Skip to content

Latest commit

 

History

History
171 lines (154 loc) · 3.9 KB

document_info.md

File metadata and controls

171 lines (154 loc) · 3.9 KB

FedRAMP® Vulnerability Scanning Requirements

Version 2.0 02/15/2024

fedramp.gov

DOCUMENT REVISION HISTORY

Date

Version

Page(s)

Description

Author

03/20/2018

1.0

All

Initial document that replaces FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide

FedRAMP PMO
07/14/2022

2.0

All

Added in Container guidance and

FedRAMP PMO

updated language throughout

02/15/2024

3.0

All

Consolidated all required scanning

FedRAMP PMO

requirements. Added and refined

language for container scanning,

encryption and reporting. Clarified

supplemental scanning

remediation reporting.

ABOUT THIS DOCUMENT

This document has been developed to provide guidance on vulnerability scanning policy, procedures, and tools in support of achieving and maintaining a security authorization that meets the Federal Risk and Authorization Management Program (FedRAMP) requirements.

Some cloud service providers (CSPs) may need to transition from their current vulnerability scanners or work with their vendors in order to meet the requirements.

This document is not a FedRAMP template – there is nothing to fill out in this document.

This document uses the term authorizing official (AO). For systems with a Joint Authorization Board (JAB) provisional authorization to operate (P-ATO), AO refers primarily to the JAB unless this document explicitly says agency AO. For systems with a FedRAMP Agency Authorization to Operate (ATO), AO refers to each leveraging agency’s AO.

WHO SHOULD USE THIS DOCUMENT?

This document is intended to be used by CSPs, third party assessment organizations (3PAOs), government contractors working on FedRAMP projects, and government employees working on FedRAMP projects.

How to Contact Us

Questions about FedRAMP or this document should be directed to info@fedramp.gov. For more information about FedRAMP, visit the website at http://www.fedramp.gov.

TABLE OF CONTENTS

  1. Purpose
  2. Background
  3. Scanning Requirements
  4. Scanning Requirements for Systems Using Container Technology
  5. Appendix A: Glossary