SlideShare a Scribd company logo
Federal Risk and Authorization
  Management Program
  (FedRAMP)

Developing Your System Security Plan


November 28, 2012
Today’s Webinar

FedRAMP is a government-wide program that provides
a standardized approach to security assessment,
authorization, and continuous monitoring for cloud
services.
 The goal of this webinar is review the System
  Security Plan (SSP) and provide the information
  and guidelines that you need to accurately
  document the FedRAMP controls and assemble
  a strong SSP that will meet FedRAMP review
  requirements.



                                                     2
System Security Plan (SSP) Overview

• Detailed description of Control Implementation,
  based on NIST SP 800-53, r3

• Global view of how the system is structured

• Identifies personnel in the organization that are
  responsible for system security

• Delineates control responsibility between the
  customer or vendor

• The SSP is the key document to moving the
  FedRAMP assessment process forward

• Putting together a well documented SSP can
  save a lot of time in moving through the process




                                                      3
Why Such a Long Document?

             • SSP template is 352 pages long

             • Long template required to assure
               the system and implementation of
               controls are properly documented

             • Effort to produce a well
               documented SSP leads to a smooth
               process



                                                  4
SSP Document Organization

1. System Information and
   Scope
   Section 1 – Section 12




                                     5
SSP Document Organization

2. Description of Control
   Implementation
   Section 13




                                      6
SSP Document Organization

3. Appendix of Supporting
   Documents
   Section 14




                                     7
Describe Your System

Sections 1 – 11 Contain
Description of your
System
• Section 1 – Basic
  System Info
• System Name
• Unique Identifier




                           8
Section 2 – Information System Categorization

• Overall System
  Categorization
• CSP Data Information
  Types




                                                    9
Section 2 – Information System Categorization

• Security Objective
  Categorization (High
  Water Mark)
• Select Security Baseline
  based on Impact Level




                                                    10
Section 2 – Information System Categorization

• FIPS Guidance on NIST
  CSRC Website




                                                    11
Section 2 – Selecting E-Authentication Level

• E-Authentication Determination




                                                        12
Section 2 – Selecting E-Authentication Level

• OMB Memo M-04-04, EAuthentication Guidance for Federal Agencies




                                                                    13
Section 3 -System Owner

• System Owner
  Contact




                             14
Section 5 – Designated Contacts

• Technical and
  Management POC




                                     15
Section 6 – Security Responsibility

• Information System
  Security Contact
• PMO will provide
  FedRAMP ISSO info




                                         16
Section 7– Operational Status

• List the operational
  state of the system




                                     17
Section 8 – Information System Type

• List cloud service
  model




                                           18
Section 8 –Information System Type

• Is the cloud service
  built on top of
  another cloud system
  with a FedRAMP
  Provisional ATO?




                                         19
Section 9 – General System Description

• The general System Description section contains some of the most
  important parts of the SSP in terms of defining the roles of the system’s
  users, defining the system boundary, and describing the system
  architecture
• What is the purpose of the system?
   – Why was it built? What problem does it solve? What solution does it
      provide?
• Types of Users
   – Defined by what privileges the user is authorized to use
   – Is the user internal or external
   – Examples of roles include systems administrators, database
      administrators, release engineers, and customers
   – List other roles that have the ability to configure components that may
      affect services (web server administrators, network administrators,
      and firewall administrators)

                                                                               20
Describing System Boundaries

                   System Boundary
                                                                        Internet
                                  Network
                               Components




                                            Protection
                                            Boundary
                                                         Ports,
                                                         Protocols
                                                         and Services
    Network
    Architecture                                                        Outside the System
                                                                            Boundary




                                            Protection
                                            Boundary
                                                                        Different System Outside
                                                                              the Boundary



•    Understand which IT assets fit within the boundary.
•    Interconnections: indicate and label interconnections to other systems
•    Make sure your boundary is consistent with hardware & software inventory
•    Make sure your diagrams are consistent with boundary descriptions

                                                                                                   21
Describing the Network Architecture

                                                                                Primary
                                                                               Datacenter
                                                                                                                   Internet
                                  Cloud Service
                                 Provider Network
  Technical
   Support


                                                  VPN
                                                  SSL
   10.x.x.x                                                                                                                                   Customer
                                Firewall                                                                                      Mobile user     192.x.x.x
                                10.x.x.x                                                                                       192.x.x.x

                                                                                                             WAN
       Support




                    Load Balancer
                       10.x.x.x


Jump Box
                                                                  Router
 10.x.x.x
                                                                  10.x.2.x

                                                                                      Operational Services
                                                                                        (Authentication,
                                                    Switch                              Messaging, etc.)                          Alternate
                                Router              10.x.2.x                                10.x.x.x
                                10.x.1.x                                                                                         Datacenter

                                                                                                                                     Backup servers
                                                                                                                                        10.x.3.x
                                                                                  Web Server
  Storage
                     Server                                                        10.x.2.x                  Authorization
  10.x.1.x                             Database          Virtualized Servers
                     10.x.1.x                                  10.x.2.x                                       Boundary

                                                                                                                                                      22
Section 10 – System Environment

• System Inventories
  – Hardware




                                     23
Section 10 – System Environment

• System Inventories
  – Software




                                     24
Section 10 – System Environment

• System Inventories
  – Network




                                     25
Section 10 – System Environment

• System Inventories
  – Port, Protocols and
    Services




                                     26
Data Flow Diagram




(Source: FISMA Center)

                                        27
Describing Security Controls in the SSP
• Security Control and enhancement requirement.
• Security control and enhancements require
  security control summary information.
• NOTE: The “-1” controls (e.g. AC-1, SC-1 etc.)
  describe Policies and Procedures.
• Some have multiple parameters and additional
  FedRAMP requirements
• All requirements (Part a – Part e) must have a
  response concerning implementations for the
  control.
Control Summary Definition
Responsible Role: the CSP should indicate what staff
role within their organization is responsible for
maintaining and implementing that particular
security control. Examples of the types of role
names may differ from CSP to CSP but could include
role names such as:
       System Administrator
       Database Administrator
       Network Operations Analyst
       Network Engineer
       Configuration Management Team Lead
       IT Director
       Firewall Engineer

                                                        28
Control Origination Definitions

     Control Origination                        Definition                                        Example
Service Provider Corporate   A control that originates from the CSP             DNS from the corporate network provides
                             corporate network.                                 address resolution services for the
                                                                                information system and the service offering.

Service Provider System      A control specific to a particular system at the   A unique host based intrusion detection
Specific                     CSP and the control is not part of the standard    system (HIDs) is available on the service
                             corporate controls.                                offering platform but is not available on the
                                                                                corporate network.

Service Provider Hybrid      A control that makes use of both corporate         There a scans of the corporate network
                             controls and additional controls that are          infrastructure; scans of databases and web
                             specific to a particular system at the CSP.        based application are system specific.

Configured by Customer       A control where the customer needs to apply a      User profiles, policy/audit configurations,
                             configuration in order to meet the control         enabling/disabling key switches (e.g.,
                             requirement.                                       enable/disable http or https, etc), entering
                                                                                an IP range specific to their organization are
                                                                                configurable by the customer.

Provided by Customer         A control where the customer needs to provide      The customer provides a SAML SSO solution
                             additional hardware or software in order to        to implement two-factor authentication.
                             meet the control requirement.

Shared                       A control that is managed and implemented          Security awareness training must be
                             partially by the CSP and partially by the          conducted by both the CSP and the
                             customer.                                          customer.

                                                                                                                                 29
Quick Tips: Easy Mistakes to Avoid

• Submitting an SSP without a Hardware or Software
  Inventory
• Incorrect references to supporting documents or
  guidelines
• Presenting non-applicable controls as implemented
• Not reviewing information pulled from other
  documents or sources
• Single sentence responses without details




                                                      30
Modifying the SSP

• You can modify the SSP to make it
  easier to describe your system
   • Add new sections
   • Do not remove required sections

• Make sure to provide sensitivity
  markings on the cover page and
  footer
   • Change to match company
      designation
   • Place markings in other sections
      as needed


                                        31
Supporting Documentation

User Guide

Describes how leveraging
agencies use the system




                                 32
Supporting Documentation

User Guide

Describes how leveraging
agencies use the system




                                   33
Supporting Documentation

Rules of Behavior

Defines the rules that describe
the system user's
responsibilities and expected
behavior with regard to
information and information
system usage and access.




                                   34
Supporting Documentation

IT Contingency Plan

This document is used to define
and test interim measures to
recover information system
services after a disruption. The
ability to prove that system data
can be routinely backed up and
restored within agency specified
parameters is necessary to limit
the effects of any disaster and
the subsequent recovery efforts.


                                    35
Supporting Documentation

Configuration Management
Plan

This plan describes how
changes to the system are
managed and tracked. The
Configuration Management
Plan should be consistent with
NIST SP 800-128




                                 36
Supporting Documentation


Incident Response Plan

This plan documents how
incidents are detected, reported,
and escalated and should include
timeframes, points of contact,
and how incidents are handled
and remediated. The Incident
Response Plan should be
consistent with NIST Special
Publication 800-61.



                                    37
Supporting Documentation

Privacy Threshold Analysis
This questionnaire is used to
help determine if a Privacy
Impact Assessment is required.

Privacy Impact Assessment
This document assesses what
Personally Identifiable
Information (PII) is captured and
if it is being properly
safeguarded. This deliverable is
not always necessary.


                                    38
What Makes a Good SSP

Key Areas of Focus for Documentation
     • Completeness
     • Compliant with FedRAMP policy and consistency with other package documents
     • Delivery of supporting documentation
     • Documentation is adequately referenced – e.g. : Policy, SOPs, Rules of Behavior,
       common control catalogs, waivers, exceptions, etc.

Content should address four (4) criteria :
    1. What
    2. Who
    3. When
    4. How

Proper level of detail for responses should be:
    • Unambiguous
    • Specific
    • Complete
    • Comprehensive
    • Make sure the response is sufficient in length to properly answer the question
                                                                                          39
How to Document References


References To Other Documents Must:
• Be relevant to the control requirement
• Be up to date…not from 4 years ago
• Refer to a real document, not something that
  doesn’t exist

• References Must Include:
   • Full document title
   • Publication date
   • Version number

                                                 40
CM-6: Poor Response


Security settings of information technology products
used with the XX system are set to the most restrictive
mode consistent with information system operational
requirements. From NIST Special Publication 800-70,
guidance was received on necessary configuration
settings for information technology products.




                                                          41
CM-6: Good Response

A. All servers, databases, and workstations are configured according to the Center for
   Internet Security (Level 1) guidelines.
B. Configuration settings are implemented and updated weekly by the System
   Administrator.
C. No system component is exempt from compliance with CIS Level 1 settings
D. Team X monitors and controls changes to configuration settings by using ZZZ
   monitoring system. Any and all changes must go through the official change request
   process.

More information may be found in the Configuration Management Plan.

(1) CSP XYZ uses COTS Product AutoBlitz, Version 1.3 to manage, apply, and verify
configuration settings. The nightly AutoBlitz report identifies and detects configuration
changes made in the last 24 hours, including authorized and unauthorized changes
(3) Upon detection of an unauthorized change or setting, a notice is automatically sent
to the CSP XYZ SOC to report and track the incident.



                                                                                            42
Resources: Guide to Understanding FedRAMP




                                            43
In Summary…

• Three main parts of the SSP
• Avoid easy mistakes by paying attention to details

• Structure your response
    • Who, What, When, How
    • Be consistent throughout the document
    • Provide the right details in your answer

• Read the Guide to Understanding FedRAMP
   • Review the Prep Checklist


                                                       44
Question and Answer Session

For more information, please contact us or
visit us at any of the following websites:
http://FedRAMP.gov
http://gsa.gov/FedRAMP
Email: info@fedramp.gov
               @ FederalCloud
For more information, please contact us or
visit us at any of the following websites:
http://FedRAMP.gov
http://gsa.gov/FedRAMP
Email: info@fedramp.gov
               @ FederalCloud

More Related Content

PDF
IIJmio meeting 19 IIJ フルMVNO徹底解説
PDF
FedRAMP 3PAO Training
PPTX
今さら聞けない人のためのGit超入門 GitLab 14対応版
PPTX
VPP事始め
PDF
EVPN & VXLAN for Cloud Builders
PDF
【SRX】JUNOS ハンズオントレーニング資料 SRXシリーズ サービス ゲートウェイ コース
PDF
Introduction to OpenCL (Japanese, OpenCLの基礎)
PDF
Docker infiniband
IIJmio meeting 19 IIJ フルMVNO徹底解説
FedRAMP 3PAO Training
今さら聞けない人のためのGit超入門 GitLab 14対応版
VPP事始め
EVPN & VXLAN for Cloud Builders
【SRX】JUNOS ハンズオントレーニング資料 SRXシリーズ サービス ゲートウェイ コース
Introduction to OpenCL (Japanese, OpenCLの基礎)
Docker infiniband

What's hot (20)

PPTX
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
PPTX
Spring tools4
PDF
Oracle Cloud Infrastructure:2023年5月度サービス・アップデート
PDF
TCAMのしくみ
PPTX
OpenAI FineTuning を試してみる
PDF
Chapter 2 Configure a Network Operating System
PPTX
PPTX
Wiresharkの解析プラグインを作る ssmjp 201409
PDF
【EX/QFX】JUNOS ハンズオントレーニング資料 EX/QFX シリーズ サービス ゲートウェイ コース
PPTX
nftables: the Next Generation Firewall in Linux
PDF
시스코 wIPS 소개자료
PDF
大規模オンプレミス環境はGitOpsの夢を見るか(CI/CD Conference 2021 by CloudNative Days 発表資料)
PDF
IIJmio meeting 31 音声通信の世界
PDF
1891件以上のカーネルの不具合修正に貢献した再現用プログラムを自動生成するsyzkallerのテスト自動化技術(NTT Tech Conference ...
PDF
第7回勉強会 ネットワークの基礎
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PDF
ネットワークエンジニアはどこでウデマエをみがくのか?
PDF
FCスイッチゾーニング設定ガイド
PDF
[Cloud OnAir] GCP で誰でも始められる HPC 2019年5月9日 放送
Cisco Modeling Labs (CML)を使ってネットワークを学ぼう!(DevNet編)
Spring tools4
Oracle Cloud Infrastructure:2023年5月度サービス・アップデート
TCAMのしくみ
OpenAI FineTuning を試してみる
Chapter 2 Configure a Network Operating System
Wiresharkの解析プラグインを作る ssmjp 201409
【EX/QFX】JUNOS ハンズオントレーニング資料 EX/QFX シリーズ サービス ゲートウェイ コース
nftables: the Next Generation Firewall in Linux
시스코 wIPS 소개자료
大規模オンプレミス環境はGitOpsの夢を見るか(CI/CD Conference 2021 by CloudNative Days 発表資料)
IIJmio meeting 31 音声通信の世界
1891件以上のカーネルの不具合修正に貢献した再現用プログラムを自動生成するsyzkallerのテスト自動化技術(NTT Tech Conference ...
第7回勉強会 ネットワークの基礎
CCNA 1 Routing and Switching v5.0 Chapter 1
ネットワークエンジニアはどこでウデマエをみがくのか?
FCスイッチゾーニング設定ガイド
[Cloud OnAir] GCP で誰でも始められる HPC 2019年5月9日 放送
Ad

Viewers also liked (20)

PDF
FedRAMP CSP SSP Training
PDF
Getting started on fed ramp sec auth for csp
PDF
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
PDF
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
PDF
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
PDF
Guide to understanding_fed_ramp_042213
DOCX
Control Implementation Summary (CIS) Template
DOCX
Wave 1 Implementation Summary
PPT
Information security as an ongoing effort
PDF
Estimating Development Security Maturity in About an Hour
PDF
DevSecOps in Baby Steps
PDF
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
PPTX
A Closer Look on C&C Panels
PDF
Conops v1.1 07162012_508
PPTX
Azure gov march 15th
PDF
Fed ramp agency_implementation_webinar
PPT
Material best practices in network security using ethical hacking
DOCX
E authentication template 050212
PPT
Fisma FedRAMP Drupal
PPT
Network security & information security maintainence modified
FedRAMP CSP SSP Training
Getting started on fed ramp sec auth for csp
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
Guide to understanding_fed_ramp_042213
Control Implementation Summary (CIS) Template
Wave 1 Implementation Summary
Information security as an ongoing effort
Estimating Development Security Maturity in About an Hour
DevSecOps in Baby Steps
Focus on Federal Risk and Authorization Management Program (FedRAMP) - Panel
A Closer Look on C&C Panels
Conops v1.1 07162012_508
Azure gov march 15th
Fed ramp agency_implementation_webinar
Material best practices in network security using ethical hacking
E authentication template 050212
Fisma FedRAMP Drupal
Network security & information security maintainence modified
Ad

Similar to Fedramp developing-system-security-plan-slides (20)

PPTX
Clavister security for virtualized environment
PPSX
3 Telecom+Network Part2
PDF
Guard Era Corp Brochure 2008
PDF
Mach Technology
PDF
Layer 7 & Burton Group: New Cloud Security Model Requirements
PDF
Integrating network virtualization security in OpenStack Deployments.pdf
PDF
RunningQuantumOnQuantumAtNicira.pdf
PDF
Lecture03 H
PDF
Panel Discussion: Small Steps for USGv6 a giant leap for Internet-kind? with ...
PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
PDF
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
PDF
Michael De Leo Global IPv6 Summit México 2009
PPTX
Denial of Service in Software Defined Netoworks
PDF
PDF
Building reliable systems from unreliable components
PDF
Presentación Data Center Cablevisión Day 2010
PDF
DirectAccess
PPTX
OpenStack Quantum Network Service
PPTX
Cloud Computing Best Practices
PPTX
From Physical to Virtual to Cloud
Clavister security for virtualized environment
3 Telecom+Network Part2
Guard Era Corp Brochure 2008
Mach Technology
Layer 7 & Burton Group: New Cloud Security Model Requirements
Integrating network virtualization security in OpenStack Deployments.pdf
RunningQuantumOnQuantumAtNicira.pdf
Lecture03 H
Panel Discussion: Small Steps for USGv6 a giant leap for Internet-kind? with ...
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
Michael De Leo Global IPv6 Summit México 2009
Denial of Service in Software Defined Netoworks
Building reliable systems from unreliable components
Presentación Data Center Cablevisión Day 2010
DirectAccess
OpenStack Quantum Network Service
Cloud Computing Best Practices
From Physical to Virtual to Cloud

More from Tuan Phan (12)

PDF
TrustedAgent GRC for Vulnerability Management
PDF
TrustedAgent GRC for Public Sector
PDF
TrustedAgent and Defense Industrial Base (DIB)
PDF
TrustedAgent FedRAMP Security Authorization
PDF
Nist cybersecurity framework isc2 quantico
PDF
Introduction to NIST Cybersecurity Framework
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PDF
Building an Effective GRC Process with TrustedAgent GRC
PDF
Key Points of FISMA Reforms of 2013
PDF
Guide to understanding_fed_ramp_032513
PDF
Continuous monitoring strategy_guide_072712
PPTX
Completing fedramp-security-authorization-process
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Public Sector
TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent FedRAMP Security Authorization
Nist cybersecurity framework isc2 quantico
Introduction to NIST Cybersecurity Framework
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Building an Effective GRC Process with TrustedAgent GRC
Key Points of FISMA Reforms of 2013
Guide to understanding_fed_ramp_032513
Continuous monitoring strategy_guide_072712
Completing fedramp-security-authorization-process

Fedramp developing-system-security-plan-slides

  • 1. Federal Risk and Authorization Management Program (FedRAMP) Developing Your System Security Plan November 28, 2012
  • 2. Today’s Webinar FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services.  The goal of this webinar is review the System Security Plan (SSP) and provide the information and guidelines that you need to accurately document the FedRAMP controls and assemble a strong SSP that will meet FedRAMP review requirements. 2
  • 3. System Security Plan (SSP) Overview • Detailed description of Control Implementation, based on NIST SP 800-53, r3 • Global view of how the system is structured • Identifies personnel in the organization that are responsible for system security • Delineates control responsibility between the customer or vendor • The SSP is the key document to moving the FedRAMP assessment process forward • Putting together a well documented SSP can save a lot of time in moving through the process 3
  • 4. Why Such a Long Document? • SSP template is 352 pages long • Long template required to assure the system and implementation of controls are properly documented • Effort to produce a well documented SSP leads to a smooth process 4
  • 5. SSP Document Organization 1. System Information and Scope Section 1 – Section 12 5
  • 6. SSP Document Organization 2. Description of Control Implementation Section 13 6
  • 7. SSP Document Organization 3. Appendix of Supporting Documents Section 14 7
  • 8. Describe Your System Sections 1 – 11 Contain Description of your System • Section 1 – Basic System Info • System Name • Unique Identifier 8
  • 9. Section 2 – Information System Categorization • Overall System Categorization • CSP Data Information Types 9
  • 10. Section 2 – Information System Categorization • Security Objective Categorization (High Water Mark) • Select Security Baseline based on Impact Level 10
  • 11. Section 2 – Information System Categorization • FIPS Guidance on NIST CSRC Website 11
  • 12. Section 2 – Selecting E-Authentication Level • E-Authentication Determination 12
  • 13. Section 2 – Selecting E-Authentication Level • OMB Memo M-04-04, EAuthentication Guidance for Federal Agencies 13
  • 14. Section 3 -System Owner • System Owner Contact 14
  • 15. Section 5 – Designated Contacts • Technical and Management POC 15
  • 16. Section 6 – Security Responsibility • Information System Security Contact • PMO will provide FedRAMP ISSO info 16
  • 17. Section 7– Operational Status • List the operational state of the system 17
  • 18. Section 8 – Information System Type • List cloud service model 18
  • 19. Section 8 –Information System Type • Is the cloud service built on top of another cloud system with a FedRAMP Provisional ATO? 19
  • 20. Section 9 – General System Description • The general System Description section contains some of the most important parts of the SSP in terms of defining the roles of the system’s users, defining the system boundary, and describing the system architecture • What is the purpose of the system? – Why was it built? What problem does it solve? What solution does it provide? • Types of Users – Defined by what privileges the user is authorized to use – Is the user internal or external – Examples of roles include systems administrators, database administrators, release engineers, and customers – List other roles that have the ability to configure components that may affect services (web server administrators, network administrators, and firewall administrators) 20
  • 21. Describing System Boundaries System Boundary Internet Network Components Protection Boundary Ports, Protocols and Services Network Architecture Outside the System Boundary Protection Boundary Different System Outside the Boundary • Understand which IT assets fit within the boundary. • Interconnections: indicate and label interconnections to other systems • Make sure your boundary is consistent with hardware & software inventory • Make sure your diagrams are consistent with boundary descriptions 21
  • 22. Describing the Network Architecture Primary Datacenter Internet Cloud Service Provider Network Technical Support VPN SSL 10.x.x.x Customer Firewall Mobile user 192.x.x.x 10.x.x.x 192.x.x.x WAN Support Load Balancer 10.x.x.x Jump Box Router 10.x.x.x 10.x.2.x Operational Services (Authentication, Switch Messaging, etc.) Alternate Router 10.x.2.x 10.x.x.x 10.x.1.x Datacenter Backup servers 10.x.3.x Web Server Storage Server 10.x.2.x Authorization 10.x.1.x Database Virtualized Servers 10.x.1.x 10.x.2.x Boundary 22
  • 23. Section 10 – System Environment • System Inventories – Hardware 23
  • 24. Section 10 – System Environment • System Inventories – Software 24
  • 25. Section 10 – System Environment • System Inventories – Network 25
  • 26. Section 10 – System Environment • System Inventories – Port, Protocols and Services 26
  • 27. Data Flow Diagram (Source: FISMA Center) 27
  • 28. Describing Security Controls in the SSP • Security Control and enhancement requirement. • Security control and enhancements require security control summary information. • NOTE: The “-1” controls (e.g. AC-1, SC-1 etc.) describe Policies and Procedures. • Some have multiple parameters and additional FedRAMP requirements • All requirements (Part a – Part e) must have a response concerning implementations for the control. Control Summary Definition Responsible Role: the CSP should indicate what staff role within their organization is responsible for maintaining and implementing that particular security control. Examples of the types of role names may differ from CSP to CSP but could include role names such as: System Administrator Database Administrator Network Operations Analyst Network Engineer Configuration Management Team Lead IT Director Firewall Engineer 28
  • 29. Control Origination Definitions Control Origination Definition Example Service Provider Corporate A control that originates from the CSP DNS from the corporate network provides corporate network. address resolution services for the information system and the service offering. Service Provider System A control specific to a particular system at the A unique host based intrusion detection Specific CSP and the control is not part of the standard system (HIDs) is available on the service corporate controls. offering platform but is not available on the corporate network. Service Provider Hybrid A control that makes use of both corporate There a scans of the corporate network controls and additional controls that are infrastructure; scans of databases and web specific to a particular system at the CSP. based application are system specific. Configured by Customer A control where the customer needs to apply a User profiles, policy/audit configurations, configuration in order to meet the control enabling/disabling key switches (e.g., requirement. enable/disable http or https, etc), entering an IP range specific to their organization are configurable by the customer. Provided by Customer A control where the customer needs to provide The customer provides a SAML SSO solution additional hardware or software in order to to implement two-factor authentication. meet the control requirement. Shared A control that is managed and implemented Security awareness training must be partially by the CSP and partially by the conducted by both the CSP and the customer. customer. 29
  • 30. Quick Tips: Easy Mistakes to Avoid • Submitting an SSP without a Hardware or Software Inventory • Incorrect references to supporting documents or guidelines • Presenting non-applicable controls as implemented • Not reviewing information pulled from other documents or sources • Single sentence responses without details 30
  • 31. Modifying the SSP • You can modify the SSP to make it easier to describe your system • Add new sections • Do not remove required sections • Make sure to provide sensitivity markings on the cover page and footer • Change to match company designation • Place markings in other sections as needed 31
  • 32. Supporting Documentation User Guide Describes how leveraging agencies use the system 32
  • 33. Supporting Documentation User Guide Describes how leveraging agencies use the system 33
  • 34. Supporting Documentation Rules of Behavior Defines the rules that describe the system user's responsibilities and expected behavior with regard to information and information system usage and access. 34
  • 35. Supporting Documentation IT Contingency Plan This document is used to define and test interim measures to recover information system services after a disruption. The ability to prove that system data can be routinely backed up and restored within agency specified parameters is necessary to limit the effects of any disaster and the subsequent recovery efforts. 35
  • 36. Supporting Documentation Configuration Management Plan This plan describes how changes to the system are managed and tracked. The Configuration Management Plan should be consistent with NIST SP 800-128 36
  • 37. Supporting Documentation Incident Response Plan This plan documents how incidents are detected, reported, and escalated and should include timeframes, points of contact, and how incidents are handled and remediated. The Incident Response Plan should be consistent with NIST Special Publication 800-61. 37
  • 38. Supporting Documentation Privacy Threshold Analysis This questionnaire is used to help determine if a Privacy Impact Assessment is required. Privacy Impact Assessment This document assesses what Personally Identifiable Information (PII) is captured and if it is being properly safeguarded. This deliverable is not always necessary. 38
  • 39. What Makes a Good SSP Key Areas of Focus for Documentation • Completeness • Compliant with FedRAMP policy and consistency with other package documents • Delivery of supporting documentation • Documentation is adequately referenced – e.g. : Policy, SOPs, Rules of Behavior, common control catalogs, waivers, exceptions, etc. Content should address four (4) criteria : 1. What 2. Who 3. When 4. How Proper level of detail for responses should be: • Unambiguous • Specific • Complete • Comprehensive • Make sure the response is sufficient in length to properly answer the question 39
  • 40. How to Document References References To Other Documents Must: • Be relevant to the control requirement • Be up to date…not from 4 years ago • Refer to a real document, not something that doesn’t exist • References Must Include: • Full document title • Publication date • Version number 40
  • 41. CM-6: Poor Response Security settings of information technology products used with the XX system are set to the most restrictive mode consistent with information system operational requirements. From NIST Special Publication 800-70, guidance was received on necessary configuration settings for information technology products. 41
  • 42. CM-6: Good Response A. All servers, databases, and workstations are configured according to the Center for Internet Security (Level 1) guidelines. B. Configuration settings are implemented and updated weekly by the System Administrator. C. No system component is exempt from compliance with CIS Level 1 settings D. Team X monitors and controls changes to configuration settings by using ZZZ monitoring system. Any and all changes must go through the official change request process. More information may be found in the Configuration Management Plan. (1) CSP XYZ uses COTS Product AutoBlitz, Version 1.3 to manage, apply, and verify configuration settings. The nightly AutoBlitz report identifies and detects configuration changes made in the last 24 hours, including authorized and unauthorized changes (3) Upon detection of an unauthorized change or setting, a notice is automatically sent to the CSP XYZ SOC to report and track the incident. 42
  • 43. Resources: Guide to Understanding FedRAMP 43
  • 44. In Summary… • Three main parts of the SSP • Avoid easy mistakes by paying attention to details • Structure your response • Who, What, When, How • Be consistent throughout the document • Provide the right details in your answer • Read the Guide to Understanding FedRAMP • Review the Prep Checklist 44
  • 45. Question and Answer Session For more information, please contact us or visit us at any of the following websites: http://FedRAMP.gov http://gsa.gov/FedRAMP Email: info@fedramp.gov @ FederalCloud
  • 46. For more information, please contact us or visit us at any of the following websites: http://FedRAMP.gov http://gsa.gov/FedRAMP Email: info@fedramp.gov @ FederalCloud