Session Presentation

Automating FedRAMP CI/CD

Michael Scribellito

Michael Scribellito

Sr. Technical Manager, Coalfire

Nikolas Theiss

Nikolas Theiss

Sr. Consultant, Coalfire

June 25, 2025
Automating Fed RAMPCICD

Reinventing the Wheel

Architecting CI/CD for FedRAMP can feel like reinventing the wheel.

Session Overview

  • Common Mistakes
  • Major Challenges
  • Automation Framework

Download Full Presentation (PDF)

 

Common Mistakes & Misconceptions

  • What’s at Stake?
  • Automating FedRAMP CI/CD
  • 4 Challenges to FedRAMP CI/CD Automation
  • FedRAMP CI/CD Framework

Major Challenges

CSP Specific Challenges

  • Parity: Alignment of commercial staff, processes & tools to FedRAMP
  • Speed: Time to market
  • Codebase: Forking of Infrastructure as Code (IaC) and application code to support disparate environments
  • Continuous Deployment vs Continuous Delivery

Challenge 1 – Government Clouds: Assumption vs. Reality

Government Clouds: Reality

  • AWS GovCloud is a physically isolated partition
  • ARNs, VPCs & IAM cannot cross boundaries
  • Plan for code changes and re-architecting efforts
  • Hardcoded configuration
  • Service availability
  • Feature limitations

Challenge 2 – Access Controls

Gray Areas

  • Who can view it? FedRAMP users are subject to guardrails
  • How is it accessed? Systems containing sensitive metadata must reside within the FedRAMP boundary

Sensitive metadata includes:

  • Configuration data (hostnames, IPs, patching level, etc.)
  • Scan data & security documentation
  • Incident response data & tickets with specific system details

Challenge 3 – Change Management

This involves friction in:

  • Developer Experience
  • Release Velocity

Challenge 4 – Limited Tooling

  • FedRAMP Authorized or Self-Hosted
  • FIPS-Validated Cryptographic Modules
  • Functionality: Small Subset of Industry Best-In-Class Tools

Recently Authorized CSOs

  • 03/14/2025 – Atlassian Government Cloud
  • 05/15/2025 – GitLab Dedicated for Government
  • Reduced overhead and management of self-hosted tooling

Automation Framework

Foundational Pillars: Shifting Compliance Left

Compliant IaC

  • Utilize centralized module repository with ”building block” reusability in mind
  • Bake security best practices and compliance requirements into modules
  • Integrate vulnerability and compliance scans into pipelines
  • Re-audit usage and feedback cycle

Compliant Applications

  • Utilize feature flags to control FedRAMP app features
  • Integrate vulnerability and compliance scans into pipelines
  • Automate FedRAMP artifact creation

FedRAMP as a Consumer

  • Reduced Access Control: Developers are trained and thinking about FedRAMP requirements without direct access to boundary.
  • Automated Artifacts: FedRAMP compliant container images and scan artifacts are generated prior to delivery and CCB.
  • In-boundary Initiated Pull: Reduced risk of ”grey area” with regards to code and reduced codebase sprawl
  • Expedited Deployments: Known deployment-ready (vulnerability scanned) images and artifacts.
  • Optimize CCB Timelines: Automated artifacts significantly reduce CCB overhead and approval cycles.
  • Smaller SRE Team: FedRAMP SRE team drives deployment forward once change approved.

Conclusion: Automating FedRAMP CI/CD

  • CI/CD is achievable in FedRAMP with minor adjustment to staff, processes & tooling
  • Commercial application code SDLC can remain untouched allowing for development outside of boundary
  • Move with similar velocity as commercial while achieving FedRAMP compliance

Breakdown of CI/CD in FedRAMP:

  • Build: Shift compliance left into commercial SDLC. Remediate vulnerabilities outside of boundary.
  • Deploy: Automated deployment allows for small FedRAMP SRE team. Portable code allows development to occur outside of boundary.
  • Release: Automate compliance artifact creation. Continue to iterate on friction points.

Log Out + Link Up at Coalfire's Black Hat Happy Hour!

Join Coalfire® for an exclusive happy hour at ORLA, Mandalay Bay’s modern Mediterranean oasis. We're taking over the space to bring you an evening of refreshing beverages, savory bites, and standout conversations, just steps away from the conference.

Register Now