FedRAMP compliance is extremely important if you want to provide cloud services to a federal government office, but how should you start this process?

What does FedRAMP stand for? FedRAMP stands for the Federal Risk and Authorization Management Program, which is run by the Office of Management and Budget (OMB) and the Joint Authorization Board (JAB), and it authorizes cloud services that the federal government can use.

What Is FedRAMP and Who Needs To Follow It?

The Federal Risk and Authorization Management Program (FedRAMP) is a unique compliance framework targeting managed service and cloud providers working with federal agencies.

Unlike other frameworks, like Cybersecurity Maturity Model Certification  (viz., targeted toward defense contractors working with agencies under the U.S. Department of Defense), FedRAMP applies specifically to anyone providing cloud-based products to government agencies.

FedRAMP was established by the Office of Management and Budget in 2011 to orient cloud security around “cost-effective, risk-based” approaches to cybersecurity. According to the OMB, any cloud system transmitting or holding federal data falls under their jurisdiction.

FedRAMP Compliance & Certification | Why It Is Important

To administer the compliance standard and provide organizations with their Authorization to Operate (ATO), several executive branch entities manage compliance. These entities include the following:

Under these governing bodies, regulations are approved, refined, revised, and implemented. FedRAMP draws its actual technical and physical requirements from a few primary documents:

  • NIST Special Publication 800-53: NIST SP 800-53 defines security controls that organizations can put into place to better secure their systems, particularly in alignment with the Federal Information Security Management Act (FISMA). More relevant to organizations seeking compliance, NIST 800-53 defines escalating levels of security controls based on the sensitivity of that information. FedRAMP leverages NIST 800-53 to define controls and best practices that organizations must meet for compliance.
  • NIST Special Publication 800-37: This document established the Risk Management Framework (RMF), a unique set of regulations that apply directly to how organizations implement risk assessment and management controls. Depending on the impact level, FedRAMP will require certain types of risk management and adherence to aspects of RMF.
  • Federal Information Processing Standards (FIPS) 140-2: FIPS 140-2 defines requirements for federal agencies and contractors when implementing cryptographic modules and encrypting data.
  • FIPS 199: This document defines the security impact levels used by FedRAMP to determine security, privacy, and risk management requirements.

To earn ATO designation, cloud providers must undergo a rigorous auditing process. One of the most important aspects of audits  is the participation of Third-Party Assessment Organizations (3PAOs).

CMMC Compliance Guide

Under federal regulations, all cloud providers undergoing audits must do so through an impartial and authorized third-party assessor. A security firm certified in audits, a 3PAO fills that role under the guidance and supervision of the PMO and JAB. An organization seeking ATO at any level can only achieve ATO once it has undergone a full audit from a 3PAO, which provides attestation as to its compliance with regulations.

FedRAMP ATO, Impact Levels, and Audits

FedRAMP authorization is divided into three impact levels, and 3PAOs assess cloud providers based on the requirements of these levels.

The impact levels of FedRAMP are outlined in FIPS 199 and include the following:

  1. Low Impact: At this level, a cloud provider’s IT systems handle information that, while publicly available through the Freedom of Information Act (FIA), is still deemed sensitive and important to the operation of a given agency. The loss, theft, or damage of this information could negatively impact the agency’s operation and negatively impact constituents.
  2. Moderate Impact: A cloud provider’s systems handle data that will seriously impact the agency or its constituents. This can include operational harm to the agency assets, financial losses for the agency, or harm to individuals (including damage to finances, privacy, or security).
  3. High Impact: At this level, if data managed by the provider is stolen, lost, or damaged, the result can be a catastrophic impact on agencies and their constituents. Adverse effects can include the financial ruin of the agency and its constituents, complete loss of privacy of critically sensitive data (like health records or personally identifiable information), or even the potential for physical harm.

Finally, there are some standard documents that most organizations pursuing ATO must provide throughout their audit process. These include the following:

  • The System Security Plan (SSP): While the government agency sets requirements and controls, the cloud service provider must kick off the process by providing their SSP. This report outlines the provider’s existing infrastructure and the controls and measures they must implement to meet their desired ATO.
  • The Control Implementation Summary (CIS): The provider documents and outlines security responsibilities they would assume for the agency, with the agency reviewing the summary for accuracy.
  • The Security Assessment Plan (SAP): The SAP is based on the SSP. The cloud provider and the 3PAO prepare the SAP, which outlines all procedures, methodologies, and tests used as part of the audit.
  • The Security Assessment Report (SAR): The SAR reports on the results of the audits. Prepared exclusively by the 3PAO, the SAR details what was tested, what was not, what controls met compliance requirements, and what failed to do so. The SAR also suggests any remediation steps.
  • The Plan of Action and Milestones (POA&M): This report, prepared by the cloud provider, outlines any remedial steps and timelines required to correct noncompliant systems. Under compliance rules, if the 3PAO determines that an organization is prepared for its ATO with relatively straightforward remediation steps, the POA&M can stand in as a sort of binding agreement that the provider will implement those steps within a reasonable period of time. 

What Are the Paths to FedRAMP Authorization?

This article has focused on general approaches to authorization, but it is important to note that these approaches fall into one of two primary paths toward ATO. The path that an organization decides to pursue can dramatically affect how they proceed with their compliance audits.

The two paths that an organization can take toward authorization are as follows:

  • Agency Authorization: Under most circumstances, a cloud provider will respond to a Request for Proposal from a government agency or otherwise partner with them. In turn, the agency will sponsor and support that provider through the authorization process. As part of this path, the agency defines the requirements of their authorization.

    Because it is an agency determining the details of compliance and security, the agency will have more latitude in determining if unconventional infrastructure meets their requirements under FedRAMP. Furthermore, agencies will often have additional requirements for cloud providers above and beyond baseline impact levels.

    Finally, the provider is not authorized to work with other agencies. Providing a cloud product to another agency would require another audit and authorization process with that organization.

  • JAB Authorization: Conversely, an organization can undergo a Provisional ATO (P-ATO) under JAB’s jurisdiction. JAB and the PMO directly approve audits and authorizations.

    The advantage of a P-ATO is that it is more generalized. While the JAB will not accept responsibility for agency-specific security needs, agencies can use a P-ATO package to consider a provider for specific authorization. The cloud provider with a P-ATO is generally ready to work with more agencies.

    However, the process is a bit longer. First, the provider seeking P-ATO must apply for consideration through the FedRAMP Connect program. Once approved, the provider must also provide a Readiness Assessment Report completed by a 3PAO that attests to the provider’s ability to complete the audit.

In either case, best practices typically revolve around thoroughness and completeness:

  • Work With an Expert 3PAO: These organizations are listed under the FedRAMP Marketplace, and a skilled and knowledgeable 3PAO can go a long way toward effective audit preparation and reporting.
  • Prepare for Continuous Monitoring: The last step in compliance auditing is continuous monitoring and annual audits. Once compliance is implemented, it is up to the provider to maintain these standards even as threats and best practices change.
  • Understand Templates and Documentation: The PMO provides a set of templates that providers and 3PAOs use to provide standardized reports. Download these reports and understand how they will be used as part of the audit process.

What Is the FedRAMP Marketplace?

Agencies must be able to verify that providers are authorized, and it is critical that providers undergoing audits can find 3PAOs certified under regulations. The FedRAMP Marketplace solves this problem by providing a searchable database of providers that have earned their ATO, 3PAOs certified to provide audits, and specific platforms and products that can meet or support compliance.

Those interested in these topics can use the searchable FedRAMP Marketplace website to discover compliant products, cloud providers, and third-party assessors.

Leverage FedRAMP-compliant Cloud Platforms To Expand Your Client Base

While federal regulations are strict, they are so for a reason—to protect critical information from attack. For organizations willing to undergo the rigors of an ATO or P-ATO audit, they will almost always find themselves more secure and better able to offer products and services to important government agencies.

Readers can learn more about the FedRAMP private cloud and why organizations should use FedRAMP authorized cloud service providers in order to protect sensitive content moving into, within, and out of their organizations.

 

Back to Risk & Compliance Glossary

SUBSCRIBE

Get email updates with our latest blogs news



Share
Tweet
Share