Framework

FedRAMP
authorisation, continuous monitoring, and ATO evidence

The Federal Risk and Authorization Management Program (FedRAMP) is the US federal cloud authorisation programme. Run FedRAMP assessments aligned to NIST SP 800-53 Rev. 5, manage the SSP, SAP, and SAR documents, track POA&M items, run monthly vulnerability scans, and produce evidence packs that 3PAOs and agency reviewers can act on.

No credit card required. Free plan available forever.

FedRAMP: a structured authorisation programme, not a one-off audit

The Federal Risk and Authorization Management Program (FedRAMP) is the United States federal government's standardised approach to security assessment, authorisation, and continuous monitoring for cloud products and services. FedRAMP was established in 2011 by the Office of Management and Budget and was codified into law by the FedRAMP Authorization Act in 2022. The programme is administered by the General Services Administration through the FedRAMP Program Management Office, with technical input from NIST and risk decisions owned by federal agencies.

FedRAMP's control catalogue is drawn from NIST SP 800-53 Rev. 5, with FedRAMP-specific parameter values and additional controls. If your team already understands SP 800-53, FedRAMP is largely about applying that catalogue to a defined cloud authorisation boundary, evidencing inheritance from the underlying infrastructure provider, and producing the SSP, SAP, SAR, POA&M, and continuous monitoring artefacts that the Joint Authorization Board or a sponsoring agency will review. For DoD contractors, FedRAMP Moderate equivalence under DFARS 252.204-7012 is the route by which a cloud service can carry CUI inside a CMMC 2.0 environment, which makes FedRAMP authorisation a prerequisite rather than an alternative for many Defense Industrial Base SaaS offerings.

Categorise the system before you scope the controls

FIPS 199 categorises an information system as Low, Moderate, or High impact based on the worst-case effect of a loss of confidentiality, integrity, or availability. FedRAMP publishes a baseline for each impact level. Confirm the impact level early, because every downstream artefact (SSP, SAP, scan scope, POA&M timeline, ConMon schedule) inherits the assumptions you set here. Misclassifying the system either creates excess control work or, worse, an authorisation that the sponsoring agency cannot accept.

Low impact

Reserved for cloud service offerings handling public information where loss of confidentiality, integrity, or availability would have a limited adverse effect on agency operations. The Low baseline is the smallest control set and is typical for public-facing informational systems and isolated test environments. Authorisation is generally faster, but the boundary still has to be documented and continuously monitored.

Moderate impact

Applied where loss would have a serious adverse effect. Most agency-facing SaaS, line-of-business applications, and supplier portals land at Moderate. The baseline adds significant access control, audit, configuration management, contingency planning, and incident response controls. Moderate is the most common authorisation level on the FedRAMP marketplace.

High impact

Applied where loss would have a severe or catastrophic effect. Used for systems supporting law enforcement, emergency services, financial systems with high transaction value, or workloads holding controlled unclassified information that requires the strongest baseline. The High baseline tightens cryptographic protection, separation of duties, monitoring, and continuous assessment.

Pick the authorisation path that matches the offering

Cloud service providers reach the FedRAMP marketplace through one of three routes. The review bar, timelines, and stakeholder set differ. Pick the path that matches the cloud service offering, the customer base, and the resourcing available, then plan the engagement accordingly.

Joint Authorization Board (JAB) Provisional Authorization (P-ATO)

The JAB issues a provisional authorisation that any agency can review and grant a downstream ATO from. The JAB pathway is competitive, takes longer, and is reserved for cloud services with broad federal demand. Closing under JAB requires the SSP, SAP, SAR, POA&M, and ConMon artefacts to meet the higher review bar.

Agency Authorization (Agency ATO)

An individual agency reviews the cloud service against its own mission needs and risk tolerance, then issues an ATO that other agencies can reuse. Agency ATO is the most common path. The cloud service provider works directly with the sponsoring agency and a 3PAO assessor through the SSP, SAP, SAR, and ATO letter sequence.

FedRAMP Tailored or 20x

FedRAMP has tailored streams for low impact Software-as-a-Service offerings and is rolling out FedRAMP 20x to streamline the authorisation process. Confirm the current FedRAMP requirements and process documentation before scoping, because the artefacts and timelines for these tracks differ from the traditional Low, Moderate, and High paths.

Documents the SSP package has to carry

The System Security Plan and its attachments are the working product of a FedRAMP engagement. They describe the authorisation boundary, the system architecture, the data flows, and the per-control implementation, and they form the input to the 3PAO Security Assessment Plan. Treat the SSP as a living document tied to the engagement, not a static Word file maintained out of band.

  • System Security Plan (SSP) describing the authorisation boundary, system architecture, data flows, and per-control implementation
  • Information System Contingency Plan (ISCP) covering recovery objectives, alternate processing, backup, and exercise records
  • Incident Response Plan with detection, analysis, containment, eradication, recovery, and post-incident review responsibilities
  • Configuration Management Plan with baseline configurations, change control, secure configuration settings, and least functionality
  • Customer Responsibility Matrix (CRM) detailing every shared, customer, or hybrid control the consumer must implement
  • Rules of Behavior covering acceptable use, privileged access, and personnel responsibilities for the authorised system
  • Privacy Impact Assessment (PIA) and Privacy Threshold Analysis (PTA) where personally identifiable information is processed
  • Digital Identity Acceptance Statement aligned to NIST SP 800-63 identity assurance, authentication, and federation levels

SAP, SAR, and how a 3PAO actually tests the controls

A FedRAMP-accredited Third Party Assessment Organization (3PAO) executes the assessment. The 3PAO produces the Security Assessment Plan (SAP) describing scope, methods, sampled components, schedule, and rules of engagement, then runs the testing programme: control examination, interviews, configuration reviews, vulnerability scans, and an annual penetration test of internet-facing components, web applications, and supporting infrastructure. The output is the Security Assessment Report (SAR), which records control test results, identified weaknesses, and the residual risk picture used by the authorising official. Track scope, sampled assets, control test results, and findings against the SAP so the SAR maps cleanly to the SSP.

The penetration test follows the FedRAMP Penetration Test Guidance and is treated as an engagement in its own right. Run it in the penetration testing workflow with scope, attack vectors, evidence, findings, and re-test linked to the engagement record so the report aligns to the SAR rather than living as a separate PDF.

Continuous monitoring on the FedRAMP cadence

FedRAMP authorisation is continuous. After the initial ATO, the cloud service provider runs an ongoing programme of vulnerability scans, control reviews, deviation handling, and significant change requests. Authorising officials review the monthly ConMon submission and can withdraw or condition the authorisation if the programme drifts. Build the cadence into the workflow rather than treating each cycle as a fresh project.

  • Monthly vulnerability scans on operating systems, web applications, and databases within the authorisation boundary
  • Authenticated scans against a representative sample of devices and applications, retained per scan window
  • Annual security control assessment by a 3PAO covering all controls in the relevant baseline
  • Annual penetration test of internet-facing components, web applications, and supporting infrastructure
  • Quarterly POA&M updates submitted to the authorising official and any agency consumers of the offering
  • Significant change request (SCR) review for boundary, technology, or service changes outside the standard release cycle
  • Continuous monitoring monthly summary covering scan results, deviations, and POA&M progress for the JAB or sponsoring agency

Pair the ConMon cadence with the continuous monitoring feature and the external scanning capability so each scan is linked back to the engagement, the asset list, and the control mapping it evidences. Authenticated coverage of internal applications and APIs comes from the authenticated scanning workflow.

POA&M, deviation requests, and significant change requests

The Plan of Action and Milestones is the operational artefact authorising officials and agency reviewers come back to first. Every weakness found during an assessment, scan, or ConMon cycle should produce a POA&M item with a planned fix, target date, and owner. Apply the FedRAMP remediation timelines (30 days for High, 90 days for Moderate, 180 days for Low) explicitly and track schedule slippage rather than letting it accumulate quietly.

  • Open a POA&M item the moment a control is Other than Satisfied or a confirmed vulnerability is identified
  • Capture the affected control, weakness, asset scope, severity, source (scan, assessment, audit), and the responsible owner
  • Apply the FedRAMP remediation timelines: 30 days for High, 90 days for Moderate, 180 days for Low risk findings
  • Record planned remediation steps, milestones, target completion date, and the resources required
  • Link supporting evidence (scanner output, configuration excerpt, screenshot, ticket reference) directly to the POA&M item
  • Track schedule slippage explicitly: original date, current date, reason for change, and approving authority decision
  • Use deviation requests when a finding qualifies as a risk adjustment, false positive, or operational requirement, with rationale
  • Close the item only after re-test evidence is captured and tied back to the original finding and control mapping

SecPortal's findings management is built around the same model: a finding has severity, an owner, a control mapping, and a remediation timeline, with re-test evidence captured before closure. Treat the POA&M as a live view of open findings, not a quarterly export.

Where SecPortal fits in the FedRAMP workflow

SecPortal is the operating layer for the assessment, not a replacement for the 3PAO, authorising official, or FedRAMP PMO. The platform handles scope, scans, findings, control mapping, POA&M tracking, and the assessor-ready output, so the engagement runs as a structured workflow rather than a long email thread.

  • Compliance tracking that maps every finding to the FedRAMP baseline alongside NIST SP 800-53, SOC 2, ISO 27001, and PCI DSS for systems carrying multiple authorisations
  • Findings management with CVSS 3.1 scoring, 300+ templates, Nessus and Burp Suite imports so existing 3PAO scanner output can flow into the workflow
  • External scanning across 16 modules covering CVE correlation, exposed services, weak TLS, and outdated software for boundary and SC family evidence
  • Authenticated scanning across 17 modules running behind login or with stored credentials for CM, IA, and SI family evidence on web applications and APIs
  • Continuous monitoring with scheduled monthly scans and trend tracking aligned to the FedRAMP ConMon cadence
  • Engagement management for the annual control assessment and annual penetration test, with scope, sampled assets, and re-test linked to the engagement record
  • AI report generation that turns control results, findings, and remediation actions into an assessor-ready narrative with executive summary, technical detail, and remediation roadmap

Adjacent frameworks the same evidence can serve

FedRAMP rarely sits alone. Cloud service providers selling into the federal market often carry a parallel SOC 2 Type II for commercial customers and an ISO 27001 certificate for international ones. The control evidence captured for FedRAMP, including authenticated scan output, configuration management records, audit logs, and incident response artefacts, can serve all three regimes when the underlying records are tied to a single engagement and control library. Map the same findings to SOC 2, ISO 27001, and the NIST Cybersecurity Framework to avoid rewriting the same control narrative for each audit.

Threat-informed test evidence strengthens the SAR narrative without changing the underlying assessment workflow. The MITRE ATT&CK framework page covers how to tag findings by tactic and technique, which sharpens the RA-3, RA-5, and IR-4 evidence trail and gives the authorising official a clearer picture of how an adversary would exploit the residual risk.

For 3PAOs, advisory firms, and managed service providers running FedRAMP engagements across multiple cloud service offerings, the security consultants workspace bundles the workflow with branded client portals and AI report generation, so the deliverable looks as polished as the work behind it. Regulated entities operating across the EU often pair FedRAMP with the DORA framework and the NIS2 Directive, sharing control evidence across regimes rather than producing a fresh evidence pack for every audit.

Pentest firms whose practice is concentrated on federal civilian, DoD, and defense industrial base contractor clients can read the SecPortal for government penetration testing firms page for the FedRAMP, CMMC, and NIST 800-171 aligned operating model, including finding-to-control tagging, branded delivery scoped per assessed entity, and the retest chain a continuous-monitoring reviewer expects to walk through.

Key control areas

SecPortal helps you track and manage compliance across these domains.

Boundary, categorisation, and impact level

Confirm the FIPS 199 categorisation (Low, Moderate, or High) for the cloud service offering before scoping controls. Document the authorisation boundary, the system architecture, the data flows, and external service dependencies. The boundary diagram and data inventory drive every control decision and every continuous monitoring scope thereafter.

Baseline selection and control tailoring

FedRAMP publishes Low, Moderate, and High baselines drawn from NIST SP 800-53 Rev. 5 with FedRAMP-specific parameters and additional controls. Tailor responsibly: capture inheritance from the underlying IaaS/PaaS provider, document customer responsibilities in the customer responsibility matrix, and record every parameter selection and compensating control with rationale that survives reauthorisation.

System Security Plan (SSP) and supporting attachments

The SSP describes how every applicable control is implemented for the cloud service offering. Track the SSP alongside attachments such as the Information System Contingency Plan, Incident Response Plan, Configuration Management Plan, Privacy Impact Assessment, Rules of Behavior, and the digital identity acceptance statement. Keep these documents linked to the engagement so the next 3PAO assessment is a refresh rather than a rebuild.

Assessment workflow: SAP, testing, and SAR

A 3PAO produces the Security Assessment Plan (SAP), executes control testing including vulnerability scans, configuration reviews, and an annual penetration test, then issues the Security Assessment Report (SAR). Track scope, methods, sampled assets, control test results, and findings against the SAP so the SAR maps cleanly to the SSP and supports the authorisation decision.

Continuous monitoring (ConMon) on the FedRAMP cadence

FedRAMP requires monthly vulnerability scans on operating systems, web applications, and databases inside the boundary, an annual control assessment, and an annual penetration test. Schedule recurring authenticated and external scans, retain raw output per scan window, and feed deviations into the POA&M with the FedRAMP remediation timelines (30 days for high, 90 days for moderate, 180 days for low) tracked explicitly.

POA&M, deviation requests, and significant change requests

Open a POA&M item the moment a control is Other than Satisfied or a vulnerability is confirmed. Track operational requirements, deviation requests (risk adjustment, false positive, operational requirement), and significant change requests with the supporting evidence and the JAB or agency reviewer decision attached to the record so the audit trail holds up at reauthorisation.

Run a defensible FedRAMP programme without spreadsheet sprawl

Track baselines, ConMon scans, POA&M items, and 3PAO evidence in one workflow. Start free.

No credit card required. Free plan available forever.