Shared Responsibility Model
Version 1.5
In the Procore for Government (PfG) environment, the responsibility for security operates under a clear Shared Responsibility Model that aligns with FedRAMP Moderate requirements. Procore, as the Cloud Services Provider (CSP), operates at the SaaS layer, inheriting security controls for the underlying infrastructure from AWS GovCloud.
The customer (agency or contractors) retains sole responsibility for managing everything above the platform layer. This includes authorizing user access, enforcing mandatory mobile device policies, configuring their Identity Provider (IdP) for Multi-Factor Authentication (MFA), and auditing user accounts against their own organizational compliance requirements. Both parties must actively collaborate and follow defined protocols to ensure the confidentiality, integrity, and availability of federal information.
To ensure you have the most comprehensive and up-to-date security information and guidance tailored to your specific system implementation, please contact your PfG Account team.
Access Control Family (AC)
Customer Responsibility | Procore Responsibility | ||
|---|---|---|---|
AC-2(a), AC-2(b), AC-2(c), AC-2(d), AC-2(e), AC-2(f), AC-2(g), AC-2(h), AC-2(i), AC-2(j), AC-2(k), AC-2(l) | Account Management | The customer is exclusively responsible for Company Account Management within PfG. Upon signing a contract, the customer must create an account using an email address and appoint an Administrator. Access to PfG is tightly controlled through customer-defined user groups, which are composed of fine-grained permissions (e.g., hiring manager, recruiter, administrator groups).
| Create and manage system-level accounts (admin, service, maintenance); enforce least privilege and disable inactive accounts; integrate with IdP where applicable. |
AC-2(1), AC-2(4), AC-2(5), AC-2(7)(a), AC-2(7)(b), AC-2(7)(c), AC-2(7)(d), AC-2(9), AC-2(12)(a), AC-2(13) | Account Management | The customer holds the sole responsibility for the lifecycle and security management of all PfG user accounts within their tenancy, adhering to their organization's policies.
| Manage the underlying infrastructure, operating system, and security configurations required to support customer accounts, including system-level resource allocation and protection. This ensures the foundational platform is secure and available for the customer to perform all mandated user-level account administration and access enforcement. |
AC-3 | Access Enforcement | The customer is responsible for establishing and maintaining the logical access policy, defining user roles and privileges (like ensuring least privilege and separation of duties), and actively assigning and managing those roles to the personnel. | Implement role-based access controls (RBAC) on Procore systems; enforce policy through IAM, console permissions, and MFA; verify access prior to granting privileges. |
AC-5(a), AC-5(b) | Separation of Duties | The customer is responsible for defining and documenting Separation of Duties (SoD) for individuals authorized to access the PfG application within their organization. Access control is implemented by the customer through custom roles designed to ensure SoD is enforced. | Assign distinct roles for system administration, security operations, and compliance; enforce through IAM group policies. |
AC-6 | Least Privilege | It is the customer's responsibility to define PfG access authorizations to support the principle of least privilege within their organization. | Restrict Procore staff access to only the resources required for operational duties; regularly review elevated privileges; enforce just-in-time access for sensitive actions. |
AC-8(a), AC-8(b) | System Use Notification | When using identity federation and Single Sign-On (SSO) to log into PfG, the customer is responsible for ensuring that their Lightweight Directory Access Protocols (LDAP) and/or Active Directory (AD) systems display a compliant system use notification message or banner. Furthermore, the customer must ensure the notification message or banner meets FedRAMP requirements and remains on screen until users acknowledge the usage conditions and take explicit action to log on or further access the system. | Display login banners on Procore systems notifying of authorized use only, per FedRAMP and agency guidance. |
AC-19(a), AC-19(b), AC-19(5) | Access Control for Mobile Devices | For the Procore for Government Mobile App, the customer bears responsibility for enforcing all mobile device policies (including those applicable to their subcontractors) to ensure responsible use. | |
CA-6(a), CA-6(b), CA-6(c), CA-6(d), CA-6(e) | Authorization | The federal customer, or agency, operating within the Procore for Government environment holds the final responsibility for Authorizing System Operation.
| Obtain and Maintain FedRAMP ATO. Ensure the SSP, SAP, SAR, and POA&M remain current; notify the PMO and AO of significant changes or incidents. |
Identification and Authentication Family (IA)
Customer Responsibility | Procore Responsibility | ||
|---|---|---|---|
IA-2(1), IA-2(12) | Identification and Authentication (Organizational Users) | The customer is responsible for selecting an Identity Provider (IdP) that supports Multi-Factor Authentication (MFA), including support for hardware-based smartcards like the Personal Identity Verification (PIV) card or Common Access Card (CAC). Agency customers who are required to use these hardware smartcards are responsible for integrating the PIV card or CAC with the Procore for Government environment, typically by using identity federation through SAML (Security Assertion Markup Language) with their Single Sign-On (SSO) capability. | Develop, document, and maintain policies for managing user identities, credentials, and authentication mechanisms for all Procore-managed components. |
IA-4(a), IA-4(b), IA-4(c), IA-4(d) | Identifier Management | The customer is responsible for approving access before provisioning unique user IDs to its user base. Specifically, the customer must ensure that user IDs are assigned to individuals in a secure manner and are prevented from being reused for at least two years. | Approve, assign, and manage unique user identifiers for all Procore staff; ensure timely deactivation upon termination or role change; maintain account lifecycle records. |
IA-5(a), IA-5(b), IA-5(d), IA-5(f), IA-5(g), IA-5(h), IA-5(i), IA-5(1)(a), IA-5(1)(b), IA-5(1)(c), IA-5(1)(d), IA-5(1)(e), IA-5(1)(f), IA-5(1)(g), IA-5(1)(h), IA-5(6) | Authenticator Management | The customer is responsible for approving access before provisioning unique user IDs to its user base. Specifically, the customer must ensure that user IDs are assigned to individuals in a secure manner and are prevented from being reused for at least two years.
| Enforce password and credential complexity, history, expiration, and storage requirements (e.g., NIST SP 800-63B). Protect keys and certificates; rotate service account credentials regularly. |
IA-8, IA-8(1), IA-8(2)(a), IA-8(2)(b), IA-8(4) | Authenticator Feedback | Customers are responsible for ensuring that passwords are obfuscated during the authentication process to protect the information from possible exploitation or use by unauthorized individuals. | Prevent disclosure of authentication information (e.g., avoid "invalid username" messages). |
IA-8, IA-8(1), IA-8(2)(a), IA-8(2)(b), IA-8(4) | Identification and Authentication (Non-Organizational Users) | The customer is responsible for integrating the Procore for Government accounts with their agency's Single Sign-On (SSO) capability using their Identity Provider's (IdP) identity federation. For agency customers mandated to use a hardware-based smartcard, the system supports integrating this card (such as a PIV card or CAC) with SSO through SAML identity federation. The customer holds the responsibility for successfully completing the integration of the PIV card or CAC with the Procore for Government environment. | |
IA-11 | Re-authentication | Customers are responsible for configuring their Identity Provider (IdP) to ensure users are re-authenticated following periods of inactivity and to strictly enforce mandatory session timeouts as required by security policy. |
Incident Reporting Family (IR)
Customer Responsibility | Procore Responsibility | ||
|---|---|---|---|
IR-6(a), IR-6(b) | Incident Reporting | The customer is responsible for reporting all suspected security incidents or system events to Procore via email at security@procore.com. | Report incidents to FedRAMP PMO, AO, and impacted customers within 1 hour or confirmation per FedRAMP guidance. Submit follow-up reports (24 hr, 3 day, 30 day). DoD reporting within 72 hours. |
IR-9(b) | Information Spillage | Customers are responsible for identifying the specific information involved in the information system contamination and for notifying Procore of potential information spillage within their tenant environment via established communication methods within the cloud service agreements. | Maintain documented spillage response procedures (e.g., handling CUI/PII); immediatly isolate and sanitize affected systems. |
Risk Assessment Family (RA)
Customer Responsibility | Procore Responsibility | ||
|---|---|---|---|
RA-2(c) | Security Categorization | Each government customer utilizing the PfG system is responsible for designating an AO. The AO must review the SSP, which includes the determined security categorization, as part of the FedRAMP package for the PfG system and authorize the system for their organization's use. |
System & Services Acquisition Family (SA)
Customer Responsibility | Procore Responsibility | ||
|---|---|---|---|
SA-4(10) | Acquisition Process | Customers can integrate PfG with their SSO through SAML 2.0. Customers are responsible for using only PIV or CAC credentials that are on the FIPS 201-approved product list. |