at least every 3 years
at least annually
significant changes
twenty-four (24) hours
eight (8) hours
eight (8) hours
at least annually
see additional Requirements and Guidance
see additional Requirements and Guidance
at least quarterly
at least every 3 years
at least annually
significant changes
at least annually
at least annually
at least annually
at least annually
at least one (1) year or 1 year after completion of a specific training program
at least every 3 years
at least annually
significant changes
successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes
organization-defined subset of the auditable events defined in AU-2a to be audited continually for each identified event.
annually and whenever there is a change in the threat environment
overwrite oldest record
at least weekly
one second granularity of time measurement
a time period in compliance with M-21-31
all information system and network components where audit capability is deployed/available
at least every 3 years
at least annually
significant changes
at least annually
individuals or roles to include FedRAMP PMO
at least annually and on input from JAB/AO
at least monthly
in accordance with OMB A-130 requirements or when a significant change occurs
to include JAB/AO
at least annually
at least every 3 years
at least annually
significant changes
at least annually and when a significant change occurs
to include when directed by the JAB
at least monthly
Continuously (via CM-7 (5))
at least every 3 years
at least annually
significant changes
at least annually
*See Additional Requirements
at least annually
at least annually
at least every 3 years
classroom exercise/table top written tests
daily incremental; weekly full
daily incremental; weekly full
daily incremental; weekly full
at least every 3 years
at least annually
significant changes
at a minimum, the ISSO (or similar role within the organization)
at least two (2) years
at least every 3 years
at least annually
significant changes
ten (10) days for privileged users, thirty (30) days for Incident Response roles
at least annually
at least annually
US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)
at least annually
see additional FedRAMP Requirements and Guidance
see additional FedRAMP Requirements and Guidance
at least every 3 years
at least annually
significant changes
at least every 3 years
at least annually
significant changes
techniques and procedures IAW NIST SP 800-88 Section 4: Reuse and Disposal of Storage Media and Hardware
at least every 3 years
at least annually
significant changes
at least annually
CSP defined physical access control systems/devices AND guards
in all circumstances within restricted access area where the information system resides
at least annually
at least annually
at least monthly
for a minimum of one (1) year
at least monthly
consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments
continuously
all information system components
at least every 3 years
at least annually
significant changes
at least annually
at least every 3 years
at least annually and when the rules are revised or changed
at least annually and when a significant change occurs
at least every 3 years
at least annually
significant changes
at least every three years
for national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance.
For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions
four (4) hours
twenty-four (24) hours
twenty-four (24) hours
at least annually
at least annually and any time there is a change to the user's level of access
including access control personnel responsible for the system and/or facilities, as appropriate
within twenty-four (24) hours
at a minimum, the ISSO and/or similar role within the organization
at least every 3 years
at least annually
significant changes
security assessment report
at least every three (3) years and when a significant change occurs
at least every three (3) years
monthly operating system/infrastructure; monthly web applications (including APIs) and databases
high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery
prior to a new scan
at least every 3 years
at least annually
significant changes
at a minimum, the ISSO (or similar role within the organization)
Appropriate FedRAMP Security Controls Baseline (s) if Federal information is processed or stored within the external system
Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored
at least every 3 years
at least annually
significant changes
Protect against
at a minimum: ICMP (ping) flood, SYN flood, slowloris, buffer overflow attack, and volume attack
In accordance with Federal requirements
FIPS-validated or NSA-approved cryptography
no exceptions for computing devices
all information system components storing Federal data or system data that must be protected at the High or Moderate impact levels
at least every 3 years
at least annually
significant changes
within thirty (30) days of release of updates
signature based and non-signature based
at least weekly
to include endpoints and network entry and exit points
to include blocking and quarantining malicious code
administrator or defined security personnel near-realtime
to include US-CERT and Cybersecurity and Infrastructure Security Agency (CISA) Directives
to include system security personnel and administrators with configuration/patch-management responsibilities
to include chief privacy and ISSO and/or similar role or designees
at least every 3 years
at least annually
significant changes
at least annually
notification of supply chain compromises and results of assessment or audits
all
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
In alignment with NIST SP 800-63B
The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.
The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.
If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.
If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.
The interrelated controls of AC-20, CA-3, and SA-9 should be differentiated as follows:
AC-20 describes system access to and from external systems.
CA-3 describes documentation of an agreement between the respective system owners when data is exchanged between the CSO and an external system.
SA-9 describes the responsibilities of external system owners. These responsibilities would typically be captured in the agreement required by CA-3.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.
Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.
Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.
The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.
The service provider must support Agency requirements to comply with M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf)
The service provider is encouraged to align with M-21-31 where possible
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Reference FedRAMP Annual Assessment Guidance.
POA&Ms must be provided at least monthly.
Reference FedRAMP-POAM-Template
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F and according to FedRAMP Significant Change Policies and Procedures. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually.
CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (ConMon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSOs authorized via the Agency path as each agency customer is responsible for performing ConMon oversight. It does not apply to CSOs authorized via the JAB path because the JAB performs ConMon oversight.
FedRAMP does not provide a template for the Continuous Monitoring Plan. CSPs should reference the FedRAMP Continuous Monitoring Strategy Guide when developing the Continuous Monitoring Plan.
Scope can be limited to public facing applications in alignment with M-22-09. Reference the FedRAMP Penetration Test Guidance.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
The service provider shall use the DoD STIGs or Center for Internet Security guidelines to establish configuration settings;
The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).
Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.
The service provider shall use Security guidelines (See CM-6) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if STIGs or CIS is not available.
must be provided at least monthly or when there is a change.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
For JAB authorizations the contingency lists include designated FedRAMP personnel.
CSPs must use the FedRAMP Information System Contingency Plan (ISCP) Template (available on the fedramp.gov: https://www.fedramp.gov/assets/resources/templates/SSP-A06-FedRAMP-ISCP-Template.docx).
Privileged admins and engineers must take the basic contingency training within 10 days. Consideration must be given for those privileged admins and engineers with critical contingency-related roles, to gain enough system context and situational awareness to understand the full impact of contingency training as it applies to their respective level. Newly hired critical contingency personnel must take this more in-depth training within 60 days of hire date when the training will have more impact.
The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.
The service provider must include the Contingency Plan test results with the security package within the Contingency Plan-designated appendix (Appendix G, Contingency Plan Test Report).
The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.
The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.
The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.
The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
For all control enhancements that specify multifactor authentication, the implementation must adhere to the Digital Identity Guidelines specified in NIST Special Publication 800-63B.
Multi-factor authentication must be phishing-resistant.
"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
All uses of encrypted virtual private networks must meet all applicable Federal requirements and architecture, dataflow, and security and privacy controls must be documented, assessed, and authorized to operate.
According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).
Multi-factor authentication must be phishing-resistant.
Multi-factor authentication to subsequent components in the same user domain is not required.
According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).
Multi-factor authentication must be phishing-resistant.
Multi-factor authentication to subsequent components in the same user domain is not required.
Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.
Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 1. Link https://pages.nist.gov/800-63-3
SP 800-63C Section 6.2.3 Encrypted Assertion requires that authentication assertions be encrypted when passed through third parties, such as a browser. For example, a SAML assertion can be encrypted using XML-Encryption, or an OpenID Connect ID Token can be encrypted using JSON Web Encryption (JWE).
Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.
For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.
Note that (c) and (d) require the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13).
The fixed time period cannot exceed the limits set in SP 800-63. At this writing they are:
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.
Reports security incident information according to FedRAMP Incident Communications Procedure.
The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.
The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The service provider measures temperature at server inlets and humidity levels by dew point.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
Select the appropriate FedRAMP Baseline
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
to include all Authorizing Officials; for JAB authorizations to include FedRAMP
Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).
The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
SC-7 (b) should be met by subnet isolation. A subnetwork (subnet) is a physically or logically segmented section of a larger network defined at TCP/IP Layer 3, to both minimize traffic and, important for a FedRAMP Authorization, add a crucial layer of network isolation. Subnets are distinct from VLANs (Layer 2), security groups, and VPCs and are specifically required to satisfy SC-7 part b and other controls. See the FedRAMP Subnets White Paper (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf) for additional information.
For each instance of data in transit, confidentiality AND integrity should be through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5), or in combination.
For clarity, this control applies to all data in transit. Examples include the following data flows:
The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).
FedRAMP-Defined Assignment / Selection Parameters
SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when outside of Controlled Access Area (CAA)]
SC-8 (5)-2 [prevent unauthorized disclosure of information AND detect changes to information]
SC-8 (5) applies when physical protection has been selected as the method to protect confidentiality and integrity. For physical protection, data in transit must be in either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.
Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).
Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.
CNSSI No.7003 can be accessed here:
https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_2015.pdf
DHS Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies can be accessed here:
https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf
Please ensure SSP Section 10.3 Cryptographic Modules Implemented for Data At Rest (DAR) and Data In Transit (DIT) is fully populated for reference in this control.
See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.
Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)
When leveraging encryption from the underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
See references in NIST 800-53 documentation.
Must meet applicable Federal Cryptographic Requirements. See References Section of control.
Wildcard certificates may be used internally within the system, but are not permitted for external customer access to the system.
This control applies to all use of cryptography. In addition to encryption, this includes functions such as hashing, random number generation, and key generation. Examples include the following:
The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS 140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program (CMVP).
https://csrc.nist.gov/projects/cryptographic-module-validation-program
For NSA-approved cryptography, the National Information Assurance Partnership (NIAP) oversees a national program to evaluate Commercial IT Products for Use in National Security Systems. The NIAP Product Compliant List can be found at the following location:
https://www.niap-ccevs.org/Product/index.cfm
When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
Moving to non-FIPS CM or product is acceptable when:
At a minimum, this control applies to cryptography in use for the following controls: AU-9(3), CP-9(8), IA-2(6), IA-5(1), MP-5, SC-8(1), and SC-28(1).
The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.
Control Description should include how DNSSEC is implemented on authoritative DNS servers to supply valid responses to external DNSSEC requests.
SC-20 applies to use of external authoritative DNS to access a CSO from outside the boundary.
External authoritative DNS servers may be located outside an authorized environment. Positioning these servers inside an authorized boundary is encouraged.
CSPs are recommended to self-check DNSSEC configuration through one of many available analyzers such as Sandia National Labs (https://dnsviz.net)
Control description should include how DNSSEC is implemented on recursive DNS servers to make DNSSEC requests when resolving DNS requests from internal components to domains external to the CSO boundary.
Internal recursive DNS servers must be located inside an authorized environment. It is typically within the boundary, or leveraged from an underlying IaaS/PaaS.
Accepting an unsigned reply is acceptable
SC-21 applies to use of internal recursive DNS to access a domain outside the boundary by a component inside the boundary.
The organization supports the capability to use cryptographic mechanisms to protect information at rest.
When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
Note that this enhancement requires the use of cryptography in accordance with SC-13.
Organizations should select a mode of protection that is targeted towards the relevant threat scenarios.
Examples:
A. Organizations may apply full disk encryption (FDE) to a mobile device where the primary threat is loss of the device while storage is locked.
B. For a database application housing data for a single customer, encryption at the file system level would often provide more protection than FDE against the more likely threat of an intruder on the operating system accessing the storage.
C. For a database application housing data for multiple customers, encryption with unique keys for each customer at the database record level may be more appropriate.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
See US-CERT Incident Response Reporting Guidelines.
Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
CSO must document and maintain the supply chain custody, including replacement devices, to ensure the integrity of the devices before being introduced to the boundary.
CSOs must ensure and document how they receive notifications from their supply chain vendor of newly discovered vulnerabilities including zero-day vulnerabilities.
CSOs must ensure that their supply chain vendors provide authenticity of software and patches and the vendor must have a plan to protect the development pipeline.
FedRAMP Logo