logo

FedRAMP


Summary

FedRAMP is a U.S. Government program designed to standardize how the Federal Information Security Management Act (FISMA) applies to cloud computing services. It provides a standardized approach to security assessment, authorization and continuous monitoring of cloud-based services. FedRAMP defines a set of security control implementations and security impact level systems based on NIST baseline controls (NIST SP 800-53).


Definitions

DefinitionRequirements
FEDRAMP-AC-2_3. Account management - Disable inactive accounts
FEDRAMP-AC-2_5. Account management - Inactivity logout
FEDRAMP-AC-2_7. Account management - Role-based schemes
FEDRAMP-AC-2_12. Account management - Account monitoring, atypical usage
FEDRAMP-AC-6_1. Least privilege - Authorize access to security functions
FEDRAMP-AC-6_2. Least privilege - Non-privileged access for nonsecurity functions
FEDRAMP-AC-6_3. Least privilege - Network access to privileged commands
FEDRAMP-AC-6_8. Least privilege - Privilege levels for code execution
FEDRAMP-AC-7_2. Unsuccessful logon - Purge, wipe mobile device
FEDRAMP-AC-8. System use notification
FEDRAMP-AC-10. Concurrent session control
FEDRAMP-AC-11. Session lock
FEDRAMP-AC-22. Publicly accessible content
FEDRAMP-AU-3_2. Centralized management of planned audit record content
FEDRAMP-AU-8. Time stamps
FEDRAMP-AU-8_1. Synchronization with authoritative time source
FEDRAMP-AU-12_3. Audit regeneration - Changes by authorized individuals
FEDRAMP-CA-2_2. Security assessment - Specialized assessments
FEDRAMP-CA-2_3. Security assessment - External organizations
FEDRAMP-CA-3. System interconnections
FEDRAMP-CA-3_3. Unclassified non-national security system connections
FEDRAMP-CA-6. Security authorization
FEDRAMP-CA-7. Continuous monitoring
FEDRAMP-CM-2_1. Baseline configuration - Reviews and updates
FEDRAMP-CM-3_6. Baseline configuration - Cryptography management
FEDRAMP-CM-5_5. Access restrictions for change - Limit production, operational privileges
FEDRAMP-CM-7. Least functionality
FEDRAMP-CM-7_5. Least functionality - Authorized software, whitelisting
FEDRAMP-IA-2_11. Identification and authentication - Remote access, separate device
FEDRAMP-IA-4. Identifier management
FEDRAMP-IA-5_1. Authenticator management - Password-based authentication
FEDRAMP-IA-5_3. Authenticator management - In-person or trusted third-party registration
FEDRAMP-IA-5_8. Authenticator management - Multiple information system accounts
FEDRAMP-MP-2. Media access
FEDRAMP-MP-5. Media transport
FEDRAMP-MP-6. Media sanitization
FEDRAMP-PE-3. Physical access control
FEDRAMP-PE-16. Delivery and removal
FEDRAMP-PS-3_3. Personnel screening - Information with special protection measures
FEDRAMP-PS-7. Third-party personnel security
FEDRAMP-RA-5. Vulnerability scanning
FEDRAMP-RA-5_4. Privileged access
FEDRAMP-SA-1. System and services acquisition policy and procedures
FEDRAMP-SA-9. External information system services
FEDRAMP-SA-10. Developer configuration management
FEDRAMP-SC-1. System and communications protection policy and procedures
FEDRAMP-SC-8. Transmission confidentiality and integrity
FEDRAMP-SC-8_1. Cryptographic or alternate physical protection
FEDRAMP-SC-10. Network disconnect
FEDRAMP-SC-12_2. Cryptographic key establishment and management - Symmetric keys
FEDRAMP-SC-13. Cryptographic protection
FEDRAMP-SC-28. Protection of information at rest
FEDRAMP-SI-3. Malicious code protection
FEDRAMP-SI-5. Security alerts, advisories, and directives

Last updated

2023/09/18