Replies: 7 comments 4 replies
-
|
I am supportive of this proposal. Based on my experience advising programs and now working directly on the CSP side, I have frequently seen collaborative continuous monitoring not implemented as intended. In practice, agencies and CSPs often provide ConMon data only to the original authorizing organization on a recurring basis, rather than engaging in a truly shared process. One suggestion would be to more clearly reinforce that collaborative ConMon is meant to be collaborative in nature. Too often, I have observed situations where a single agency exerts disproportionate control over the process, imposing agency-specific requirements and directing all ConMon activities for every organization reusing the authorization. This approach can undermine the efficiency and shared responsibility that collaborative ConMon is intended to achieve. |
Beta Was this translation helpful? Give feedback.
-
|
I concur with all the components of RFC 0026 with the exception of "Corrective Actions for All RV5-CV07 Requirements". This RFC on its face is providing CSP advanced notice that effective December 31 2026, any CSP that is not actively participating in Collaborative ConMons will be subjected to corrective actions: **Given that CSP have until the December to self-assess and come into compliance, 8 months in my opinion is more than sufficient. ** Suggest the following: If it is determined after the December deadline, they still are not in compliance the CSP should be given One opportunity to explain why they have not engaged in Collaborative ConMons and along with a get-well plan to come into compliance within 45 days. If they do not meet that 45-day window, step 5 under the Corrective Action (Fifth failure: FedRAMP will notify the provider and revoke their FedRAMP Certification.) should be enforced. Respectfully |
Beta Was this translation helpful? Give feedback.
-
ALSO: Define a “minimum viable” shared ConMon dataset that supports reuse across agencies without extra customization. |
Beta Was this translation helpful? Give feedback.
-
|
Gap #1: Undefined Expectations for Data Timeliness Gap #2: No Clarification on Agency Consumption Responsibility Gap #3: Missing Scalability Considerations for High-Customer CSPs Gap #4: No Metrics for “Adequate Authorization Data” Gap #5: Limited Guidance on Handling Sensitive or Restricted Data Gap #6: No Transition Guidance for Existing Tooling |
Beta Was this translation helpful? Give feedback.
-
|
I have been learning what all has happened to my identity and data. You say
I commented! I never commented to my identity and personal data being
unlawfully internationally transfered. Keep in mind there is a a double
controller accessible to my devices and stealing all my finances, bitcoin i
have no privacy to nothing everything is being stolen like the past 13
years of my life. I'm totally commented to helping in all ways but
something has to give were the theft of my personal everything will stop.
…On Thursday, April 2, 2026, Gaurav Vedi ***@***.***> wrote:
Gap #1 <#1>: Undefined
Expectations for Data Timeliness
Issue: Although monthly sharing is required, the RFC does not clarify
acceptable latency for critical updates (e.g., high/critical
vulnerabilities discovered mid-cycle).
Recommendation: Establish timeliness SLAs for different severity levels
(e.g., critical vulnerabilities shared within 72 hours).
Gap #2 <#2>: No
Clarification on Agency Consumption Responsibility
Issue: The RFC emphasizes CSP obligations but does not address agency-side
responsibilities for reviewing and acting on shared data.
Recommendation: Include guidance outlining agency expectations for
consumption, review cadence, and response actions to ensure shared data is
effectively used.
Gap #3 <#3>: Missing
Scalability Considerations for High-Customer CSPs
Issue: CSPs with a large number of agency customers may face operational
strain in hosting and managing monthly collaboration sessions.
Recommendation: Allow scalable alternatives (e.g., tiered briefings,
recorded sessions, or asynchronous collaboration models) that still meet
transparency requirements.
Gap #4 <#4>: No Metrics
for “Adequate Authorization Data”
Issue: The RFC states that failure to share data equates to inadequate
authorization support but does not define measurable criteria for adequacy.
Recommendation: Define quantitative and qualitative metrics (e.g.,
completeness, accuracy, timeliness) to objectively assess compliance.
Gap #5 <#5>: Limited
Guidance on Handling Sensitive or Restricted Data
Issue: Sharing detailed vulnerability data across multiple agencies may
raise security and data sensitivity concerns, especially for exploitable
findings.
Recommendation: Provide guidance on data segmentation, redaction, and
need-to-know controls while maintaining transparency.
Gap #6 <#6>: No
Transition Guidance for Existing Tooling
Issue: CSPs may already use legacy tooling that does not support expanded
sharing requirements, but the RFC lacks transition or migration guidance.
Recommendation: Include a transition framework or reference architecture
to help CSPs adapt existing tooling to meet new expectations.
—
Reply to this email directly, view it on GitHub
<#130?email_source=notifications&email_token=B5Q6XKD37U6OFVQY2LUWIKD4T2HRXA5CNFSNUABIM5UWIORPF5TWS5BNNB2WEL2ENFZWG5LTONUW63SDN5WW2ZLOOQXTCNRUGI2TOMZZUZZGKYLTN5XKOY3PNVWWK3TUUVSXMZLOOSWGM33PORSXEX3DNRUWG2Y#discussioncomment-16425739>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/B5Q6XKHWBCTGEZGB2CYQWQD4T2HRXAVCNFSM6AAAAACWYFVRX6VHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTMNBSGU3TGOI>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
Comment from Raj P. Please find below my public comments on RFC-0026: Clarifying CA-7 Continuous Monitoring Expectations for Rev5 Providers. Comment 1 — General / Meeting Standards Generally Supportive of this RFC. The proposed corrective action ladder is a step towards clarity from the current gray area. However there is one gap I wanted to highlight. The failure metric for RV5-CA07-CCM states Providers shall host a monthly meeting open to all agency customers, but there is no definition of what "hosting a meeting" entails, what baseline content/topics must be covered in the meeting, or how a provider can document that the meeting took place. Without clarity on those 3 aspects it will be difficult for 3PAOs to consistently evaluate and providers have no clear bar to work towards. Would recommend adding minimum expectations for meeting content and how it should be documented before this is finalized. Comment 2 — Agency Perspective Supportive of this RFC. The proposed corrective action "framework" definitely moves the ball forward when it comes to holding CSP's accountable. However from an agency perspective there is a gap in that when a CSP reaches each "strike", the onus is solely on them to take action to correct and retry. If an agency receives a "strike three" and logs into the Marketplace to see their provider is now in Remediation, there is no explanation of what that means for them moving forward. Are they expected to reassess their determination, suspend use of AWS.org, or just wait for AWS to meet any required remediation criteria? This RFC does a good job of putting the burden of information sharing on the CSP but leaves agencies in the dark about their own responsibilities. Would recommend that the final rule mention at minimum that agencies have a set of responsibilities they need to meet when they receive failure notifications. Comment 3 — Provider Perspective In Support of this RFC and appreciate the increase in transparency the corrective action ladder will provide. Enforcement concern: Due to the 12 month window resetting after each failure, a CSP needs to go 12 consecutive months without any failure to clear their slate. All failure measures will apply to all agency customers at once with no partial points awarded. So if your provider has 30 agency customers and meets the requirement to share ConMon data with 29 of them but fails to due to a technical glitch or admin oversight on 1, you still fail and are treated the same as a provider who didn't share with any agencies. Considering the fact that the motivation of this RFC admits the requirements were changed with little notice in July of 2024, some leeway for partial compliance or a cure period of less than 30 days would better balance the framework risk without losing the strength of enforcing this requirement. Thank you for the opportunity to comment on this RFC. |
Beta Was this translation helpful? Give feedback.
-
|
Supportive of this RFC. The five-strike corrective action framework is a meaningful step toward accountability, and the distinction between RV5-CA07-VLN and RV5-CA07-CCM correctly separates the data-sharing obligation from the collaborative engagement obligation. One intersection I haven't seen raised in the comments: BOD 25-01 now requires FCEB agencies to deploy CISA's ScubaGear to assess M365 tenant configuration against SCuBA Secure Configuration Baselines and report results into CyberScope. ScubaGear is a point-in-time assessment tool. This RFC is formalizing the continuous monitoring expectation above that assessment. But there's a practical gap between "ScubaGear scanned clean last Tuesday" and "the tenant is still compliant today" that neither tool nor policy currently fills. Configuration drift in a multi-admin GCC Moderate tenant can happen hours after a clean scan -- a Conditional Access policy change, a SharePoint external sharing default, a Defender policy override. The monthly ConMon cadence this RFC establishes is the right governance rhythm for collaborative reporting, but it doesn't address what happens to configuration state between those monthly checkpoints. Building on @austinsonger's point about a "minimum viable shared ConMon dataset" -- I'd argue that dataset needs to include canonical desired-state definitions (what the tenant configuration should look like per the applicable SCuBA baseline) alongside continuous drift detection evidence, not just vulnerability and POA&M status. That gives agencies an ongoing authorization signal they can act on, rather than a monthly snapshot that may already be stale. We've been working on this exact problem in GCC Moderate environments -- a governance layer that consumes ScubaGear output as the assessment baseline, maintains canonical desired state, runs continuous drift detection, and tracks remediation with owner accountability and SLA timelines. The enforcement teeth this RFC adds will create real demand for that kind of persistent compliance evidence. CSPs and agencies will need more than periodic scans and monthly meetings to stay on the right side of the corrective action ladder -- they'll need machine-trackable proof that configuration state was maintained between touchpoints. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
RFC-0026 Clarifying CA-7 Continuous Monitoring Expectations for Rev5 Providers
❓ Please note that FedRAMP will not answer questions in this thread as it is reserved for public comment. If you would like to ask a question or generally discuss this RFC informally, please use the General discussion and Q&A for RFCs related to Rev5 Updates (RFCs 0026, 0027, 0028, 0029, & 0030) thread. Thank you!
Status: Open
Start Date: March 19, 2026
Closing Date: April 22, 2026
Summary
This RFC outlines FedRAMP Consolidated Rules 2026 clarifications and updates to the CA-7 Continuous Monitoring control for all FedRAMP Rev5 baselines to ensure cloud service providers with multiple agency customers provide sufficient information to support ongoing authorization to all agency customers. These updates are summarized as follows:
Motivation
FedRAMP is not simply a security program - it is a government-wide program established to provide a standardized, reusable approach to security assessment and authorization for cloud services used by agencies. FedRAMP’s primary responsibility is ensuring agencies have the information they need to make ongoing authorization decisions about the cloud services they are already using. Any agency that issued an authorization to operate a cloud service based on the information provided in a FedRAMP authorization package must also have access to ongoing authorization data (including all continuous monitoring and annual assessment artifacts) to support their authorization to operate.
The Additional FedRAMP Requirements and Guidance for CA-7 Continuous Monitoring [add link if possible] in their current form have a confusing reference to the JAB path that was rescinded by OMB Memorandum M-24-15. This guidance currently reads as follows:
“Requirement: CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (ConMon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSOs authorized via the Agency path as each agency customer is responsible for performing ConMon oversight. It does not apply to CSOs authorized via the JAB path because the JAB performs ConMon oversight.”
The implementation of a continuous monitoring program that shares necessary information with all agency customers is a critical component for the presumption of adequacy provided by a FedRAMP Certification; if these materials are not available to all agency customers then the cloud service provider is not sharing adequate information for use in an agency authorization and corrective action is required.
FedRAMP acknowledges that these requirements changed unexpectedly and abruptly in July 2024 with the rescission of the previous FedRAMP memorandum and establishment of a new vision for FedRAMP by OMB Memorandum M-24-15; this RFC proposes a structured timeline, clear next steps, and predictable corrective action to ensure that all cloud service providers can continue to meet ongoing FedRAMP Certification requirements without further surprise.
The section below, “CA-7 Additional FedRAMP Requirements and Guidance,” would entirely replace the existing guidance for CA-7.
CA-7 Additional FedRAMP Requirements and Guidance
Guidance: The optional Collaborative Continuous Monitoring Balance Improvement Release for Rev5 includes a detailed blueprint for maintaining a healthy modern continuous monitoring program.
FedRAMP does not provide a template for the Continuous Monitoring Plan. Providers should reference the FedRAMP Collaborative Continuous Monitoring Balance Improvement Release or the Rev5 Continuous Monitoring Playbook when developing the Continuous Monitoring Plan.
Requirement RV5-CA07-VLN (Vulnerability Reporting)
Providers MUST share vulnerability information with all agency customers and FedRAMP using one of the following two processes:
Implementing the Vulnerability Detection and Response Balance Improvement Release for Rev5 (either in Beta or Wide Release); or
Sharing Operating System, Database, Web Application, Container, and Service Configuration Scans, at least monthly; AND sharing updated Plans of Action and Milestones (POA&Ms), at least monthly; AND sharing all scans performed by an Independent Assessor, at least annually.
NOTES:
Requirement RV5-CA07-CCM (Collaborative Continuous Monitoring)
Providers MUST provide recurring monitoring information (including meetings) to all agency customers and FedRAMP using one of the following two collaborative continuous monitoring processes:
Implement the Collaborative Continuous Monitoring Balance Improvement Release for Rev5 (either in Beta or Wide Release); or
Implement the traditional collaborative continuous monitoring approach as described in the FedRAMP Rev5 Continuous Monitoring Playbook or successor materials.
Effective Date for All RV5-CA07 Requirements
These requirements will be effective immediately for gradual adoption when published with the FedRAMP Consolidated Rules for 2026 by the end of June 2026. There will be an initial grace period without any corrective action until December 31, 2026.
Enforcement with corrective action will begin on January 1, 2027.
Failure Measures for All RV5-CA07 Requirements
These failure measures and corrective actions apply only to providers that are NOT following the Collaborative Continuous Monitoring Balance Improvement Release process (because that process has separate failure measures and corrective actions).
Failure measures that will trigger corrective action include:
Failure to host a traditional monthly ConMon meeting open to all agency customers (RV5-CA07-CCM) and FedRAMP during any given month.
Failure to share the required information (RV5-CA07-VLN), following the required process, with all agency customers and FedRAMP during any given month.
NOTE: Providers implementing the Vulnerability Detection and Response Balance Improvement Release do not maintain Plans of Action & Milestones.
Corrective Actions for All RV5-CV07 Requirements
These requirements will be enforced over a 12-month period that resets after each failure (meaning a provider must go 12 months without failures to clear the corrective actions) as follows:
First failure:
FedRAMP will notify the provider and request a Corrective Action Plan.
FedRAMP will notify all agencies.
Providers will be granted a one month grace period for implementation after submitting the initial Corrective Action Plan.
Second failure:
FedRAMP will notify the provider and request an updated Corrective Action Plan.
FedRAMP will notify all agencies that the provider has failed 2 times.
Third failure:
FedRAMP will notify the provider and request an updated Corrective Action Plan.
FedRAMP will notify all agencies that the provider has failed 3 times.
FedRAMP will move the cloud service offering into the “Remediation” status on the FedRAMP Marketplace and publicly summarize the failures leading to corrective action.
Fourth failure:
FedRAMP will notify the provider and request an updated Corrective Action Plan.
FedRAMP will notify all agencies that the provider has failed 4 times and is pending revocation of FedRAMP Certification.
FedRAMP will maintain the cloud service offering in the “Remediation” status on the FedRAMP Marketplace with a public summary of the failures.
Fifth failure:
FedRAMP will notify the provider and revoke their FedRAMP Certification.
FedRAMP will notify all agencies that the provider failed 5 times in 12 months and their FedRAMP Certification has been revoked.
The cloud service offering will be removed from the FedRAMP Marketplace for a period of at least 6 months, after which the cloud service offering may undergo a full new assessment for FedRAMP Certification.
Beta Was this translation helpful? Give feedback.
All reactions