logo

Database

FedRAMP

Last updated: 2023/09/18
logo

FedRAMP is a U.S. Government program designed to standardize how the Federal Information Security Management Act (FISMA) applies to cloud computing services. It provides a standardized approach to security assessment, authorization and continuous monitoring of cloud-based services. FedRAMP defines a set of security control implementations and security impact level systems based on NIST baseline controls (NIST SP 800-53).

Control-Requirement Mapping

DefinitionRequirements
AC-2_3. Account management - Disable inactive accounts
AC-2_5. Account management - Inactivity logout
AC-2_7. Account management - Role-based schemes
AC-2_12. Account management - Account monitoring, atypical usage
AC-6_1. Least privilege - Authorize access to security functions
AC-6_2. Least privilege - Non-privileged access for nonsecurity functions
AC-6_3. Least privilege - Network access to privileged commands
AC-6_8. Least privilege - Privilege levels for code execution
AC-7_2. Unsuccessful logon - Purge, wipe mobile device
AC-8. System use notification
AC-10. Concurrent session control
AC-11. Session lock
AC-22. Publicly accessible content
AU-3_2. Centralized management of planned audit record content
AU-8. Time stamps
AU-8_1. Synchronization with authoritative time source
AU-12_3. Audit regeneration - Changes by authorized individuals
CA-2_2. Security assessment - Specialized assessments
CA-2_3. Security assessment - External organizations
CA-3. System interconnections
CA-3_3. Unclassified non-national security system connections
CA-6. Security authorization
CA-7. Continuous monitoring
CM-2_1. Baseline configuration - Reviews and updates
CM-3_6. Baseline configuration - Cryptography management
CM-5_5. Access restrictions for change - Limit production, operational privileges
CM-7. Least functionality
CM-7_5. Least functionality - Authorized software, whitelisting
IA-2_11. Identification and authentication - Remote access, separate device
IA-4. Identifier management
IA-5_1. Authenticator management - Password-based authentication
IA-5_3. Authenticator management - In-person or trusted third-party registration
IA-5_8. Authenticator management - Multiple information system accounts
MP-2. Media access
MP-5. Media transport
MP-6. Media sanitization
PE-3. Physical access control
PE-16. Delivery and removal
PS-3_3. Personnel screening - Information with special protection measures
PS-7. Third-party personnel security
RA-5. Vulnerability scanning
RA-5_4. Privileged access
SA-1. System and services acquisition policy and procedures
SA-9. External information system services
SA-10. Developer configuration management
SC-1. System and communications protection policy and procedures
SC-8. Transmission confidentiality and integrity
SC-8_1. Cryptographic or alternate physical protection
SC-10. Network disconnect
SC-12_2. Cryptographic key establishment and management - Symmetric keys
SC-13. Cryptographic protection
SC-28. Protection of information at rest
SI-3. Malicious code protection
SI-5. Security alerts, advisories, and directives