David Wolf · Portfolio Use Case
A control-architecture and evidence-readiness effort translating FedRAMP Moderate requirements into policy, standards, technical controls, operational procedures, and audit-ready proof.
Supported Cornerstone's FedRAMP Moderate authorization effort by helping turn formal control requirements into security policies, standards, guidelines, technical-control architecture, ownership models, procedures, and evidence that could support assessment, authorization, customer trust, and continuous security operations.

Client
Cornerstone OnDemand
Engagement Type
Full-Time or role-based contribution; exact title and dates should be confirmed from resume/Profile source
Period
Career Role; exact dates should be confirmed
Role
Security / Product Security / Compliance Engineering Contributor
Focus Areas
FedRAMP Moderate ATO, Control Evidence, NIST 800-53
The Context
FedRAMP Moderate authorization requires a working control system, not a binder of policy language. Policies, standards, procedures, architecture, monitoring, ownership, and evidence have to describe the same reality.
The Challenge
The challenge was traceability. A requirement must map to a control. A control must map to an owner. An owner must operate a procedure. The procedure must produce evidence. The evidence must support assessment and continuous monitoring.
What I Did
The Outcome
The project created practical experience in building controls that survive assessment. That same lesson now applies directly to AI governance: controls must be real, owned, testable, evidenced, and reviewable.
FedRAMP
Moderate ATO-related control evidence work for an enterprise SaaS environment
To
Security policies, standards, guidelines, procedural documentation, technical-control architecture, and evidence-readiness patterns
Across
Security, engineering, operations, compliance, and audit-support concerns
Reusable
Experience translating NIST/FedRAMP-style controls into practical implementation and evidence workflows
Key Deliverables
Collaboration
Worked across security, engineering, operations, compliance, audit-facing stakeholders, and leadership contexts to align FedRAMP requirements with practical controls, operating procedures, and evidence that could support authorization.
Client
Cornerstone OnDemand
Engagement Type
Full-Time or role-based contribution; exact title and dates should be confirmed from resume/Profile source
Period
Career Role; exact dates should be confirmed
Role
Security / Product Security / Compliance Engineering Contributor
Focus Areas
FedRAMP Moderate ATO, Control Evidence, NIST 800-53
The Context
FedRAMP Moderate authorization requires a working control system, not a binder of policy language. Policies, standards, procedures, architecture, monitoring, ownership, and evidence have to describe the same reality.
The Challenge
The challenge was traceability. A requirement must map to a control. A control must map to an owner. An owner must operate a procedure. The procedure must produce evidence. The evidence must support assessment and continuous monitoring.
What I Did
The Outcome
The project created practical experience in building controls that survive assessment. That same lesson now applies directly to AI governance: controls must be real, owned, testable, evidenced, and reviewable.
FedRAMP
Moderate ATO-related control evidence work for an enterprise SaaS environment
To
Security policies, standards, guidelines, procedural documentation, technical-control architecture, and evidence-readiness patterns
Across
Security, engineering, operations, compliance, and audit-support concerns
Reusable
Experience translating NIST/FedRAMP-style controls into practical implementation and evidence workflows
Key Deliverables
Collaboration
Worked across security, engineering, operations, compliance, audit-facing stakeholders, and leadership contexts to align FedRAMP requirements with practical controls, operating procedures, and evidence that could support authorization.
At a Glance
Focus Areas
Tools & Technologies
Evidence & Artifacts
Public-Safe Caveat
This case study uses public-safe language around Cornerstone FedRAMP Moderate ATO support. Exact control IDs, system boundaries, SSP details, internal architecture, assessment evidence, proprietary policies, audit records, customer details, and non-public implementation specifics are intentionally omitted.
David Wolf
AI Security · Product Security · Security Leadership
Based on analyzed public signals, not proof of any individual's or company's internal state.