FedRAMP compliance for feature flags

View as Markdown

Overview

When operating in a FedRAMP-compliant environment, it’s crucial to ensure that all integrated systems, including feature flagging solutions, adhere to the same compliance standards. Using a homegrown or third-party feature flag system that does not support FedRAMP standards can compromise your certification and introduce unnecessary risks.

This guide provides an overview of how Unleash Enterprise features align with FedRAMP controls, helping your organization meet its compliance requirements.

Access Control

FedRAMP ControlUnleash Feature
AC-02 Account ManagementUnleash uses role-based access control (RBAC) with configurable permissions. In addition, you can integrate Unleash roles with other identity systems using SCIM. You can control authorization at different levels with single sign-on (SSO) and personal access tokens.
AC-04 Information Flow EnforcementUnleash supports information flow control with architectural system components like Unleash Edge, and configuration-level options like IP allow-lists.
AC-06 Least PrivilegeUnleash provides granular role-based access control (RBAC) with permissions configurable at the instance, project, and environment levels. Custom roles can be defined to enforce least-privilege access patterns. Change requests add approval workflows that prevent unauthorized modifications to production flag state.
AC-07 Unsuccessful Logon AttemptsUnleash restricts user logins after 10 failed attempts.

Audit and Accountability

FedRAMP ControlUnleash Feature
AU-02 Event LoggingUnleash provides detailed audit logs and event tracking, accessible through the Admin UI or exportable for integration with other systems.
AU-12 Audit Record GenerationUnleash provides detailed audit logs and event tracking, accessible through the Admin UI or exportable for integration with other systems.

Security Assessment and Authorization

FedRAMP ControlUnleash Feature
CA-8 Penetration TestingUnleash conducts annual penetration testing by external auditors; results are available upon request.

Configuration Management

FedRAMP ControlUnleash Feature
CM-02 Baseline ConfigurationUnleash provides Export functionality that facilitates keeping a configuration snapshot of feature flags and related entities in the audit records. Instance-wide configurations, such as projects, users, and roles, can be managed and restored using the Unleash Terraform provider.
CM-05 Access Restrictions for ChangeUnleash provides advanced role-based access control (RBAC) controls to implement logical access restrictions. Change Requests help you define and track approval flows.

Identification and Authentication

FedRAMP ControlUnleash Feature
IA-02 Identification and Authentication (Organizational Users)Unleash provides single sign-on (SSO) to enable customers to enforce multi-factor authentication (MFA) for all Unleash users.
IA-02 (01) Identification and Authentication (Organizational Users); Multi-factor Authentication to Privileged AccountsUnleash provides SSO to enable customers to enforce multi-factor authentication (MFA) for all Unleash users.
IA-02 (02) Identification and Authentication (Organizational Users); Multi-factor Authentication to Non-privileged AccountsUnleash provides SSO to enable customers to enforce multi-factor authentication (MFA) for all Unleash users.
IA-02 (08) Identification and Authentication (Organizational Users); Access to Accounts — Replay ResistantUnleash restricts user logins after 10 failed attempts.

System and Communications Protection

FedRAMP ControlUnleash Feature
SC-07 Boundary ProtectionUnleash Edge operates as a boundary component that controls information flow between applications and the Unleash API. IP allow-lists can restrict access to the Unleash instance. For self-hosted deployments, customers deploy Unleash within their network perimeter and control all boundary protections using their existing infrastructure.
SC-08 (01) Transmission Confidentiality and Integrity (Cryptographic Protection)Unleash implements cryptographic protection for data in transit, as detailed in our SOC2 report (available upon request.
SC-12 Cryptographic Key Establishment and ManagementFor self-hosted deployments, cryptographic key management is handled entirely by the customer’s infrastructure. Unleash delegates TLS termination, database encryption, and storage encryption to the infrastructure layer, allowing customers to apply their FIPS-compliant or NSA-approved key management solutions without requiring application-level changes.
SC-13 Cryptographic ProtectionFor self-hosted deployments, cryptographic protection is managed at the infrastructure layer. TLS termination and encryption happen at the level of infrastructure components (load balancers, reverse proxies, database connections). Unleash delegates all application-level cryptographic operations to the runtime’s OpenSSL modules and uses FIPS-approved algorithms (for example, SHA-256 for hashing). Unleash supports deployment on FIPS-enabled operating systems and runtimes, including container images built on FIPS-enabled base images. Customers operating in FedRAMP environments achieve FIPS 140-2/140-3 compliance by configuring their infrastructure stack to use validated cryptographic modules. Unleash provides access to source code, enabling customers to build and verify the application within their certified environments.
SC-17 Public Key Infrastructure CertificatesUnleash uses PKI certificates issued by AWS and Google.
SC-28 Protection of Information at RestUnleash stores feature flag configuration data in a PostgreSQL database. For self-hosted deployments, data-at-rest encryption is managed by the customer at the database and storage layer using their preferred encryption solution.

System and Information Integrity

FedRAMP ControlUnleash Feature
SI-07 Software, Firmware, and Information IntegrityUnleash Enterprise is built on an open-source foundation, enabling customers to inspect and verify the integrity of the application code. Self-hosted customers can integrate Unleash deployments into their existing software integrity verification processes, including container image signing and supply chain security tooling.