Add work/tbx/FedRAMP.md

This commit is contained in:
2024-04-09 14:36:50 +00:00
parent cf52ffff1a
commit 4ea9599180

75
work/tbx/FedRAMP.md Normal file
View File

@@ -0,0 +1,75 @@
### 1. Introduction to FedRAMP
#### 1.1 What is FedRAMP?
- **Definition:** The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that promotes the adoption of secure cloud services across the Federal Government by providing a standardized approach to security assessment, authorization, and continuous monitoring.
- **Objective:** Ensure all federal data is securely stored, processed, and transmitted in cloud environments.
#### 1.2 FedRAMP Impact Levels
- **Low, Moderate, High:** Each level represents the potential impact on organizational operations, assets, or individuals should there be a breach of confidentiality, integrity, or availability.
- **Control Sets:** Tailored from NIST SP 800-53, specifying required security controls for each impact level.
### 2. Understanding FedRAMP's Technical Requirements
#### 2.1 Security Assessment Framework
- **Overview:** A structured process to ensure cloud services meet FedRAMP requirements, including security assessments, authorization, and continuous monitoring.
#### 2.2 Cloud Service Models
- **IaaS, PaaS, SaaS:** Different models with unique requirements under FedRAMP. Meraki primarily falls under SaaS and partially IaaS/PaaS for its cloud management capabilities.
#### 2.3 Control Baselines
- **Detailing Controls:** Each baseline (Low, Moderate, High) requires a set of controls. For example, the Moderate baseline requires over 300 controls, including access control, incident response, and encryption standards.
### 3. Cisco Meraki and FedRAMP Compliance
#### 3.1 Overview of Cisco Meraki
- **Product Portfolio:** Introduce Meraki MX (firewalls), MS (switches), MR (wireless APs), and MV (security cameras), focusing on their cloud-managed nature.
- **Compliance and Security Features:** Encryption, multi-factor authentication, access controls, and automated threat detection.
#### 3.2 Meraki for Different FedRAMP Impact Levels
- **Low Impact Level:** Entry-level MX firewalls for basic security; MR wireless access points for public Wi-Fi access with basic access control.
- **Moderate Impact Level:** Higher-end MX firewalls with advanced malware protection; MS switches for secure data handling and segmentation; comprehensive device management through Meraki Systems Manager.
- **High Impact Level:** Top-tier MX appliances with intrusion detection/prevention, content filtering, and high availability configurations; MR access points with enhanced security for sensitive environments; MV cameras for physical security monitoring.
#### 3.2 Meraki Features for FedRAMP Compliance
- **Layer 7 Firewall Rules:** Meraki MX appliances support application-aware firewall rules, helping meet access control requirements by filtering traffic based on application type and behavior.
- **VLAN Tagging:** Meraki MS switches enable network segmentation through VLAN tagging, isolating sensitive data and limiting access to authorized users, aligning with FedRAMP's access control and data protection requirements.
- **Client Visibility:** Meraki's client visibility features, such as device fingerprinting and traffic analytics, provide detailed insights into network activity, aiding in monitoring and incident response efforts, as required by FedRAMP.
### 4. Building a FedRAMP-Compliant BoM with Meraki
#### 4.1 SKU Selection for Low Impact Level
- **Criteria:** Focus on basic security and reliability. Suitable SKUs include entry-level MX models and MR series access points for managed Wi-Fi environments.
#### 4.2 SKU Selection for Moderate Impact Level
- **Criteria:** Enhanced security features like IPS, advanced malware protection, and secure, segmented network access. Recommended SKUs encompass mid to high-range MX appliances, MS series switches for network segmentation, and MR series for secure wireless access.
#### 4.3 SKU Selection for High Impact Level
- **Criteria:** Highest security demands requiring redundancy, failover, and segmentation capabilities. Select top-range MX models, MR access points with all available security features enabled, and MV smart cameras for surveillance.
### 5. Design and Implementation Considerations
#### 5.1 Network Design
- **Architecture:** Importance of network segmentation, secure remote access, and the principle of least privilege.
- **SD-WAN and Zero Trust:** Leveraging Meraki MX for SD-WAN capabilities to securely connect sites and implementing a zero-trust approach within the network architecture.
#### 5.2 Deployment and Management
- **Cloud Management:** Utilizing Merakis cloud-based management console for configuration, monitoring, and reporting to ensure ongoing compliance.
- **Security Configuration:** Best practices for configuring security settings across Meraki devices, including firewall rules, SSID configurations, and access policies.
#### 6.1 Patch Management
- **Automatic Updates:** Meraki devices automatically download and install the latest security patches and firmware updates, ensuring systems remain up-to-date and compliant with FedRAMP requirements.
- **Scheduling and Control:** Administrators can schedule updates during maintenance windows and control the update process through the Meraki dashboard, minimizing disruptions to network operations.
#### 6.2 Vulnerability Scanning
- **Integrated Scanning Tools:** Meraki MX appliances include built-in vulnerability scanning capabilities, helping identify potential security risks and maintain compliance with FedRAMP's continuous monitoring requirements.
- **Third-Party Integration:** Meraki's API allows integration with third-party vulnerability scanning tools, enabling comprehensive network security assessments and reporting.
#### 6.3 Incident Response
- **Alert Configuration:** The Meraki platform allows administrators to configure custom alerts for security events, ensuring prompt notification and response to potential incidents, as required by FedRAMP.
- **Detailed Logging:** Meraki devices generate detailed logs of network activity, providing valuable information for incident investigation and reporting, aligning with FedRAMP's incident response and reporting requirements.
### 7. Conclusion
- **Recap:** Highlighting the critical role of understanding FedRAMP requirements and Merakis offerings in creating secure and compliant networking solutions for federal agencies.
- **Further Resources:** Direction to Meraki documentation, FedRAMP templates, and Cisco support for deep dives into specific configurations and compliance questions.