1 min read

What is Continuous Monitoring?

What is Continuous Monitoring?

Continuous monitoring is the monthly security status check of the provider. It begins once a product achieves a GovRAMP milestone status of Ready, Provisionally Authorized or Authorized. 

Why is continuous monitoring important?

Continuous monitoring ensures a service provider’s solution is progressing with its security requirements and maintaining a secure state of system. It gives insights into a solution’s vulnerabilities, and monthly checks allow service providers to close out items and align with GovRAMP requirements. Continuous monitoring helps identify areas of risk so service providers can take action to protect the system as soon as possible. If there are vulnerabilities, governments can make informed decisions.

What is the continuous monitoring process?  

On a monthly basis, providers must complete their plans of actions and milestones document and executive summary as well as update their scans and inventory worksheet. The GovRAMP Program Management Office (PMO) reviews this information monthly on behalf of the governments they serve. 

If items are creeping out of scope, the GovRAMP PMO will follow up with additional questions or concerns. A service provider has 30 days to remediate high POA&M items, 90 days to remediate moderate POA&M items, and 180 days to remediate low POA&M items. Critical vulnerabilities must be remediated immediately.  

Annually, service providers must submit a new audit conducted by a Third-Party Assessment Organization (3PAO) for the GovRAMP PMO to review. 

What is the escalation process?

The purpose of continuous monitoring is to ensure providers are meeting GovRAMP requirements for continuous monitoring performance. If a service provider has any issues or concerns, our team wants to work with them to resolve the issue before having to defer to the Continuous Monitoring Escalation Process, which includes a Corrective Action Plan or Detailed Findings Review.  

Where do we store documents?

Today, documents are stored in a platform that is authorized at the FedRAMP Moderate Level. Our security team at the GovRAMP Program Management Office has access to review the documentation and with the approval of a service provider, they can grant access to government partners.  

What are the differences between FedRAMP and GovRAMP continuous monitoring?  

GovRAMP requires continuous monitoring for providers with Ready status as well. GovRAMP requires continuous monitoring so we can do our due diligence on behalf of the government to ensure the security state of the system is continuous. We verify there are no gaps or issues that aren't being remediated. GovRAMP's goal is to keep government data secure after the initial authorization.  

Begin the verification process today by becoming a member and submitting a Security Review Request form!

Understanding Threats and Vulnerabilities in Government Cybersecurity

Understanding Threats and Vulnerabilities in Government Cybersecurity

In cybersecurity, especially in the public sector, clarity matters. Terms like “threat” and “vulnerability” are often used interchangeably, but they...

Read More
What Is Risk—And Why It Matters in Cybersecurity Risk Management for Government

What Is Risk—And Why It Matters in Cybersecurity Risk Management for Government

Risk isn’t just a technical concern. For both public and private sector organizations, it's a strategic consideration tied directly to trust,...

Read More
HRTec: Enabling Secure Government Infrastructure with GovRAMP

HRTec: Enabling Secure Government Infrastructure with GovRAMP

HRTec has long supported public sector organizations through its secure, scalable FedHIVE platform and Compliance as a Service model. As a GovRAMP...

Read More
GovRAMP and the Cost of Cybersecurity Ignorance

GovRAMP and the Cost of Cybersecurity Ignorance

As businesses evolve in the digital landscape, so do the threats they face. Investing in cybersecurity is critical, especially when doing business...

Read More
What You Need To Know About the Access Control (AC) Control Family

What You Need To Know About the Access Control (AC) Control Family

GovRAMP security standards and requirements are based on the National Institute of Standards and Technology (NIST) Special Publication 800-53 Rev. 4....

Read More
Cloud Security Compliance Mistakes and How to Avoid Them

Cloud Security Compliance Mistakes and How to Avoid Them

Securing cloud services and protecting consumer data is extremely important in today’s technology landscape. As more businesses rely on cloud...

Read More