Session Presentation
Future of FedRAMP Assessments: Automating 3PAO Testing & Validation


June 25, 2025


Session Overview
- FedRAMP 20x
- KSIS
- System Design
- Auditing Techniques
Download Full Presentation (PDF)
More than just a green check mark
- Automated Assessments are a key priority for FedRAMP in the 20x program!
- Manual control testing techniques are being phased out.
- Automated collection and validation of KSIs are the future.
FedRAMP Key Security Indicator Evolution
Key Security Indicators
- Cloud Native Architecture (KSI-CNA)
- Service Configuration (KSI-SC)
- Identity and Access Management (KSI IAM)
- Monitoring, Logging, and Auditing (KSI-MLA)
- Change Management (KSI-CM)
- Policy and Inventory (KSI-PI)
- Third Party Information Resources (KSI-3IR)
- Cybersecurity Education (KSI-CE)
- Incident Response (KSI-IR)
NIST Control References
- SC-5, SC-7, SC-12, SC-39, SR-12
- CM-2, CM-4, CM-8, IA-7, RA-7, SC-8, SC-8 (1), SC-13, SC-28, SC-28 (1), SI-3, SI-4
- AC-2, AC-3, AU-9, AC-14, IA-2, IA-2 (1), IA-2 (2), IA-2 (8), IA-2 (12), IA-4, IA-5, IA-5 (1), IA-6, IA-8, IA-8 (1),IA-8 (2), IA-8 (4), IA-11, PS-2, PS-3, PS-4, PS-5, PS-7, PS-9
- AC-7, AU-2, AU-3, AU-4, AU-8, AU-11, AU-12, RA-5, SI-2
- CM-6, CM-7, CM-10, CM-11
- AC-1, AU-1, CA-1, CM-1, CM-8, CP-1, IA-1, IR-1, PL-1, PL-2, PS-1, RA-1, SA-1, SA-2, SA-3, SA-5, SA-8, SC-1, SI-1, SR-1
- AC-2, AC-20, AC-23, CA-3, CA-9, RA-3 (1), SA-4, SA-9, SA-22, SI-5, SR-2, SR-2 (1), SR-3, SR-5, SR-8, SR-10, SR-11, SR-11 (2)
- AT-2, AT-3, AT-6
- CP-2, CP-4, CP-9, CP-10, IR-4, IR-5, IR-6, IR-7, IR-8, PS-8, RA-3, RA-5 (2), RA-5 (11)
Applying KSI automation to complex systems
- Customer Responsibility
- User Interface
- Application Code
- Shared Responsibility
- Serverless Computing
- Managed Databases
- Container Orchestration Tools
- Compute Instances
- Hosting Service Responsibility
- Infrastructure as a Service
What are the key foundations for testing evidence?
- Complete
- Accurate
- Timely
With the consideration that Exceptions may be necessary!
Completeness
- Do we have the correct set of requirements to validate against?
- What technologies need to be evaluated?
- What population should be used to verify the requirements?
Identify Assets
Integrations
- 11 Connected integrations
- AWS
- Checkr
- Cloudflare
- Crowdstrike
- Deel
- Github
- Google Workspace
- Kandji
- Rippling
- Vercel
Verify Coverage
Asset inventory
- Computers
- Cloud resources
- Repositories
- Tickets
Accuracy
- What configurations were tested?
- How do we verify that the test is reporting as expected?
Timeliness
- When was the data pulled?
- How often should the data be verified again?
Exceptions
- How do we address automation gaps?
- How do we report those in a machine-readable format?
Manual Testing Exceptions
Connected Documentation
Log Out + Link Up at Coalfire's Black Hat Happy Hour!
Join Coalfire® for an exclusive happy hour at ORLA, Mandalay Bay’s modern Mediterranean oasis. We're taking over the space to bring you an evening of refreshing beverages, savory bites, and standout conversations, just steps away from the conference.
Register Now