Skip to content

Federal Compliance Overview

Document ID: PLCY-FED-001
Version: 1.0
Effective Date: December 30, 2025
Last Review: December 30, 2025
Owner: Hop And Haul Team


CONFIDENTIAL

This document is CONFIDENTIAL and for internal use only. Do not distribute outside the organization.

1. Purpose

This document establishes Hop And Haul' approach to achieving FedRAMP Moderate authorization and NIST 800-53 compliance. It provides an overview of the federal compliance program, gap analysis, and roadmap for federal readiness.


2. Scope

2.1 Authorization Target

AttributeValue
Target AuthorizationFedRAMP Moderate
Baseline Controls~325 controls
NIST FrameworkSP 800-53 Rev 5
FIPS 199 CategorizationModerate-Moderate-Moderate

2.2 System Boundary

The Hop And Haul authorization boundary includes:

ComponentIncludedNotes
Hop And Haul API (Swift Vapor)YesCore application
RDS PostgreSQL DatabaseYesPrimary data store
AWS InfrastructureInheritedFedRAMP High authorized
Cloudflare Zero TrustInheritedFedRAMP Moderate authorized
Mobile ApplicationsYesiOS/Android clients
Admin PortalYesInternal management interface

2.3 Inherited Controls

Hop And Haul inherits controls from FedRAMP-authorized cloud service providers:

ProviderAuthorization LevelInherited Control Families
AWS (GovCloud eligible)FedRAMP HighPE, PS (partial), CP (partial)
CloudflareFedRAMP ModerateSC (partial), AC (partial)

3. Existing Compliance Foundation

Hop And Haul has established a comprehensive SOC 2 Type II compliance program that provides a strong foundation for FedRAMP authorization.

3.1 SOC 2 Trust Service Criteria Coverage

TSC CategoryCoveragePrimary Documents
Security (CC1-CC9)CompletePLCY-SEC-001, PLCY-ACC-001
Availability (A1)CompletePLCY-DRP-001, PLCY-INF-001
Processing Integrity (PI1)CompletePLCY-PTV-001, PLCY-AUD-001
Confidentiality (C1)CompletePLCY-DAT-001, PLCY-RET-001
Privacy (P1-P8)CompletePLCY-CON-001

3.2 Regulatory Alignment

RegulationStatusRelevance
49 CFR 392.80/392.82CompliantDOT texting/phone prohibition
49 CFR 390.6CompliantCoercion prohibition
FMCSA HOSCompliantHours of Service

4. NIST 800-53 Control Family Mapping

4.1 Control Family Coverage Summary

FamilyNameControlsImplementedPlannedGap
ACAccess Control251852
ATAwareness & Training6330
AUAudit & Accountability161420
CAAssessment & Authorization9450
CMConfiguration Management11731
CPContingency Planning131030
IAIdentification & Authentication12921
IRIncident Response10820
MAMaintenance6330
MPMedia Protection8530
PEPhysical & Environmental20Inherited--
PLPlanning9630
PMProgram Management161060
PSPersonnel Security9Inherited--
RARisk Assessment9720
SASystem & Services Acquisition221282
SCSystem & Communications Protection4125106
SISystem & Information Integrity231652
SRSupply Chain Risk Management12642

4.2 Overall Readiness

MetricValue
Total FedRAMP Moderate Controls~325
Implemented~220 (68%)
Planned (Phase 1-3)~90 (27%)
Gap (Requires New Implementation)~15 (5%)

5. Gap Analysis Summary

5.1 Critical Gaps Requiring Immediate Attention

Gap IDControlDescriptionRemediation
GAP-01SC-13FIPS 140-2 validated cryptographic modulesPhase 3: Federal Hardening
GAP-02IA-2(12)PIV/CAC authentication supportPhase 3: Federal Hardening
GAP-03CM-8Automated component inventoryPhase 2: Safety Operations
GAP-04SI-7Code signing and integrity verificationPhase 3: Federal Hardening
GAP-05SA-4Formal acquisition security requirementsPhase 2: Safety Operations

5.2 Enhancements Required

EnhancementCurrent StateRequired StateTimeline
EncryptionAES-256-GCMFIPS 140-2 validatedPhase 3
AuthenticationSSO + MFASSO + MFA + PIV/CACPhase 3
Asset ManagementManualAutomated CMDBPhase 2
Code IntegrityCode reviewSigned buildsPhase 3
Vendor AssessmentInformalFormal SA-4 processPhase 2

6. Federal Compliance Document Suite

6.1 New Federal Documents

Document IDTitlePurpose
PLCY-FED-001Federal Compliance OverviewThis document
PLCY-FED-002SSP-LiteSystem Security Plan
PLCY-FED-003Risk Register (Federal)High-consequence threat model
PLCY-FED-004Development RoadmapPhase 1-3 implementation plan
PLCY-FED-005Control Mapping MatrixNIST to SOC 2 crosswalk

6.2 NIST 800-53 Policy Documents

Document IDTitleControl Family
PLCY-NIST-AC-001Access Control PolicyAC
PLCY-NIST-AU-001Audit & Accountability PolicyAU
PLCY-NIST-IR-001Incident Response PolicyIR
PLCY-NIST-CMSI-001Configuration Management & IntegrityCM, SI
PLCY-NIST-SA-001Vendor Risk ManagementSA, SR

7. Authorization Approach

7.1 Authorization Strategy

Hop And Haul will pursue FedRAMP Moderate authorization through the following approach:

PhaseActivityDependencies
PreparationComplete Phase 1-3 development roadmapInternal
Readiness Assessment3PAO readiness assessment3PAO selection
DocumentationComplete SSP and supporting artifactsReadiness assessment
Assessment3PAO security assessmentDocumentation
AuthorizationJAB P-ATO or Agency ATOAssessment completion
Continuous MonitoringOngoing ConMon programAuthorization

7.2 Third-Party Assessment Organization (3PAO)

RequirementStatus
3PAO SelectionPending
Engagement TimelineAfter Phase 2 completion
Scope DefinitionFull system boundary

8. Continuous Monitoring Strategy

8.1 ConMon Requirements

ActivityFrequencyOwner
Vulnerability scanningMonthlySecurity Team
POA&M reviewMonthlySecurity Team
Configuration baseline reviewQuarterlyOperations
Penetration testingAnnual3PAO
Security control assessmentAnnual3PAO
Significant change assessmentAs neededSecurity Team

8.2 Reporting Requirements

ReportFrequencyRecipient
Monthly ConMon reportMonthlyFedRAMP PMO
Annual security assessmentAnnualFedRAMP PMO
Significant change reportAs neededFedRAMP PMO
Incident reportAs neededUS-CERT, FedRAMP PMO

DocumentRelationship
SSP-LiteSystem Security Plan
Risk RegisterFederal risk assessment
Control Mapping MatrixNIST to SOC 2 crosswalk
Development RoadmapImplementation timeline
PLCY-SEC-001Security controls baseline
PLCY-RSK-001Risk assessment methodology

10. Document Control

VersionDateAuthorChanges
1.0December 30, 2025Hop And Haul TeamInitial release

CONFIDENTIAL - Internal Use Only - Hop And Haul Policy Documentation