How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing



Similar documents
Seeing Though the Clouds

Overview. FedRAMP CONOPS

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES

Infrastructure as a Service (IaaS)

December 8, Security Authorization of Information Systems in Cloud Computing Environments

Federal Risk and Authorization Management Program (FedRAMP)

U.S. General Services Administration. Infrastructure as a Service (IaaS) Blanket Purchase Agreement (BPA) Fact Sheet

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Security for Federal Agencies

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

DISA releases updated DoD Cloud Requirements What are the impacts? James Leach January 2015

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Introduction to Cloud Computing DLT Solutions LL DL C T Solutions LL May 2011

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

DoD Cloud Computing Security Requirements Guide (SRG) Overview

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Federal Cloud Security

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015

CHAPTER 8 CLOUD COMPUTING

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Guide to Understanding FedRAMP. Guide to Understanding FedRAMP

NIST Cloud Computing Security Reference Architecture (SP draft)

An Introduction to Cloud Computing in the Public Sector

Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business


STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

How To Protect Your Cloud Computing Resources From Attack

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

2) trusted network, resilient against large scale Denial of Service attacks

Security Authorization Process Guide

Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA

NIST Cloud Computing Program Activities

Federal Cloud Computing Initiative Overview

Esri Managed Cloud Services and FedRAMP

CLOUD COMPUTING. A Primer

The NIST Cloud Computing Program

Key Considerations of Regulatory Compliance in the Public Cloud

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Architecting the Cloud

TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

CLOUD COMPUTING OVERVIEW

The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative

Cloud Security. DLT Solutions LLC June #DLTCloud

VA Enterprise Design Patterns: 6. Cloud Computing 6.1 Enterprise Cloud Services Broker

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Clo l ud d C ompu p tin i g

When Security, Privacy and Forensics Meet in the Cloud

Security & Trust in the Cloud

Cloud Computing What Auditors need to know

Cloud Computing and Standards

An Introduction to Cloud Computing in the Federal Public Sector

FedRAMP Standard Contract Language

FISMA Cloud GovDataHosting Service Portfolio

Proposed Security Assessment & Authorization for U.S. Government Cloud Computing

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Information Systems Security Line of Business (ISS LoB)

Environments, Services and Network Management for Green Clouds

CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.

U.S. Federal Strategy for the Safe and Secure Adoption of Cloud Computing

Flying Through Federal Thunder Clouds Navigating FedRAMP, DoD Cloud Guidance, & Cloud Cybersecurity Issues

Virtualization Technologies in SCADA/EMS/DMS/OMS. Vendor perspective Norman Sabelli Ventyx, an ABB company

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC

Highlights & Next Steps

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

The NIST Definition of Cloud Computing (Draft)

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Enterprise Managed Cloud Computing at NASA. Karen Petraska NASA Office of the CIO Computing Services Service Office (CSSO) October 1, 2014

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director

Transcription:

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing Warren S. Udy, CISSP Senior Cyber Security Advisor Office of Cyber Security 301-903-5515 warren.udy@hq.doe.gov

Five Stages of Grief (or how is a cyber professional to deal with cloud computing?) 1.Denial and Isolation 2.Anger 3.Bargaining 4.Depression 5.Acceptance

The NIST Cloud Definition Framework Hybrid Clouds Deployment Models Private Cloud Community Cloud Public Cloud Service Models Essential Characteristics Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) On Demand Self-Service Broad Network Access Rapid Elasticity Resource Pooling Measured Service Massive Scale Resilient Computing Common Characteristics Homogeneity Virtualization Geographic Distribution Service Orientation Low Cost Software Advanced Security 3

Service Model Architectures Cloud Infrastructure SaaS Cloud Infrastructure PaaS SaaS Cloud Infrastructure IaaS PaaS SaaS Software as a Service (SaaS) Architectures Cloud Infrastructure PaaS Cloud Infrastructure IaaS PaaS Platform as a Service (PaaS) Architectures Cloud Infrastructure IaaS Infrastructure as a Service (IaaS) Architectures

NIST SP 800-37 - Changes in Rev 1 Two new concepts were added to NIST SP 800-37r1: Concept of Joint Authorization Concept of Leveraged Authorization

Federal Risk and Authorization Management Program (FedRAMP) Provides a standard approach to Assessing and Authorizing cloud computing services and products Allows joint authorizations and continuous monitoring services for Government and Commercial cloud computing systems Results in a common security risk model that can be leveraged across the Federal Government Approve once, and use often" U.S. Department of Energy Office of the Chief Information Officer 6

Government use of FedRAMP Federal agencies will interact with FedRAMP in two ways: Sponsoring a multi-agency cloud provider Leveraging a FedRAMP authorized system

Elements of FedRAMP Joint Authorization Board (JAB)?(Sponsor) JAB Technical Representatives Day-to-day involvement in the process and the review of the authorizations. Recommend approval to the Authorizing Officials FedRAMP Operations Office Day-to-day support of the authorization process Interacts with federal Offices Interacts with the service providers

Joint Authorization Board DOD DHS GSA (Plus Sponsoring Agency)

Sponsoring a Provider

What does it mean to sponsor a provider? Must have two sponsors to confirm multi-agency If your agency is the secondary agency sponsor, you are only confirming that the provider will be used by multiple agencies NO other support or interaction is needed Agency has a contractual relationship with the provider Feels that the provider can have government wide utilization (multi-agency) Agency CIO is willing to sponsor (Join JAB) Provide a Technical Representative to review authorization and advise the CIO on the authorization decision Participate in the joint authorization

If my agency sponsors a provider and they can not meet the FedRAMP standards what happens? Remember that the provider will fund the needed documentation of the controls and the independent assessments The first step in the process will be to document how the provider will comply with the controls. Answers will be high level Workbook with answers will be reviewed by FedRAMP and the JAB Tech Reps May require face-to-face meeting to understand risks and its implications. By the end of this initial step agencies should know if the provider can complete the process.

Remember. Agencies sponsoring a provider can add controls if needed Agency will utilized limited resources for the initial reviews of the workbook If you don t like what the provider provided (read free documentation), the agency is free to initiate their own authorization

Leveraging an Authorization

www.fedramp.gov U.S. Department of Energy Office of the Chief Information Officer 15

How does my agency leverage an authorization? FedRAMP web site will list two types of authorizations: Those who have completed the FedRAMP authorization process Those authorized by other federal entities that could be used by multiple agencies These could have used the FedRAMP set of controls Most likely authorized only by one agency and with baseline controls FedRAMP will provide document access to only FedRAMP authorized systems Site will help agencies get access to other listed systems

NIST 800-37 r1 Leveraging. leveraged authorization, is employed when a federal agency chooses to accept some or all of the information in an existing authorization package generated by another federal agency based on a need to use the same information resources (e.g., information system and/or services provided by the system). The leveraging organization reviews the organization s authorization package as the basis for determining risk to the leveraging organization. Considers risk factors such as the authorization results, the environment of operation, the criticality/sensitivity of the information to be processed, stored, or transmitted, as well as the overall risk tolerance of the leveraging organization.

Agency Authorization Package Agency Controls Referenced FedRAMP Authorization

Leveraged use of Authorization FedRAMP Federal Entity A Service Provider (SaaS) Federal Entity B Federal Entity C

Examples of Agency Controls FIPS-199 determination of the data. Initial Privacy Review of the data. Perform user cyber training. Provisioning of actual users. Termination of users. Continuous review of agency controls.

Where Are We Today?

High-Level Review Process Documents for Public Comment Vendor Experience CSIS Discussion Comprehensive Recommendations Policy Changes Stakeholder Decisions on Recommendations Combine, Categorize Comments Trend Analysis Identify Themes Review Process Control Review Assessment & Authorization Continuous Monitoring Policy & Tangential Executive Management Report Security Controls Continuous Monitoring Process & Procedure Operating & Business Model Documentation Updates Controls Process Assessment Procedures Operational Plan to Launch FedRAMP Launch FedRAMP 22

Summary of FedRAMP Comments Organization Type Government 98 75% Industry 30 23% General Public 3 2% Comment Type Editorial 76 58% Policy 13 10% Procedural 6 5% Question 21 16% Technical 2 2% Other 13 10% Comment period was extended to Monday, January 17, 2011. 23 23

FedRAMP Tiger Teams FedRAMP Security Controls Assessment and Authorization FedRAMP A&A processes Security Control Baseline IV&V and Independent 3 rd Party Assessment Continuous Monitoring Vulnerability Scanning and Penetration Testing Change Management Incident Handling Continuous Monitoring and Reporting Policy FISMA Reporting Trusted Internet Connection (TIC) Privacy FedRAMP Operating and Business Model 24

PMO Update - IaaS Award Cloud Storage Awardees: Apptis, Inc. AT&T Autonomics Resources CGI Federal Inc. Computer Literacy World Computer Technology Consultants Eyak Tech LLS General Dynamics Information Technology Insight Public Sector Savvis Federal Systems Verizon Federal Inc. Vendor Cloud Storage Virtual Machines 1 Apptis, Inc. X X 2 AT&T X X 3 Autonomic Resources X Web Hosting 4 CGI Federal Inc. X X 5 6 Computer Literacy World Computer Technology Consultants X X X X X X 7 Eyak Tech LLC X X X 8 General Dynamics Information Technology 9 Insight Public Sector X 10 Savvis Federal Systems X X 11 Verizon Federal Inc. X Total Awards by Lot 6 10 5 X

Now that we have FedRAMP, how does DOE interact with it?

Implement a DOE interaction Office Reviewing a draft charter Leveraging on the FedRAMP concepts Include a Joint authorization for DOE only systems Governance model Determine what systems DOE sponsors Assist any DOE element to take advantage of a FedRAMP authorized system Jump start systems for cloud use

QUESTIONS? U.S. Department of Energy Office of the Chief Information Officer 28

Words of Wisdom I realized that security is more of a people and process problem than a technical problem Mischel Kwon, Former Director of US-CERT U.S. Department of Energy Office of the Chief Information Officer 29