SlideShare a Scribd company logo
Expert Series:
Solving Real-World Challenges in
FedRAMP Compliance
Housekeeping
01
02
03
All participant lines are muted
Q&A will be held at the end, enter questions via Q&A panel
You will receive a follow-up email with a link to the recording
04 Please take the short feedback survey at the end of the webinar
Mike Strohecker
Director of Cloud Operations
Infusion Point
Neil Levine
SVP of Product
Anchore
FedRAMP and SSDF
background
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Anchore Enterprise for
FedRAMP
The FedRAMP process distilled
1. Initiate 2. Prepare & Partner 3. Implement
4. Pre-Assessment
(3PAO - optional)
5. Assessment (3PAO) 6. Remediatie Deficiencies
9. Continuous Monitoring
7. Authorization
Understand the requirements & process
What baseline applies?
Low: 125 controls
Moderate: 325 controls
High: 425 controls
Do a gap assessment
Engage a Third-Party Assessment
Organization (3PAO)
Develop the System Security Plan (SSP), fill
the gaps, gather evidence, list POA&Ms
3PAO assesses any gaps in compliance
3PAO conducts assessment
Output is a System Assessment Report
(SAR)
Address any deficiencies and document
these changes in the Plan Of Action &
Milestones (POA&Ms)
Submit documentation to the PMO
(e.g., SSP, SAR, POA&Ms)
Receive P-ATO or ATO
Monthly reporting of vulnerabilities
High = 30 days | Moderate = 90 days
Document and reporting changes
Incident Response to CISA directives
POA&M management
Challenges of FedRAMP for Containers
Time and effort to identify
applicable controls
and implement for containers
Hundreds of
controls…
Which ones apply
to my app?
Hardened images Container pipelines
Vulnerability scanning
Security sensors
Registry monitoring
Asset mgmt & Inventory reporting
Proving controls to auditors
and managing exceptions
Reporting
x
✓
✓
✓
x
✓
✓
x
POAMs
Plan of Action and
Milestones
Implementing continuous
monitoring and addressing
new requirements
Continuous
Monitoring
U.S. Cybersecurity Executive Order
CISA Known Exploited Vulnerabilities
Log4j Remediation Requirements
Plus any future requirements
FedRAMP
policy
checks
Continuous scanning
and evaluation of
FedRAMP controls and
emerging requirements
Continuous monitoring
Future
checks
Anchore Streamlines FedRAMP for Containers
Manage exceptions
with time-based
allowlists and action
plans
x
Allowlists
x
x
Manage
exceptions
Reports
x
✓
✓
✓
Reporting for
auditors to show
controls and
exceptions
Audit
reporting
FedRAMP
policy
checks
Pre-built policy
bundle of FedRAMP
controls for
containers
Automate
controls
Scan for
vulnerabilities,
malware and
secrets
Automated
scanning
Hardened images Container pipelines
Vulnerability scanning Security sensors Registry monitoring Asset mgmt/ Inventory reporting
Anchore 5-step Configuration Checklist
❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that
proves base-OS STIG profiles are applied and passing for your container images
[CM-2, CM-6, (1) Hardened Images]
❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software
and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2,
SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines]
❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset
Management and Inventory Reporting for Deployed Containers]
❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings
[RA-5, SI-2, (3) Vulnerability Scanning for Container Images]
❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
Anchore 5-step Configuration Checklist
❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that
proves base-OS STIG profiles are applied and passing for your container images
[CM-2, CM-6, (1) Hardened Images]
❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software
and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2,
SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines]
❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset
Management and Inventory Reporting for Deployed Containers]
❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings
[RA-5, SI-2, (3) Vulnerability Scanning for Container Images]
❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
STIG
Anchore STIG Browser
Local File
Storage
S3 Storage
Anchore STIG Checker
SSG Profiles
Images
(in Registry)
Instances
(in Runtime)
STIG
Runtime includes the following profiles:
● Ubuntu 20.04 (ubuntu-20.04)
● Universal Base Image 8 (ubi8)
● Postgres 9 (postgres9)
● Apache Tomcat 9 (apache-tomcat 9)
● Crunchy PostgreSQL
(crunchy-postgresql)
● JBOSS (jboss)
● Java Runtime Environment 7 (jre7)
● MongoDB Enterprise (mongodb)
● nginx (nginx)
Static includes the following profiles:
● CentOS 7
● CentOS 8
● Debian 10
● Debian 11
● Fedora
● Oracle Linux 7
● Oracle Linux 8
● Oracle Linux 9
● OpenSUSE
● SUSE Linux Enterprise Server 15
● Red Hat Enterprise Linux 7
● Red Hat Enterprise Linux 8
● Red Hat Enterprise Linux 9
● Ubuntu 16.04
● Ubuntu 18.04
● Ubuntu 20.04
● Ubuntu 22.04
The STIG Checker is a command-line tool, much like AnchoreCTL, that can scan either a static image
(e.g., within a CI Build Pipeline) or a running container (similar, in a way, to our k8s runtime inventory
agent)
Anchore 5-step Configuration Checklist
❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that
proves base-OS STIG profiles are applied and passing for your container images
[CM-2, CM-6, (1) Hardened Images]
❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software
and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2,
SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines]
❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset
Management and Inventory Reporting for Deployed Containers]
❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings
[RA-5, SI-2, (3) Vulnerability Scanning for Container Images]
❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
FedRAMP Policy Bundle
CISA KEV
CISA KEV
NVD
GHSA
Red Hat,
Ubuntu
etc
Python
NPM
etc
CISA KEV
Feed
Service
Anchore
Enterprise
Internet
Customer
Anchore
Vuln
Data
CISA KEV
Anchore 5-step Configuration Checklist
❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that
proves base-OS STIG profiles are applied and passing for your container images
[CM-2, CM-6, (1) Hardened Images]
❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software
and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2,
SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines]
❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset
Management and Inventory Reporting for Deployed Containers]
❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings
[RA-5, SI-2, (3) Vulnerability Scanning for Container Images]
❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
Reports
Anchore 5-step Configuration Checklist
❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that
proves base-OS STIG profiles are applied and passing for your container images
[CM-2, CM-6, (1) Hardened Images]
❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software
and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2,
SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines]
❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset
Management and Inventory Reporting for Deployed Containers]
❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings
[RA-5, SI-2, (3) Vulnerability Scanning for Container Images]
❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
Allowlists
Time-based Allowlists
Anchore 5-step Configuration Checklist
❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that
proves base-OS STIG profiles are applied and passing for your container images
[CM-2, CM-6, (1) Hardened Images]
❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software
and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2,
SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines]
❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset
Management and Inventory Reporting for Deployed Containers]
❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings
[RA-5, SI-2, (3) Vulnerability Scanning for Container Images]
❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
Subscriptions
Subscriptions
SBOMs
SBOM Content
SBOM Output
SBOM Application Groups
Anchore’s pro-tips for FedRAMP time savings
❏ Shift-left: fix vulnerabilities in CI before they make it to your production registry. Use
our “developer-bundle” in CI for developers to take immediate action on. This will
ensure vulnerabilities with fixes available and CISA KEV vulnerabilities are addressed
before they make it to the registry you have to report on
❏ Automate monthly/annual reporting using Anchore’s reporting. Have these reports
setup to autogenerate based on
❏ Centrally manage POA&Ms in Anchore. Use Allowlists in Anchore to centrally manage
POA&Ms and assessed/justifiable findings
❏ Practice good production registry hygiene. Use Anchore’s runtime inventory (K8’s
inventory) to identify images that have not been used in the last ~7 days (company
defined) to remove from your production registry
Poll Question #3
Key Takeaways
01
02
03
04
Automated policy checks are key for compliance
SBOMs are the foundation for strong container security
Anchore Enterprise + FedRAMP Policy Pack helps you meet all requirements
FedRAMP vulnerability scanning requirements for containers
apply to every step in the SDLC
Q&A
Get your step-by-step playbook on using Anchore
to meet FedRAMP vulnerability scanning requirements for containers:
anchore.com/fedramp-playbook
Next Steps
Get a personal demo
get.anchore.com/contact
Generating and Safeguarding Artifacts for SSDF Attestation
https://infusionpoints.com/blogs/generating-and-safeguarding
-artifacts-ssdf-attestation
FedRAMP Requirements Checklist for Container Vulnerability Scanning
https://get.anchore.com/fedramp-vulnerability-scanning-check
list-containers/
Case Study: Cisco Umbrella achieves FedRAMP in weeks
https://anchore.com/cisco-fedramp

More Related Content

PPT
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
PDF
WebSphere Technical University: Top WebSphere Problem Determination Features
Chris Bailey
 
PDF
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
Shawn Wells
 
PDF
Sccm online training
AngelinaJoile1
 
PDF
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
Anchore
 
PDF
Self-Aware Applications: Automatic Production Monitoring (NDC Sydney 2017)
Dina Goldshtein
 
PDF
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Michael Gough
 
PPTX
Monitoring and Reporting for IBM i Compliance and Security
Precisely
 
Agentless System Crawler - InterConnect 2016
Canturk Isci
 
WebSphere Technical University: Top WebSphere Problem Determination Features
Chris Bailey
 
2015-06-25 Red Hat Summit 2015 - Security Compliance Made Easy
Shawn Wells
 
Sccm online training
AngelinaJoile1
 
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
Anchore
 
Self-Aware Applications: Automatic Production Monitoring (NDC Sydney 2017)
Dina Goldshtein
 
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Michael Gough
 
Monitoring and Reporting for IBM i Compliance and Security
Precisely
 

Similar to Expert Series: Solving Real-World Challenges in FedRAMP Compliance (20)

PPTX
Monitor everything
Brian Christner
 
PPT
Coml Psg Automation Approach
roopavani
 
PPTX
Snowflake_Data_Validation_Framework_Presentation.pptx
m23aid005
 
PDF
Maximizing Oracle RAC Uptime
Markus Michalewicz
 
PPTX
STE_DailyHC_TSMV6.pptx
RaulRamirez547593
 
PDF
Video Recording of Selenium Automation Flows
RapidValue
 
PPTX
Event log analyzer by me
ER Swapnil Raut
 
PDF
Scalawox deeplearning
scalawox
 
PDF
Getting optimal performance from oracle e business suite(aioug aug2015)
pasalapudi123
 
PDF
Getting optimal performance from oracle e business suite
aioughydchapter
 
PPT
Pmo slides jun2010
Steve Turner
 
PDF
Ewm erp qm_basic_inspection_process
ManikandanVijayan2
 
PDF
Continuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
M Kevin McHugh
 
PDF
AA5 - I1 EITM and the Use Case Factory
David Messineo
 
PPTX
SCOM Tips and Tricks
Christian Heitkamp
 
PDF
WebSphere Technical University: Introduction to the Java Diagnostic Tools
Chris Bailey
 
PPTX
Automation Framework Presentation
Ben Ngo
 
PDF
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Michael Gough
 
PDF
Managing bitlocker with MBAM
Olav Tvedt
 
DOCX
Sccm 2016 Online Training Course content
KashifSCCMTrainer
 
Monitor everything
Brian Christner
 
Coml Psg Automation Approach
roopavani
 
Snowflake_Data_Validation_Framework_Presentation.pptx
m23aid005
 
Maximizing Oracle RAC Uptime
Markus Michalewicz
 
STE_DailyHC_TSMV6.pptx
RaulRamirez547593
 
Video Recording of Selenium Automation Flows
RapidValue
 
Event log analyzer by me
ER Swapnil Raut
 
Scalawox deeplearning
scalawox
 
Getting optimal performance from oracle e business suite(aioug aug2015)
pasalapudi123
 
Getting optimal performance from oracle e business suite
aioughydchapter
 
Pmo slides jun2010
Steve Turner
 
Ewm erp qm_basic_inspection_process
ManikandanVijayan2
 
Continuous Delivery of a Cloud Deployment at a Large Telecommunications Provider
M Kevin McHugh
 
AA5 - I1 EITM and the Use Case Factory
David Messineo
 
SCOM Tips and Tricks
Christian Heitkamp
 
WebSphere Technical University: Introduction to the Java Diagnostic Tools
Chris Bailey
 
Automation Framework Presentation
Ben Ngo
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Michael Gough
 
Managing bitlocker with MBAM
Olav Tvedt
 
Sccm 2016 Online Training Course content
KashifSCCMTrainer
 
Ad

More from Anchore (20)

PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
PDF
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
PDF
Shift Right Security for EKS Webinar Slides
Anchore
 
PDF
Webinar: How to Identify and Tackle SBOM Sprawl
Anchore
 
PDF
Rapid Incident Response to Zero Day Vulnerabilities
Anchore
 
PDF
STIG in Action: Continuous Compliance with MITRE & Anchore
Anchore
 
PDF
Increase Supply Chain Transparency & Security with Harbor & Anchore
Anchore
 
PDF
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
Anchore
 
PDF
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
Anchore
 
PDF
Understanding SBOMs: An Introduction to Modern Development
Anchore
 
PDF
2024 Trends in Software Supply Chain Security
Anchore
 
PDF
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
Anchore
 
PDF
Release Webinar: Introducing the Anchore Data Service
Anchore
 
PDF
How SBOMs Protect Google's Massive Software Supply Chain
Anchore
 
PDF
Automated Policy Enforcement for CMMC with Anchore Enterprise
Anchore
 
PDF
Adopting the DoD Software Factory Model: Insights & How Tos
Anchore
 
PDF
Easy Compliance is Continuous Compliance
Anchore
 
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
Anchore
 
PDF
Adapting to the new normal at NVD with Anchore Vulnerability Feed
Anchore
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
Shift Right Security for EKS Webinar Slides
Anchore
 
Webinar: How to Identify and Tackle SBOM Sprawl
Anchore
 
Rapid Incident Response to Zero Day Vulnerabilities
Anchore
 
STIG in Action: Continuous Compliance with MITRE & Anchore
Anchore
 
Increase Supply Chain Transparency & Security with Harbor & Anchore
Anchore
 
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
Anchore
 
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
Anchore
 
Understanding SBOMs: An Introduction to Modern Development
Anchore
 
2024 Trends in Software Supply Chain Security
Anchore
 
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
Anchore
 
Release Webinar: Introducing the Anchore Data Service
Anchore
 
How SBOMs Protect Google's Massive Software Supply Chain
Anchore
 
Automated Policy Enforcement for CMMC with Anchore Enterprise
Anchore
 
Adopting the DoD Software Factory Model: Insights & How Tos
Anchore
 
Easy Compliance is Continuous Compliance
Anchore
 
How to Secure Your Kubernetes Software Supply Chain at Scale
Anchore
 
Adapting to the new normal at NVD with Anchore Vulnerability Feed
Anchore
 
Ad

Recently uploaded (20)

PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Software Development Methodologies in 2025
KodekX
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Doc9.....................................
SofiaCollazos
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 

Expert Series: Solving Real-World Challenges in FedRAMP Compliance

  • 1. Expert Series: Solving Real-World Challenges in FedRAMP Compliance
  • 2. Housekeeping 01 02 03 All participant lines are muted Q&A will be held at the end, enter questions via Q&A panel You will receive a follow-up email with a link to the recording 04 Please take the short feedback survey at the end of the webinar
  • 3. Mike Strohecker Director of Cloud Operations Infusion Point Neil Levine SVP of Product Anchore
  • 10. The FedRAMP process distilled 1. Initiate 2. Prepare & Partner 3. Implement 4. Pre-Assessment (3PAO - optional) 5. Assessment (3PAO) 6. Remediatie Deficiencies 9. Continuous Monitoring 7. Authorization Understand the requirements & process What baseline applies? Low: 125 controls Moderate: 325 controls High: 425 controls Do a gap assessment Engage a Third-Party Assessment Organization (3PAO) Develop the System Security Plan (SSP), fill the gaps, gather evidence, list POA&Ms 3PAO assesses any gaps in compliance 3PAO conducts assessment Output is a System Assessment Report (SAR) Address any deficiencies and document these changes in the Plan Of Action & Milestones (POA&Ms) Submit documentation to the PMO (e.g., SSP, SAR, POA&Ms) Receive P-ATO or ATO Monthly reporting of vulnerabilities High = 30 days | Moderate = 90 days Document and reporting changes Incident Response to CISA directives POA&M management
  • 11. Challenges of FedRAMP for Containers Time and effort to identify applicable controls and implement for containers Hundreds of controls… Which ones apply to my app? Hardened images Container pipelines Vulnerability scanning Security sensors Registry monitoring Asset mgmt & Inventory reporting Proving controls to auditors and managing exceptions Reporting x ✓ ✓ ✓ x ✓ ✓ x POAMs Plan of Action and Milestones Implementing continuous monitoring and addressing new requirements Continuous Monitoring U.S. Cybersecurity Executive Order CISA Known Exploited Vulnerabilities Log4j Remediation Requirements Plus any future requirements
  • 12. FedRAMP policy checks Continuous scanning and evaluation of FedRAMP controls and emerging requirements Continuous monitoring Future checks Anchore Streamlines FedRAMP for Containers Manage exceptions with time-based allowlists and action plans x Allowlists x x Manage exceptions Reports x ✓ ✓ ✓ Reporting for auditors to show controls and exceptions Audit reporting FedRAMP policy checks Pre-built policy bundle of FedRAMP controls for containers Automate controls Scan for vulnerabilities, malware and secrets Automated scanning Hardened images Container pipelines Vulnerability scanning Security sensors Registry monitoring Asset mgmt/ Inventory reporting
  • 13. Anchore 5-step Configuration Checklist ❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that proves base-OS STIG profiles are applied and passing for your container images [CM-2, CM-6, (1) Hardened Images] ❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2, SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines] ❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset Management and Inventory Reporting for Deployed Containers] ❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings [RA-5, SI-2, (3) Vulnerability Scanning for Container Images] ❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
  • 14. Anchore 5-step Configuration Checklist ❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that proves base-OS STIG profiles are applied and passing for your container images [CM-2, CM-6, (1) Hardened Images] ❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2, SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines] ❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset Management and Inventory Reporting for Deployed Containers] ❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings [RA-5, SI-2, (3) Vulnerability Scanning for Container Images] ❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
  • 15. STIG Anchore STIG Browser Local File Storage S3 Storage Anchore STIG Checker SSG Profiles Images (in Registry) Instances (in Runtime)
  • 16. STIG Runtime includes the following profiles: ● Ubuntu 20.04 (ubuntu-20.04) ● Universal Base Image 8 (ubi8) ● Postgres 9 (postgres9) ● Apache Tomcat 9 (apache-tomcat 9) ● Crunchy PostgreSQL (crunchy-postgresql) ● JBOSS (jboss) ● Java Runtime Environment 7 (jre7) ● MongoDB Enterprise (mongodb) ● nginx (nginx) Static includes the following profiles: ● CentOS 7 ● CentOS 8 ● Debian 10 ● Debian 11 ● Fedora ● Oracle Linux 7 ● Oracle Linux 8 ● Oracle Linux 9 ● OpenSUSE ● SUSE Linux Enterprise Server 15 ● Red Hat Enterprise Linux 7 ● Red Hat Enterprise Linux 8 ● Red Hat Enterprise Linux 9 ● Ubuntu 16.04 ● Ubuntu 18.04 ● Ubuntu 20.04 ● Ubuntu 22.04 The STIG Checker is a command-line tool, much like AnchoreCTL, that can scan either a static image (e.g., within a CI Build Pipeline) or a running container (similar, in a way, to our k8s runtime inventory agent)
  • 17. Anchore 5-step Configuration Checklist ❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that proves base-OS STIG profiles are applied and passing for your container images [CM-2, CM-6, (1) Hardened Images] ❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2, SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines] ❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset Management and Inventory Reporting for Deployed Containers] ❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings [RA-5, SI-2, (3) Vulnerability Scanning for Container Images] ❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
  • 20. CISA KEV NVD GHSA Red Hat, Ubuntu etc Python NPM etc CISA KEV Feed Service Anchore Enterprise Internet Customer Anchore Vuln Data
  • 22. Anchore 5-step Configuration Checklist ❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that proves base-OS STIG profiles are applied and passing for your container images [CM-2, CM-6, (1) Hardened Images] ❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2, SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines] ❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset Management and Inventory Reporting for Deployed Containers] ❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings [RA-5, SI-2, (3) Vulnerability Scanning for Container Images] ❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
  • 24. Anchore 5-step Configuration Checklist ❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that proves base-OS STIG profiles are applied and passing for your container images [CM-2, CM-6, (1) Hardened Images] ❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2, SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines] ❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset Management and Inventory Reporting for Deployed Containers] ❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings [RA-5, SI-2, (3) Vulnerability Scanning for Container Images] ❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
  • 27. Anchore 5-step Configuration Checklist ❏ Setup Anchore’s Static STIG Checker tool in CI: this will generate an html file that proves base-OS STIG profiles are applied and passing for your container images [CM-2, CM-6, (1) Hardened Images] ❏ Configure the Anchore FedRAMP policy bundle. These checks ‘harden’ your software and provide evidence for the following controls [CM-2, CM-3, CM-6, CM-8, RA-5, SI-2, SI-3, (1) Hardened Images, (2) Container Build, Test, and Orchestration Pipelines] ❏ Configure Reports in Anchore to auto-generate vulnerability reports [CM-8, (6) Asset Management and Inventory Reporting for Deployed Containers] ❏ Set up Allowlists in Anchore to effectively manage POA&Ms and justifiable findings [RA-5, SI-2, (3) Vulnerability Scanning for Container Images] ❏ Configure Anchore to watch the Production image registry [(5) Registry Monitoring]
  • 30. SBOMs
  • 34. Anchore’s pro-tips for FedRAMP time savings ❏ Shift-left: fix vulnerabilities in CI before they make it to your production registry. Use our “developer-bundle” in CI for developers to take immediate action on. This will ensure vulnerabilities with fixes available and CISA KEV vulnerabilities are addressed before they make it to the registry you have to report on ❏ Automate monthly/annual reporting using Anchore’s reporting. Have these reports setup to autogenerate based on ❏ Centrally manage POA&Ms in Anchore. Use Allowlists in Anchore to centrally manage POA&Ms and assessed/justifiable findings ❏ Practice good production registry hygiene. Use Anchore’s runtime inventory (K8’s inventory) to identify images that have not been used in the last ~7 days (company defined) to remove from your production registry
  • 36. Key Takeaways 01 02 03 04 Automated policy checks are key for compliance SBOMs are the foundation for strong container security Anchore Enterprise + FedRAMP Policy Pack helps you meet all requirements FedRAMP vulnerability scanning requirements for containers apply to every step in the SDLC
  • 37. Q&A Get your step-by-step playbook on using Anchore to meet FedRAMP vulnerability scanning requirements for containers: anchore.com/fedramp-playbook
  • 38. Next Steps Get a personal demo get.anchore.com/contact Generating and Safeguarding Artifacts for SSDF Attestation https://infusionpoints.com/blogs/generating-and-safeguarding -artifacts-ssdf-attestation FedRAMP Requirements Checklist for Container Vulnerability Scanning https://get.anchore.com/fedramp-vulnerability-scanning-check list-containers/ Case Study: Cisco Umbrella achieves FedRAMP in weeks https://anchore.com/cisco-fedramp