Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/14/2019
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Rackspace and Telos Team Up to Accelerate FedRAMP Journey

SAN ANTONIO, May 14, 2019 (GLOBE NEWSWIRE) -- Rackspace today announced a new program that provides affordable FedRAMP compliance for SaaS providers, Rackspace Inheritable Security Controls (RISC), powered by Telos® Corporation’s Xacta. Leveraging the power of FedRAMP inheritance and Rackspace’s existing Joint Authorization Board (JAB)-authorized platform-as-a-service, RISC significantly shortens the time and reduces the cost required to achieve Authorization to Operate (ATO) for independent software vendors (ISVs) selling software-as-a-service (SaaS) to the federal government.

The standard process of hiring hourly consultants to obtain a new SaaS ATO can take more than two years and cost over two million dollars. This high-risk journey can make it virtually impossible for ISVs to make the internal business case for working with the government. This prevents the government from receiving the same cloud-enabled innovations that are easily accessible to the private sector.

RISC has achieved federal ATOs in a fraction of the time, with cost savings of up to 70 percent.

“Our joint approach to the FedRAMP process represents a significant departure from traditional, consultant-led engagements typically required to provide federally compliant solutions,” said Raymond Kalustyan, vice president and general manager of Rackspace Government Solutions. “Through enhanced automation and cyber risk management capabilities, RISC helps ISVs bring cloud solutions to the government quickly and with a much lower investment than previously required. Think of it as FedRAMP-as-a-Service.”

Aligning efforts with Telos, provider of continuous security solutions for the world’s most security-conscious organizations, RISC is leveraging Telos’ Xacta, a first-of-its-kind cyber risk management solution that automates the necessary FedRAMP authorization package, including documentation, registration of projects, assessments, authorizations and continuous monitoring. Also participating in the RISC program are SecureIT, an accredited Third Party Assessment Organization (3PAO), delivering full lifecycle FedRAMP assessment and advisory solutions, and Carahsoft, a public sector distributor for Rackspace.

Rackspace, Telos, SecureIT and Carahsoft offer ISV customers a simplified path through FedRAMP via an affordable three-step program that includes:

1. An interactive workshop with subject matter experts from Rackspace, Telos and SecureIT, including 30-day access to Xacta 360, designed to create a plan of action and uncover major impediments before making serious time and resource commitments. 2. A 3PAO led gap assessment by SecureIT that quickly identifies showstopper remediations necessary for an ISV to pursue FedRAMP authorization. 3. A FedRAMP Ready/In-Process SaaS environment, leveraging the JAB-authorized RISC platform and an Xacta-powered Body of Evidence and System Security Plan.

“Navigating the FedRAMP process can be a daunting task for ISVs,” said Steve Horvath, vice president of strategy and vision for Telos. “Using our proven cyber risk management solution, Xacta, Rackspace has made it easier for organizations to tackle the FedRAMP process, fast-tracking their ability to sell to the federal government.”

Rackspace provides 24x7x365 hybrid-cloud management, operational support and security services as a packaged, on-demand, audited and pay-as-you-go service. Whether organizations are looking for assistance with FedRAMP, FISMA, DFARS or other security and compliance needs, Rackspace offers a team of unbiased experts across a range of leading cloud and infrastructure technologies — built on a compliance-ready framework and backed by ongoing managed operations, continuous monitoring, security services, living compliance documentation and audit assistance. Rackspace is a trusted government solutions partner, from business case through ATO.

For additional information on the new RISC, powered by Xacta offering, please visit www2.telos.com/risc-fedramp-workshop.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...