GuardTechly logo

Understanding Whale Phishing: A Comprehensive Analysis

An illustration depicting a phishing email targeting executives.
An illustration depicting a phishing email targeting executives.

Intro

In an era defined by rapid technological advancement, the domain of cybersecurity faces evolving threats that require constant adaptation and understanding. Whale phishing is one such threat that has emerged, aiming at high-profile individuals like executives and company directors. This discussion will illuminate the significance of whale phishing, examining its methodologies, characteristics, and implications for organizations.

The importance of awareness in this context cannot be overstated. As businesses increasingly rely on digital platforms, cybercriminals exploit vulnerabilities in communication flows and data management systems. The potential ramifications of successful whale phishing attacks extend beyond financial loss; organizations face reputational damage and erosion of trust among stakeholders.

This article seeks to provide thorough insights into whale phishing, equipping cybersecurity professionals, IT specialists, network administrators, and technology enthusiasts with the necessary knowledge to better combat these targeted threats. From understanding the distinct features of whale phishing to implementing preventative measures, the following sections aim to construct a well-rounded narrative addressing the intricacies of this cyber threat.

Foreword to Whale Phishing

Whale phishing stands as a significant threat in the realm of cybersecurity. This form of phishing is not just a fleeting concern; it has evolved into an intricate scheme that specifically targets high-profile individuals within organizations. Understanding whale phishing is crucial for various stakeholders, including cybersecurity professionals, IT specialists, and network administrators.

The repercussions of successfully executed whale phishing attacks can be devastating. Financial losses, reputational harm, and legal implications are all potential fallout for organizations. Therefore, recognizing the unique characteristics and tactics associated with this sophisticated form of cybercrime is imperative.

It is essential to comprehensively explore this subject, as awareness and education can bolster defenses against such targeted threats. The following sections will delve into the definition of whale phishing and trace its evolution over time, providing clarity on its significance.

Definition of Whale Phishing

Whale phishing refers to a targeted attempt to steal sensitive information from high-profile individuals, often referred to as "whales" within an organization. These individuals typically hold positions of power, such as executives or senior managers. Unlike traditional phishing, which tends to cast a wide net to catch unsuspecting victims, whale phishing focuses on a narrow group, utilizing personalized methods to exploit trust and influence. The attackers usually research their targets thoroughly to craft convincing messages. They may impersonate trusted colleagues or utilize business context to create urgency and pressure.

The ultimate objective is often financial gain, where attackers might seek to redirect funds or access sensitive company data. With a deeper understanding of whale phishing, organizations can implement better safeguards and training for key personnel, thus reducing the probability of successful attacks.

The Evolution of Phishing Attacks

Phishing as a concept has been around for decades. Initially, phishing scams primarily targeted the average internet user with generic emails designed to trick people into providing login credentials. However, the evolution of technology and the increasing sophistication of cybercriminals led to more elaborate methods.

Whale phishing emerged as one of the latest developments, capitalizing on advancements in social engineering techniques. Attackers now leverage information gathered from various sources, including social media platforms and corporate websites, to create realistic scenarios that make their phishing attempts seem more legitimate.

Consequently, the techniques have refined to become extremely deceptive. With the growing value of data and the ease of accessing personal information online, the motivation for such attacks continues to rise. Organizations must stay vigilant, adapting their defenses as phishing tactics evolve, particularly in targeting their most valuable assets—knowledgeable and influential employees, who are often unaware of how they might be specifically targeted.

Characteristics of Whale Phishing

Understanding the characteristics of whale phishing is fundamental to grasp the nuances of this sophisticated attack vector. Whale phishing stands out due to its targeted approach, focusing on high-profile individuals within organizations, such as executives and decision-makers. The importance of identifying these characteristics lies in developing effective defenses and response strategies. By recognizing the specific elements that define whale phishing, cybersecurity professionals can better protect sensitive information and mitigate risks associated with these attacks.

Target Selection Criteria

The target selection criteria for whale phishing attacks are meticulous. Cybercriminals do not randomly select their victims; instead, they undertake substantial research to identify prime targets within an organization. This action typically involves examining publicly available information on social media platforms and professional websites. The emphasis is on high-ranking officials such as CEOs, CFOs, and other key figures whose access to sensitive data can lead to severe organizational harm if compromised.

Attackers look for individuals with the following attributes:

  • Prominent Roles: Higher positions correlate with access to sensitive information.
  • Recent Media Activity: Targets in the news may elicit emotional responses, making them more vulnerable.
  • Connected Networks: Individuals with extensive networks may unintentionally share compromise potential through associates.

Understanding these criteria allows organizations to implement targeted countermeasures.

Complexity of the Attacks

The complexity of whale phishing attacks is one of the most daunting aspects of this cyber threat. Unlike traditional phishing, which relies on generic messages sent to a wide audience, whale phishing campaigns are precise and well-crafted. Attackers often employ various techniques such as deepfake technology or brand impersonation to create genuine-looking communications.

Key elements contributing to this complexity include:

  • Tailored Communication: Messages are personalized based on the target's role and recent interactions.
  • Multi-Channel Approaches: Attackers utilize different platforms, such as email and messaging applications, to increase the chance of success.
  • Integration of Social Engineering: The manipulation of victims' emotions or environment forms part of the technique.

This level of sophistication makes it challenging for even the most vigilant individuals to recognize attacks.

Psychological Manipulation Techniques

Psychological manipulation is a core component of whale phishing. Cybercriminals employ various techniques to exploit human behavior, aiming to lower the target’s defenses and elicit compliance. Understanding these techniques is crucial for cybersecurity strategies.

Some of the prevalent psychological tactics include:

  1. Urgency: Imposing a sense of urgency can override rational thinking, prompting hasty decisions.
  2. Authority: Posing as a superior or a trusted figure lends credibility to the attack.
  3. Reciprocity: Attackers may create scenarios where the target feels obligated to assist, manipulating them into compliance.
A diagram showcasing the key characteristics of whale phishing.
A diagram showcasing the key characteristics of whale phishing.

Organizations must remain aware of these tactics to train staff effectively and foster a culture of skepticism toward unexpected requests.

"Whale phishing is not just a technical breach; it is a human one, relying on deep social manipulation."

Common Tactics Employed in Whale Phishing

Whale phishing is characterized by its complexity and high-stakes targets. Understanding the common tactics used by cybercriminals is crucial for organizations to protect themselves. This section delves into specific elements of tactics employed in whale phishing attacks, focusing on the implications and necessary considerations for safeguarding sensitive information.

Credential Harvesting

Credential harvesting is a primary tactic in whale phishing schemes. Attackers often create fake websites that closely resemble legitimate ones. They use these sites to trick the victims into entering their login credentials. This method is remarkably effective because it exploits the trust users have in familiar interfaces.

Often, these fake sites use URLs that appear genuine at a glance. For instance, they might manipulate a single letter or use subdomains that can mislead users. As a result, even vigilant individuals can fall victim to such tactics. Harvested credentials can then be used for unauthorized access to critical systems, potentially leading to significant data breaches.

Business Email Compromise (BEC)

Business Email Compromise is another prevalent tactic within whale phishing. This method typically targets executives or employees with access to financial resources. Attackers often impersonate high-ranking officials or trusted vendors, resulting in employees unwittingly transferring funds or sensitive information.

The appeal of BEC lies in its psychological manipulation. By using information sourced from various platforms, attackers can craft messages that appear highly authentic. They may note specific details about an organization to make communications seem legitimate. Such specialized approaches boost the chances of success and can lead to severe financial consequences for businesses.

"BEC can lead to both direct financial losses and long-term reputational damage for organizations."

Spear Phishing Techniques

Spear phishing is distinct in its focus; attackers tailor their approach to specific individuals rather than using broad, mass-targeted emails. Each spear phishing attack is customized, utilizing personal information gathered from social media and other public platforms. This level of personalization increases the likelihood that targets will respond or take the desired action.

These attacks often involve emails that appear highly credible and relevant to the recipient. This might include messages that reference recent company events or pressing deadlines. Because the email feels genuine, the victim is more likely to click on malicious links or attachments that compromise their systems. Consequently, spear phishing has evolved into a key tactic within the broader whale phishing framework, leveraging sophisticated social engineering methods to manipulate even the most cautious individuals.

Real-World Examples of Whale Phishing Attacks

Understanding real-world examples of whale phishing attacks is vital for cybersecurity professionals and organizations aiming to enhance their defenses. Studying these incidents provides insights into the tactics employed by attackers, the vulnerabilities they exploit, and the devastating consequences of successful breaches. By dissecting specific cases, we enrich our knowledge on the behaviors and methods that can lead to financial losses or reputational damage for companies.

Furthermore, these examples serve as educational tools for training employees and informing policy decisions on cybersecurity protocols. Analyzing such incidents helps organizations hone their awareness and response strategies, making it essential to be conversant about these situations without leaning into panic or assumption.

Case Study: The Ubiquity Attack

In 2020, Ubiquiti Networks, a provider of internet and networking technology, was hit by a significant whale phishing attack. Attackers impersonated a high-ranking official and sent a convincing email to a subordinate with critical instructions. The email contained a request for a large transfer of funds, leveraging the urgency and authority associated with such communication.

The attackers used social engineering tactics, ensuring the email appeared legitimate, which increased its chances of success. Unfortunately, the recipient acted on the request, resulting in a loss of millions. This incident exemplifies how a well-crafted email can exploit both human trust and organizational hierarchy.

Key Takeaways from the Ubiquiti Attack:

  • The necessity of verifying unusual fund transfer requests, regardless of perceived authority.
  • Employing a multi-step verification process within financial transactions can mitigate risk.
  • Continuous employee training is critical, emphasizing the importance of skepticism towards unexpected emails.

This case highlights the potential impact of whale phishing and reinforces the need for robust security practices in organizations.

Case Study: The Snapchat Incident

In another notable example, Snapchat, the social media platform, faced a whale phishing attack in early 2014. Attackers posed as a recruiting service, successfully convincing an employee to share sensitive information. This incident showcases how even well-known companies are not immune to such threats.

The attackers utilized a clever ruse, drawing from industry norms and terminology familiar to the employee. Although the actual damage may have been mitigated, it highlighted vulnerabilities tied to insider threats and the ease with which attackers can gather information through impersonation.

Insights from the Snapchat Incident:

  • Organizations should regularly conduct security audits to assess employee knowledge concerning phishing threats.
  • Transparent communication about security threats fosters a culture of vigilance among employees.
  • Focusing not only on external threats but also internal processes can provide further protection.

Both case studies indicate that whale phishing attacks are not just isolated incidents; they underline trends that organizations must recognize. Failing to learn from these examples could lead to similar, if not worse, breaches in the future.

Potential Impacts of Whale Phishing on Organizations

Whale phishing poses significant risks to organizations, impacting them in multifaceted ways. By understanding the potential impacts of these attacks, organizations can better prepare themselves to mitigate risks and protect their assets. The implications of whale phishing extend beyond immediate financial losses, encompassing reputational damage and legal vulnerabilities. Each of these elements is critical for maintaining not only the financial health of an organization but also its standing in the market and its compliance with various regulations.

A conceptual image representing cybersecurity measures against whale phishing.
A conceptual image representing cybersecurity measures against whale phishing.

Financial Losses

The financial ramifications of whale phishing are often severe. Successful attacks can lead to substantial monetary losses. Cybercriminals may exploit these incidents to siphon funds directly from an organization’s accounts or to acquire sensitive financial information that can be sold on the dark web. Furthermore, the costs associated with recovery efforts, forensic investigations, and potential ransom payments can escalate quickly.

In addition to direct loss from theft, organizations may experience indirect financial impacts due to operational disruptions. When resources are diverted to address a breach, productivity can suffer, affecting revenues. The financial burden can extend to regulatory penalties if compliance protocols are found lacking, which compounds the initial loss.

Reputational Damage

Reputational damage is another critical impact of whale phishing. Customer trust is paramount in any business relationship. When high-profile individuals within an organization fall victim to phishing, it can erode public perception and lead to skepticism about the company’s ability to safeguard sensitive information.

The fallout from a phishing incident can be long-lasting. Customers and clients may reconsider their relationships with organizations implicated in such attacks. Negative media coverage can amplify the damage, leading to further loss of confidence. Organizations may require extensive branding efforts to recover from such events, underscoring the importance of proactive preventive measures against such attacks.

Legal and Compliance Risks

The legal landscape surrounding cybersecurity breaches is complex and evolving. Organizations that suffer whale phishing incidents may face legal ramifications for failing to protect sensitive data, especially if those data involved personal or financial information of employees or clients. Regulatory compliance is not only critical for operations but also for avoiding hefty fines.

In several jurisdictions, organizations are mandated to have protective measures in place and notify affected individuals in the event of data breaches. Failure to comply can lead to lawsuits and class actions, further escalating costs. As regulations become more stringent worldwide, the emphasis on compliance becomes crucial.

In sum, the potential impacts of whale phishing on organizations are vast, encompassing financial tolls, reputational harm, and legal liabilities. Therefore, vigilance is essential.

Preventive Measures Against Whale Phishing

Whale phishing presents a significant threat to businesses and high-profile individuals. Preventing these attacks is crucial for maintaining organizational security. Effective preventive measures enhance overall security posture and mitigate the risk associated with targeted attacks. A proactive approach is necessary for defending against the cunning strategies employed by cybercriminals. Below are three key areas of focus to prevent whale phishing effectively.

Employee Training and Awareness Programs

Employee training is vital in combating whale phishing. Staff members are the first line of defense. Thus, they must understand the risks and recognize the signs of potential phishing attempts. Regular training sessions should emphasize the techniques used by cybercriminals, such as impersonating executives or using urgent requests for sensitive information. Awareness programs can include simulated phishing attacks. These help employees learn to identify unusual email behavior without real risk. Moreover, establishing a culture of cybersecurity awareness can significantly reduce the likelihood of successful attacks.

Implementation of Robust Email Filters

Email is the primary vector for whale phishing attacks. Therefore, implementing effective email filters can drastically reduce risk. Email filtering solutions utilize various techniques to detect and block suspicious emails. For example, filters that analyze sender reputation, content, and attachments can help identify potential threats. Organizations should continuously update their filtering rules to adapt to ever-evolving tactics used by attackers. Additionally, investing in advanced threat detection systems can enhance email security and provide an additional layer of protection.

Multi-Factor Authentication

Multi-Factor Authentication (MFA) adds an extra layer of security. It requires users to verify their identity through multiple methods before accessing sensitive information. MFA can include text message codes, authentication apps, or biometric verification. Even if attackers obtain login credentials, MFA makes it more difficult for them to gain unauthorized access. Implementing MFA across all critical systems addresses a significant vulnerability, making whale phishing less effective. Moreover, organizations should encourage the use of MFA for third-party services as well.

"Investing in preventive measures can significantly reduce the risks associated with whale phishing attacks."

Response Strategies to Whale Phishing Incidents

Whale phishing poses significant threats to organizations, demanding effective responses when incidents occur. A structured strategy is essential to mitigate the damage and prevent future occurrences. This section outlines the critical elements of response strategies, focusing on their importance in preserving organizational integrity, security, and trust.

Immediate Incident Response Procedures

Upon discovering a whale phishing incident, immediate action is crucial. The first step is to identify the details of the attack. This includes determining the nature of the phishing attempt, identifying the target, and collecting information on how the phishing email or message made its way into the system. Establishing a dedicated incident response team is a key aspect as they will coordinate the overall effort to address the incident effectively.

The team should follow these procedures:

  1. Containment: Isolate affected systems to prevent further exploitation. This may involve disconnecting devices from the network.
  2. Investigation: Analyze the phishing attempt's specifics, including any credentials that may have been compromised.
  3. Documentation: Record all findings and actions taken during the incident response for future reference and audit.

By promptly executing these steps, organizations can minimize potential harm and expedite recovery from the attack.

Communication with Stakeholders

Effective communication with stakeholders is paramount during a whale phishing incident. It involves timely updates to ensure transparency and trustworthiness.

  1. Informing Affected Parties: Stakeholders, including executives and employees, must be informed of the incident, its impact, and the actions being taken. Clear instructions should be provided on how to enhance their own security in light of the incident.
  2. Regulatory Compliance: Depending on the jurisdiction, organizations may have legal obligations to report data breaches. Ensuring compliance with regulations like GDPR or HIPAA can prevent legal ramifications.
  3. Public Relations Management: Depending on the severity of the incident, engaging with public relations professionals may be necessary to manage any potential public fallout.

This proactive approach to communication can help preserve stakeholder confidence and maintain the organization’s reputation.

Post-Incident Review and Analysis

A visual representation of response strategies for whale phishing incidents.
A visual representation of response strategies for whale phishing incidents.

After addressing the immediate repercussions of a whale phishing incident, organizations should conduct a comprehensive analysis to learn and adapt.

  1. Review of Response Effectiveness: Assess how well the incident response plan worked. This includes evaluating the actions taken and identifying areas for improvement.
  2. Identifying Vulnerabilities: Conduct a thorough investigation to discover how the phishing attack succeeded. Understanding these vulnerabilities is key to strengthening defenses.
  3. Updating Policies and Training: Based on findings from the review, it may be necessary to update security policies and enhance employee training programs. Continuous education can help staff recognize phishing attempts more effectively.

"Post-incident analysis is not just about understanding what went wrong; it's about building a stronger defense against future threats."

Overall, having robust response strategies in place will allow organizations to tackle whale phishing incidents more effectively. Addressing immediate concerns while also focusing on long-term improvements is vital in sustaining organizational resilience against cyber threats.

The Role of Technology in Combating Whale Phishing

Whale phishing's complexity requires a multi-faceted approach to cybersecurity, with technology playing a vital role. Sophisticated tools can greatly enhance an organization’s defenses against these targeted attacks. As whale phishing targets high-profile individuals, the stakes are incredibly high. Thus, employing advanced technology is not merely optional; it is essential. Organizations must understand how to leverage technology effectively for the security of their high-value assets.

Advanced Threat Detection Tools

Advanced threat detection tools are designed to identify and neutralize potential phishing threats before they reach the intended targets. These tools analyze patterns, behaviors, and anomalies in communication, offering organizations a proactive defense strategy.

  1. Email Security Solutions: Tools like Proofpoint and Mimecast filter emails for potential threats. They use predictive analytics to identify unusual patterns that may indicate attempts of whale phishing.
  2. Behavioral Analysis Tools: These tools monitor how employees interact with digital environments. For instance, Darktrace applies machine learning to recognize normal user behavior and identify deviations. Outlier activities can raise red flags for security teams.
  3. Threat Intelligence Platforms: Resources such as Recorded Future help track and analyze phishing tactics. Understanding the tactics used by cybercriminals can help IT specialists anticipate attempts and apply preventive measures.

Using these advanced tools significantly increases the chances of identifying threats swiftly, thus minimizing successful whale phishing attacks. Implementing multiple layers of threat detection is recommended for enhanced security.

Artificial Intelligence in Cybersecurity

Artificial Intelligence (AI) has revolutionized the cybersecurity landscape, particularly in combating whale phishing. AI technologies enhance security systems by automating threat detection and response processes, which is crucial when managing high-risk scenarios.

  • Predictive Analytics: AI systems can forecast potential phishing attacks based on historical data. By analyzing previous phishing trends, organizations can prepare for new methods and techniques employed by cybercriminals.
  • Natural Language Processing (NLP): NLP algorithms can scrutinize email communications for unusual language patterns or formats often characteristic of phishing attempts. This analysis may flag emails that appear suspicious, increasing the likelihood of interception.
  • Automated Incident Response: Machine learning algorithms assist in rapid response to detected threats. When a potential phishing attempt is recognized, these systems can initiate protocols to mitigate damage. This immediate action can prevent unauthorized access and protect sensitive data.

As the cyber threat landscape evolves, the role of technology continues to expand in importance. Therefore, organizations must remain vigilant and invest in cutting-edge tools and technologies to defend against whale phishing effectively.

Advanced technologies provide an essential layer of defense, offering organizations the ability to proactively address phishing threats before they escalate.

Future Trends in Whale Phishing

As organizations adapt to shifting digital landscapes, understanding the future trends in whale phishing becomes crucial. This section examines the anticipated evolution of tactics employed by cybercriminals, along with the regulatory responses that will shape the environment in which these threats manifest. Cybersecurity professionals must stay informed about these trends to effectively safeguard their organizations.

Predicted Tactics Evolution

The evolution of tactics used in whale phishing is influenced by advancements in technology and changes in organizational structures. Cybercriminals are likely to employ more sophisticated techniques to manipulate their targets. One potential trend is the increased use of artificial intelligence to craft highly personalized messages that leverage information from social media and other public sources. This could make phishing attempts even more convincing and difficult to detect.

Moreover, there is a possibility that cybercriminals will enhance their use of multi-channel attacks. For instance, a well-timed phone call following an email phishing attempt can raise the success rate of the attack. This combined approach could trick even the most vigilant employees into revealing sensitive information. Additionally, techniques like deepfakes could be used to impersonate executives or trusted contacts, further complicating detection efforts.

Organizations may also see an uptick in the use of business email compromise techniques that exploit supply chain vulnerabilities. Targeting interconnected networks allows attackers to gain access to multiple organizations, increasing their potential impact. Thus, organizations need to enhance their vigilance in monitoring communications across all channels.

Regulatory Responses

Regulatory bodies are beginning to take a more active role in combating whale phishing. One key response will be the introduction of more stringent data protection laws. These laws will likely require organizations to implement robust cybersecurity measures, including proactive monitoring and reporting of phishing incidents. Companies may face substantial penalties if they fail to adhere to these regulations, creating a strong incentive for compliance.

Furthermore, there may be a push for increased transparency in incident responses. Organizations could be mandated to disclose phishing attacks to stakeholders and the public. This transparency can help build trust but also places pressure on organizations to maintain high security standards to avoid reputational harm.

The future of whale phishing is not merely a technological battle; it also encompasses a legal and regulatory framework that organizations must navigate.

In addition, collaboration among private-sector companies, law enforcement, and regulatory agencies is likely to increase. Such partnerships can facilitate information sharing regarding new phishing techniques and trends, enabling organizations to prepare better. By working together, the community can enhance the overall security posture against whale phishing threats.

Epilogue

In the context of cybersecurity, the examination of whale phishing presents a critical understanding of a sophisticated threat that targets organizations. This article underscores the necessity of recognizing the implications such attacks can have on financial, reputational, and operational facets of a business. The conclusion aims to synthesize the essential insights gathered throughout the text, emphasizing the gravitas of being prepared and vigilant.

Summarizing Key Insights

Whale phishing is not merely a variation of traditional phishing; it possesses unique characteristics and implications that demand special attention. High-profile individuals within organizations are often targeted due to the sensitive information and access they hold. Furthermore, these attackers leverage complex social engineering tactics tailored to their victims, increasing their chances of success. The identification of distinguishing factors, and common tactics such as credential harvesting and business email compromise, reinforces the need for organizations to implement tailored security strategies.

  • Understanding Threats: Recognizing the specific nature of whale phishing helps in formulating effective defense mechanisms.
  • Preventive Measures: Training employees and enforcing technical controls can dramatically reduce the likelihood of a successful breach.
  • Response Strategies: Preparedness in incident response can mitigate potential damages when an attack occurs.

Final Thoughts on Cybersecurity Vigilance

Cybersecurity is not a one-time effort but an ongoing commitment. The landscape of cyber threats is ever-evolving, and whale phishing exemplifies the need for continuous vigilance. Organizations must remain aware of emerging tactics and trends to protect themselves from these targeted threats.

"Cybersecurity requires constant attention and adaptation to new threats that arise every day."

Moreover, fostering a culture of security awareness among employees is paramount. Routine training and simulations can enhance responsiveness against potential attacks. Furthermore, investing in advanced tools and technologies can fortify defenses and provide more robust threat detection capabilities. By prioritizing cybersecurity vigilance, organizations can better defend against whale phishing and safeguard their critical assets.

Innovative Technology Enhancing Remote Work
Innovative Technology Enhancing Remote Work
Explore the transformative potential of work-from-anywhere apps 🌐 Uncover the benefits like flexibility, productivity, and shaping the future of work culture 🚀
An illustration depicting the Gartner Magic Quadrant framework
An illustration depicting the Gartner Magic Quadrant framework
Dive into the 2021 Gartner Magic Quadrant Report, exploring insights on IT service providers and their impact on cybersecurity. 🛡️ Uncover trends & strategies! 📊
Conceptual visualization of a DDoS attack targeting telecommunications
Conceptual visualization of a DDoS attack targeting telecommunications
Explore the intricacies of DDoS attacks on T-Mobile, revealing vulnerabilities, historical incidents, and measures to boost network security. 🔒📞
Shield symbolizing cybersecurity measures
Shield symbolizing cybersecurity measures
Discover how Amazon AWS FedRAMP certification drives improvements in cybersecurity protocols. 🛡️ Gain insights into data security and compliance enhancements for organizations leveraging Amazon Web Services within FedRAMP parameters.