RFC-0019: Reporting Assessment Costs #109
Replies: 29 comments 18 replies
-
Comment on RFC-0019: Reporting Assessment CostsI support FedRAMP's effort to meet its statutory mandate under the FedRAMP Authorization Act to understand assessment costs. Cost transparency is essential for identifying barriers to entry and measuring the impact of modernization efforts. However, the proposed requirements raise several concerns that warrant refinement. On Data Sensitivity and FOIA ExposureWhile LAC-FRX-IDS and PVA-GEN-IDS commit FedRAMP to not voluntarily sharing identified cost data, this does not insulate the data from FOIA requests. Cost data submitted to a federal agency is generally presumed to be agency records subject to FOIA, with narrow exemptions (e.g., Exemption 4 for confidential commercial information). The RFC should clarify:
Without these assurances, CSPs and 3PAOs may rationally underreport or structure engagements to obscure true costs. On Historical Cost Reporting (LAC-GEN-HAC)Requiring historical costs "dating back to the initial authorization" is problematic for long-tenured authorizations. CSPs authorized 5+ years ago may lack detailed records, and cost structures have changed dramatically (different 3PAO, different scope, pre-Rev5 baselines). The requirement to estimate and the limitation to "total costs per year" for pre-effective assessments is reasonable, but consider:
A 6-month revocation for failure to produce potentially unrecoverable historical data is disproportionate. On Corrective Action SeverityThe corrective actions are notably severe:
These penalties exceed those for some security-related deficiencies. A CSP that fails to report assessment costs faces harsher consequences than one with unresolved POA&M items. Recommend recalibrating:
On Assessor Attestation (LAC-GEN-ASA)Requiring 3PAO attestation that CSP-reported costs are "accurate" places assessors in an uncomfortable position. 3PAOs have visibility into their own invoices but may not have full insight into:
Suggest narrowing the attestation scope to: "The independent assessor attests that the assessment services costs attributed to [3PAO name] are accurate to the best of their knowledge." On Cost Data ScopeThe proposed fields focus on direct assessment costs but omit significant cost drivers:
If the goal is to understand true cost-to-authorize, consider either expanding the scope or explicitly noting that reported costs represent a subset of total authorization investment. On 20x vs. Rev5 Structural DifferencesThe 20x requirements (PVA-GEN-*) are lighter-touch and better aligned with the continuous nature of 20x. The Rev5 requirements, by contrast, treat cost reporting as a discrete annual event with significant punitive consequences. Consider whether the 20x model—ongoing updates every six months with proportionate corrective actions—should be the unified approach across both paths. |
Beta Was this translation helpful? Give feedback.
-
|
3PAO should be submitting assessment costs not CSPs
|
Beta Was this translation helpful? Give feedback.
-
|
The cost of the 3PAO assessment is just a drop in the bucket for some CSPs when it comes to how much they must spend to become FedRAMP-certified. Even the most security-minded CSP can spend millions of $$ to switch tools and cloud services because the ones they use for their commercial solution don't meet all FedRAMP requirements, especially FIPS and FedRAMP-only cloud services. So I would suggest FedRAMP collect assessment costs from 3PAOs and "upgrade" costs from CSPs. Also, suggest adding the cost of out-of-cycle SCR assessments for Rev 5 systems if agencies continue to require separate assessments for significant changes. |
Beta Was this translation helpful? Give feedback.
-
|
I fully support these changes. Shopping for a FedRAMP assessment should be like buying a TV, not used car shopping. |
Beta Was this translation helpful? Give feedback.
-
|
If I look at this from the angle of a CSPs experience I observe that a 3PAO prices an engagement based on scope complexity, their own risk tolerance for findings they might inherit, and where they want to position in the market. Some assessors charge more because they go deeper. Some charge less because they've templated their approach. That differentiation is how CSPs find the right fit and it's reflected in what they pay. Now FedRAMP collects all of that. Even with LAC-FRX-IDS protections, once you segment "average cost for High initial assessment" across 48 recognized assessors, fewer actively taking new work, the numbers start to mean something. A 3PAO can back into where they sit. A CSP procurement office can wave a benchmark at a vendor and ask why they're above the mean. The RFC explains collection but not use. If the data sits in a drawer to satisfy the statutory "review" requirement, the compliance burden seems disproportionate. If it gets published as benchmarks, that's a different policy choice with real market effects and one worth discussing explicitly rather than discovering later. I'm not suggesting the intent is price regulation. But when cost becomes a tracked metric, there's gravity toward the middle. The 3PAO charging a premium for thoroughness feels pressure to justify it. The one differentiating on speed gets questioned on quality. The market flattens. What's the intended use of this data once collected? |
Beta Was this translation helpful? Give feedback.
-
|
I concur with what others have already shared above. In addition, some other observations as well. Gap #1 Gap #2 Gap #3 Gap #4 Gap #5 Gap #6 Gap #7 Gap #8 |
Beta Was this translation helpful? Give feedback.
-
|
I do not see the point in this RFC. I was told this was mandatory to get this info from CSPs and 3PAOs, but it is not. In the M-24-15 it only puts that burden on the agency from what I read on page 18 under "d. Agencies --- 8) Report costs related to the issuance of FedRAMP authorizations, in accordance with OMB budget guidance;" Scrap this and redo it so agencies report this info to you. |
Beta Was this translation helpful? Give feedback.
-
Everything else is fantastic! Great work PMO! |
Beta Was this translation helpful? Give feedback.
-
|
Overall, I support increased transparency around the costs associated with FedRAMP assessments. Currently, service fees vary significantly among 3PAOs, leaving stakeholders uncertain about what others are paying and the quality of their assessments. However, I am skeptical that cost submissions from CSPs alone will provide meaningful insights, as costs can vary widely depending on factors such as product type, CSP organization size, and whether significant changes are tested during the assessment or off-cycle. I also agree with previous comments that obtaining historical assessment cost data may be challenging, especially for CSPs with authorizations dating back several years and with staffing changes over time. Additionally, costs from assessments conducted five or more years ago may not be a reliable benchmark due to evolving FedRAMP requirements and changes in 3PAO availability. While there are additional costs associated with maintaining a FedRAMP authorization—as noted earlier—capturing those comprehensively would require more effort. Ultimately, the greatest value of reporting assessment costs lies in enhancing pricing transparency to support contract negotiations and internal budgeting. The best source of this information may come from a regular solicitation of bids for the assessment. |
Beta Was this translation helpful? Give feedback.
-
|
I particularly agree with specific issues identified by rgutwein and vedigaurav. kcarr91 also provides a great rationale the 3PAO should be submitting the data, rather than CSPs. Therefore, my suggestion is specify only the cost to contract with the 3PAO. In which case, as kcarr91 stated, the data should be provided by the 3PAO, not the CSP. That would reverse LAC-GEN-ASA to "Independant assessors MUST submit a signed attestation from their CSP that confirms the information submitted per LAC-GEN-IAC and LAC-GEN-OAC are accurate." I presume "Beginning and end dates of the annual assessment" would be between Charter date and Submission to MAX.gov. But that is not clearly defined. Does every 3PAO get to choose which dates begin and end the annual assessment? LAC-GEN-HAC will be impossible for CSOs that were purchased from one CSP to another. The data would only be available to the initial CSP, if the data has not been deleted. The 3PAO may not share the previous costs with the purchaser of the CSO, nor should they. Since the nature of the industry includes mergers and acquisitions, the requirement as currently stated is problematic. I also agree with rgutwein that the Corrective Actions are severe and worse than security issues. The process cannot have an effective date of 1AM ET on March 25, 2026, as the RFC will not closed public comment until Feb 12, 2026 and it is not yet published. Given historical publish times for FedRAMP, this is way too fast to evaluate this github comment thread and resolve all issues. |
Beta Was this translation helpful? Give feedback.
-
|
Curious to see how the proposed appendix to the SAR denoting costs will defer between annual assessments and significant change assessments. Of course, there are changes coming to significant change processes with the SCN balance improvement and 20x requirements; however, ensuring there is clear distinction between annual assessments and significant change assessments, particularly with regards to historical costs, will be vital to providing the PMO with proper cost insights. |
Beta Was this translation helpful? Give feedback.
-
|
There are many types of costs that go into FedRAMP. My assumption is that FedRAMP would like to focus purely on 3PAO assessment costs, not system, advisory, or compliance costs. Rev5 Security Assessment Report (SAR) Costs Appendix #5: If a vendor is assisting with the assessment, the total hours should include the time the vendor spends on the assessment as well, but not the time that the assessor spends on the assessment (unless it is desired to track this separately). While I would like a way to determine the difference between a public cloud mega-offerings' data and startup niche offerings' data, I believe respecting the anonymity and the simplicity of this form does not justify such granularity. Users of the data gathered from this process, however, should keep in mind the vast differences in the various CSOs. Adding a disclaimer to this effect will orient those less experienced in FedRAMP to make sense of the numbers. |
Beta Was this translation helpful? Give feedback.
-
Feedback: Cost Reporting and Assessment TransparencyThank you for RFC-0019 addressing cost transparency in FedRAMP assessments. I support the goal of enabling federal agencies to make informed procurement decisions based on assessment cost data. However, I have identified several implementation gaps that require PMO guidance before March 25, 2026 (mandate date). Critical Issue #1: FOIA Disclosure Liability — Legal Safe Harbor RequiredProblem: RFC-0019 requires CSP cost data to be published to the FedRAMP Marketplace. However, CSPs will likely claim this information is confidential commercial data protected under FOIA Exemption 4 (5 U.S.C. § 552(b)(4)). This also raises Paperwork Reduction Act (44 U.S.C. § 3501 et seq.) considerations if the new reporting requirements are not supported by a clear burden justification and approval pathway. Conflict Identified:
Potential Agency Impact: Recommendation to FedRAMP PMO:
Success Criteria: Agencies should be able to cite FedRAMP/DOJ guidance stating "RFC-0019 cost publishing does not waive FOIA protections" OR "RFC-0019 cost data is considered public record, FOIA Exemption 4 does not apply" Issue #2: Cost Reporting Scope — 3PAO Pricing Transparency vs. Costs to ComplyProblem: RFC-0019 scope is ambiguous on what "cost" means:
RFC-0019 Reality: The RFC appears to focus on 3PAO assessment fees (Option B), but agencies need Option A (CSP compliance cost) and Option C (federal procurement cost) to make informed decisions. Agency Context Feedback:
Recommendation to FedRAMP PMO:
Specify how to handle: shared costs, multi-year contracts, continuous monitoring cost, updated assessment cost (if system changes). Issue #3: Race-to-Bottom Prevention — Minimum Quality Standards for Budget CSPsProblem: Cost transparency creates incentive for CSPs to undercut each other on assessment/compliance cost. Low-cost assessments may correlate with low-quality assessments, creating federal risk. RFC-0019 Concern: If 3PAO assessment cost becomes the metric for selecting assessors, agencies may select low-cost, low-quality 3PAOs to reduce federal expenditure. This shifts federal risk from CSP to customer. Agency Experience: I've seen this in other federal procurements (lowest-cost contractors often deliver lowest-quality audits). Recommendation to FedRAMP PMO:
This prevents agencies from equating "cheap" with "good." Issue #4: Cost Data Stale-Aging GuidanceProblem: CSP and 3PAO costs change annually. RFC-0019 doesn't specify:
Recommendation to FedRAMP PMO:
Implementation ReadinessBy March 25 Deadline, FedRAMP PMO should publish:
CFO/Budget Questions for Agencies:
ClosingI support RFC-0019's transparency goal. With the above guidance clarifications, cost data will enable better federal procurement decisions while protecting CSPs from unfair FOIA disclosure liability. I recommend fast-tracking DOJ consultation on Exemption 4 interpretation. Submitted by: Trevor Lowing (private citizen, personal capacity) |
Beta Was this translation helpful? Give feedback.
-
|
The Cloud Service Providers – Advisory Board submits the following comments: Regarding the Rev5 Security Assessment Report (SAR) Costs Appendix: These seem like important metrics for the FedRAMP program to track but caution that FedRAMP should weigh the effort for CSPs to produce these metrics against the value to agency customers. For example, do individual agencies care about the cost of assessments for CSPs? We recommend this be a separate form completed and submitted at the time of the SAR but not an appendix. It is also important to understand how FedRAMP will normalize the size and complexity of systems to make cost information able to be analyzed to provide FedRAMP useful information about the financial state of the marketplace. Additional clarification from FedRAMP is needed here and/or in section FRX-IDS. Specifically, FedRAMP should clearly define that this SAR Cost Appendix will be separate from the rest of the SAR and only be shared between FedRAMP and CSPs unless necessary to meet a legal requirement. Regarding LAC-GEN-IAC Initial Authorization Costs - Providers MUST submit a complete Security Assessment Report Costs Appendix directly to FedRAMP during initial authorization: CSP-AB understands FedRAMP’s statutory requirement to review costs associated with independent assessment services. However, the cost associated with independent assessments for initial authorization may vary depending on several factors, including size and complexity of a system. CSP-AB feels strongly that CSPs should NOT be sharing costs from other 3PAO providers. Instead, FedRAMP should require 3PAOs to share their pricing structure which would better allow FedRAMP and its stakeholders to receive standardized information on the cost of assessments. Regarding LAC-GEN-IAC Initial Authorization Costs Corrective Action – Failure to meet this requirement will result in denial of authorization and a 3 month resubmission penalty: This corrective action is way too harsh given that this data has no impact on security. There should be a different enforcement mechanism or public note about the lack of this information from a CSP. Regarding LAC-GEN-HAC Historical Assessment Costs – Providers MUST include historical assessment costs dating back to the initial authorization of the cloud service offering; data submitted for assessments prior to this process taking effect may be estimated and limited to total costs per year. There should be a reasonable time frame for the historical data. For long standing CSPs this information might not be available. Reasonable timelines in line with data retention policies should be used for timeframes. It should also be clear that CSPs are not sharing information between different 3PAOs. Regarding LAC-GEN-ASA Assessor Signed Attestation – Providers MUST submit a signed attestation from their independent assessor that confirms the information submitted per LAC-GEN-IAC and LAC-GEN-OAC are accurate. For CSPs who have switched 3PAOs, this requirement must only apply to the current 3PAO assessment. It might not be possible to get this information and confirmation from older assessments. FedRAMP should clarify what the expectation is and ensure the enforcement of not sharing data between 3PAO providers. |
Beta Was this translation helpful? Give feedback.
-
|
I do not believe this requirement should be imposed as written. If it proceeds, I would suggest the following changes:
|
Beta Was this translation helpful? Give feedback.
-
|
Microsoft offers the feedback outlined below: Issue #1: Recommendation: Rationale: Issue #2: Recommendation: Rationale: |
Beta Was this translation helpful? Give feedback.
-
|
My feedback for: Asymmetric Negotiating Power Through Cost Transparency Disproportionate Reputational Impact of Public Notifications Administrative Burden Falls Harder on Smaller Teams We urge FedRAMP to consider the following modifications to ensure these RFCs do not inadvertently favor large incumbents: For RFC-0019 (Cost Reporting):
|
Beta Was this translation helpful? Give feedback.
-
|
RFC-0019 Comment, Cost Appendix Structure and Definitions (Rev5 and 20x) [Comment 1] Thank you for publishing RFC-0019. I support the statutory goal of improving FedRAMP visibility into the costs of independent assessment services. Several themes below have been raised by other commenters (including cost data sensitivity, historical lookback, and clarity on what counts as assessment cost). I am adding implementation-focused suggestions that aim to keep the requirement minimal, consistent, and enforceable.
Personal capacity note: This comment is submitted in an individual capacity and does not represent any employer or organization. Matthew S. Graham, CISSP |
Beta Was this translation helpful? Give feedback.
-
|
RFC-0019 Comment, Assessor Attestation, Dispute Pause, and Corrective Actions [Comment 2] Thank you for publishing RFC-0019. I support improved visibility into assessment services costs, but the assessor attestation and dispute mechanics need additional precision to avoid unintended liability and operational deadlocks. Several points below align with themes already raised by other commenters (including attestation scope limits, feasibility for historical costs, and proportional enforcement). I am adding specific decision rules and wording options.
Personal capacity note: This comment is submitted in an individual capacity and does not represent any employer or organization. Matthew S. Graham, CISSP |
Beta Was this translation helpful? Give feedback.
-
|
RFC-0019 Comment, Acceptable Evidence, Historical Reporting, and Record Retention [Comment 3] Thank you for publishing RFC-0019. The RFC will collect sensitive and potentially hard-to-reconstruct information. To keep reporting consistent and reduce disputes, it would help to define acceptable evidence and provide practical limits for historical reporting. Several themes below have been raised by other commenters (including lookback feasibility, multi-vendor scenarios, and privacy risk). I am adding concrete, minimal-burden evidence expectations.
Personal capacity note: This comment is submitted in an individual capacity and does not represent any employer or organization. Matthew S. Graham, CISSP |
Beta Was this translation helpful? Give feedback.
-
|
Thank you to the FedRAMP PMO for issuing this RFC and for continuing to seek community input. BLUF: OMB M-24-15 appears focused on agencies reporting “costs related to the issuance of FedRAMP authorizations.” This RFC, however, seems to focus primarily on CSP assessment costs, which feels somewhat tangential to that directive. While the FedRAMP Authorization Act references “costs incurred by agencies and cloud service providers related to issuance of FedRAMP authorizations,” there is significant room for interpretation regarding what specific costs should be reported and why. Concerns with Current RFC1. Total Cost vs. Assessment CostCSPs have highly variable and proprietary cost drivers (internal engineering, architecture, operations, tooling, advisory support, etc.) that should remain out of scope. These costs are not standardized and are not comparable across providers. 2. Corrective ActionsIssuing corrective action for CSP not reporting total costs seems excessive. This data does not materially impact the security posture of the CSO. A CSP’s decision not to report (total) cost information does not create a security risk, nor does it prevent an agency from making a risk-based authorization decision. 3. Historical Assessment CostsRequiring historical cost reporting may not be a good use of time. This could be quite burdensome and detract CSPs other high priority items (e.g., Rev5 BIRs, transitioning to 20x,etc.). Its also unclear how far back CSPs would be expected to go. Most providers would likely supply rough-order-of-magnitude (ROM) estimates just to comply. The data will not be verifiable and may not provide desired/actionable insight. 4. Minor ClarificationThe RFC should clarify that the effective date (3/25/2026) applies to assessments conducted after that date and does not retroactively apply to previously authorized CSOs. Summary Recommendations• Clarify the objective: How will this data be used, and how will proprietary vendor information be protected? |
Beta Was this translation helpful? Give feedback.
-
|
Microsoft Azure Comments - Issue - LAC-GEN-OAC Ongoing Assessment Costs - 3PAO total assessment costs collected by FedRAMP across multiple CSPs would not be comparable and/or provide accurate estimates to other CSPs regarding 3PAO costs, as it does not take into account the number of products, significant change requests, data center assessments, IAAS/PaaS/SaaS cloud environments, continuous monitoring reviews that are assessed for a specific CSP. |
Beta Was this translation helpful? Give feedback.
-
|
Abnormal AI appreciates the intent to increase transparency across the FedRAMP authorization process through the collection of assessment cost information. When collected consistently over time, this data enables not only visibility, but meaningful trend analysis that can inform program improvement, resource planning, and future policy decisions. For example, analysis of total cost and total assessor hours for initial assessments, paired with assessment start and end dates, could reveal trends in assessment duration, cost variability, and changes in effort over time. Similarly, tracking costs and hours associated with annual assessments could enable comparison between initial and recurring authorization activities, helping to identify where efficiencies are being realized and where effort remains disproportionately high. Aggregated data on costs and hours for FedRAMP-related ongoing assessment services between annual assessments could further surface trends in continuous monitoring effort, recurring control areas driving sustained cost, and opportunities to better align ongoing assessment activities with actual risk. If paired with high-level characteristics of the assessor (such as firm size, assessment model, or authorization volume), this data could also support analysis of how assessment approaches correlate with cost, duration, and consistency of outcomes. Over time, such analysis could help identify best practices, reduce unexplained variability across assessments, and inform refinements to guidance that promote more consistent and predictable assessment execution across the ecosystem. CSPs would benefit from published trend analysis derived from this data, including patterns in cost drivers, assessment duration, and assessor effort across authorization phases. Providing this type of insight would help CSPs, assessors, and the program itself make more informed, data-driven decisions while reinforcing FedRAMP’s transparency and modernization objectives. |
Beta Was this translation helpful? Give feedback.
-
GAP 1: This cannot be mandatory for CSPs to provide this data - only voluntary.The FedRAMP PMO lacks the legal authority under the FedRAMP Authorization Act to require CSPs to provide historical or commercial cost data as outlined in this RFC. The existing statutes only authorize the government to track its own internal expenditures. While the PMO is tasked with identifying ways to reduce costs for CSPs, it does not have the power to compel private entities to report their internal financial metrics. https://www.fedramp.gov/docs/authority/m-24-15/industry/#central-point-of-contact
GAP 2: This data collection is unlawful to be collected historically.Requiring CSPs to provide a decade of historical cost data is an unsubstantiated administrative burden that lacks a legal basis. The Paperwork Reduction Act requires agencies to prove that any information collection is 'necessary for the proper performance of the functions of the agency' and that it minimizes burden. This RFC fails both tests: the PMO lacks the statutory authority to collect CSP-side financial data, and the retroactive nature of the request makes compliance technically and legally infeasible for commercial entities. GAP 3: Corrective actions are unlawful to be enforced.Administrative agencies, like GSA and FedRAMP, do not have the inherent authority to engage in rule making or retroactive rulemaking unless explicitly granted by Congress. The FedRAMP Authorization Act contains no such grant. Any attempt to mandate "corrective actions" based on data constitutes an "arbitrary and capricious" application of power under the Administrative Procedure Act (APA), as it seeks to punish entities for non-compliance with a standard that was not in effect during the period in question. GAP 4: Data collection should use anonymization techniques to remove uniqueness of individual records for re-identification.There are significant concerns that FedRAMP collects this data from commercial entities, it can become public record via FOIA process. As proposal, when collecting this data,
GAP 5: RFC does not address how to standardize the collection of cost data as required by the GAO report.https://www.gao.gov/assets/gao-24-106591.pdf - page 17:
The proposed items in the RFC do not meet this objective and should be modified as follows to align to the phases of an Agency Authorization: Preparation:
Authorization:
Continuous Monitoring:
|
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from Coalfire on Thu Feb 12 @ 5:14pm. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc. Hi Pete & Team - Here's Coalfire’s feedback on RFC-0019 Reporting Assessment Costs. LAC-GEN-ASA Assessor Signed Attestation The IA or 3PAO should be the one responsible for listing/providing this data. There should be consideration for the costs directly imposed by the 3PAO and those that are internal to the CSP as part of implementing and maintaining a FedRAMP compliant CSO. FedRAMP should consider adjusting this requirement and creating separate fields for CSPs and IA/3PAOs to provide their own cost info. 3PAO costs should be specific to performing the required assessment activities (manual control testing, vulnerability scanning, and penetration testing). CSP costs should have categories that allow for cost data to be associated with a specific category to support future analysis by FedRAMP." LAC-FRX-IDS, PVA-GEN-IDS FedRAMP should request this from 3PAO directly for assessment costs and not be another manual PDF/Word form. If we are modernizing compliance lets modernize these submissions to be online form submissions and aggregated data on a quarterly or annual basis. Other accreditation bodies do this today such as PCI to collect relevant program details from accredited organizations, and it is aggregated to reduce the risk of any data associated with a single assessment in the case of data leakage. As part of the submission the 3PAO can attest to the accuracy of the information provided. Rev 5 and 20X Costs Reporting Costs and hours in a vacuum will not be valuable, and the information collected should include aggregated information related to data points that can drill costs down to common denominators. For example:
The idea being that cost and hours as a standalone data point does not help illustrate average costs because every boundary and environment is different so finding common data points to account for costs across the FedRAMP program will help FedRAMP quantify and average out costs between large, medium and smaller CSPs. CSP Submissions CSP data submissions should be limited to their costs for supporting the management of the environment, continuous monitoring and supporting the initial and annual assessment. It should not be a PDF/Word appendix but an online form that can then be used from the system capturing the information for reporting, Finally, CSPs should also submit data point that define the size and complexity of the environment similar to the 3PAO:
|
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from Rubrik on Thu Feb 12 @ 4:35pm. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc. Hi Pete- Thanks for the opportunity to provide feedback on RFC-0019. Rubrik's comments are captured below:
|
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from Salesforce on Thu Feb 12 @ 3:23pm. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc.
|
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from CoreWeave on Wed Feb 11 @ 2:45pm. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc.
|
Beta Was this translation helpful? Give feedback.
-
|
This also came in just under the wire from ADI last week. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc. The Alliance for Digital Innovation (ADI) appreciates the opportunity to comment on RFC-0019, the Reporting Assessment Costs. We respectfully request that FedRAMP clarify and explicitly state a defined cap on the Historical Assessment Costs lookback period. As written, the RFC references reporting dating back to the initial authorization but does not specify a time limitation. In the absence of a stated cap, this could be interpreted as requiring reporting in perpetuity. We recommend aligning the requirement with the current standard of a two-year lookback period. More broadly, we strongly prefer that the timeframe be explicitly stated rather than left ambiguous |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
RFC-0019 Reporting Assessment Costs
Status: Closed
Start Date: January 13, 2026
Closing Date: February 12, 2026
Summary
This RFC outlines a new cost reporting requirement for FedRAMP recognized independent assessors (aka Third-Party Assessment Organizations/3PAOs) and cloud service providers, how this data will be managed, and related corrective actions for those who fail to supply it as required.
Motivation
The FedRAMP Authorization Act requires FedRAMP to regularly review the costs associated with independent assessment services related to the FedRAMP process. Traditionally these services are contracted directly between cloud service providers and FedRAMP recognized independent assessors such that FedRAMP has no insight into these costs. This must be corrected to meet FedRAMP’s statutory requirements and to understand the impact of ongoing changes to the FedRAMP assessment process.
FedRAMP acknowledges that this information may be considered sensitive for cloud service providers and independent assessors; understanding the potential impact of collecting, reviewing, and sharing this information is a critical aspect of public comment for this updated guidance.
Rev5 Security Assessment Report (SAR) Costs Appendix
A new Rev5 Security Assessment Report (SAR) Appendix will be created for cloud service providers to submit information about the cost of their assessment services. This Cost Appendix will include fields for at least:
Proposed Rev5 Requirements for Reporting Assessment Costs
Note: This RFC contains separate requirements for Rev5 and 20x that are structured differently. This section applies only for Rev5 Certifications and uses the LAC (Legacy Assessment Costs) designation.
The following requirements for reporting assessment costs apply to ALL cloud service offerings that obtain and maintain FedRAMP Certification.
This process will have an effective date of 1AM ET on March 25, 2026 (tentatively).
LAC-FRX-IDS Identified Data Sharing
LAC-GEN-IAC Initial Authorization Costs
LAC-GEN-OAC Ongoing Assessment Costs
LAC-GEN-HAC Historical Assessment Costs
LAC-GEN-ASA Assessor Signed Attestation
Proposed 20x Requirements for Reporting Assessment Costs:
Note: This RFC contains separate requirements for Rev5 and 20x that are structured differently. This section applies only for 20x Validations and will be integrated into the Persistent Validation and Assessment process for FedRAMP 20x.
This process will be effective for all 20x Phase 2 pilot participants and future FedRAMP 20x Validations. The Persistent Validation and Assessment process will be amended as follows:
PVA-GEN-IAC Initial Assessment Costs
PVA-GEN-OAC Ongoing Assessment Costs
PVA-GEN-IDS Identified Data Sharing
Beta Was this translation helpful? Give feedback.
All reactions