Skip to content

Commit 789221d

Browse files
feat(compliance): add FedRAMP 20x KSI Low compliance frameworks (#9198)
Co-authored-by: pedrooot <pedromarting3@gmail.com>
1 parent ef4e28d commit 789221d

File tree

8 files changed

+1140
-3
lines changed

8 files changed

+1140
-3
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,9 +82,9 @@ prowler dashboard
8282

8383
| Provider | Checks | Services | [Compliance Frameworks](https://docs.prowler.com/projects/prowler-open-source/en/latest/tutorials/compliance/) | [Categories](https://docs.prowler.com/projects/prowler-open-source/en/latest/tutorials/misc/#categories) | Support | Interface |
8484
|---|---|---|---|---|---|---|
85-
| AWS | 576 | 82 | 38 | 10 | Official | UI, API, CLI |
86-
| GCP | 79 | 13 | 12 | 3 | Official | UI, API, CLI |
87-
| Azure | 162 | 19 | 12 | 4 | Official | UI, API, CLI |
85+
| AWS | 576 | 82 | 39 | 10 | Official | UI, API, CLI |
86+
| GCP | 79 | 13 | 13 | 3 | Official | UI, API, CLI |
87+
| Azure | 162 | 19 | 13 | 4 | Official | UI, API, CLI |
8888
| Kubernetes | 83 | 7 | 5 | 7 | Official | UI, API, CLI |
8989
| GitHub | 17 | 2 | 1 | 0 | Official | Stable | UI, API, CLI |
9090
| M365 | 70 | 7 | 3 | 2 | Official | UI, API, CLI |
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
import warnings
2+
3+
from dashboard.common_methods import get_section_containers_cis
4+
5+
warnings.filterwarnings("ignore")
6+
7+
8+
def get_table(data):
9+
aux = data[
10+
[
11+
"REQUIREMENTS_ID",
12+
"REQUIREMENTS_DESCRIPTION",
13+
"REQUIREMENTS_ATTRIBUTES_SECTION",
14+
"CHECKID",
15+
"STATUS",
16+
"REGION",
17+
"ACCOUNTID",
18+
"RESOURCEID",
19+
]
20+
].copy()
21+
22+
# Shorten the long FedRAMP KSI descriptions for better display
23+
ksi_short_names = {
24+
"A secure cloud service offering will protect user data, control access, and apply zero trust principles": "Identity and Access Management",
25+
"A secure cloud service offering will use cloud native architecture and design principles to enforce and enhance the Confidentiality, Integrity and Availability of the system": "Cloud Native Architecture",
26+
"A secure cloud service provider will ensure that all system changes are properly documented and configuration baselines are updated accordingly": "Change Management",
27+
"A secure cloud service provider will continuously educate their employees on cybersecurity measures, testing them regularly": "Cybersecurity Education",
28+
"A secure cloud service offering will document, report, and analyze security incidents to ensure regulatory compliance and continuous security improvement": "Incident Reporting",
29+
"A secure cloud service offering will monitor, log, and audit all important events, activity, and changes": "Monitoring, Logging, and Auditing",
30+
"A secure cloud service offering will have intentional, organized, universal guidance for how every information resource, including personnel, is secured": "Policy and Inventory",
31+
"A secure cloud service offering will define, maintain, and test incident response plan(s) and recovery capabilities to ensure minimal service disruption and data loss": "Recovery Planning",
32+
"A secure cloud service offering will follow FedRAMP encryption policies, continuously verify information resource integrity, and restrict access to third-party information resources": "Service Configuration",
33+
"A secure cloud service offering will understand, monitor, and manage supply chain risks from third-party information resources": "Third-Party Information Resources",
34+
}
35+
36+
# Replace long descriptions with short names - use contains for partial matching
37+
if not aux.empty:
38+
for long_desc, short_name in ksi_short_names.items():
39+
mask = aux["REQUIREMENTS_DESCRIPTION"].str.contains(
40+
long_desc, na=False, regex=False
41+
)
42+
aux.loc[mask, "REQUIREMENTS_DESCRIPTION"] = short_name
43+
44+
return get_section_containers_cis(
45+
aux, "REQUIREMENTS_ID", "REQUIREMENTS_ATTRIBUTES_SECTION"
46+
)
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
import warnings
2+
3+
from dashboard.common_methods import get_section_containers_cis
4+
5+
warnings.filterwarnings("ignore")
6+
7+
8+
def get_table(data):
9+
aux = data[
10+
[
11+
"REQUIREMENTS_ID",
12+
"REQUIREMENTS_DESCRIPTION",
13+
"REQUIREMENTS_ATTRIBUTES_SECTION",
14+
"CHECKID",
15+
"STATUS",
16+
"REGION",
17+
"ACCOUNTID",
18+
"RESOURCEID",
19+
]
20+
].copy()
21+
22+
# Shorten the long FedRAMP KSI descriptions for better display
23+
ksi_short_names = {
24+
"A secure cloud service offering will protect user data, control access, and apply zero trust principles": "Identity and Access Management",
25+
"A secure cloud service offering will use cloud native architecture and design principles to enforce and enhance the Confidentiality, Integrity and Availability of the system": "Cloud Native Architecture",
26+
"A secure cloud service provider will ensure that all system changes are properly documented and configuration baselines are updated accordingly": "Change Management",
27+
"A secure cloud service provider will continuously educate their employees on cybersecurity measures, testing them regularly": "Cybersecurity Education",
28+
"A secure cloud service offering will document, report, and analyze security incidents to ensure regulatory compliance and continuous security improvement": "Incident Reporting",
29+
"A secure cloud service offering will monitor, log, and audit all important events, activity, and changes": "Monitoring, Logging, and Auditing",
30+
"A secure cloud service offering will have intentional, organized, universal guidance for how every information resource, including personnel, is secured": "Policy and Inventory",
31+
"A secure cloud service offering will define, maintain, and test incident response plan(s) and recovery capabilities to ensure minimal service disruption and data loss": "Recovery Planning",
32+
"A secure cloud service offering will follow FedRAMP encryption policies, continuously verify information resource integrity, and restrict access to third-party information resources": "Service Configuration",
33+
"A secure cloud service offering will understand, monitor, and manage supply chain risks from third-party information resources": "Third-Party Information Resources",
34+
}
35+
36+
# Replace long descriptions with short names - use contains for partial matching
37+
if not aux.empty:
38+
for long_desc, short_name in ksi_short_names.items():
39+
mask = aux["REQUIREMENTS_DESCRIPTION"].str.contains(
40+
long_desc, na=False, regex=False
41+
)
42+
aux.loc[mask, "REQUIREMENTS_DESCRIPTION"] = short_name
43+
44+
return get_section_containers_cis(
45+
aux, "REQUIREMENTS_ID", "REQUIREMENTS_ATTRIBUTES_SECTION"
46+
)
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
import warnings
2+
3+
from dashboard.common_methods import get_section_containers_cis
4+
5+
warnings.filterwarnings("ignore")
6+
7+
8+
def get_table(data):
9+
aux = data[
10+
[
11+
"REQUIREMENTS_ID",
12+
"REQUIREMENTS_DESCRIPTION",
13+
"REQUIREMENTS_ATTRIBUTES_SECTION",
14+
"CHECKID",
15+
"STATUS",
16+
"REGION",
17+
"ACCOUNTID",
18+
"RESOURCEID",
19+
]
20+
].copy()
21+
22+
# Shorten the long FedRAMP KSI descriptions for better display
23+
ksi_short_names = {
24+
"A secure cloud service offering will protect user data, control access, and apply zero trust principles": "Identity and Access Management",
25+
"A secure cloud service offering will use cloud native architecture and design principles to enforce and enhance the Confidentiality, Integrity and Availability of the system": "Cloud Native Architecture",
26+
"A secure cloud service provider will ensure that all system changes are properly documented and configuration baselines are updated accordingly": "Change Management",
27+
"A secure cloud service provider will continuously educate their employees on cybersecurity measures, testing them regularly": "Cybersecurity Education",
28+
"A secure cloud service offering will document, report, and analyze security incidents to ensure regulatory compliance and continuous security improvement": "Incident Reporting",
29+
"A secure cloud service offering will monitor, log, and audit all important events, activity, and changes": "Monitoring, Logging, and Auditing",
30+
"A secure cloud service offering will have intentional, organized, universal guidance for how every information resource, including personnel, is secured": "Policy and Inventory",
31+
"A secure cloud service offering will define, maintain, and test incident response plan(s) and recovery capabilities to ensure minimal service disruption and data loss": "Recovery Planning",
32+
"A secure cloud service offering will follow FedRAMP encryption policies, continuously verify information resource integrity, and restrict access to third-party information resources": "Service Configuration",
33+
"A secure cloud service offering will understand, monitor, and manage supply chain risks from third-party information resources": "Third-Party Information Resources",
34+
}
35+
36+
# Replace long descriptions with short names - use contains for partial matching
37+
if not aux.empty:
38+
for long_desc, short_name in ksi_short_names.items():
39+
mask = aux["REQUIREMENTS_DESCRIPTION"].str.contains(
40+
long_desc, na=False, regex=False
41+
)
42+
aux.loc[mask, "REQUIREMENTS_DESCRIPTION"] = short_name
43+
44+
return get_section_containers_cis(
45+
aux, "REQUIREMENTS_ID", "REQUIREMENTS_ATTRIBUTES_SECTION"
46+
)

prowler/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ All notable changes to the **Prowler SDK** are documented in this file.
1919
- Add multiple compliance improvements [(#9145)](https://github.com/prowler-cloud/prowler/pull/9145)
2020
- Added validation for invalid checks, services, and categories in `load_checks_to_execute` function [(#8971)](https://github.com/prowler-cloud/prowler/pull/8971)
2121
- NIST CSF 2.0 compliance framework for the AWS provider [(#9185)](https://github.com/prowler-cloud/prowler/pull/9185)
22+
- Add FedRAMP 20x KSI Low for AWS, Azure and GCP [(#9198)](https://github.com/prowler-cloud/prowler/pull/9198)
2223

2324
### Changed
2425
- Update AWS Direct Connect service metadata to new format [(#8855)](https://github.com/prowler-cloud/prowler/pull/8855)

0 commit comments

Comments
 (0)