Overview
AegisShield is FedRAMP Ready, implementing core security controls required for Federal Risk and Authorization Management Program compliance. The application implements 15 NIST SP 800-53 Rev. 5 controls that align with FedRAMP baseline requirements.What is FedRAMP?
The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.Standardization
Reusability
Risk Management
Continuous Monitoring
FedRAMP Impact Levels
FedRAMP defines three impact levels based on the sensitivity of data:- Low Impact
- Moderate Impact
- High Impact
FedRAMP Low
Data Classification: Public informationSecurity Controls: 125 controls from NIST SP 800-53AegisShield Applicability: ✅ ReadyAegisShield implements core controls required for Low impact systems, including:- Access control and authentication (AC-3, IA-2, IA-5)
- Audit and accountability (AU-3, AU-4, AU-6, AU-8)
- System monitoring (SI-4, SI-7, SI-11)
AegisShield FedRAMP Control Mapping
AegisShield implements controls across multiple FedRAMP baseline categories:Access Control Family
AC-3: Access Enforcement (Low, Moderate, High)
AC-3: Access Enforcement (Low, Moderate, High)
api_key_handler.py:73, 82FedRAMP Requirement: Enforce approved authorizations for logical accessAegisShield Implementation:- API key validation before granting access to external services
- Access control enforcement through authenticator validation
- Session state management for credential validation
Identification and Authentication Family
IA-2: Identification and Authentication (Low, Moderate, High)
IA-2: Identification and Authentication (Low, Moderate, High)
api_key_handler.py:8FedRAMP Requirement: Uniquely identify and authenticate organizational usersAegisShield Implementation:- Authentication to external services (OpenAI, NVD, AlienVault OTX)
- API key management for service authentication
- Secure credential storage via Streamlit secrets
IA-5: Authenticator Management (Low, Moderate, High)
IA-5: Authenticator Management (Low, Moderate, High)
api_key_handler.py:4, 15, 20, 72, 78FedRAMP Requirement: Manage information system authenticatorsAegisShield Implementation:- IA-5(1): Password-Based Authentication
- Secure API key storage using Streamlit secrets
- Masked input for sensitive authenticator data
- Session-based credential management
System and Communications Protection Family
SC-7: Boundary Protection (Low, Moderate, High)
SC-7: Boundary Protection (Low, Moderate, High)
nvd_search.py:13, 37, 128 and alientvault_search.py:14, 69FedRAMP Requirement: Monitor and control communications at external system boundariesAegisShield Implementation:- Secure external API communications with retry mechanisms
- HTTP error handling and timeout management
- Exponential backoff for resilient communication
- Boundary protection for NVD and OTX API endpoints
SC-12: Cryptographic Key Establishment and Management (Moderate, High)
SC-12: Cryptographic Key Establishment and Management (Moderate, High)
api_key_handler.py:5, 16FedRAMP Requirement: Establish and manage cryptographic keysAegisShield Implementation:- SC-12(2): Symmetric Keys implementation
- API key lifecycle management
- Secure key storage and retrieval systems
System and Information Integrity Family
SI-4: Information System Monitoring (Low, Moderate, High)
SI-4: Information System Monitoring (Low, Moderate, High)
nvd_search.py:15, 38 and alientvault_search.py:11, 66FedRAMP Requirement: Monitor the information system to detect attacks and unauthorized activityAegisShield Implementation:- Continuous vulnerability monitoring via NVD
- External threat intelligence monitoring via AlienVault OTX
- Connection failure monitoring and logging
SI-7: Software, Firmware, and Information Integrity (Moderate, High)
SI-7: Software, Firmware, and Information Integrity (Moderate, High)
nvd_search.py:11, 126FedRAMP Requirement: Employ integrity verification toolsAegisShield Implementation:- Automated vulnerability identification for software components
- Technology version vulnerability analysis
- CVE-based integrity assessment via NVD
SI-11: Error Handling (Low, Moderate, High)
SI-11: Error Handling (Low, Moderate, High)
error_handler.py:14, 53, 82, 88, 97FedRAMP Requirement: Generate error messages that provide necessary information without revealing sensitive dataAegisShield Implementation:- Centralized exception management
- User-friendly error messages without sensitive data exposure
- Comprehensive error capture and logging
- Sanitized error messages to prevent information leakage
Audit and Accountability Family
AU-3: Content of Audit Records (Low, Moderate, High)
AU-3: Content of Audit Records (Low, Moderate, High)
error_handler.py:10, 32, 50, 61, 98FedRAMP Requirement: Generate audit records containing sufficient informationAegisShield Implementation:- Complete error context and metadata capture
- API interaction logging (NVD, OTX)
- Vulnerability scan result logging
- Threat intelligence query logging
AU-4: Audit Storage Capacity (Low, Moderate, High)
AU-4: Audit Storage Capacity (Low, Moderate, High)
error_handler.py:11, 33FedRAMP Requirement: Allocate audit record storage capacityAegisShield Implementation:- Automated log directory creation
- Log file management and storage
AU-6: Audit Review, Analysis, and Reporting (Low, Moderate, High)
AU-6: Audit Review, Analysis, and Reporting (Low, Moderate, High)
error_handler.py:12, 52, 66, 83, 99FedRAMP Requirement: Review and analyze information system audit recordsAegisShield Implementation:- Structured log format for analysis
- Console output for immediate audit review
- User notification as part of error handling
AU-8: Time Stamps (Low, Moderate, High)
AU-8: Time Stamps (Low, Moderate, High)
error_handler.py:13, 34, 51, 59FedRAMP Requirement: Use internal system clocks to generate time stampsAegisShield Implementation:- Precise timestamp generation for all logged events
- Consistent timestamp format for audit records
Risk Assessment Family
RA-3: Risk Assessment (Low, Moderate, High)
RA-3: Risk Assessment (Low, Moderate, High)
alientvault_search.py:12, 67FedRAMP Requirement: Conduct risk assessments periodicallyAegisShield Implementation:- Industry-specific threat intelligence collection
- Threat intelligence integration for risk analysis
- AlienVault OTX integration for risk-relevant data
RA-5: Vulnerability Scanning (Low, Moderate, High)
RA-5: Vulnerability Scanning (Low, Moderate, High)
nvd_search.py:12, 125FedRAMP Requirement: Scan for vulnerabilities in the information systemAegisShield Implementation:- Automated CVE discovery via NVD API
- Technology-specific vulnerability scanning
- CVSS score-based vulnerability prioritization
Program Management Family
PM-16: Threat Awareness Program (Moderate, High)
PM-16: Threat Awareness Program (Moderate, High)
alientvault_search.py:13, 68FedRAMP Requirement: Implement a threat awareness programAegisShield Implementation:- External threat intelligence consumption
- Structured threat intelligence collection
- AlienVault OTX integration for organizational threat awareness
FedRAMP Assessment Procedures
Security Assessment Process
Package Preparation
- Document architecture and data flows
- Map controls to implementation locations
- Prepare control traceability matrix
Assessment Testing
- Examine: Review documentation and code evidence
- Interview: Discuss implementation with development team
- Test: Validate control effectiveness through testing
Authorization
- Review security assessment report (SAR)
- Issue authorization to operate (ATO)
- Define continuous monitoring requirements
Assessment Methods for AegisShield Controls
All AegisShield controls support three assessment methods:Examine
nist-sp-800-53-controls-mapping.jsonInterview
Test
Machine-Readable Control Evidence
AegisShield provides machine-readable control mappings for automated assessment:Continuous Monitoring Requirements
FedRAMP requires continuous monitoring of authorized systems:Monthly Scanning
Monthly Scanning
- Vulnerability scanning using approved tools
- AegisShield implements RA-5 (Vulnerability Scanning) via NVD integration
- Automated CVE discovery and CVSS prioritization
Incident Reporting
Incident Reporting
- Report security incidents within required timeframes
- AegisShield implements SI-11 (Error Handling) with comprehensive logging
- AU-3, AU-6, AU-8 provide audit trail capabilities
Configuration Management
Configuration Management
- Track and document system changes
- Control implementations documented in code with NIST references
- Version control provides change tracking
Annual Assessment
Annual Assessment
- Annual security assessment by 3PAO
- Machine-readable control mappings facilitate automated assessment
- Complete traceability from control to code
Path to FedRAMP Authorization
For organizations seeking FedRAMP authorization using AegisShield:1. Determine Impact Level
- Low
- Moderate
2. Prepare System Security Plan
- Use
NIST-SP-800-53-CONTROLS.mdas implementation guide - Reference
nist-sp-800-53-controls-mapping.jsonfor automated documentation - Document system architecture and data flows
- Map all controls to implementation evidence
3. Engage Third-Party Assessor
- Select FedRAMP-approved 3PAO
- Provide control implementation documentation
- Support assessment activities (examine, interview, test)
- Remediate findings and document compensating controls
4. Submit for Authorization
- Agency ATO: Submit to sponsoring agency
- JAB P-ATO: Submit to Joint Authorization Board
- Address any authorization conditions
- Establish continuous monitoring procedures