Request a Demo
Request a Demo

FedRAMP 20x Key Security Indicators: Complete Implementation Guide

FedRAMP 20x replaces the traditional 325+ NIST 800-53 controls with 61 Key Security Indicators (KSIs) for Moderate authorization. This guide covers every KSI category with implementation requirements, automation expectations, and practical guidance.

Table of Contents

  1. What Are Key Security Indicators?
  2. KSI Categories Overview
  3. KSI-AFR: Authorization by FedRAMP
  4. KSI-IAM: Identity and Access Management
  5. KSI-CNA: Cloud Native Architecture
  6. KSI-SVC: Service Configuration
  7. KSI-MLA: Monitoring, Logging, and Auditing
  8. KSI-CMT: Change Management
  9. KSI-PIY: Policy and Inventory
  10. KSI-RPL: Recovery Planning
  11. KSI-INR: Incident Response
  12. KSI-CED: Cybersecurity Education
  13. KSI-TPR: Third-Party Resources
  14. Cross-Cutting Requirements
  15. Automation Requirements
  16. Getting Started

What Are Key Security Indicators?

Key Security Indicators (KSIs) are measurable security capabilities that replace traditional NIST 800-53 control narratives in FedRAMP 20x. Instead of documenting how you plan to implement a control, KSIs require you to prove the control is working through automated validation.

KSIs vs. Traditional Controls

AspectTraditional FedRAMPFedRAMP 20x KSIs
FocusProcess documentationMeasurable outcomes
ValidationPoint-in-time auditContinuous automation
EvidenceWritten narrativesMachine-readable data
Count325+ controls (Moderate)61 KSIs (Moderate)
Assessment3PAO manual reviewAutomated + 3PAO

Why KSIs Matter

The shift to KSIs reflects a fundamental change in how FedRAMP evaluates security:

  • Outcomes over process: Does encryption actually work, not just “is there an encryption policy”
  • Continuous over point-in-time: Ongoing proof, not annual audits
  • Automated over manual: Machine-readable evidence, not PDF narratives
  • Capabilities over controls: What your system can do, not what documents exist

KSI Categories Overview

FedRAMP 20x organizes KSIs into 11 thematic categories:

CategoryCodeKSIs (Moderate)Focus
Authorization by FedRAMPKSI-AFR5Government-specific requirements
Identity and Access ManagementKSI-IAM6Authentication, authorization, zero trust
Cloud Native ArchitectureKSI-CNA8Infrastructure security, network controls
Service ConfigurationKSI-SVC10Encryption, hardening, patching
Monitoring, Logging, AuditingKSI-MLA8SIEM, vulnerability management
Change ManagementKSI-CMT5CI/CD security, configuration baselines
Policy and InventoryKSI-PIY7Asset management, security policies
Recovery PlanningKSI-RPL4Backup, RTO/RPO, disaster recovery
Incident ResponseKSI-INR3Reporting, logging, lessons learned
Cybersecurity EducationKSI-CED2Security awareness, role-based training
Third-Party ResourcesKSI-TPR4Supply chain, SBOM, vendor management

Note: The Moderate baseline includes 5 additional KSIs not in Low (KSI-CNA-08, KSI-MLA-08, KSI-SVC-08, KSI-SVC-09, KSI-SVC-10).


KSI-AFR: Authorization by FedRAMP

Theme: A secure cloud service provider seeking FedRAMP authorization will address all FedRAMP 20x requirements and recommendations, including government-specific requirements.

This category is unique because it ties directly to FedRAMP-specific policies that commercial providers typically don’t implement for commercial customers.

KSI-AFR-01: Minimum Assessment Scope

Requirement: Apply the FedRAMP Minimum Assessment Scope (MAS) to identify and document the scope of the cloud service offering to be assessed for FedRAMP authorization.

What This Means:

  • Define your authorization boundary clearly
  • Document all components within scope
  • Identify inherited controls from IaaS providers
  • Map data flows for federal information

Implementation:

{
  "authorization_boundary": {
    "system_name": "Platform28 Contact Center",
    "deployment_model": "SaaS",
    "service_model": "multi-tenant",
    "components_in_scope": [
      "web_application",
      "api_gateway",
      "database_cluster",
      "telephony_services",
      "ai_processing_engine"
    ],
    "inherited_from": [
      {
        "provider": "AWS GovCloud",
        "fedramp_authorization": "FedRAMP High",
        "controls_inherited": ["PE-*", "MP-*", "MA-*"]
      }
    ]
  }
}

Related NIST Controls: CA-3, CA-9, PL-2

KSI-AFR-02: Authorization Data Sharing

Requirement: Use a FedRAMP-compatible trust center to store and share authorization data with all necessary parties.

What This Means:

  • Maintain a public trust center
  • Provide programmatic access to authorization data
  • Log access for at least six months
  • Don’t require NDAs for FedRAMP review

Trust Center Requirements:

  • Direct marketplace links
  • Service and deployment model documentation
  • Customer support information
  • Next authorization report dates
  • Security objectives and controls

KSI-AFR-03: Government Reporting

Requirement: Report security status and incidents to government customers per FedRAMP requirements.

What This Means:

  • Monthly continuous monitoring reports
  • Incident notifications within required timeframes
  • POA&M updates
  • Annual assessment results

KSI-AFR-04: Federal Requirements Compliance

Requirement: Address all government-specific requirements that don’t apply to commercial customers.

Examples:

  • US person requirements for privileged access
  • Data residency (US-only)
  • Background check requirements
  • Specific logging retention periods

KSI-AFR-05: FedRAMP Standards Adherence

Requirement: Demonstrate compliance with all published FedRAMP standards and guidance.

Key Documents to Address:

  • Vulnerability scanning requirements
  • Continuous monitoring guidance
  • Incident response requirements
  • Security assessment procedures

KSI-IAM: Identity and Access Management

Theme: A secure cloud service offering will protect user data, control access, and apply zero trust principles.

This is one of the most critical KSI categories. IAM failures are involved in the majority of cloud breaches.

KSI-IAM-01: Phishing-Resistant MFA

Requirement: Enforce phishing-resistant multi-factor authentication (MFA) for all user authentication.

What “Phishing-Resistant” Means:

MethodPhishing-Resistant?Why
FIDO2/WebAuthnYesCryptographically bound to origin
PIV/CAC smart cardsYesCertificate-based, origin-bound
Passkeys (device-bound)YesCryptographic binding
SMS codesNoSIM swap, phishing
TOTP (Authenticator apps)NoUser enters code on fake site
Push notificationsNoPush bombing/MFA fatigue
Email codesNoPhishable

Implementation:

{
  "ksi": "KSI-IAM-01",
  "idp_configuration": {
    "provider": "Okta",
    "mfa_policy": {
      "required": true,
      "allowed_factors": ["webauthn", "fido2"],
      "disallowed_factors": ["sms", "totp", "email", "push"],
      "fallback_allowed": false
    }
  },
  "validation": {
    "method": "automated_policy_export",
    "frequency": "continuous",
    "last_validated": "2026-02-24T00:00:00Z"
  }
}

Common Mistakes:

  1. Allowing SMS/TOTP as fallback methods
  2. Excluding service accounts from requirements
  3. Not covering all entry points (admin consoles, APIs)
  4. Using push notifications and calling it “phishing-resistant”

Related NIST Controls: IA-2, IA-2(1), IA-2(2), IA-2(6), IA-2(8)

KSI-IAM-02: Strong Authentication

Requirement: Implement passwordless methods where feasible; otherwise require strong passwords with MFA.

Passwordless Options:

  • FIDO2 security keys
  • Platform authenticators (Windows Hello, Touch ID)
  • Certificate-based authentication

If Passwords Required:

  • Minimum 15 characters
  • No password expiration (per NIST 800-63B)
  • Breached password detection
  • MFA always required

KSI-IAM-03: Service Account Security

Requirement: Enforce secure authentication for non-user accounts and services.

Implementation Requirements:

  • No shared credentials
  • Short-lived tokens (< 1 hour)
  • Certificate-based authentication
  • Managed identities where available
  • No hardcoded credentials in code
{
  "service_accounts": [
    {
      "name": "api-gateway-service",
      "auth_method": "managed_identity",
      "credential_rotation": "automatic",
      "token_lifetime_seconds": 3600
    },
    {
      "name": "database-connector",
      "auth_method": "certificate",
      "certificate_rotation_days": 90,
      "private_key_storage": "AWS Secrets Manager"
    }
  ]
}

Related NIST Controls: IA-4, IA-5, IA-9

KSI-IAM-04: Least Privilege Authorization

Requirement: Apply least-privilege, role/attribute-based, just-in-time authorization models.

Implementation:

  • Role-based access control (RBAC)
  • Attribute-based access control (ABAC) where appropriate
  • Just-in-time (JIT) access for privileged operations
  • Regular access reviews (quarterly minimum)
  • Automatic de-provisioning on termination

JIT Access Example:

{
  "jit_policy": {
    "privileged_roles": ["database_admin", "infrastructure_admin"],
    "max_duration_hours": 4,
    "approval_required": true,
    "approvers": ["security_team", "manager"],
    "justification_required": true,
    "audit_logging": true
  }
}

Related NIST Controls: AC-2, AC-3, AC-6

KSI-IAM-05: Zero Trust Design

Requirement: Implement zero trust design principles that assume resources will be compromised.

Zero Trust Principles:

  1. Never trust, always verify: Authenticate every request
  2. Assume breach: Design as if attackers are inside
  3. Verify explicitly: Use all available data points
  4. Least privilege access: Minimum necessary permissions
  5. Micro-segmentation: Limit lateral movement

Implementation Evidence:

  • Network segmentation documentation
  • Identity verification at every layer
  • Encrypted communications everywhere
  • Continuous session validation
  • Device health checks

KSI-IAM-06: Suspicious Activity Response

Requirement: Automatically disable or secure privileged accounts upon suspicious activity detection.

Automated Responses:

TriggerResponse
Multiple failed loginsTemporary lockout, alert
Impossible travelSession termination, step-up auth
Unusual access patternsAlert, require re-authentication
Privileged action anomalyBlock, require approval
Credential leak detectedForce password reset

Related NIST Controls: AC-2(4), SI-4


KSI-CNA: Cloud Native Architecture

Theme: A secure cloud service offering will use cloud native architecture and design principles to enforce and enhance confidentiality, integrity, and availability.

KSI-CNA-01: Traffic Controls

Requirement: Configure all information resources to restrict inbound and outbound traffic.

Implementation:

  • Security groups with deny-by-default
  • Network ACLs for subnet-level control
  • Web Application Firewall (WAF)
  • Outbound traffic filtering (egress controls)
{
  "security_group": {
    "name": "web-tier-sg",
    "inbound_rules": [
      {"port": 443, "source": "0.0.0.0/0", "description": "HTTPS"},
      {"port": 80, "source": "0.0.0.0/0", "description": "HTTP redirect"}
    ],
    "outbound_rules": [
      {"port": 443, "destination": "api-tier-sg", "description": "API calls"},
      {"port": 5432, "destination": "db-tier-sg", "description": "Database"}
    ],
    "default_action": "deny"
  }
}

Related NIST Controls: SC-7, AC-4

KSI-CNA-02: Attack Surface Minimization

Requirement: Design systems to minimize the attack surface and lateral movement if compromised.

Implementation:

  • Remove unnecessary services and ports
  • Micro-segmentation between services
  • Container isolation
  • Immutable infrastructure
  • Principle of least functionality

KSI-CNA-03: Logical Networking

Requirement: Use logical networking and related capabilities to enforce traffic flow controls.

Implementation:

  • Virtual Private Clouds (VPCs)
  • Private subnets for internal services
  • VPC peering with explicit routes
  • PrivateLink for AWS services
  • No direct internet access for databases

KSI-CNA-04: Immutable Infrastructure

Requirement: Use immutable infrastructure with strictly defined functionality and privileges by default.

Implementation:

  • Infrastructure as Code (Terraform, CloudFormation)
  • Immutable container images
  • No SSH access to production
  • Blue-green deployments
  • Automated rollback capabilities
{
  "deployment_config": {
    "strategy": "blue-green",
    "immutable_artifacts": true,
    "ssh_access": "disabled",
    "instance_replacement": "on_config_change",
    "rollback_automatic": true,
    "rollback_trigger": "health_check_failure"
  }
}

KSI-CNA-05: DoS Protection

Requirement: Protect against denial of service attacks and unwanted spam.

Implementation:

  • AWS Shield or equivalent
  • Rate limiting at edge
  • Geographic blocking (if appropriate)
  • Auto-scaling for legitimate traffic spikes
  • CDN with DDoS mitigation

Related NIST Controls: SC-5

KSI-CNA-06: High Availability

Requirement: Design systems for high availability and rapid recovery.

Implementation:

  • Multi-AZ deployment
  • Auto-scaling groups
  • Health checks and automatic replacement
  • Database replication
  • Defined RTO/RPO

KSI-CNA-07: Provider Best Practices

Requirement: Ensure cloud-native resources are implemented based on host provider’s best practices and documented guidance.

Evidence:

  • AWS Well-Architected review results
  • Compliance with CIS benchmarks
  • Security Hub findings addressed
  • Trusted Advisor recommendations

KSI-CNA-08: Automated Security Posture (Moderate Only)

Requirement: Use automated services to persistently assess security posture and enforce secure operations.

Implementation:

  • AWS Security Hub or equivalent
  • Automated compliance scanning
  • Drift detection
  • Auto-remediation for common issues

KSI-SVC: Service Configuration

Theme: A secure cloud service offering will follow FedRAMP encryption policies, continuously verify information resource integrity, and restrict access to third-party information resources.

KSI-SVC-01: Configuration Hardening

Requirement: Harden and review network and system configurations.

Implementation:

  • CIS benchmark compliance
  • Automated configuration scanning
  • Hardened AMIs/container images
  • Regular configuration reviews
{
  "hardening_baseline": "CIS_AWS_Foundations_v1.5",
  "compliance_score": 98.5,
  "findings": {
    "critical": 0,
    "high": 0,
    "medium": 2,
    "low": 5
  },
  "last_scan": "2026-02-24T00:00:00Z"
}

Related NIST Controls: CM-2, CM-6, CM-7

KSI-SVC-02: Network Traffic Encryption

Requirement: Encrypt or otherwise secure network traffic.

Implementation:

  • TLS 1.2+ for all external communications
  • TLS 1.3 preferred
  • Internal service mesh with mTLS
  • No plaintext protocols

Required Evidence:

  • Certificate inventory
  • TLS configuration audits
  • No deprecated cipher suites

KSI-SVC-03: Encryption at Rest

Requirement: Encrypt all federal and sensitive information at rest by default.

Implementation:

  • AWS KMS or equivalent for key management
  • AES-256 encryption minimum
  • Customer-managed keys (CMK) where required
  • Encrypted EBS volumes, S3 buckets, RDS instances
{
  "encryption_at_rest": {
    "databases": {
      "encryption": "AES-256",
      "key_management": "AWS KMS",
      "key_type": "customer_managed"
    },
    "object_storage": {
      "default_encryption": "SSE-KMS",
      "bucket_policy_enforced": true
    },
    "block_storage": {
      "encryption": "AES-256",
      "encrypted_by_default": true
    }
  }
}

Related NIST Controls: SC-28, SC-28(1)

KSI-SVC-04: Centralized Configuration Management

Requirement: Manage machine-based resource configurations using automation.

Implementation:

  • Infrastructure as Code
  • Configuration drift detection
  • Automated remediation
  • Version-controlled configurations

KSI-SVC-05: Cryptographic Integrity

Requirement: Enforce system and information resource integrity through cryptographic means.

Implementation:

  • Signed container images
  • Code signing
  • Artifact verification
  • Integrity monitoring (file integrity monitoring)

KSI-SVC-06: Automated Key Management

Requirement: Use automated key management systems to manage, protect, and regularly rotate digital keys and certificates.

Implementation:

  • AWS KMS or HashiCorp Vault
  • Automatic key rotation
  • Certificate auto-renewal (Let’s Encrypt, ACM)
  • Key usage logging
{
  "key_management": {
    "provider": "AWS KMS",
    "rotation": {
      "enabled": true,
      "frequency_days": 365
    },
    "certificates": {
      "provider": "AWS ACM",
      "auto_renewal": true
    },
    "audit_logging": true
  }
}

KSI-SVC-07: Security Patching

Requirement: Use a consistent, risk-informed approach for applying security patches.

Implementation:

  • Critical patches: 24-72 hours
  • High patches: 7 days
  • Medium patches: 30 days
  • Low patches: 90 days
  • Automated patching where possible

Related NIST Controls: SI-2

KSI-SVC-08: Residual Data Prevention (Moderate Only)

Requirement: Prevent changes from introducing residual elements damaging confidentiality, integrity, or availability.

Implementation:

  • Secure deletion procedures
  • Memory sanitization
  • Ephemeral compute instances
  • Data lifecycle management

KSI-SVC-09: Communication Integrity (Moderate Only)

Requirement: Continuously validate authenticity and integrity of communications between resources.

Implementation:

  • Mutual TLS (mTLS) for service-to-service
  • Message signing
  • API authentication
  • Certificate pinning where appropriate

KSI-SVC-10: Data Removal (Moderate Only)

Requirement: Promptly remove unwanted information, including from backups.

Implementation:

  • Data retention policies
  • Automated data deletion
  • Backup expiration
  • Right to deletion procedures

KSI-MLA: Monitoring, Logging, and Auditing

Theme: A secure cloud service offering will monitor, log, and audit all important events, activity, and changes.

KSI-MLA-01: SIEM Operation

Requirement: Operate a centralized, tamper-resistant SIEM or equivalent system.

Implementation:

  • Centralized log aggregation
  • Tamper-evident storage
  • Real-time alerting
  • Correlation rules
  • Retention per FedRAMP requirements
{
  "siem_configuration": {
    "platform": "Splunk Cloud",
    "log_sources": [
      "cloudtrail", "vpc_flow_logs", "waf_logs",
      "application_logs", "database_audit_logs"
    ],
    "retention_days": 365,
    "tamper_protection": true,
    "real_time_alerting": true
  }
}

Related NIST Controls: AU-6, SI-4

KSI-MLA-02: Log Reviews

Requirement: Conduct regular log reviews and audits.

Implementation:

  • Automated anomaly detection
  • Weekly manual reviews for high-priority events
  • Monthly audit log reviews
  • Documented review procedures

KSI-MLA-03: Vulnerability Response

Requirement: Rapidly detect and remediate/mitigate vulnerabilities per FedRAMP’s Vulnerability Response standard.

Required Timeframes:

SeverityDetectionRemediation
Critical24 hours15 days
High24 hours30 days
MediumWeekly90 days
LowMonthly180 days

KSI-MLA-04: Authenticated Scanning

Requirement: Perform authenticated vulnerability scanning.

Implementation:

  • Credentialed scans for deeper analysis
  • Weekly infrastructure scans
  • Container image scanning in CI/CD
  • Database vulnerability assessment

KSI-MLA-05: IaC Evaluation

Requirement: Execute Infrastructure as Code and configuration evaluation/testing.

Implementation:

  • Pre-deployment security scanning
  • Terraform/CloudFormation validation
  • Policy as code (Sentinel, OPA)
  • Drift detection
{
  "iac_security": {
    "scanner": "Checkov",
    "integration": "CI/CD pipeline",
    "policy_framework": "OPA",
    "drift_detection": {
      "enabled": true,
      "frequency": "hourly",
      "auto_remediate": false
    }
  }
}

KSI-MLA-06: Centralized Vulnerability Tracking

Requirement: Centrally track and prioritize vulnerability mitigation.

Implementation:

  • Vulnerability management platform
  • Risk-based prioritization
  • SLA tracking
  • Remediation workflows

KSI-MLA-07: Audit Log Protection

Requirement: Protect audit logs from unauthorized access and modification.

Implementation:

  • Write-once storage
  • Separate log accounts
  • Access logging for logs
  • Encryption at rest

KSI-MLA-08: Log Access Controls (Moderate Only)

Requirement: Apply least-privileged, role/attribute-based, just-in-time access for log data.

Implementation:

  • RBAC for log access
  • Audit trail for log queries
  • Data masking for sensitive fields
  • Time-limited access grants

KSI-CMT: Change Management

Theme: A secure cloud service provider will ensure that all changes are properly documented and configuration baselines are updated accordingly.

KSI-CMT-01: Modification Logging

Requirement: Log and monitor all system modifications.

Implementation:

  • Infrastructure change logging (CloudTrail)
  • Application deployment logging
  • Configuration change tracking
  • User activity monitoring

KSI-CMT-02: Version-Controlled Deployment

Requirement: Deploy changes through immutable, version-controlled resources rather than direct modifications.

Implementation:

  • Git-based workflows
  • No manual production changes
  • Immutable deployments
  • Rollback capabilities
{
  "deployment_policy": {
    "method": "gitops",
    "manual_changes_allowed": false,
    "approval_required": true,
    "rollback_enabled": true,
    "version_control": "GitHub",
    "artifact_registry": "ECR"
  }
}

KSI-CMT-03: Automated Testing

Requirement: Implement persistent automated testing and validation of changes throughout their lifecycle.

Implementation:

  • Unit tests in CI
  • Integration tests
  • Security scanning (SAST/DAST)
  • Compliance validation
  • Performance testing

KSI-CMT-04: Change Procedures

Requirement: Consistently follow a documented change management procedure.

Implementation:

  • Change advisory board (CAB) for significant changes
  • Emergency change procedures
  • Change request documentation
  • Post-implementation reviews

KSI-CMT-05: Risk Evaluation

Requirement: Evaluate risk and impact for all changes.

Implementation:

  • Change impact assessment
  • Risk categorization
  • Approval workflows based on risk
  • Rollback planning

KSI-PIY: Policy and Inventory

Theme: A secure cloud service offering will have intentional, organized, universal guidance for how every information resource, including personnel, is secured.

KSI-PIY-01: Asset Inventory

Requirement: Generate inventories of information resources from authoritative sources.

Implementation:

  • Automated asset discovery
  • Infrastructure as Code as source of truth
  • Container/service inventory
  • Software inventory (SBOM)
{
  "inventory_sources": [
    {"type": "infrastructure", "source": "Terraform state"},
    {"type": "containers", "source": "EKS API"},
    {"type": "software", "source": "SBOM generation"},
    {"type": "certificates", "source": "ACM"}
  ],
  "sync_frequency": "hourly",
  "last_updated": "2026-02-24T00:00:00Z"
}

Related NIST Controls: CM-8

KSI-PIY-02: Security Objectives

Requirement: Document security objectives for all resources.

Implementation:

  • Security policies per resource type
  • Data classification
  • Access requirements
  • Encryption requirements

KSI-PIY-03: Vulnerability Disclosure

Requirement: Maintain a vulnerability disclosure program.

Implementation:

  • Public security.txt
  • Bug bounty or VDP program
  • Response procedures
  • Researcher communication process

KSI-PIY-04: Secure SDLC

Requirement: Integrate security into Software Development Lifecycle; align with CISA Secure By Design.

Implementation:

  • Security requirements in design
  • Threat modeling
  • Secure coding training
  • Security testing in CI/CD
  • Security sign-off before release

KSI-PIY-05: Evaluation Documentation

Requirement: Document implementation evaluation methods.

Implementation:

  • Security control testing procedures
  • Validation criteria
  • Evidence collection methods
  • Audit procedures

KSI-PIY-06: Security Resources

Requirement: Allocate dedicated security staff and budget with executive support.

Implementation:

  • Defined security roles
  • Security budget allocation
  • Executive sponsorship
  • Security team reporting structure

KSI-PIY-07: Supply Chain Documentation

Requirement: Document risk management decisions for software supply chain security.

Implementation:

  • Vendor security assessments
  • Third-party risk management
  • Supply chain risk decisions
  • Dependency management

KSI-RPL: Recovery Planning

Theme: A secure cloud service offering will define, maintain, and test incident response plan(s) and recovery capabilities to ensure minimal service disruption.

KSI-RPL-01: RTO/RPO Definition

Requirement: Define Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO).

Implementation:

{
  "recovery_objectives": {
    "tier_1_critical": {
      "services": ["core_api", "database", "auth"],
      "rto_hours": 1,
      "rpo_hours": 0.25
    },
    "tier_2_important": {
      "services": ["reporting", "analytics"],
      "rto_hours": 4,
      "rpo_hours": 1
    },
    "tier_3_standard": {
      "services": ["admin_portal", "documentation"],
      "rto_hours": 24,
      "rpo_hours": 24
    }
  }
}

Related NIST Controls: CP-2, CP-10

KSI-RPL-02: Recovery Plan

Requirement: Develop and maintain a recovery plan that aligns with defined recovery objectives.

Implementation:

  • Documented recovery procedures
  • Runbooks for common scenarios
  • Communication plans
  • Escalation procedures

KSI-RPL-03: Backup Alignment

Requirement: Perform system backups aligned with recovery objectives.

Implementation:

  • Backup frequency matches RPO
  • Backup testing
  • Offsite/cross-region storage
  • Encryption of backups

KSI-RPL-04: Recovery Testing

Requirement: Regularly test the capability to recover from incidents and contingencies.

Implementation:

  • Quarterly recovery drills
  • Annual full DR test
  • Documented test results
  • Lessons learned integration

KSI-INR: Incident Response

Theme: A secure cloud service provider will document, report, and analyze security incidents for compliance and improvement.

KSI-INR-01: Incident Reporting

Requirement: Report incidents per FedRAMP requirements and provider policies.

FedRAMP Reporting Timeframes:

Incident TypeNotification
Data breach1 hour
Significant incident24 hours
Security incident72 hours

Implementation:

  • Automated incident detection
  • Escalation procedures
  • FedRAMP notification templates
  • Agency notification lists

KSI-INR-02: Incident Logging

Requirement: Maintain incident log with periodic pattern/vulnerability reviews.

Implementation:

  • Incident tracking system
  • Root cause documentation
  • Trend analysis
  • Quarterly reviews

KSI-INR-03: After-Action Reports

Requirement: Generate after-action reports and integrate lessons learned.

Implementation:

  • Post-incident reviews
  • Lessons learned documentation
  • Process improvements
  • Training updates

KSI-CED: Cybersecurity Education

Theme: A secure cloud service provider will educate their employees on cybersecurity measures, testing them persistently to ensure their knowledge is satisfactory.

KSI-CED-01: Security Awareness Training

Requirement: Ensure all employees receive security and privacy awareness training, incident response training, and are familiar with all relevant policies and procedures.

Implementation:

  • Annual security awareness training
  • Phishing simulations
  • Policy acknowledgment
  • New hire training
  • Refresher training
{
  "training_program": {
    "security_awareness": {
      "frequency": "annual",
      "completion_required": true,
      "topics": [
        "phishing", "social_engineering", "data_handling",
        "incident_reporting", "password_security"
      ]
    },
    "phishing_simulations": {
      "frequency": "quarterly",
      "remedial_training": true
    }
  }
}

KSI-CED-02: Role-Based Training

Requirement: Deploy role-specific training for high-risk positions, including privileged access roles.

Implementation:

  • Developer secure coding training
  • Admin security training
  • Incident responder training
  • Compliance training for relevant roles

KSI-TPR: Third-Party Resources

Theme: A secure cloud service provider will understand, monitor, and manage supply chain risks from third-party services or components.

KSI-TPR-01: Third-Party Identification

Requirement: Follow FedRAMP’s Minimum Assessment Standard for third-party resources.

Implementation:

  • Inventory all third-party dependencies
  • Classify by risk level
  • Document data flows
  • Identify FedRAMP-authorized services

KSI-TPR-02: FedRAMP Authorization Verification

Requirement: Regularly confirm FedRAMP authorization and secure configuration of services handling federal information.

Implementation:

  • Verify via FedRAMP Marketplace
  • Annual re-verification
  • Monitor authorization status changes
  • Document authorization levels

KSI-TPR-03: Supply Chain Risk

Requirement: Identify and prioritize supply chain risk mitigation.

Implementation:

  • Vendor security assessments
  • Software composition analysis
  • Dependency vulnerability monitoring
  • Risk-based vendor tiering

KSI-TPR-04: Upstream Monitoring

Requirement: Monitor third-party software for upstream vulnerabilities with contractual notification or active monitoring.

Implementation:

  • SBOM maintenance
  • Dependency scanning (Dependabot, Snyk)
  • Vendor security notification subscription
  • Vulnerability tracking
{
  "supply_chain_monitoring": {
    "sbom_generation": "automatic",
    "dependency_scanning": {
      "tool": "Snyk",
      "frequency": "continuous"
    },
    "vendor_notifications": true,
    "critical_vuln_sla_hours": 24
  }
}

Cross-Cutting Requirements

Three cross-cutting KSIs apply across all categories:

KSI-CSX-MAS: Minimum Assessment Scope

Requirement: Apply all KSIs to all aspects within the FedRAMP Minimum Assessment Scope.

Every KSI must be applied to every component within your authorization boundary. No exceptions.

KSI-CSX-SUM: KSI Summaries

Requirement: Maintain summaries for each KSI including:

  • Goals for implementation
  • Validation process
  • Pass/fail criteria
  • Traceability to evidence

KSI-CSX-ORD: Implementation Order

Recommendation: Address KSIs in priority order in authorization packages.

Suggested Priority:

  1. KSI-IAM (Identity) - Most critical for risk
  2. KSI-MLA (Monitoring) - Enables visibility
  3. KSI-SVC (Configuration) - Encryption, hardening
  4. KSI-CNA (Architecture) - Foundation
  5. Remaining categories

Automation Requirements

Phase 2 Automation Mandate

For Moderate authorization, FedRAMP requires:

  • 70% of KSIs must have automated validation
  • Evidence in machine-readable format
  • Continuous validation, not point-in-time

What “Automated” Means

LevelDescriptionAcceptable?
Manual documentationWritten narrativesNo
Manual evidence collectionScreenshots, exportsPartial
Automated collectionScripted evidence gatheringYes
Continuous validationReal-time compliance checksYes (preferred)

Automation Tooling

CategoryTools
IaC SecurityCheckov, tfsec, Terrascan
Policy as CodeOpen Policy Agent, Sentinel
Compliance PlatformsDrata, Vanta, Secureframe
CSPMAWS Security Hub, Prisma Cloud
Vulnerability ManagementQualys, Tenable, Rapid7
SIEMSplunk, Sumo Logic, Datadog

Evidence Format

FedRAMP expects machine-readable evidence. Example structure:

{
  "ksi_evidence": {
    "ksi_id": "KSI-IAM-01",
    "validation_method": "automated",
    "tool": "Okta Policy Export",
    "timestamp": "2026-02-24T00:00:00Z",
    "result": "pass",
    "evidence": {
      "policy_id": "mfa-phishing-resistant",
      "allowed_factors": ["webauthn"],
      "enforcement": "required"
    },
    "next_validation": "2026-02-25T00:00:00Z"
  }
}

Getting Started

Assessment Checklist

  1. Inventory your environment

    • List all components in scope
    • Identify inherited controls from IaaS
    • Map data flows
  2. Gap analysis against each KSI

    • Document current state
    • Identify gaps
    • Prioritize by risk
  3. Build automation

    • Select tooling
    • Implement continuous validation
    • Generate machine-readable evidence
  4. Document everything

    • KSI summaries
    • Validation procedures
    • Pass/fail criteria

Timeline Considerations

  • Phase 2 Pilot: Through March 2026
  • General Availability: Expected Q3-Q4 2026
  • Traditional Rev5 EOL: H2 2027

Summary

FedRAMP 20x’s 61 Key Security Indicators represent a fundamental shift from documentation-based compliance to capabilities-based authorization. The key changes:

  1. Outcomes over process: Prove security works, don’t just document policies
  2. Automation required: 70%+ of KSIs need automated validation for Moderate
  3. Continuous over point-in-time: Ongoing proof, not annual audits
  4. Machine-readable evidence: JSON/OSCAL packages, not PDFs

For organizations with strong security practices, KSIs are often easier than traditional controls because you’re demonstrating what you already do rather than writing narratives about what you plan to do.

The transition requires investment in automation tooling and process changes, but the result is a more efficient, more secure authorization process that benefits everyone.


Last updated: February 2026. KSI requirements may change as FedRAMP finalizes Phase 2 standards. Always refer to official FedRAMP documentation for current requirements.

PT
Written by Platform28 Team Platform28

Insights from the Platform28 team on contact center technology, AI, and customer experience.