SlideShare a Scribd company logo
Federal Risk and Authorization
  Management Program
  (FedRAMP)

Getting started on the FedRAMP Security
Authorization Process for Cloud Service Providers
November 7, 2012
Today’s Webinar

FedRAMP is a government-wide program that provides
a standardized approach to security assessment,
authorization, and continuous monitoring for cloud
services.
   This webinar describes what is required to
    complete the initial step in the FedRAMP
    process and covers topics from “before you
    begin” through defining the security
    authorization boundary and delineating
    between consumer and provider
    responsibilities.


                                                     2
Access Points for FedRAMP Secure Repository



    Authorization Level              FedRAMP 3PAO             ATO Status




                                                                              Level of Gov’t Review
 JAB Provisional Authorization                              JAB (+Agency)


Agency ATO with FedRAMP 3PAO                                    Agency


        Agency ATO**                                            Agency


         CSP Supplied                                               n/a

             ** A&A packages without a FedRAMP 3PAO do not meet the JAB
              independence requirements and are not eligible for JAB review

                        3PAO – Third Party Assessment Organization
                                                                                                      3
How Does FedRAMP Relate to the NIST Process?
                               Agency

                         1. Categorize the
                        Information System
       CSP                                         Agency
                            -Low Impact
6. Monitor Security      -Moderate Impact      2. Select the
     Controls                                    Controls
  - Continuous                               -FedRAMP Low or
   Monitoring                                Moderate Baseline

                      NIST Risk Management
       JAB                 Framework                CSP

  5. Authorize                                 3. Implement
   Information                               Security Controls
      System
-Provisional Auth.          CSP and 3PAO      -Describe in SSP
   -Agency ATO             4. Assess the
                         Security Controls
                            -FedRAMP
                         Accredited 3PAO
                                                                 4
Before You Get Started - FedRAMP.gov a Resource
Treasure Trove




                                                   5
FedRAMP.gov a Resource Treasure Trove (cont’d)

                                          Accredited 3PAOs
                          BrightLine                 Homeland Security
                                                     Consultants
                          COACT, Inc.                J.D. Biggs and Associates,
                                                     Inc.
                          Coalfire Systems           Knowledge Consulting
                                                     Group, Inc.
                          Department of              Logyx LLC
                          Transportation (DOT)
                          Enterprise Service Center
                          (ESC)
                          Dynamics Research         Lunarline, Inc.
                          Corporation (DRC)

                          Earthling Security, Inc.   Secure Info

                          Electrosoft Services, Inc. SRA International, Inc.

                                                     Veris Group, LLC




                                                                                  6
How to Apply




               7
Time to Begin Your Documentation




Foundation…                  Resources…




                           Time to start
You’ve applied…           documentation.
                                           8
After You Apply

• Expect a preliminary call from the FedRAMP PMO
   • Establish communications
   • Confirm application information
   • Answer questions concerning FedRAMP

• Determine the best and quickest path to get into the
  FedRAMP Repository
   • Review existing documentation
   • Understand current relationships and ATO status
     with existing customer agencies
   • Identify overall readiness to pursue JAB
     provisional authorization
                                                         9
Keys to Proper Documentation Development

Key Areas of Focus for Documentation
     • Completeness
     • Compliant with FedRAMP policy and consistency with other package documents
     • Delivery of supporting documentation
     • Documentation is adequately referenced – e.g. : Policy, SOPs, Rules of Behavior,
       common control catalogs, waivers, exceptions, etc.

Content should address four (4) criteria :
    1. What
    2. Who
    3. When
    4. How

Proper level of detail for responses should be:
    • Unambiguous
    • Specific
    • Complete
    • Comprehensive
    • Make sure the response is sufficient in length to properly answer the question
                                                                                          10
Describing Boundaries in the System Security Plan
            (SSP)
                   System Boundary
                                                                        Internet
                                  Network
                               Components




                                            Protection
                                            Boundary
                                                         Ports,
                                                         Protocols
                                                         and Services
    Network
    Architecture                                                        Outside the System
                                                                            Boundary




                                            Protection
                                            Boundary
                                                                        Different System Outside
                                                                              the Boundary



•    Understand which IT assets fit within the boundary.
•    Interconnections - Indicate and label interconnections to other systems
•    Indicate the hardware and software
•    Make sure your diagrams are consistent with boundary descriptions

                                                                                                   1111
Describing Components in the SSP




Components by Name        Components Grouped by         Components by Function
                                Controls

• Keep naming convention consistent
• Group components by controls
• If multiple controls are used describe which controls affect each
  component
                                                                                 12
Describing Security Controls in the SSP
• Security Control and enhancement requirement.
• Security control and enhancements require
  security control summary information.
• NOTE: The “-1” controls (e.g. AC-1, SC-1 etc.)
  describe Policies and Procedures.


Control Summary Definition
Responsible Role: In the field described as
Responsible Role, the CSP should indicate what staff
role within their organization is responsible for
maintaining and implementing that particular
security control. Examples of the types of role
names may differ from CSP to CSP but could include
role names such as:

•System Administrator
•Database Administrator
•Network Operations Analyst
•Network Engineer
•Configuration Management Team Lead
•IT Director
•Firewall Engineer



                                                       13
System Security Plan Reality Check

• SSP template is 352 pages long
• Long template required to assure the system and
  implementation of controls are properly documented
• Effort to produce a well documented SSP leads to a smooth
  process
• SSP Quick Tips
   – Is your hardware and software inventory complete?
   – Are components from the inventory represented on your
     network map?
   – Have you provided a response for all sections of the
     control and the control enhancement?
                                                         14
In Summary…

• A little prep will ensure a smooth assessment
  process

• Review the FedRAMP Baseline Controls and SSP
  Template

• Read the Guide to Understanding FedRAMP

• Review the Prep Checklist

• Apply to FedRAMP

                                                  15
Question and Answer Session

For more information, please contact us or
visit us at any of the following websites:
http://FedRAMP.gov
http://gsa.gov/FedRAMP
Email: info@fedramp.gov
               @ FederalCloud
For more information, please contact us or
visit us at any of the following websites:
http://FedRAMP.gov
http://gsa.gov/FedRAMP
Email: info@fedramp.gov
               @ FederalCloud

More Related Content

PDF
Fedramp developing-system-security-plan-slides
PDF
FedRAMP 3PAO Training
PDF
FedRAMP CSP SSP Training
PPTX
Completing fedramp-security-authorization-process
PDF
Federal Risk and Authorization Management Program (FedRAMP)
PDF
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
PDF
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
PPTX
stackArmor - FedRAMP and 800-171 compliant cloud solutions
Fedramp developing-system-security-plan-slides
FedRAMP 3PAO Training
FedRAMP CSP SSP Training
Completing fedramp-security-authorization-process
Federal Risk and Authorization Management Program (FedRAMP)
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
Work With Federal Agencies? Here's What You Should Know About FedRAMP Assessm...
stackArmor - FedRAMP and 800-171 compliant cloud solutions

What's hot (17)

PDF
TrustedAgent FedRAMP Security Authorization
PPT
Fisma FedRAMP Drupal
DOCX
Control Implementation Summary (CIS) Template
PDF
Barqa Edinburgh Final
PDF
Symantec Control Compliance Suite 11, February 2012
PDF
Control Compliance Suite 10
PDF
Symantec control compliance suite
PDF
Symantec Brightmail Gateway 9
PDF
Gallagher Systems Catalogue
PPTX
IT GRC with Symantec
PDF
Gpc case study_eng_0221
PPTX
TA security
PDF
Oracle Database Security Diagnostic Service
PDF
Posecco clustering meeting
PDF
Managed Hosting:
TrustedAgent FedRAMP Security Authorization
Fisma FedRAMP Drupal
Control Implementation Summary (CIS) Template
Barqa Edinburgh Final
Symantec Control Compliance Suite 11, February 2012
Control Compliance Suite 10
Symantec control compliance suite
Symantec Brightmail Gateway 9
Gallagher Systems Catalogue
IT GRC with Symantec
Gpc case study_eng_0221
TA security
Oracle Database Security Diagnostic Service
Posecco clustering meeting
Managed Hosting:
Ad

Similar to Getting started on fed ramp sec auth for csp (20)

PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
PPT
Cybersecurity exchange briefing oct 2012 v2
PDF
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
PDF
Nephos Technologies - Extending Security to the Cloud - Cloud Expo 2013
PDF
Nephos technologies lee_biggenden_c_expo13_v2.0
PDF
FedRAMP Is Broken (And here's how to fix it)
PDF
Guide to understanding_fed_ramp_032513
PPT
Presentation for CISIS 2012
PDF
FedRAMP concept-of-operations-conops
PDF
Conops v1.1 07162012_508
PPT
Gra implementations perbix_search
PDF
Guard Era Corp Brochure 2008
PDF
Guide to understanding_fed_ramp_042213
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
PPTX
Contract Security Officer Services
PPTX
Enterprise API Security & Data Loss Prevention - Intel
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
PDF
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
PPT
Cyber crime with privention
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Cybersecurity exchange briefing oct 2012 v2
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Nephos Technologies - Extending Security to the Cloud - Cloud Expo 2013
Nephos technologies lee_biggenden_c_expo13_v2.0
FedRAMP Is Broken (And here's how to fix it)
Guide to understanding_fed_ramp_032513
Presentation for CISIS 2012
FedRAMP concept-of-operations-conops
Conops v1.1 07162012_508
Gra implementations perbix_search
Guard Era Corp Brochure 2008
Guide to understanding_fed_ramp_042213
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Contract Security Officer Services
Enterprise API Security & Data Loss Prevention - Intel
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Cyber crime with privention
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Ad

More from Tuan Phan (11)

PDF
TrustedAgent GRC for Vulnerability Management
PDF
TrustedAgent GRC for Public Sector
PDF
TrustedAgent and Defense Industrial Base (DIB)
PDF
Nist cybersecurity framework isc2 quantico
PDF
Introduction to NIST Cybersecurity Framework
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PDF
Fed ramp agency_implementation_webinar
PDF
Building an Effective GRC Process with TrustedAgent GRC
PDF
Key Points of FISMA Reforms of 2013
PDF
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
PDF
Continuous monitoring strategy_guide_072712
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Public Sector
TrustedAgent and Defense Industrial Base (DIB)
Nist cybersecurity framework isc2 quantico
Introduction to NIST Cybersecurity Framework
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Fed ramp agency_implementation_webinar
Building an Effective GRC Process with TrustedAgent GRC
Key Points of FISMA Reforms of 2013
March 18 _2013_fed_ramp_agency_compliance_and_implementation_workshop.final
Continuous monitoring strategy_guide_072712

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Modernizing your data center with Dell and AMD
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
Unlocking AI with Model Context Protocol (MCP)
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Getting started on fed ramp sec auth for csp

  • 1. Federal Risk and Authorization Management Program (FedRAMP) Getting started on the FedRAMP Security Authorization Process for Cloud Service Providers November 7, 2012
  • 2. Today’s Webinar FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services.  This webinar describes what is required to complete the initial step in the FedRAMP process and covers topics from “before you begin” through defining the security authorization boundary and delineating between consumer and provider responsibilities. 2
  • 3. Access Points for FedRAMP Secure Repository Authorization Level FedRAMP 3PAO ATO Status Level of Gov’t Review JAB Provisional Authorization  JAB (+Agency) Agency ATO with FedRAMP 3PAO  Agency Agency ATO**  Agency CSP Supplied  n/a ** A&A packages without a FedRAMP 3PAO do not meet the JAB independence requirements and are not eligible for JAB review 3PAO – Third Party Assessment Organization 3
  • 4. How Does FedRAMP Relate to the NIST Process? Agency 1. Categorize the Information System CSP Agency -Low Impact 6. Monitor Security -Moderate Impact 2. Select the Controls Controls - Continuous -FedRAMP Low or Monitoring Moderate Baseline NIST Risk Management JAB Framework CSP 5. Authorize 3. Implement Information Security Controls System -Provisional Auth. CSP and 3PAO -Describe in SSP -Agency ATO 4. Assess the Security Controls -FedRAMP Accredited 3PAO 4
  • 5. Before You Get Started - FedRAMP.gov a Resource Treasure Trove 5
  • 6. FedRAMP.gov a Resource Treasure Trove (cont’d) Accredited 3PAOs BrightLine Homeland Security Consultants COACT, Inc. J.D. Biggs and Associates, Inc. Coalfire Systems Knowledge Consulting Group, Inc. Department of Logyx LLC Transportation (DOT) Enterprise Service Center (ESC) Dynamics Research Lunarline, Inc. Corporation (DRC) Earthling Security, Inc. Secure Info Electrosoft Services, Inc. SRA International, Inc. Veris Group, LLC 6
  • 8. Time to Begin Your Documentation Foundation… Resources… Time to start You’ve applied… documentation. 8
  • 9. After You Apply • Expect a preliminary call from the FedRAMP PMO • Establish communications • Confirm application information • Answer questions concerning FedRAMP • Determine the best and quickest path to get into the FedRAMP Repository • Review existing documentation • Understand current relationships and ATO status with existing customer agencies • Identify overall readiness to pursue JAB provisional authorization 9
  • 10. Keys to Proper Documentation Development Key Areas of Focus for Documentation • Completeness • Compliant with FedRAMP policy and consistency with other package documents • Delivery of supporting documentation • Documentation is adequately referenced – e.g. : Policy, SOPs, Rules of Behavior, common control catalogs, waivers, exceptions, etc. Content should address four (4) criteria : 1. What 2. Who 3. When 4. How Proper level of detail for responses should be: • Unambiguous • Specific • Complete • Comprehensive • Make sure the response is sufficient in length to properly answer the question 10
  • 11. Describing Boundaries in the System Security Plan (SSP) System Boundary Internet Network Components Protection Boundary Ports, Protocols and Services Network Architecture Outside the System Boundary Protection Boundary Different System Outside the Boundary • Understand which IT assets fit within the boundary. • Interconnections - Indicate and label interconnections to other systems • Indicate the hardware and software • Make sure your diagrams are consistent with boundary descriptions 1111
  • 12. Describing Components in the SSP Components by Name Components Grouped by Components by Function Controls • Keep naming convention consistent • Group components by controls • If multiple controls are used describe which controls affect each component 12
  • 13. Describing Security Controls in the SSP • Security Control and enhancement requirement. • Security control and enhancements require security control summary information. • NOTE: The “-1” controls (e.g. AC-1, SC-1 etc.) describe Policies and Procedures. Control Summary Definition Responsible Role: In the field described as Responsible Role, the CSP should indicate what staff role within their organization is responsible for maintaining and implementing that particular security control. Examples of the types of role names may differ from CSP to CSP but could include role names such as: •System Administrator •Database Administrator •Network Operations Analyst •Network Engineer •Configuration Management Team Lead •IT Director •Firewall Engineer 13
  • 14. System Security Plan Reality Check • SSP template is 352 pages long • Long template required to assure the system and implementation of controls are properly documented • Effort to produce a well documented SSP leads to a smooth process • SSP Quick Tips – Is your hardware and software inventory complete? – Are components from the inventory represented on your network map? – Have you provided a response for all sections of the control and the control enhancement? 14
  • 15. In Summary… • A little prep will ensure a smooth assessment process • Review the FedRAMP Baseline Controls and SSP Template • Read the Guide to Understanding FedRAMP • Review the Prep Checklist • Apply to FedRAMP 15
  • 16. Question and Answer Session For more information, please contact us or visit us at any of the following websites: http://FedRAMP.gov http://gsa.gov/FedRAMP Email: info@fedramp.gov @ FederalCloud
  • 17. For more information, please contact us or visit us at any of the following websites: http://FedRAMP.gov http://gsa.gov/FedRAMP Email: info@fedramp.gov @ FederalCloud