Consolidated 20x Phase 2 pilot Q&A / discussion #101
Replies: 24 comments 47 replies
-
|
I'm going to close out this other thread asking about Cohort 1 application and submission but carry the content over here for reference.
After a pilot proposal, providers will either be accepted into the pilot or disqualified from the pilot. 3 will be accepted into Cohort 1, while 7 will be accepted into Cohort 2. Any providers who qualify during Cohort 1 but aren't chosen for that cohort will be entered into Cohort 2. We are, in generally, strongly discouraging folks from over-indexing on trying to be first, trying to rush into Cohort 1, etc. It will be a brutal slog. Folks should NOT be trying to rush their way into this pilot. |
Beta Was this translation helpful? Give feedback.
-
|
Thank you @pete-gov. Some additional question around P2 submission:
|
Beta Was this translation helpful? Give feedback.
-
Update on 20x Phase 2 sent to qualified Phase 1 participantsFor public transparency, the following email was sent to all qualified Phase 1 participants today: Hi again all! For your awareness, I'm sending this note to all Phase 1 participants who are eligible to apply for Phase 2 participation via bcc at the contact email you provided during your submission. This week, shortly after the conclusion of the longest government shutdown in history, we shared an updated plan for Phase 2. It aligns with some of what we have previously shared but tightens up requirements, applies stricter participation criteria, and includes a multi-cohort approach to ensure that we can spend time directly with participants to save everyone time and effort in the long run during the Phase 2 pilot. Importantly, we are now placing a strict 10 participant cap on the pilot (vs the previous soft goal) and will require interested participants to apply for participation with a detailed proposal. During the pilot itself, providers will be required to engage in multiple collaborative workshops with the FedRAMP team to review your approach to each and every requirement in advance of finalizing a package. We have also added a new KSI theme called "Authorization by FedRAMP" that effectively increases the number of requirements and recommendations that must be addressed by 5x. If you haven't dug in yet, please review our Key FedRAMP Updates After the Shutdown blog post from earlier in the week for all the details (you'll want to carve out a solid couple of hours to work through all the new content and finalized requirements). The Phase 2 pilot will be by far the most difficult phase of 20x for any cloud service provider. Phase 1 was deliberately quite simple while future phases will be supported by more explicit guidance, best practices, and (most importantly) more readily available third-party tools for automating these requirements. Participants will need to commit considerable engineering resources to build to each requirement and engage a FedRAMP recognized independent assessor on a recurring time-and-materials basis over the course of 6-8 weeks at their own expense. I do not expect most of you to apply for participation in the Phase 2 pilot. I strongly encourage you to review all of the requirements in depth, every single one, and discuss them with your engineering and compliance teams (as well as senior leadership) prior to determining if you should apply. If you still do decide to apply, I encourage you to apply for Cohort 2 where you can have a solid 6 weeks to prepare an approach that you can be confident in (and make sure you have contracts in place for assessment/etc.). Plus folks in Cohort 2 won't have to work as much over the holidays! ;) For those of you still going through review during Phase 1, know that we are committed to completing your review and you can still come through this with a 20x Low pilot authorization while we work with others on Phase 2. You'll have a year to integrate all of the requirements being tested in Phase 2. All that said - I'm looking forward to catching up with some of you and hearing from you during the upcoming Cohort 1 application period starting on December 1, and I hope everyone else will continue to participate at your own pace. If you have any questions about any of this, please post them in the (new) Consolidated 20x Phase 2 pilot Q&A / discussion thread on GitHub. Thank you - we'll keep building 20x together. 💪🔒☁️ 🇺🇸 |
Beta Was this translation helpful? Give feedback.
-
|
Hi Pete, I have a question regarding the application periods and the distinction between the proposal vs the presentation timing. Is the expectation that the proposal and presentation will both take place between the application period (so December 1-5 or January 5-9), or is that simply when we will be proposal is due, and then the pilot proposal presentation follows sometime after the application period. |
Beta Was this translation helpful? Give feedback.
-
|
"KSI-IAM-06 Suspicious Activity" is missing the applicability designation on https://www.fedramp.gov/docs/key-security-indicators/#ksi-iam-05-least-privilege. Is that intentional or an error? |
Beta Was this translation helpful? Give feedback.
-
|
Hi PMO, we're evaluating the requirements for the Phase 2 pilot proposal and being a bit pedantic to make sure we provide the expected answers.
Coming from Phase 1, Key Security Indicators were all of the controls that we implemented automation for to evaluate our security posture. With the updated guidelines published earlier this week, what was referred as KSIs in Phase 1 are now "embedded" into KSI-AFR-02. For the requirements for the pilot proposal, is requirement 1. referring to the subset of KSIs under KSI-AFR-02? Or is it referring to all of the KSIs including the ones under the AFR theme? If the latter, then I that'd be redundant with requirement 2., so I'm thinking the prior (similar to what was asked for Phase 1 in terms of approach to automatically validating the KSIs under KSI-AFR-02). The confusion we simply have is what we considered as KSIs in Phase 1 is now KSI-AFR-02, but the new documentation also refers to KSIs as everything inclusive of AFRs. Perhaps instead of answering my question directly, if the requirements for pilot submission can be reworded to clear up which "Key Security Indicator" it is referring to, that would give us more clarity when putting together our pilot proposal. Thank you in advance! Reference screenshot taken from the right sidebar of https://www.fedramp.gov/docs/key-security-indicators/ |
Beta Was this translation helpful? Give feedback.
-
|
Hi @pete-gov , question from my team regarding a third party tool. If you have a non-FR system that does not have FIPS enforcement on their end, can we encrypt the actual data in flight and in storage on OUR end before sending to them and maintain compliance? We would assure that ALL usage of this system would be encrypted on our side before sending it to the non-FR system. |
Beta Was this translation helpful? Give feedback.
-
|
Adding a couple general updates for folks:
This week we'll be running interested (and qualified) Phase 2 participants through the initial Cohort 1 shark tank - so far we have 5 cloud service providers signed up! |
Beta Was this translation helpful? Give feedback.
-
|
I’ve been following along with 20x discussions and have heard things about pentesting in 20x but was unable to find guidance specifying the requirement for pentesting and red team in 20x assessments. Will pentests and red team be required for 20x? If so, do will they match the currently posted guidance based on rev.5? Also, I noticed that the latest draft version of the penetration testing guidance which included a red team section was removed from public access. Is there another version we should use or look out for other than the version on the website dated 2022-06-30? |
Beta Was this translation helpful? Give feedback.
-
|
I apologize for posting this question here; however, the other seemingly more appropriate sections (Discussion 4 and Discussion 6) have been closed. With respect to the significant change process, my organization has received external guidance (not from any FedRAMP-affiliated source) indicating that, in order to initiate this process, our CSO must possess both a FedRAMP 20x program authorization and an agency-issued ATO. I have been unable to locate any such requirement within the FedRAMP 20x GitHub repository, including guidance pertaining to “transformative” changes. The only related directive I have found states that, if an agency partner exists, it must be notified in advance of the intent to invoke the significant change process. Could FedRAMP please confirm whether this dual-authorization requirement is accurate? Any clarification would be greatly appreciated. Thank you in advance for your assistance. |
Beta Was this translation helpful? Give feedback.
-
|
This project from Defense Unicorns seems like it could be super useful to establishing a gitops process |
Beta Was this translation helpful? Give feedback.
-
|
Hi @pete-gov , hope you are having a great day! Question for you: To apply to cohort 2, do automations need to be built for the Also, do you have an approximate timeline for FR20x Moderate opening to the public after the pilots conclude? Thank you for any help! |
Beta Was this translation helpful? Give feedback.
-
|
Just something to consider for the builders - TruffleHog is a good thing to put in your pipelines - https://github.com/trufflesecurity/trufflehog
https://trufflesecurity.com/blog/scanning-5-6-million-public-gitlab-repositories-for-secrets |
Beta Was this translation helpful? Give feedback.
-
|
Hi @pete-gov and @emu-gov, happy holidays! I noticed that in FRMR.SCN.significant-change-notifications.json, the individual FRR IDs starting with FRR-SCN-04 and onward do not include a name field. I was not sure if this was intentional, since all the other FRR IDs do include names, so I wanted to flag it in case this was a mistake. Here is a link to the relevant section for reference: I would have opened an issue directly, but it looks like issues are restricted on the repo. |
Beta Was this translation helpful? Give feedback.
-
|
For public awareness and transparency, the following message was sent to all cloud service providers eligible to apply for Cohort 2 today: (this message from FedRAMP is informational and all action is optional - no response is necessary) The first cohort for the 20x Phase 2 pilot is off working hard to incorporate feedback and finalize their 20x Phase 2 packages, the holidays are (mostly) in the bag, and we're ready to tackle the second cohort! If you're receiving this message then you are eligible to apply for participation in Cohort 2 next week. As a reminder, Phase 2 is much more complicated than Phase 1 and we do not expect most of you to participate in Phase 2. A big shift in Phase 2 is that we're moving well past the boolean "do you do this yes/no" from Phase 1 and focusing heavily on measuring outcome and effect. Plus we added 100+ additional requirements and recommendations in the KSI-AFR theme that must be addressed - and all of this will need to be done prior to March 10. In short, if you don't already have a strong prototype implementation from Phase 1 or haven't started implementing the requirements and recommendations in the KSI-AFR theme then you're unlikely to meet the Phase 2 pilot requirements in the expected timeframe. If that didn't scare you off, the next step is a pilot proposal next week. This pilot proposal is a simple presentation that you'll make to FedRAMP that shows us how ready you are to meet all of the Phase 2 pilot requirements in the expected timeframe. It's not a product pitch or even about your product at all - instead, we expect to hear about how much you've already implemented, how little you have remaining, and how you're going to tackle the KSI-AFR theme. And don't forget you need a FedRAMP recognized 3PAO who you've already been working with to share how they are going about the independent verification and validation of your approach! Pro-tip: Review the Cohort 1 pilot proposals and consider that the bar is definitely higher for Cohort 2. To apply for Cohort 2: Head over to this Google calendar link, check the time slots the week of Jan 5, and book a pilot proposal slot! A final heads up: Based on the discussions in Cohort 1 we will be releasing updated Key Security Indicators very soon. These updates won't change the intent of any KSI but will hopefully add clarity and specificity to a few that are a bit confusing and will remove a couple more that have become redundant. We're also going to do 1.5hr collaborative workshops instead of 2hr workshops because we learned that 2hrs was a lot. Things change, just in case you forgot it was a pilot. ;) |
Beta Was this translation helpful? Give feedback.
-
|
Thank you @pete-gov , this link seems to take me to a YouTube video. Can you please provide a refreshed link to schedule?
…> To apply for Cohort 2: Head over to this Google calendar link<https://youtu.be/dQw4w9WgXcQ>, check the time slots the week of Jan 5, and book a pilot proposal slot!
|
Beta Was this translation helpful? Give feedback.
-
Big Key Security Indicators Update!!For everyone's awareness, we just released version 25.12A for the Key Security Indicators:
From the changelog:
After these retirements, there are now 56 low and 61 moderate KSIs. Detailed changesYou can likely generate the delta quite easily from the machine readable versions but here are the notes I worked off when making these changes for reference. KSI-CED-01 General Education KSI-CED-02 Role-Specific Education¶ KSI-CED-03 Development and Engineering Education¶ KSI-CED-04 Incident Response and Disaster Recovery Education¶ KSI-CMT-02 Redeployment¶ KSI-CMT-04 Change Management Procedure¶ KSI-CNA-01 Restrict Network Traffic¶ KSI-CNA-02 Minimize the Attack Surface¶ KSI-CNA-05 Unwanted Activity¶ KSI-CNA-06 High Availability¶ KSI-CNA-07 Best Practices¶ KSI-IAM-05 Least Privilege¶ KSI-INR-01 Incident Response Procedure¶ KSI-INR-03 Incident After Action Reports¶ KSI-MLA-02 Audit Logging¶ KSI-MLA-05 Infrastructure as Code¶ KSI-PIY-01 Automated Inventory¶ KSI-PIY-02 Security Objectives and Requirements¶ KSI-PIY-03 Vulnerability Disclosure Program¶ KSI-PIY-04 CISA Secure By Design¶ KSI-PIY-05 Evaluate Implementations¶ KSI-PIY-06 Security Investment Effectiveness¶ KSI-PIY-07 Supply Chain Risk Management¶ KSI-PIY-08 Executive Support¶ KSI-RPL-01 Recovery Objectives¶ KSI-RPL-02 Recovery Plan¶ KSI-RPL-03 System Backups¶ KSI-RPL-04 Recovery Testing¶ KSI-SVC-07 Patching¶ KSI-SVC-08 Shared Resources¶ KSI-TPR-03 Supply Chain Risk Management¶ |
Beta Was this translation helpful? Give feedback.
-
|
In the intent of the trust center tooling, is the idea that we have a historical capture of point in time state of our monitoring or is an active up to date viewpoint considered acceptable in showing each KSI? Then if we have the point in time in a given assessment that we can compare that against a previous point in time audit status to show improvements? Example: Using Wiz we can create links that show the current status of different KSI evidence. If I put that into our trust center, that link always shows the latest data for that evidence (say TLS is enabled for encryption and TLS 1.3 is the minimum on all load balancers). It is not a point in time capture of our status for compliance against an assessment of Jan for the FedRAMP 20x Low KSI. Put another way. Should we have point in time data uploads done on a regular scheduled of weekly that are effectively immutable on time of upload or is a dynamically changing proof of evidence considered acceptable? |
Beta Was this translation helpful? Give feedback.
-
|
One of the recurring themes in 20x is that tooling should be something you, the CSO, use as part of your normal business operations. So for the specific example about TLS, my question would be how often do YOU want to check to make sure that TLS is properly configured? Ideally the trust portal would show the current status as well as the results of any previous checks. Maybe not to the dawn of time but think about your own comfort level. If you suddenly found that TLS was misconfigured how much historical data would you want to have and at what time interval to help identify the root cause of that change. |
Beta Was this translation helpful? Give feedback.
-
|
The following notification was sent today to all Phase 2 pilot participants (including 3PAOs) - also sharing this with the public (no rickrolls this time, promise!). Almost all of you have completed our collaborative workshops, and some of you have submitted authorization packages already during the Phase 2 pilot. You've all put so much time and effort into that and I can't express how valuable we have found your participation. We are continuing to build and iterate on our side based on the interactions we're having with you during the pilot. A big part of this pilot is also for folks following along and thinking about the future. It's in FR's interest to make changes as we learn from you just as you make changes based on conversations with us, so that others can see what we're learning and how the pilot is providing value. To that end, I have publicly updated the FedRAMP Machine-Readable Docs from v0.4.0-alpha to v0.9.0-beta. This includes a significant rework of the underlying JSON structure and complete labeling overhaul. Many items were condensed, restructured, renamed, and reordered. This updated model builds on many lessons learned while we built this first-of-a-kind structured ruleset for 20x. Phase 2 pilot participants are NOT REQUIRED to update from the v0.4.0-alpha ruleset. You may complete your Phase 2 authorization using the same ruleset that you've been working on. A full copy of the v0.4.0-alpha ruleset is available on GitHub at https://github.com/FedRAMP/docs-alpha and the human-readable version of that snapshot is available at https://fedramp.github.io/docs-alpha/. When v1 is released as part of the formal 20x requirements (in May) I expect there will be additional changes to each ruleset, though the structure of the JSON data itself is unlikely to shift like this again. It's totally fair to wait until v1 is released to update. However, if you want to get started with v0.9.0 this ruleset is available at https://fedramp.gov/docs and the release notes are available on GitHub here at https://github.com/FedRAMP/docs/releases/tag/v0.9.0-beta. And I've finally decided to lift interaction limits on the FRMR Docs repository - that means we are open for issues and comments directly. Feels like things are in a good enough place to consider our options for opening up wider community contributions as well, at least tentatively. Cheers, -Pete |
Beta Was this translation helpful? Give feedback.
-
|
Joining late to the party. This is probably covered somewhere but I cannot find it. Thank you for your continued leadership and efforts to modernize the FedRAMP program in alignment with the July 2024 memorandum. The momentum around FedRAMP 20X is appreciated.
In reviewing the FedRAMP 20X definition of Federal Customer Data (FRD-FCD), it appears that telemetry, metadata, analytics, and similar CSP-generated data are explicitly excluded from that definition. However, the Minimum Assessment Scope (MAS) guidance (updated 02/04/2026) states that metadata and third-party services must be considered and documented when scoping a CSO.
|
Beta Was this translation helpful? Give feedback.
-
|
Hi @pete-gov , have you heard any chatter on third-parties using anthropic? There are a few folks asking if we can still use this as an organization if we sell to gov. From what I've read, the agencies can't use tools from anthropic, but there are no mentioned restrictions on government using third-party tools that include its usage. |
Beta Was this translation helpful? Give feedback.
-
Pete. I am not a FedRAMP professional but a business guy looking forward to FedRAMP 20x. With the close date for the pilot just passed, big picture, how do you think the pilot is going? |
Beta Was this translation helpful? Give feedback.
-
|
Pete and the 20x PMO team,
If requirements like Part 3 of PVA-TPX-UNP, or PVA-TPX-OUC, and/or other PVA requirements, are meant to require 3PAOs to validate that the CSP implementation actually satisfies the security intent of the KSI, that is not entirely clear, or at least is not explicit and forceful. For example, an additional PVA requirement with verbiage such as "Assessors must validate that the security controls providers use to demonstrate Key Security Indicators meet the security intent of the Key Security Indicator." would ensure that 3PAOs have the authority to identify instances where a CSP implements an accurate automated process that completely misses the security objective of the Key Security Indicator.
P.S. |
Beta Was this translation helpful? Give feedback.



Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
FedRAMP is requesting that participants ask questions in public during Phase 2 instead of sending emails to FedRAMP.
This will encourage continued transparency, reduce effort on FedRAMP staff, and ensure everyone has access to information they need by addressing questions that someone else might be wondering but doesn't feel up to asking. This also provides a single thread to ensure previously asked questions are easy for folks to quickly review.
Please use this thread to ask questions about the Phase 2 pilot. Thank you for your continued public participation!
Beta Was this translation helpful? Give feedback.
All reactions