Skip to main content

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CMS Security Automation Framework (CMS-SAF)

The CMS ISPG SAF program was discontinued in September 2023. The open-source tools and baseline validation content will still be maintained.

Contact: Program Retired Sept 2023 | CISO@cms.hhs.gov

What is CMS Security Automation Framework (CMS-SAF)? 

The CMS SAF was developed in partnership with MITRE and was designed to streamline security automation for systems and DevOps pipelines within CMS. As of September 2023, the CMS SAF program will no longer be supported. 

Existing CMS-tailored Security Validation (InSpec Profile) content will still be available on GitHub, as well as the other open-source tools provided on the MITRE website

CMS-tailored Security Validation (InSpec Profile) Content

Java Runtime Environment 7 STIG

ARS 3.1 Moderate  

Java Runtime Environment 8 STIG

ARS 3.1 Moderate 

Red Hat Jboss 6.3 STIG

ARS 3.1 Moderate 

RSA Archer 6 SCG

ARS 3.1 High 

AWS Foundations CIS

ARS 3.1 Moderate 

AWS RDS Best Practices Benchmark

AWS RDS BPB

AWS RDS Infrastructure CIS

 ARS 3.1 Moderate  

AWS S3         

AWS S3

AWS S3 Best Practices Benchmark

AWS S3 BPB 

Google Cloud Platform CIS

Google Cloud Platform CIS

Google Cloud Platform PCI-DSS 3.2.1

Google Cloud Platform PCI-DSS 3.2.1

AWS RDS MSQL Server 2017 CIS

ARS 3.1 Low 

ARS 3.1 Moderate 

ARS 3.1 High 

AWS RDS MSQL Server Instance 2014 STIG

ARS 3.1 High 

AWS RDS Oracle Database 12c STIG

ARS 3.1 Low 

ARS 3.1 Moderate

ARS 3.1 High

AWS RDS Oracle Database 19c CIS

ARS 5.0  

AWS RDS Oracle MySQL 8 STIG

ARS 5.0

AWS RDS Oracle MySQL EE 5.7 CIS

ARS 3.1 Moderate

AWS RDS PostgreSQL 10-13 STIG

ARS 5.0

ARS 3.1 Low

ARS 3.1 Moderate

ARS 3.1 High

AWS RDS PostgreSQL 9.x STIG

ARS 3.1 Moderate

MongoDB STIG

ARS 3.1 Moderate

MSQL Server 2014 Database STIG

ARS 3.1 High

MSQL Server 2014 Instance STIG

ARS 3.1 High

MSQL Server 2017 CIS

ARS 3.1 Low

ARS 3.1 Moderate 

ARS 3.1 High

Oracle Database 12c STIG

ARS 3.1 Moderate

Oracle Database 19c CIS

ARS 5.0

Oracle MySQL 8 STIG

ARS 5.0 

Oracle MySQL EE 5.7 CIS

ARS 3.1 Moderate 

PostgreSQL 10-13 STIG

ARS 5.0 

ARS 3.1 Low

ARS 3.1 Moderate

ARS 3.1 High

PostgreSQL 9.x STIG

ARS 3.1 Moderate 

Docker CE CIS

ARS 3.1 Moderate

EKS Cluster CIS

ARS 5.0

ARS 3.1 Low 

ARS 3.1 Moderate

ARS 3.1 High

EKS Node CIS

ARS 5.0 

ARS 3.1 Low 

ARS 3.1 Moderate 

ARS 3.1 High 

Google Kubernetes Engine CIS

Google Kubernetes Engine CIS

K8S Cluster STIG

ARS 5.0

K8S Node STIG

ARS 5.0

Kubernetes CIS            

Kubernetes CIS

VMWare ESXI 6.5 STIG

VMWare ESXI 6.5 STIG

VMWare ESXI 6.7 STIG

VMWare ESXI 6.7 STIG

VMWare VCSA 6.7 STIG

VMWare VCSA 6.7 STIG

VMWare vSphere 6.7 STIG

VMWare vSphere 6.7 STIG

VMWare vSphere VM 6.5 STIG

VMWare vSphere VM 6.5 STIG

Apache 2.4 Server STIG

Apache 2.4 Server STIG

Apache 2.4 Site STIG

Apache 2.4 Site STIG

Apache Tomcat 9 STIG

Apache Tomcat 9 STIG

IIS 8.5 Server STIG

ARS 3.1 High 

IIS 8.5 Site STIG

ARS 3.1 High

NGINX

ARS 3.1 Moderate 

As part of the shared community, MITRE will still be available on a limited basis to advise on issues posted on CMS or MITRE GitHub repositories, as well as inquiries at saf@groups.mitre.org.

Alternatives to CMS-tailored Security Validation (InSpec Profile) Content

While CMS teams can still use existing CMS-tailored Security Validation Content, these alternatives could be considered: