Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Improving FedRAMP: Federal Procurement & Risk Management

The Federal Risk and Authorization Management Program (FedRAMP) has been in place for just over a decade (2011). Its purpose is to provide a “cost-effective, risk-based approach for the adoption and use of cloud services” by the federal government. This is to equip and enable federal agencies to utilize cloud technologies in a way that minimizes risk exposure through security and protection of federal information and processes.

FedRAMP Cloud Service Providers and Services

Google adopted its cloud infrastructure, Google Cloud Platform (GCP), to be compliant with FedRAMP. GCP earned a FedRAMP High authorization to operate (ATO) for several cloud products in a handful of locations and has uplifted the current FedRAMP Moderate services to more products and locations. Government agencies can now work with the highest level of classified information using GCP.

OSCAL and FedRAMP Automation

The current FedRAMP Authorization process is a struggle. First, you must manage multiple regulatory standards and frameworks, which change over time. Second, regulatory standards and frameworks overlap in scope and can often conflict and be difficult to manage together. And, lastly, information systems continue to increase in size and complexity.

Quick Guide on FedRAMP Fundamentals

The federal government enacted the FedRAMP regulation in December 2011 to enable executive agencies and departments to use an assessment method based on risk and cost-effectiveness when adopting cloud technologies. A FedRAMP readiness assessment is mandatory for cloud products and solutions providers seeking to receive an Authorization to Operate (ATO). FedRAMP ATO indicates that a provider’s hosted information and systems meet FedRAMP requirements.

What Organizations Need to Adapt to a Changing Cybersecurity Landscape

The future is already here. Is it everything we expected? That depends on who you ask, but the nightmare of maintaining cybersecurity has certainly persisted just as many sci-fi stories predicted. As we move further into the digital era, the stakes in cybersecurity only get higher and higher. So what are some of the main things that organizations should consider in building a solid cybersecurity strategy? Here are a few tips below.

Understanding CMMC 2.0 Scoping Guide by the Department of Defense

The Department of Defense (DoD) has recently released new CMMC 2.0 audit and assessment scoping guides. The awaited CMMC 2.0 Level 1 and Level 2 scoping guides provide insight into how a certified CMMC third-party assessor organization (C3PAO) may scope the CMMC audit and how businesses can potentially scope their own environments. These scoping guides are critical for the CMMC audit and boundary diagrams developed as part of your business’s System Security Plan (SSP).