FedRAMP Rev 5 Low Baseline 2023-08-31T00:00:00Z 2024-01-11T23:40:17Z 5.1.1+fedramp-20240111-0 1.1.1 Document creator The FedRAMP Program Management Office (PMO) PMO The FedRAMP Joint Authorization Board (JAB) JAB Federal Risk and Authorization Management Program: Program Management Office FedRAMP PMO info@fedramp.gov
1800 F St. NW Washington DC 20006 US
Federal Risk and Authorization Management Program: Joint Authorization Board FedRAMP JAB 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d ca9ba80e-1342-4bfd-b32a-abac468c24b4
ac-1 ac-2 ac-3 ac-7 ac-8 ac-14 ac-17 ac-18 ac-19 ac-20 ac-22 at-1 at-2 at-2.2 at-3 at-4 au-1 au-2 au-3 au-4 au-5 au-6 au-8 au-9 au-11 au-12 ca-1 ca-2 ca-2.1 ca-3 ca-5 ca-6 ca-7 ca-7.4 ca-8 ca-9 cm-1 cm-2 cm-4 cm-5 cm-6 cm-7 cm-8 cm-10 cm-11 cp-1 cp-2 cp-3 cp-4 cp-9 cp-10 ia-1 ia-2 ia-2.1 ia-2.2 ia-2.8 ia-2.12 ia-4 ia-5 ia-5.1 ia-6 ia-7 ia-8 ia-8.1 ia-8.2 ia-8.4 ia-11 ir-1 ir-2 ir-4 ir-5 ir-6 ir-7 ir-8 ma-1 ma-2 ma-4 ma-5 mp-1 mp-2 mp-6 mp-7 pe-1 pe-2 pe-3 pe-6 pe-8 pe-12 pe-13 pe-14 pe-15 pe-16 pl-1 pl-2 pl-4 pl-4.1 pl-8 pl-10 pl-11 ps-1 ps-2 ps-3 ps-4 ps-5 ps-6 ps-7 ps-8 ps-9 ra-1 ra-2 ra-3 ra-3.1 ra-5 ra-5.2 ra-5.11 ra-7 sa-1 sa-2 sa-3 sa-4 sa-4.10 sa-5 sa-8 sa-9 sa-22 sc-1 sc-5 sc-7 sc-8 sc-8.1 sc-12 sc-13 sc-15 sc-20 sc-21 sc-22 sc-28 sc-28.1 sc-39 si-1 si-2 si-3 si-4 si-5 si-12 sr-1 sr-2 sr-2.1 sr-3 sr-5 sr-8 sr-10 sr-11 sr-11.1 sr-11.2 sr-12 true

at least every 3 years

at least annually

significant changes

twenty-four (24) hours

eight (8) hours

eight (8) hours

at least annually

see additional Requirements and Guidance

see additional Requirements and Guidance

at least quarterly

at least every 3 years

at least annually

significant changes

at least annually

at least annually

at least annually

at least annually

at least one (1) year or 1 year after completion of a specific training program

at least every 3 years

at least annually

significant changes

successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes

organization-defined subset of the auditable events defined in AU-2a to be audited continually for each identified event.

annually and whenever there is a change in the threat environment

overwrite oldest record

at least weekly

one second granularity of time measurement

a time period in compliance with M-21-31

all information system and network components where audit capability is deployed/available

at least every 3 years

at least annually

significant changes

at least annually

individuals or roles to include FedRAMP PMO

at least annually and on input from JAB/AO

at least monthly

in accordance with OMB A-130 requirements or when a significant change occurs

to include JAB/AO

at least annually

at least every 3 years

at least annually

significant changes

at least annually and when a significant change occurs

to include when directed by the JAB

at least monthly

Continuously (via CM-7 (5))

at least every 3 years

at least annually

significant changes

at least annually

*See Additional Requirements

at least annually

at least annually

at least every 3 years

classroom exercise/table top written tests

daily incremental; weekly full

daily incremental; weekly full

daily incremental; weekly full

at least every 3 years

at least annually

significant changes

at a minimum, the ISSO (or similar role within the organization)

at least two (2) years

at least every 3 years

at least annually

significant changes

ten (10) days for privileged users, thirty (30) days for Incident Response roles

at least annually

at least annually

US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

at least annually

see additional FedRAMP Requirements and Guidance

see additional FedRAMP Requirements and Guidance

at least every 3 years

at least annually

significant changes

at least every 3 years

at least annually

significant changes

techniques and procedures IAW NIST SP 800-88 Section 4: Reuse and Disposal of Storage Media and Hardware

at least every 3 years

at least annually

significant changes

at least annually

CSP defined physical access control systems/devices AND guards

in all circumstances within restricted access area where the information system resides

at least annually

at least annually

at least monthly

for a minimum of one (1) year

at least monthly

consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments

continuously

all information system components

at least every 3 years

at least annually

significant changes

at least annually

at least every 3 years

at least annually and when the rules are revised or changed

at least annually and when a significant change occurs

at least every 3 years

at least annually

significant changes

at least every three years

for national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance.

For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions

four (4) hours

twenty-four (24) hours

twenty-four (24) hours

at least annually

at least annually and any time there is a change to the user's level of access

including access control personnel responsible for the system and/or facilities, as appropriate

within twenty-four (24) hours

at a minimum, the ISSO and/or similar role within the organization

at least every 3 years

at least annually

significant changes

security assessment report

at least every three (3) years and when a significant change occurs

at least every three (3) years

monthly operating system/infrastructure; monthly web applications (including APIs) and databases

high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery

prior to a new scan

at least every 3 years

at least annually

significant changes

at a minimum, the ISSO (or similar role within the organization)

Appropriate FedRAMP Security Controls Baseline (s) if Federal information is processed or stored within the external system

Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored

at least every 3 years

at least annually

significant changes

Protect against

at a minimum: ICMP (ping) flood, SYN flood, slowloris, buffer overflow attack, and volume attack

In accordance with Federal requirements

FIPS-validated or NSA-approved cryptography

no exceptions for computing devices

all information system components storing Federal data or system data that must be protected at the High or Moderate impact levels

at least every 3 years

at least annually

significant changes

within thirty (30) days of release of updates

signature based and non-signature based

at least weekly

to include endpoints and network entry and exit points

to include blocking and quarantining malicious code

administrator or defined security personnel near-realtime

to include US-CERT and Cybersecurity and Infrastructure Security Agency (CISA) Directives

to include system security personnel and administrators with configuration/patch-management responsibilities

to include chief privacy and ISSO and/or similar role or designees

at least every 3 years

at least annually

significant changes

at least annually

notification of supply chain compromises and results of assessment or audits

all

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

AC-7 Additional FedRAMP Requirements and Guidance

In alignment with NIST SP 800-63B

AC-8 Additional FedRAMP Requirements and Guidance

The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.

If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

AC-20 Additional FedRAMP Requirements and Guidance

The interrelated controls of AC-20, CA-3, and SA-9 should be differentiated as follows:

AC-20 describes system access to and from external systems.

CA-3 describes documentation of an agreement between the respective system owners when data is exchanged between the CSO and an external system.

SA-9 describes the responsibilities of external system owners. These responsibilities would typically be captured in the agreement required by CA-3.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

AU-2 Additional FedRAMP Requirements and Guidance

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.

AU-6 Additional FedRAMP Requirements and Guidance

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

AU-11 Additional FedRAMP Requirements and Guidance

The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

The service provider must support Agency requirements to comply with M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf)

The service provider is encouraged to align with M-21-31 where possible

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

CA-2 Additional FedRAMP Requirements and Guidance

Reference FedRAMP Annual Assessment Guidance.

CA-5 Additional FedRAMP Requirements and Guidance

POA&Ms must be provided at least monthly.

Reference FedRAMP-POAM-Template

CA-6 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F and according to FedRAMP Significant Change Policies and Procedures. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

CA-7 Additional FedRAMP Requirements and Guidance

Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually.

CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (ConMon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSOs authorized via the Agency path as each agency customer is responsible for performing ConMon oversight. It does not apply to CSOs authorized via the JAB path because the JAB performs ConMon oversight.

FedRAMP does not provide a template for the Continuous Monitoring Plan. CSPs should reference the FedRAMP Continuous Monitoring Strategy Guide when developing the Continuous Monitoring Plan.

CA-8 Additional FedRAMP Requirements and Guidance

Scope can be limited to public facing applications in alignment with M-22-09. Reference the FedRAMP Penetration Test Guidance.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

CM-2 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.

CM-6 Additional FedRAMP Requirements and Guidance

The service provider shall use the DoD STIGs or Center for Internet Security guidelines to establish configuration settings;

The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).

Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.

During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.

CM-7 Additional FedRAMP Requirements and Guidance

The service provider shall use Security guidelines (See CM-6) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if STIGs or CIS is not available.

CM-8 Additional FedRAMP Requirements and Guidance

must be provided at least monthly or when there is a change.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

CP-2 Additional FedRAMP Requirements and Guidance

For JAB authorizations the contingency lists include designated FedRAMP personnel.

CSPs must use the FedRAMP Information System Contingency Plan (ISCP) Template (available on the fedramp.gov: https://www.fedramp.gov/assets/resources/templates/SSP-A06-FedRAMP-ISCP-Template.docx).

CP-3 Additional FedRAMP Requirements and Guidance

Privileged admins and engineers must take the basic contingency training within 10 days. Consideration must be given for those privileged admins and engineers with critical contingency-related roles, to gain enough system context and situational awareness to understand the full impact of contingency training as it applies to their respective level. Newly hired critical contingency personnel must take this more in-depth training within 60 days of hire date when the training will have more impact.

CP-4 Additional FedRAMP Requirements and Guidance

The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

The service provider must include the Contingency Plan test results with the security package within the Contingency Plan-designated appendix (Appendix G, Contingency Plan Test Report).

CP-9 Additional FedRAMP Requirements and Guidance

The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.

The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.

The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

IA-2 Additional FedRAMP Requirements and Guidance

For all control enhancements that specify multifactor authentication, the implementation must adhere to the Digital Identity Guidelines specified in NIST Special Publication 800-63B.

Multi-factor authentication must be phishing-resistant.

"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.

All uses of encrypted virtual private networks must meet all applicable Federal requirements and architecture, dataflow, and security and privacy controls must be documented, assessed, and authorized to operate.

IA-2 (1) Additional FedRAMP Requirements and Guidance

According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).

Multi-factor authentication must be phishing-resistant.

Multi-factor authentication to subsequent components in the same user domain is not required.

IA-2 (2) Additional FedRAMP Requirements and Guidance

According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).

Multi-factor authentication must be phishing-resistant.

Multi-factor authentication to subsequent components in the same user domain is not required.

IA-2 (12) Additional FedRAMP Requirements and Guidance

Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

IA-5 Additional FedRAMP Requirements and Guidance

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 1. Link https://pages.nist.gov/800-63-3

SP 800-63C Section 6.2.3 Encrypted Assertion requires that authentication assertions be encrypted when passed through third parties, such as a browser. For example, a SAML assertion can be encrypted using XML-Encryption, or an OpenID Connect ID Token can be encrypted using JSON Web Encryption (JWE).

IA-5 (1) Additional FedRAMP Requirements and Guidance

Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.

For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.

For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.

Note that (c) and (d) require the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13).

IA-11 Additional FedRAMP Requirements and Guidance

The fixed time period cannot exceed the limits set in SP 800-63. At this writing they are:

  • AAL1 (low baseline)
    • 30 days of extended session
    • No limit on inactivity

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

IR-4 Additional FedRAMP Requirements and Guidance

The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."

The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

IR-6 Additional FedRAMP Requirements and Guidance

Reports security incident information according to FedRAMP Incident Communications Procedure.

IR-8 Additional FedRAMP Requirements and Guidance

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

PE-14 Additional FedRAMP Requirements and Guidance

The service provider measures temperature at server inlets and humidity levels by dew point.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

PL-8 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.

PL-10 Additional FedRAMP Requirements and Guidance

Select the appropriate FedRAMP Baseline

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

RA-3 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.

Include all Authorizing Officials; for JAB authorizations to include FedRAMP.

RA-5 Additional FedRAMP Requirements and Guidance

See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/

an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.

to include all Authorizing Officials; for JAB authorizations to include FedRAMP

Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.

Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.

Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SA-4 Additional FedRAMP Requirements and Guidance

The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.

See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SC-7 Additional FedRAMP Requirements and Guidance

SC-7 (b) should be met by subnet isolation. A subnetwork (subnet) is a physically or logically segmented section of a larger network defined at TCP/IP Layer 3, to both minimize traffic and, important for a FedRAMP Authorization, add a crucial layer of network isolation. Subnets are distinct from VLANs (Layer 2), security groups, and VPCs and are specifically required to satisfy SC-7 part b and other controls. See the FedRAMP Subnets White Paper (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf) for additional information.

SC-8 Additional FedRAMP Requirements and Guidance

For each instance of data in transit, confidentiality AND integrity should be through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5), or in combination.

For clarity, this control applies to all data in transit. Examples include the following data flows:

  • Crossing the system boundary
  • Between compute instances - including containers
  • From a compute instance to storage
  • Replication between availability zones
  • Transmission of backups to storage
  • From a load balancer to a compute instance
  • Flows from management tools required for their work - e.g. log collection, scanning, etc.

The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).

FedRAMP-Defined Assignment / Selection Parameters

SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when outside of Controlled Access Area (CAA)]

SC-8 (5)-2 [prevent unauthorized disclosure of information AND detect changes to information]

SC-8 (5) applies when physical protection has been selected as the method to protect confidentiality and integrity. For physical protection, data in transit must be in either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.

Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).

Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).

Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.

CNSSI No.7003 can be accessed here:

https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_2015.pdf

DHS Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies can be accessed here:

https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf

SC-8 (1) Additional FedRAMP Requirements and Guidance

Please ensure SSP Section 10.3 Cryptographic Modules Implemented for Data At Rest (DAR) and Data In Transit (DIT) is fully populated for reference in this control.

See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"

SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.

Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)

When leveraging encryption from the underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.

SC-12 Additional FedRAMP Requirements and Guidance

See references in NIST 800-53 documentation.

Must meet applicable Federal Cryptographic Requirements. See References Section of control.

Wildcard certificates may be used internally within the system, but are not permitted for external customer access to the system.

SC-13 Additional FedRAMP Requirements and Guidance

This control applies to all use of cryptography. In addition to encryption, this includes functions such as hashing, random number generation, and key generation. Examples include the following:

  • Encryption of data
  • Decryption of data
  • Generation of one time passwords (OTPs) for MFA
  • Protocols such as TLS, SSH, and HTTPS

The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS 140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program (CMVP).

https://csrc.nist.gov/projects/cryptographic-module-validation-program

For NSA-approved cryptography, the National Information Assurance Partnership (NIAP) oversees a national program to evaluate Commercial IT Products for Use in National Security Systems. The NIAP Product Compliant List can be found at the following location:

https://www.niap-ccevs.org/Product/index.cfm

When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.

Moving to non-FIPS CM or product is acceptable when:

  • FIPS validated version has a known vulnerability
  • Feature with vulnerability is in use
  • Non-FIPS version fixes the vulnerability
  • Non-FIPS version is submitted to NIST for FIPS validation
  • POA&M is added to track approval, and deployment when ready

At a minimum, this control applies to cryptography in use for the following controls: AU-9(3), CP-9(8), IA-2(6), IA-5(1), MP-5, SC-8(1), and SC-28(1).

SC-15 Additional FedRAMP Requirements and Guidance

The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

SC-20 Additional FedRAMP Requirements and Guidance

Control Description should include how DNSSEC is implemented on authoritative DNS servers to supply valid responses to external DNSSEC requests.

SC-20 applies to use of external authoritative DNS to access a CSO from outside the boundary.

External authoritative DNS servers may be located outside an authorized environment. Positioning these servers inside an authorized boundary is encouraged.

CSPs are recommended to self-check DNSSEC configuration through one of many available analyzers such as Sandia National Labs (https://dnsviz.net)

SC-21 Additional FedRAMP Requirements and Guidance

Control description should include how DNSSEC is implemented on recursive DNS servers to make DNSSEC requests when resolving DNS requests from internal components to domains external to the CSO boundary.

  • If the reply is signed, and fails DNSSEC, do not use the reply
  • If the reply is unsigned:
    • CSP chooses the policy to apply

Internal recursive DNS servers must be located inside an authorized environment. It is typically within the boundary, or leveraged from an underlying IaaS/PaaS.

Accepting an unsigned reply is acceptable

SC-21 applies to use of internal recursive DNS to access a domain outside the boundary by a component inside the boundary.

  • DNSSEC resolution to access a component inside the boundary is excluded.
SC-28 Additional FedRAMP Requirements and Guidance

The organization supports the capability to use cryptographic mechanisms to protect information at rest.

When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.

Note that this enhancement requires the use of cryptography in accordance with SC-13.

SC-28 (1) Additional FedRAMP Requirements and Guidance

Organizations should select a mode of protection that is targeted towards the relevant threat scenarios.

Examples:

A. Organizations may apply full disk encryption (FDE) to a mobile device where the primary threat is loss of the device while storage is locked.

B. For a database application housing data for a single customer, encryption at the file system level would often provide more protection than FDE against the more likely threat of an intruder on the operating system accessing the storage.

C. For a database application housing data for multiple customers, encryption with unique keys for each customer at the database record level may be more appropriate.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SI-4 Additional FedRAMP Requirements and Guidance

See US-CERT Incident Response Reporting Guidelines.

SI-5 Additional FedRAMP Requirements and Guidance

Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SR-3 Additional FedRAMP Requirements and Guidance

CSO must document and maintain the supply chain custody, including replacement devices, to ensure the integrity of the devices before being introduced to the boundary.

SR-8 Additional FedRAMP Requirements and Guidance

CSOs must ensure and document how they receive notifications from their supply chain vendor of newly discovered vulnerabilities including zero-day vulnerabilities.

SR-11 Additional FedRAMP Requirements and Guidance

CSOs must ensure that their supply chain vendors provide authenticity of software and patches and the vendor must have a plan to protect the development pipeline.

FedRAMP Applicable Laws and Regulations

FedRAMP Logo

NIST Special Publication (SP) 800-53 revision 5