CA-8 — Penetration testing
Requires annual penetration testing of the authorization boundary. Applies to Moderate (CA-8(1) also requires privileged-access testing) and High baselines. The test must follow an approved methodology — NIST SP 800-115 is the FedRAMP standard. Results feed the Plan of Action and Milestones (POA&M).
SA-11 — Developer security testing
Requires security testing during development and before deployment of new system components. For cloud service providers adding features to a FedRAMP-authorized system, this means testing before the change goes into the authorization boundary. Significant changes (SCR process) often trigger SA-11 evidence.
RA-5 — Vulnerability scanning
Separate from CA-8. Requires regular automated vulnerability scanning of the authorization boundary — quarterly for Moderate, monthly for High. RA-5 is automated scanning; CA-8 is manual penetration testing. Both are required and neither satisfies the other.
SI-2 — Flaw remediation
Critical flaws must be remediated within 30 days, high within 90 days. Penetration test findings populate the POA&M and trigger SI-2 timelines. The retest report closes POA&M items. We time our retest delivery to your POA&M update cycle.