the Service in its Continuous Monitoring Plan.
+If Static code analysis cannot be performed (for example, when the source code is not available), then dynamic code analysis must be performed (see SA-11 (8))
+This enhancement is required for all high (or critical) vulnerability scan findings.
-The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).
-The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
-See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.
-track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.
-The service provider must document its methodology for reviewing newly developed code for the Service in its Continuous Monitoring Plan.
-If Static code analysis cannot be performed (for example, when the source code is not available), then dynamic code analysis must be performed (see SA-11 (8))
-For each instance of data in transit, confidentiality AND integrity should be through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5), or in combination.
- +For clarity, this control applies to all data in transit. Examples include the following data flows:
The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).
FedRAMP-Defined Assignment / Selection Parameters
SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when outside of Controlled Access Area (CAA)]
@@ -3432,21 +11383,33 @@SC-8 (5) applies when physical protection has been selected as the method to protect confidentiality and integrity. For physical protection, data in transit must be in either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.
- +Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).
- -Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS’s Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS’ recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
- + +Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
+Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.
- +CNSSI No.7003 can be accessed here:
https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_2015.pdf
- +DHS Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies can be accessed here:
https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf
See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
+See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.
The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS 140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program (CMVP).
https://csrc.nist.gov/projects/cryptographic-module-validation-program
The organization supports the capability to use cryptographic mechanisms to protect information at rest.
+When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
+Note that this enhancement requires the use of cryptography in accordance with SC-13.
+Organizations should select a mode of protection that is targeted towards the relevant threat scenarios.
+Examples:
+A. Organizations may apply full disk encryption (FDE) to a mobile device where the primary threat is loss of the device while storage is locked.
+B. For a database application housing data for a single customer, encryption at the file system level would often provide more protection than FDE against the more likely threat of an intruder on the operating system accessing the storage.
+C. For a database application housing data for multiple customers, encryption with unique keys for each customer at the database record level may be more appropriate.
+The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.
+The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.
+Synchronization of system clocks improves the accuracy of log analysis.
+The organization supports the capability to use cryptographic mechanisms to protect information at rest.
-When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
-Note that this enhancement requires the use of cryptography in accordance with SC-13.
-Organizations should select a mode of protection that is targeted towards the relevant threat scenarios.
-Examples:
-A. Organizations may apply full disk encryption (FDE) to a mobile device where the primary threat is loss of the device while storage is locked.
-B. For a database application housing data for a single customer, encryption at the file system level would often provide more protection than FDE against the more likely threat of an intruder on the operating system accessing the storage.
-C. For a database application housing data for multiple customers, encryption with unique keys for each customer at the database record level may be more appropriate.
-The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.
-The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.
-Synchronization of system clocks improves the accuracy of log analysis.
-Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.
Determine if the organization defines information system account types to be identified and selected to support organizational missions/business functions.
Access control policy; procedures addressing account management; security plan; information system design documentation; information system configuration settings and associated documentation; list of active system accounts along with the name of the individual associated with each account; list of conditions for group and role membership; notifications or records of recently transferred, separated, or terminated employees; list of recently disabled information system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; information system monitoring records; information system audit records; other relevant documents or records.
Organizational personnel with account management responsibilities; system/network administrators; organizational personnel with information security responsibilities.
Organizational processes for account management on the information system; automated mechanisms for implementing account management.
NSO for non-privileged users. Attestation for privileged users related to multi-factor identification and authentication.
FED - This is related to agency data and agency policy solution.
FED - This is related to agency data and agency policy solution.
NSO - All access to Cloud SaaS are via web services and/or API. The device accessed from or whether via wired or wireless connection is out of scope. Regardless of device accessed from, must utilize approved remote access methods (AC-17), secure communication with strong encryption (SC-13), key management (SC-12), and multi-factor authentication for privileged access (IA-2[1]).
NSO - All access to Cloud SaaS are via web service and/or API. The device accessed from is out of the scope. Regardless of device accessed from, must utilize approved remote access methods (AC-17), secure communication with strong encryption (SC-13), key management (SC-12), and multi-factor authentication for privileged access (IA-2 [1]).
NSO - Loss of availability of the audit data has been determined to have little or no impact to government business/mission needs.
NSO - Loss of availability of the audit data has been determined as little or no impact to government business/mission needs.
Condition: There are connection(s) to external systems. Connections (if any) shall be authorized and must: 1) Identify the interface/connection. 2) Detail what data is involved and its sensitivity. 3) Determine whether the connection is one-way or bi-directional. 4) Identify how the connection is secured.
Attestation - for compliance with FedRAMP Tailored LI-SaaS Continuous Monitoring Requirements.
Condition: There are connection(s) to external systems. Connections (if any) shall be authorized and must: 1) Identify the interface/connection. 2) Detail what data is involved and its sensitivity. 3) Determine whether the connection is one-way or bi-directional. 4) Identify how the connection is secured.
Required - Specifically include details of least functionality.
NSO- Not directly related to protection of the data.
NSO - Boundary is specific to SaaS environment; all access is via web services; users' machine or internal network are not contemplated. External services (SA-9), internal connection (CA-9), remote access (AC-17), and secure access (SC-12 and SC-13), and privileged authentication (IA-2[1]) are considerations.
NSO - Loss of availability of the SaaS has been determined as little or no impact to government business/mission needs.
NSO - Loss of availability of the SaaS has been determined as little or no impact to government business/mission needs.
NSO - Loss of availability of the SaaS has been determined as little or no impact to government business/mission needs.
NSO - Loss of availability of the SaaS has been determined as little or no impact to government business/mission needs.
NSO for non-privileged users. Attestation for privileged users related to multi-factor identification and authentication - specifically include description of management of service accounts.
Determine if the information system:
Condition: Must document and assess for privileged users. May attest to this control for non-privileged users. FedRAMP requires a minimum of multi-factor authentication for all Federal privileged users, if acceptance of PIV credentials is not supported. The implementation status and details of how this control is implemented must be clearly defined by the CSP.
Condition: Must document and assess for privileged users. May attest to this control for non-privileged users. FedRAMP requires a minimum of multi-factor authentication for all Federal privileged users, if acceptance of PIV credentials is not supported. The implementation status and details of how this control is implemented must be clearly defined by the CSP.
Attestation - Specifically attest to US-CERT compliance.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.
Attestation - Specifically stating that any third-party security personnel are treated as CSP employees.
Condition: If availability is a requirement, define protections in place as per control requirement.
Condition: If implementing need to detail how they meet it or don't meet it.
NSO - Not directly related to the security of the SaaS.
Attestation - Specifically related to US-CERT and FedRAMP communications procedures.
Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP’s Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
+Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.
"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
+"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.
-For cases where technology doesn’t allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
-For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.
-Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.
+For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
+For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.
+Note that (c) and (d) require the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13).
The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
+The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
+Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
+See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
+an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
+If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
+to include all Authorizing Officials; for JAB authorizations to include FedRAMP
+Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
+Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
+Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.
+The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).
+The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
+See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.
+Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
-Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
-See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
-an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
-If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
-to include all Authorizing Officials; for JAB authorizations to include FedRAMP
-Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
-Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
-Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a “warning” as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on “Tracking of Compliance Scans” in FAQs.
-The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).
-The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
-See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.
-
The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).
@@ -1958,7 +6472,7 @@
Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).
-
Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS’s Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS’ recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
+Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.
@@ -1970,6 +6484,18 @@
See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
+See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.
Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.
personnel screening criteria – as required by specific information
+personnel screening criteria - as required by specific information
Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.
-Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.
-For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.
-Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.
+Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.
+For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.
+Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP’s Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
+Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.
FedRAMP does not provide a template for the Configuration Management Plan. However, NIST SP 800-128, Guide for Security-Focused Configuration Management of Information Systems, provides guidelines for the implementation of CM controls as well as a sample CMP outline in Appendix D of the Guide
The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
-The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
+"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
+"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
For cases where technology doesn’t allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
+For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.
The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
+The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
The service provider measures temperature at server inlets and humidity levels by dew point.
-Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
-Select the appropriate FedRAMP Baseline
-The service provider measures temperature at server inlets and humidity levels by dew point.
+Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
+Select the appropriate FedRAMP Baseline
+See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
+an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
+If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
+to include all Authorizing Officials; for JAB authorizations to include FedRAMP
+Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
+Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
+Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.
+See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
-an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
-If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
-to include all Authorizing Officials; for JAB authorizations to include FedRAMP
-Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
-Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
-Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a “warning” as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on “Tracking of Compliance Scans” in FAQs.
-For each instance of data in transit, confidentiality AND integrity should be through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5), or in combination.
- +For clarity, this control applies to all data in transit. Examples include the following data flows:
The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).
FedRAMP-Defined Assignment / Selection Parameters
SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when outside of Controlled Access Area (CAA)]
@@ -3104,21 +10049,33 @@SC-8 (5) applies when physical protection has been selected as the method to protect confidentiality and integrity. For physical protection, data in transit must be in either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.
- +Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).
- -Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS’s Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS’ recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
- + +Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
+Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.
- +CNSSI No.7003 can be accessed here:
https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_2015.pdf
- +DHS Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies can be accessed here:
https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf
See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
+See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.
The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS 140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program (CMVP).
https://csrc.nist.gov/projects/cryptographic-module-validation-program
@@ -3208,6 +10186,26 @@Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.