Search Results :
×FedRAMP is one of the processes which is used for standardizing the security offered by Software-as-a-Service (SAAS) Providers. It is an assessment that is done through a continuous monitoring process. This process is directed by the Office of Management and Budget. Which is owned by U.S federal agencies for benchmarking security products and services. FedRAMP was developed as a result of a collaboration of cloud security and cloud experts from the National Institute of Standards and Technology (NIST), General Services Administration (GSA), Department of Defence (DOD), Department of Homeland Security (DHS), Office of Management and Budget (OMB), the federal Chief Information Officer (CIO) Council and its working groups as well as private industry. Internal processes are tested by many third-party audits. These audits are effective in managing the security within their facilities where data is stored.
The bottom line of the Federal Information Management and Security Act (FISMA) points to achieve most of the cybersecurity and focus lies in "Risk-based policy for cost-effective security." Security here means protecting the data and information safe from unauthorized access, use, disrupt, modify. This provides integrity, confidentiality, and availability.
Fed Ramp is an assessment and authorization program which keeps control on the security offered by Software-as-a-Service (SaaS) providers to their clients (Security here means the protection of unauthorized access, disruption, and modification of customer’s data). U.S. federal agencies which are directed by the office of management and budget are looking for this security check. The federal information of security management ACT of 2002, is a law designed as per title III of E-Government Act of 2002 (Pub.L. 107–347, 116 Stat. 2899). This process is continuous and re-assessment is done every two years. All the assessment here is done in such a way that Cloud Security Provider (CSP) must meet high standards of independence and performance, especially quality, completeness, and timeliness. |
There are three ways for Cloud Service Provider to be FedRAMP Compliant:
|
The Cloud First Policy needs that, all federal agencies should use the FedRAMP process to conduct security assessments, authorizations, and continuous monitoring of cloud services. The FedRAMP program office has stated five requirements on basis of which FedRAMP compliance is achieved:
|
The advantages of FedRAMP compliance are:
|
To achieve FedRAMP compliance specific steps are taken, these are listed below:
|
There are two paths by which the CSPs can become FedRAMP-compliant: The CSP can approach through the FedRAMP PMO as well as by seeking help from a sponsoring federal agency. If a CSP has an existing business with an agency or if a potential customer has interest then CSP can navigate the FedRAMP process directly with the agency by obtaining a sponsorship. If there is no sponsorship from an agency, CSPs must submit a request to the FedRAMP PMO and enter the queue of CSPs waiting for approval to begin a FedRAMP assessment. Any of the above paths can be followed in order to become FedRAMP Compliant by the cloud service provider (CSP). The PMO path of compliance takes time since the waiting list is there, but the agency sponsoring route can be more difficult. Registered third party and the agency involved must be consulted before choosing the option. |
The cloud service providers need to check the controls if they want to undergo FedRAMP compliance. These controls are selected and implemented according to and in proportion with risks, especially by accessing threats, vulnerabilities, and impacts:
|
Cloud service providers can operate on a scale and protect their usernames and passwords. There are few policies which are to be implemented in order to offer perfect service at affordable rates.
|
CSP opts for the FedRAMP process of compliance during which many processes the system has to go through. If an organization fails to go through this process then there are certain corrective actions which can be taken in a given time frame.
|
Authorization is done through the agency by almost 65 percent of companies. This is an option to obtain FedRAMP compliance.
|
The documents that are taken care of during FedRAMP are:
|
The controls that are not applicable for FedRAMP are: The controls related to the provision and management of wireless services are not applicable to CSP’s implementation. This is applicable when no wireless network capability is implemented. The controls are fully inherited and entirely the responsibility of the provider. These are not to be tested by CSP. |