Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.

Slides:



Advertisements
Similar presentations
ENTITIES FOR A UN SYSTEM EVALUATION FRAMEWORK 17th MEETING OF SENIOR FELLOWSHIP OFFICERS OF THE UNITED NATIONS SYSTEM AND HOST COUNTRY AGENCIES BY DAVIDE.
Advertisements

1 Cloud Security in the Federal Sector: FedRAMP (Federal Risk and Authorization Management Program) © Grant Thornton LLP. All rights reserved. Orus Dearman,
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
1 Department of State Program Evaluation Policy Overview Spring 2013.
METRICS AND CONTROLS FOR DEFENSE IN DEPTH AN INFORMATION TECHNOLOGY SECURITY ASSESSMENT INITIATIVE.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
PAGE Quick Guide to the FedRAMP Readiness Process 1 August 2014 Presented by: FedRAMP PMO
The New TNI Laboratory Accreditation Standards Requirements for an Accreditation Body.
PAGE Agency ATO Quick Guide 1 December 23,
Cybersecurity Blueprints
1 Executive Office of Public Safety. 2 National Incident Management System.
Federal Cloud Computing Initiative Matthew Goodrich November 5, 2010 GSA Confidential and Proprietary – Not for Distribution Section 508 Coordinator Conference.
Conformity Assessment: activities & systems
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
PAGE Agency ATO Quick Guide 1 May 1,
Annie W. Sokol, IT Specialist, NIST
Quality evaluation and improvement for Internal Audit
PAGE[classification marking] marking] FedRAMP Government Discussion Matt Goodrich, FedRAMP Director January 14,
Risk Management Framework
project management office(PMO)
Purpose of the Standards
1 Continuous Monitoring Proprietary Information of SecureInfo ® Corporation © 2011 All Rights Reserved.
Complying With The Federal Information Security Act (FISMA)
FedRAMP Federal Risk and Authorization Management Program Industry Day June 4, 2014 Industry Day.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
CDS CERTIFICATION AND ACCREDITATION PROCESS
Continual Service Improvement Process
FY2010 PEMP Notable Outcomes October 15, FRA, LLC Board of Directors 10/15-16/2009 Office of Quality and Best Practices Performance Evaluation Management.
Evaluation in the GEF and Training Module on Terminal Evaluations
NIST Special Publication Revision 1
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Federal IT Security Professional - Auditor
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ADD Perspectives on Accountability Where are We Now and What does the Future Hold? Jennifer G. Johnson, Ed.D.
December 14, 2011/Office of the NIH CIO Operational Analysis – What Does It Mean To The Project Manager? NIH Project Management Community of Excellence.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 OMB Circular A-123 Lessons Learned: Strategies for Sustained Compliance and Outlook for the Future Presented by Frank Petersen, Director Office of Quality.
National Institute of Standards and Technology Information Technology Laboratory 1 USG Cloud Computing Technology Roadmap Next Steps NIST Mission: To promote.
SANAS ACCREDITATION DEES DHANRAJ BEE Lead Assessor.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
ISA Setting the Standard for Automation ™ Automation Standards Compliance Institute ISA Security Compliance Institute (ISCI) Prepared by: Andre Ristaino,
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Department of Defense Knowledge Fair Tim Young Office of Management and Budget September 27, 2007.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Senior Evaluation Officer GEF Independent Evaluation Office Minsk, Belarus September 2015 Evaluation in the GEF and Training Module on Terminal Evaluations.
Tracking national portfolios and assessing results Sub-regional Workshop for GEF Focal Points in West and Central Africa June 2008, Douala, Cameroon.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
International Atomic Energy Agency Roles and responsibilities for development of disposal facilities Phil Metcalf Workshop on Strategy and Methodologies.
Assessment and Authorization– Module 5 (combined with Module 6)
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Technology Services – National Institute of Standards and Technology Implementing the National Technology Transfer and Advancement Act in the Federal Government.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Assessment and Authorization– Module 5 (combined with Module 6)
NATIONAL INCIDENT MANAGEMENT SYSTEM Department of Homeland Security Executive Office of Public Safety.
FITARA Revamping IT in the Federal Government Presentation to DIR Information Security Forum Richard A. Spires April 14, 2016.
OMB Status 03/31/05 Monday, June 6, 2005 OMB Progress 03/31/05 Vicki Novak Tom Luedtke Gwen SykesPat DunningtonGwen Sykes Best in Government! Steps to.
SaaS Working Group Meeting Cloud Assessments Industry Day February, 2016 John Connor, IT Security Specialist, OISM, NIST Background Photo - JILA.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Matthew Christian Dave Maddox Tim Toennies
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Evaluation in the GEF and Training Module on Terminal Evaluations
Presentation transcript:

Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination Office

What is FedRAMP? 2 FedRAMP is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.  This approach uses a “do once, use many times” framework that will save cost, time, and staff required to conduct redundant agency security assessments.

Why FedRAMP? 3 Problem: A duplicative, inconsistent, time consuming, costly, and inefficient cloud security risk management approach with little incentive to leverage existing Authorizations to Operate (ATOs) among agencies. Solution: FedRAMP Uniform risk management approach Standard set of approved, minimum security controls (FISMA Low and Moderate Impact) Consistent assessment process Provisional ATO

FedRAMP builds upon existing policy, frameworks 4 eGov Act of 2002 includes Federal Information Security Management Act (FISMA) eGov Act of 2002 includes Federal Information Security Management Act (FISMA) FedRAMP Security Requirements Agency ATO Congress passes FISMA as part of 2002 eGov Act OMB A-130 NIST SP , , OMB A-130 NIST SP , , OMB A-130 provide policy, NIST Special Publications provide risk management framework FedRAMP builds upon NIST SPs establishing common cloud computing baseline supporting risk based decisions Agencies leverage FedRAMP process, heads of agencies understand, accept risk and grant ATOs

FedRAMP and the Security Assessment and Authorization Process 5 Maintains Security Baseline including Controls & Continuous Monitoring Requirements Maintains Assessment Criteria Maintains Active Inventory of Approved Systems Ongoing A&A (Continuous Monitoring) Ongoing A&A (Continuous Monitoring) Provisional Authorization Joint Authorization Board reviews assessment packages and grants provisional authorizations Agencies issue ATOs using a risk-based framework Joint Authorization Board reviews assessment packages and grants provisional authorizations Agencies issue ATOs using a risk-based framework Independent Assessment CSP must retain an independent assessor from FedRAMP accredited list of 3PAOs DHS – CyberScope Data Feeds DHS – US CERT Incident Response and Threat Notifications FedRAMP PMO – POA&Ms Consistency and Quality Trustworthy & Re-useable Near Real-Time Assurance FedRAMP

FedRAMP 3PAO Accreditation – 6 Benefits of leveraging a formal 3PAO approval process: Consistency in performing security assessments Ensures 3PAO independence from Cloud Service Providers Establishes an approved list of 3PAOs for CSPs and Agencies to use Consistency in performing security assessments Ensures 3PAO independence from Cloud Service Providers Establishes an approved list of 3PAOs for CSPs and Agencies to use Conformity assessment process to accredit 3PAOs based on NIST program (1)Independence and quality management in accordance with ISO standards; and (2)Technical competence through FISMA knowledge testing. Conformity assessment process to accredit 3PAOs based on NIST program (1)Independence and quality management in accordance with ISO standards; and (2)Technical competence through FISMA knowledge testing. FedRAMP requires CSPs to use Third Party Assessment Organizations (3PAOs) to independently validate and verify that they meet FedRAMP security requirements Initial list published on fedramp.gov on May , assessors are approved ongoing basis.

FedRAMP Major Players 7 Provides Cloud IT Services with a provisional authorization granted by FedRAMP JAB Cloud Service Provider Performs initial and periodic assessment of security and privacy controls deployed in Cloud information systems 3 rd Party Assessment Organization JAB (DOD, DHS, GSA) PMO- GSA Technical Advisor – NIST Continuous Monitoring - DHS JAB (DOD, DHS, GSA) PMO- GSA Technical Advisor – NIST Continuous Monitoring - DHS Federal Agencies

FedRAMP Stakeholder Roles and Interaction 8

FedRAMP Phases and Timeline Phased evolution towards sustainable operations allows for the management of risks, capture of lessons learned, and incremental rollout of capabilities 9 FY12 FY13 Q2FY14 Pre-Launch ActivitiesInitial Operational Capabilities (IOC) Full OperationsSustaining Operations Finalize Requirements and Documentation in Preparation of Launch Launch IOC with Limited Scope and Cloud Service Provider (CSP)s Execute Full Operational Capabilities with Manual Processes Move to Full Implementation with On-Demand Scalability Key Activities Publish FedRAMP Requirements (Security Controls, Templates, Guidance) Publish Agency Compliance Guidance Accredit 3PAOs Establish Priority Queue Authorize CSPs Update CONOPS, Continuous Monitoring Requirements and CSP Guidance Conduct Assessments & Authorizations Scale Operations to Authorize More CSPs Implement Electronic Authorization Repository Scale to Steady State Operations Outcomes Initial List of Accredited 3PAOs Launch FedRAMP into Initial Operating Capabilities Initial CSP Authorizations Established Performance Benchmark Multiple CSP Authorizations Defined Business Model Measure Benchmarks Authorizations Scale by Demand Implement Business Model Self-Sustaining Funding Model Covering Operations Privatized Accreditation Board Gather Feedback and Incorporate Lessons Learned We Are Here!

Key Benefits Re-use of existing security assessments across agencies Savings in cost, time and resources – do once, use many times Risk based not compliance based Transparency between government and cloud service providers Transparency trust, reliability, consistency, and quality of the Federal security authorization process 10