Federal Risk and Authorization Management Program (FedRAMP)



Similar documents
Overview. FedRAMP CONOPS

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director

FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO

Seeing Though the Clouds

Security Authorization Process Guide

December 8, Security Authorization of Information Systems in Cloud Computing Environments

Esri Managed Cloud Services and FedRAMP

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

How To Write The Jab P-Ato Vulnerability Scan Requirements Guide

Cloud Security for Federal Agencies

The role of certification and standards for trusted Cloud solutions

DISA releases updated DoD Cloud Requirements What are the impacts? James Leach January 2015

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

FedRAMP Standard Contract Language

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

Continuous Monitoring Strategy & Guide

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

DoD Cloud Computing Security Requirements Guide (SRG) Overview

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Guide to Understanding FedRAMP. Guide to Understanding FedRAMP

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

ArcGIS Security Authorization Advancements

FedRAMP Master Acronym List. Version 1.0

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Incident Management. Verdis Spearman

Flying Through Federal Thunder Clouds Navigating FedRAMP, DoD Cloud Guidance, & Cloud Cybersecurity Issues

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL

Status of Cloud Computing Environments within OPM (Report No. 4A-CI )

How To Use Cloud Computing For Federal Agencies

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release January 2015

2012 FISMA Executive Summary Report

HyTrust Addendum to the VMware Product Applicability Guide. For. Federal Risk and Authorization Management Program (FedRAMP) version 1.

The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative

Public Sector Cloud Service Providers

SECURITY ASSESSMENT AND AUTHORIZATION

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Cybersecurity Risk Management Activities Instructions Fiscal Year 2015

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

Federal Cloud Security

Final Audit Report -- CAUTION --

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Review of the SEC s Systems Certification and Accreditation Process

UCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs)

Security Control Standard

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Standard Operating Procedure

Securing Government Clouds Preparing for the Rainy Days

What should go to the Cloud and When. What should NOT go to the Cloud and Why

United States Department of Agriculture. Office of Inspector General

Lots of Updates! Where do we start?

Cyber Security Assessment & Management (CSAM) CSAM C&A web

Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY Report No. 4A-CI

Information System Security Officer (ISSO) Guide

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

AWS Worldwide Public Sector

Proposed Security Assessment & Authorization for U.S. Government Cloud Computing

United States Patent and Trademark Office

Information Security for Managers

Audit of the Department of State Information Security Program

FISMA Cloud GovDataHosting Service Portfolio

EPA Classification No.: CIO P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: Review Date: 08/06/2015

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

Security Authorization Process Guide

Department of Homeland Security

Information System Security Officer (ISSO) Guide

MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES

5 FAH-8 H-351 CLOUD COMPUTING

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

2014 Audit of the Board s Information Security Program

Security Control Standard

Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010

Final Audit Report. Report No. 4A-CI-OO

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

CMS INFORMATION SECURITY ASSESSMENT PROCEDURE

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton

FedRAMP Penetration Test Guidance. Version 1.0.1

Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

U.S CONSUMER PRODUCT SAFTEY COMMISION OFFICE OF THE INSPECTOR GENERAL. Issued: June 4, 2012

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

AODR Role-Based Training. Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security

Security Control Standard

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Security Controls Assessment for Federal Information Systems

Information Systems Security Line of Business (ISS LoB)

GAO INFORMATION TECHNOLOGY REFORM. Progress Made but Future Cloud Computing Efforts Should be Better Planned

Transcription:

Federal Risk and Authorization Management Program (FedRAMP) NIST June 5, 2013 Matt Goodrich, JD FedRAMP, Program Manager Federal Cloud Computing Initiative OCSIT GSA

What is FedRAMP? FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. This approach uses a do once, use many times framework that will save cost, time, and staff required to conduct redundant agency security assessments. 2

Why FedRAMP? Problem: A duplicative, inconsistent, time consuming, costly, and inefficient cloud security risk management approach with little incentive to leverage existing Authorizations to Operate (ATOs) among agencies. Solution: FedRAMP Uniform risk management approach Standard set of approved, minimum security controls (FISMA Low and Moderate Impact) Consistent assessment process Provisional ATO 3

FedRAMP Policy Memo OMB Policy Memo December 8, 2011 Mandates FedRAMP compliance for all cloud services used by the Federal government All new services acquired after June 2012 All existing services by June 2014 Establishes Joint Authorization Board CIOs from DOD, DHS, GSA Creates the FedRAMP requirements Establishes PMO Maintained at GSA Establishes FedRAMP processes for agency compliance Maintains 3PAO program 4

FedRAMP Policy Framework Agency ATO FedRAMP Security Requirements OMB A-130 NIST SP 800-37, 800-137, 800-53 Agencies leverage FedRAMP process, heads of agencies understand, accept risk and grant ATOs FedRAMP builds upon NIST SPs establishing common cloud computing baseline supporting risk based decisions OMB A-130 provide policy, NIST Special Publications provide risk management framework egov Act of 2002 includes Federal Information Security Management Act (FISMA) Congress passes FISMA as part of 2002 egov Act 5

FedRAMP and NIST RMF 800-37 Agency CSP 6. Monitor Security Controls - Continuous Monitoring JAB / Agency 5. Authorize Information System -Provisional Auth. -Agency ATO 1. Categorize the Information System -Low Impact -Moderate Impact NIST Risk Management Framework CSP and 3PAO 4. Assess the Security Controls -FedRAMP Accredited 3PAO Agency 2. Select the Controls -FedRAMP Low or Moderate Baseline CSP 3. Implement Security Controls -Describe in SSP 6

FedRAMP Standardizes RMF for Cloud NIST SP 800-37 Step FedRAMP Standard 1. Categorize System Low and Moderate Impact Levels 2. Select Controls Control Baselines for Low and Moderate Impact Levels 3. Implement Security Controls Document control implementations using the FedRAMP templates Implementation Guidance in Guide to Understanding FedRAMP 4. Assess the Security Controls FedRAMP accredits 3PAOs 3PAOs use standard process, templates 5. Authorize the System Joint Authorization Board or Agency AO authorize the system that can be leveraged due to increased trust 6. Continuous Monitoring CSPs conduct monitoring in accordance with Continuous Monitoring Strategy and Guide 7

FedRAMP Key Stakeholders & Responsibilities Federal Agencies Contract with Cloud Service Provider Leverage ATO or use FedRAMP Process when authorizing Implement Consumer Controls 3PAOs Third Party Assessment Organizations Cloud Service Provider Implement and Document Security Use Independent Assessor Monitor Security Provide Artifacts Cloud auditor, maintains independence from CSP Performs initial and periodic assessment of FedRAMP controls Does NOT assist in creation of control documentation FedRAMP PMO & JAB Establish Processes and Standards for Security Authorizations Maintain Secure Repository of Available Security Packages Provisionally Authorize Systems That Have Greatest Ability to be Leveraged Government-wide 8

Mythbusting FedRAMP Lots of Confusion Still about FedRAMP, need to address top areas of concern: Who defines cloud? Control responsibility between vendors and stacking of authorizations Perception of delays in authorizations Ability of vendor to meet Federal requirements Difference between Agency ATO s and JAB Provisional ATOs 3PAO Privatization efforts impact on the program

What is the Definition of Cloud? Cloud First Policy Agencies must default to cloud based products and services when spending any new money on IT New services, recompetes, additional services Agencies must justify to OMB when a cloud provider is NOT selected When a cloud service provider is selected, FedRAMP governs the security authorization process. Cloud Definition FedRAMP is not arbiter of what is and what is not cloud. We will authorize anything that is cloud esque If any agency submits a FedRAMP package for a system they deem cloud, FedRAMP will review that system as cloud we will not interfere with or negate an agency determination of cloud. 10

Vendor Abilities to Meet Federal Requirements Many cloud vendors are new to FISMA and it takes time to meeting Federal Requirements Clearly Defined Boundaries FIPS 140-2 Encryption Authenticated Scans Remediation of Vulnerabilities Multi-Factor Authentication 11

Delays in Authorizations FedRAMP is a rigorous process, with increased scrutiny on meeting security requirements Currently 2 JAB provisional ATO s: CGI Federal, Autonomic Resources Currently 2 Agency ATOs: Amazon s US East/West, and Amazon s GovCloud FISMA process takes time Difference between efficient and expedient Transparency New process for many vendors Updated CONOPs and standardization of timelines AGENCY ATO S AND JAB PROVISIONAL ATO S 12

FedRAMP Provisional Authorization Timeframe Overview 6 months + SSP Ready Review Assign ISSO -- Kick Off ISSO / CSP review SSP SSP Finalization 10-15 weeks JAB Review Address JAB Notes ISSO / 3PAO Review SAP SAP Finalization 3-4 weeks JAB Review Address JAB Notes Testing 6 weeks Testing SAR / POA&M Review 6 weeks ISSO / 3PAO / CSP review SAR JAB Review Address JAB Notes Final Review P-ATO Signoff Quality of SSP and responsiveness and ability of CSP to resolve ISSO comments can create iterations in this process Quality of SAP and responsiveness and ability of CSP to resolve ISSO comments can create iterations in this process Quality of SAR as well as number and types of risks can create iterations in this process Key CSP Action FedRAMP Action FedRAMP / CSP Action FedRAMP JAB Action FedRAMP / 3PAO Action FedRAMP / 3PAO / CSP Action

JAB Provisional ATO vs Agency ATO Timeframe JAB 25+ weeks minimum Agency 14+ weeks minimum Level / Depth of Review JAB: Four sets of eyes (PMO, DoD, DHS, GSA) Agency: One set of eyes (agency) Risk Acceptance Level JAB: Low risk tolerance level, security for security Agency: Varying levels of risk acceptance, business needs can justify more risk as can individual agency policies Continuous Monitoring JAB: JAB will maintain, agencies need to review Agency: Agency must work with CSP to complete 14

Why should Agencies do Agency ATOs? Mandatory to meet FedRAMP Requirements OMB Policy Memo - Reporting to OMB through PortfolioStat Not new process current NIST / FISMA authorization process standardized Timeframe If business needs exist to use a service now, agency doesn t have to wait on JAB Can complete an authorization faster than the JAB Not ALL cloud providers will receive a JAB ATO JAB will only authorize those systems they see as being leveraged the most government-wide JAB will not authorize systems that do not meet certain capabilities and Federal requirements Acceptance risk level is flexible HHS can vary acceptable risk levels based on many factors JAB doesn t consider (e.g. flexible baseline, types of data, business need, cost, ROI, etc.) More Influence over CSP Contract with CSP allows agency to enforce capabilities FedRAMP does not have contracts with CSPs 15

Control Responsibility and Stacking Authorizations Provider/Consumer responsibilities and how they interact There is no distinct line of where I/P/S offerings begin and end. The differences between vendors is part of what defines offerings as well as gives vendors advantages over competitors. However, I/P/S offerings create unique boundaries that sit on top of each other, and the consumer/agency responsibility is above all of these. Authorizations can be stacked on top of each other to create a singular authorization for a type of service.

3PAO Privatization 3PAO Privatization is designed to keep rigor of 3PAO program and free government resources Same process that was done for Health IT, NAVLAP, UL, etc. FedRAMP will maintain ownership of accreditation list and is final source of accreditation decision Privatization is for accreditation reviews of applicants ONLY Privatization will also allow for increased surveillance post accreditation 17

Privatization Timeframe March 25 th Cutoff for Government Review May 15th AB Application Closed October 1 (projected) AB Stood Up April 15th AB Application Open Summer (projected) Selection of AB Tentative Timeline for 3PAO Privatization Currently reviewing AB applications We are evaluating all possibilities and approaches for transition of currently accredited 3PAOs to privatized accreditation review CSPs and Federal agencies will not be impacted due to privatization efforts SARs will be accepted from anyone who is on the accredited list 18

For more information, please contact us or visit us the following website: www.fedramp.gov Email: info@fedramp.gov @ FederalCloud 19