Whitepaper

Choosing a Cloud Service Provider (CSP): Coverage, Costs, and Hidden Headaches

March 12, 2025

Let me set the scene. You don’t feel well, and you head to the hospital. You ask the receptionist if they accept your insurance. They say yes, but three months later you get a bill for an ‘out of network' hospital visit and 'out of network practitioner’. 

The next time you go to a different hospital when you're feeling unwell, you ask instead, "Are you in-network?" The receptionist says "Yes," but a few months go by, and you get a another whopper of a bill because one of the practitioners you saw was ‘out of network’.

So next time, you search for each hospital and each practitioner before going to ensure that they are in fact, ‘in-network’ and a perfect fit for your needs.

 

How is this scenario similar to selecting a Cloud Service Provider (CSP)?

You have to painstakingly do your homework on CSPs just as you would for finding the right in-network hospitals and practitioners. You can’t fully trust that when you ask either a health or a cloud service provider whether they meet the requirements you need, that they will actually know the answers, so you must validate based on your own research before going forward.

The Cybersecurity Maturity Model Certification (CMMC) as defined in Title 32 Code of Federal Regulations (CFR) Part 170 requires organizations to fully understand who is responsible for enforcing and implementing the security controls listed in the:

  • National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and;
  • NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171

 

Using the healthcare analogy, can you choose a CSP that originates and is managed ‘out-of-network’?

Sure, if you are only using it for the management of data where no Controlled Unclassified Information (CUI) is involved. The same is true if the CSP investment is for security protection data of CUI.

If, however, the data you are managing is CUI, then No. The CSP must be at minimum FedRAMP moderate or equivalent depending on the type of CUI categories you have. This underscores the value of having good network segmentation based on your CUI dataflow and really understanding the difference between CUI assets and everything else on your network.

When selecting a CSP for CUI that requires additional level of safeguards, it is important to understand the dissemination requirements. In some cases, there are instances where it is also important to ensure that the service personnel are US citizens, and the data is stored within the USA. Again, using the healthcare analogy, your data and the personnel monitoring the data must be ‘in network’. If either the data or the CSP personnel are ‘out of network’ not only will the health of the data be at risk, but your financial standing will suffer if you are found to be in violation of the regulations, putting your contracts in jeopardy.

 

Even a FedRAMP Moderate CSP Requires Work on Your End

Another critical consideration is that even when you invest in a CSP that is FedRAMP Moderate, you still have work to do to show how you are meeting your own responsibilities. As a consultant and assessor for over a decade, a key observation is that clients are not aware of their responsibilities when investing in cloud services, especially true when investing for the protection of CUI. It is not as easy as selecting a CSP from the FedRAMP marketplace and then being done. CSPs do not provide customers with a full definition of shared responsibilities, complete with a Body of Evidence (BOE) when purchasing CSP services. This is the information customers need to know concerning who is responsible for implementing controls. Typically, CSPs that state that they are equivalent but are not FedRAMP authorized often do not have a body of evidence that is readily available to the client. 

If you are considering a CSP that states they are FedRAMP equivalent, here are examples of what is included in a BOE:

  1. System Security plan (SSP)
  2. Customer Responsibility Matrix (CRM)/ Shared Responsibility Matrix (SRM)
  3. Security Assessment Report (SAR)
  4. Risk Assessment Report (RAR)
  5. Plan of Action and Milestones (POA&M)

BOEs are highly sensitive information, confidential, and are not publicly available. Customers must request this information.

 

Understanding Your Responsibilities

When you review the SSP and CRM, you should take the time to review the information and know what you are responsible for so that you can carry out your responsibilities. You need to know what is shared or fully inherited from the CSP and are required to document the responsibilities in your own SSP. Assessments for your enterprise or CUI enclave will require you to document how each control objective is implemented and by whom. If there is any inheritance (partial or full) from a CSP, you must provide evidence, including a CRM that shows assessors where the responsibilities lie and how the evidence supports your affirmations.

Additionally, a CRM is needed for all external service providers you use for:

  • Storing
  • Processing
  • Handling
  • Protecting your CUI environment

Further details of customers responsibilities for addressing use of External Service Providers are outlined under 32 CFR Part 170 and 48 CFR 252.204-7012.

 

Mapping NIST 800-171 to NIST 800-53

FedRAMP moderate, high or equivalent BOEs address the implementations of the security controls identified under NIST 800-53, Security and Privacy Controls for Information Systems and Organizations. To help you identify which NIST 800-171 control aligns with those under NIST 80-53, NIST provides a mapping of the NIST 800-171 security controls to NIST 800-53 security controls: APPENDIX D: MAPPING TABLES

 

Partner with Coalfire Federal for CMMC & Cloud Security Compliance


Navigating the complexities of CMMC compliance can be overwhelming, but you don’t have to do it alone.

At Coalfire Federal, we specialize in helping organizations:

  • Understand their security responsibilities
  • Assess cloud service providers
  • Ensure compliance with CMMC and federal regulations

As a trusted C3PAO with deep expertise in cybersecurity assessments, we provide the insights and guidance you need to:

  • Make informed decisions
  • Mitigate risks
  • Protect your Controlled Unclassified Information (CUI)

Don't leave your compliance and security to chance—partner with Coalfire Federal to ensure your cloud strategy aligns with CMMC requirements and industry best practices.

Contact us today to learn how we can help you prepare for your CMMC assessment with confidence.

Brie Taylor

Senior Consultant

Brie Taylor is a cybersecurity leader with over 12 years of experience in the private and public space. She excels in training, planning, implementing, executing, and monitoring complex risk assessments with multidisciplinary teams, specializing in NIST, RMF IV&V, CobiT, FISMA, and FedRAMP compliance.

View Full Bio