The Wayback Machine - https://web.archive.org/web/20120509051554/http://cloudcomputing.sys-con.com/node/2132479

Welcome!

Cloud Expo Authors: Nicole Gorman, Chris Evans, Max Katz, Aaron Hollobaugh, Jaime Ryan

Related Topics: Cloud Expo

Cloud Expo: Blog Feed Post

What You Need To Know About FedRAMP

FedRAMP released its list of security controls earlier this month

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program established in December 2011 to speed the adoption of cloud computing. FedRAMP includes a set of requirements for federal cloud computing and universal procedures for approving services and providers to work with the government. When contractors feel that they have met FedRAMP requirements, they must have their security control implementations independently verified and validated by a FedRAMP accredited Third Party Assessment Organization for compliance which then submits  a security assessment package for review by the cross-agency Joint Authorization Board (JAB) . FedRAMP is expected to be operational by June and will be mandatory for all government cloud deployments of low to moderate risk levels except for single agency private clouds. Agencies can also add additional requirements on top of the FedRAMP controls. The goal is to establish standards to ease fears about cloud security while saving time and labor through one federal standard rather than redundant agency standards, allowing organizations to leverage past approvals elsewhere.

After looking at over 1000 comments from government and industry, FedRAMP released its list of security controls earlier this month. The controls are based on the National Institute of Standards and Technology special publication 800-53, Revision 3, which are already in place for each federal agency through the Federal Information Management Security Act (FISMA), with additions relating specifically to security in the cloud. The 800-53 standards are characterized by measures to ensure the consistent application of security practices and continuous monitoring of near-real time data.

Additions include controls to deal with trust on shared resources and to dictate secure practices for Platform-as-a-Service, Software-as-a-Service, and Infrastructure-as-a-Service. PaaS and IaaS are to have session locks and SaaS needs to have cryptography up to federally mandated standards. Service providers must support the capability to produce, control, and distribute asymmetric cryptographic keys. Identity and privilege are to be tightly managed, with means to identify foreign nationals and contractors on government networks and enforce role-based access controls at the file, table, row, column, or even cell level if necessary. There are extensive documentation requirements. Service providers must maintain a list of software programs authorized to execute on the information system and submit it to the JAB for approval, and must also document all outsourced security services as well as conduct a risk assessment of future outsourced security services to be approved by the JAB. To gain authorization, service providers must also submit updated code analysis reports and, in the Continuous Monitoring Plan, how new code will be reviewed. The JAB must also approve a list of security functions that must be routed for DHS monitoring such as authentication and resource provisioning and what internal communications traffic will be routed through authenticated proxy server to which external networks. Service providers are to logically or physically separate administrator information security tools, mechanisms, and support components and set resource allocation priorities for the moderate impact systems. The full list of controls contains more additions and specifics.

FedRAMP has already gotten a mixed response. Government executives say that the program will speed up the adoption of cloud computing by simplifying the authorization process for cloud services. If a Third Party Assessment Organization and the Joint Authorization Board find a service to be compliant, any and all government agencies can adopt it. That is, however, only if individual agencies don’t add too many additional conditions to the controls, which some researchers fear will happen. Also, as noted above, the authorisation process is very documentation intensive with many steps that may create a bureaucratic nightmare as cloud services rush to get authorized. Rather than speed up the adoption of cloud services, FedRAMP could create a bottleneck. To combat this, the JAB intends to view authorization packages in order of priority and grant provisional authorization if necessary.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Cloud Expo Breaking News
It’s easy to lose your head in the clouds. While virtualization has provided a way to satiate the need for on-demand solutions, it is easy to lose sight of the appropriate architecture when being allured to the sky. In his session at the 10th International Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will go back to the basics and take a practical approach to solution building: how to structure your application to take advantage of hybrid environments and provide the...
The move to cloud-based applications has undeniably delivered tremendous benefits. However, the associated distribution creates various challenges from the quality perspective: End-to-end tests need to pass through multiple dependent systems, which are commonly unavailable, evolving, or difficult-to-access for testing. Accessing such systems often involves transaction and bandwidth fees. Teams need to test and tune the system under test against a realistic and broad range of performance and ...
“The speed of businesses is accelerating, requiring continuous tuning and optimization of business processes and operations,” noted Bruce Fingles, CIO and VP of Product Quality at Xsigo Systems, in this exclusive Q&A; with Cloud Expo Conference Chair Jeremy Geelan. “IT organizations must have an infrastructure that enables them to partner with business leaders and respond quickly to changes that can help drive the business forward,” Fingles concluded. Cloud Computing Journal: Agree or disagree? ...
In spite of the great strides the cloud industry has made in addressing security and integration concerns, large enterprises (e.g., banks, insurance companies, health care firms) continue to be reluctant to adopt the cloud for mission-critical applications. Further, resistance to cloud adoption is now at least as much an issue of misaligned incentives and fear of the unknown as it is about legitimate technology concerns. Breaking the impasse on mission-critical apps often can't be done directl...
Want to save your business money? Of course you do. What if we could show you a way to use the cloud in and around your office, get your workforce mobile, make communication faster and easier, and reduce OPEX? We can. In his session at the 10th International Cloud Expo, Jason Silverglate, CEO of Fortress ITX and its subsidiaries, will present a “how to” analysis of what cloud technology can do for the modern office, of any size. He will show how incorporating hosted PBX, hosted email, and even...
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they w...
The elastic resources offered by cloud computing have created an exciting opportunity for applications to handle very large workloads. However, writing applications that span an elastic pool of virtual servers creates huge challenges for developers. How can these virtual servers easily and efficiently share application data while avoiding scaliability bottlenecks? The answer lies in using in-memory data grids (IMDGs) to provide a powerful, easy-to-use, and highly scalable storage layer. IMDGs ...
In this CEO Power Panel at the 10th International Cloud Expo, moderated by Cloud Expo Conference Chair Jeremy Geelan, leading executives in the Cloud Computing and Big Data space will be discussing such topics as: Is it just wishful thinking to depict the Cloud as more than just a technology solution? If not, then what concrete examples best demonstrate cloud computing as an engine of business value? Big Data has existed since the early days of computing; why, then, do you think there is such...
SYS-CON Events announced today that ComputeNext Inc. will exhibit at SYS-CON's 10th International Cloud Expo, which will take place on June 11–14, 2012, at the Javits Center in New York City, New York. What’s the scope of your “single pane of glass”? If you’re a cloud architect wouldn’t you be better suited with a telescope than a magnifying glass? The ComputeNext marketplace and workload manager sprawls across public clouds, eliminating vendor and platform lock-in. A single point of payment a...
Information Security and Risk has become a top concern of IT organizations and consumers alike. Concern about inadequate Info Security remains the #1 obstacle to greater adoption of Cloud Computing, according to Intel’s research. The rapid growth of Mobile and IP-connected Embedded devices, Cloud Computing, Social Networks, and “Consumerization of IT” is being met with, and in some cases contributing to, an escalating number and complexity of Cyber-threats. Tenants of the cloud need the ability ...