How Zoom meets FedRAMP and DoD requirements
Red Hat puts a great deal of thought into FedRAMP and DoD compliance as part of its development process to help Zoom for Government achieve compliance. “Red Hat touches almost every base that we are required to implement for a U.S. Government environment and makes doing that easy. I use it because it’s the de facto standard. There’s quite a great deal of caring on FedRAMP and DoD requirements, and that's just part of the process of developing well,” said Ryan Kimbrell, Senior Cloud Operations Engineer at Zoom.
At Zoom, security is paramount, and the company uses sophisticated tools to secure its infrastructure, including DISA STIG. According to Kimbrell, the Red Hat publication of its DISA STIG Ansible playbook allows Zoom to run it across everything. “The playbook gets us probably 80% of the way to DISA STIG compliance,” said Kimbrell.
Small things also make a big difference. The resources on the Red Hat website, including the Common Vulnerabilities and Exposures (CVE) database and the Red Hat security advisory (RHSA), are invaluable when working with the U.S. Government. “Every week we have to do security scans against every system in the environment,” said Kimbrell. “And those scanners list vulnerabilities in packages that are on the operating systems. Any time that occurs, we can immediately go to the Red Hat site, and get full explanations of the vulnerabilities, which help determine if we’re affected. Nobody else does that for other Linux distributions. It would quickly become a nightmare trying to run a production government environment without it because we would have to do all that research every month ourselves.”
Additional FedRAMP and DoD compliance and security requirements are fulfilled thanks to Red Hat IdM capabilities, which are used for group management, user management, and multifactor authentication. This ultimately helps Zoom meet its controls, while Red Hat Satellite adds another layer of security. “It provides us with the ability to see what our environment is doing before our security scanner,” said Peirce.
When providing the U.S. Government with communication tools, it is vital to provide security and align with all the necessary requirements and regulations. Zoom for Government can do that. “Compliance is nothing but discipline. And Red Hat has the discipline that we need,” said Keese.
Enabled efficient use of internal resources
The DoD has stringent controls for application whitelisting. When Zoom began working with FedRAMP and the DoD, it discovered that the tool the DoD used for whitelisting was very expensive and ran on an operating system that Zoom didn’t want to introduce to its space. The solution was a RHEL 8 feature—file access policy daemon (fapolicyd), a user space daemon that determines access rights to files.
“It allowed us to avoid the acquisition of the tool the DoD was using, the introduction of another operating system, and hiring new staff to run it,” said Keese. “And more recently, we were able to remove a file integrity management tool (FIM) that we had in place and realize some cost-savings.” Peirce added that the fapolicyd feature in Red Hat Enterprise Linux helped Zoom meet compliance requirements while reducing constraints on infrastructure and staff, making the operation more efficient and cost-effective.
What’s more, Red Hat IdM helped Zoom save on licensing from third-party providers. By sticking to one toolset, Zoom has realized cost savings and simpler operations.