RFC-0022 Leveraging External Frameworks #112
Replies: 21 comments 19 replies
-
|
Dear FedRAMP Community and PMO Team,
Conclusion |
Beta Was this translation helpful? Give feedback.
-
|
I appreciate the intent here which I am assuming is about breaking the chicken-and-egg problem for smaller CSPs who can't justify FedRAMP investment without proven federal demand makes sense. I'm curious about the design choice to retire FedRAMP Ready (per RFC-0023) while simultaneously introducing Validated Level 1. Ready already required independent 3PAO assessment, it just lacked formal pilot authorization. Why not preserve Ready and formalize agency pilot authority against it, similar to DISA's IATT model? That would enable the pilot use case while maintaining independent validation. Validated Level 1 achieves the same objective but removes the independent assessment layer entirely. Is the view that independent assessment at the pilot stage adds cost without commensurate security value, or is there another driver I'm missing? |
Beta Was this translation helpful? Give feedback.
-
|
This is a great entry point for all to participate. I would add the following to the MKT-LEF-ASF Approved Security Frameworks
|
Beta Was this translation helpful? Give feedback.
-
|
Gap #1: Ambiguity in Control Coverage Sufficiency for External Framework Mapping Gap #2: No Explicit Guardrails on Multi-Tenant or Shared-Service Risk Gap #3: Unclear Handling of Significant Changes During the 12-Month Validated Period Gap #4: No Defined Criteria for Early Revocation Based on Risk Degradation Gap #5: Insufficient Guidance on Agency-Specific Compensating Controls Gap #6: No Defined Marketplace Signaling for “Pilot-Only” Status Gap #7: Unclear Provider Obligations if No Agency Reuse Occurs Gap #8: Lack of FedRAMP Capacity Signaling for Validated Level 1 Intake |
Beta Was this translation helpful? Give feedback.
-
|
Excited about this one as well. In particular, I appreciate the benefit this will provide to CSPs to leverage prior investments and work in attaining other frameworks to reduce the time / cost to entry, without sacrificing security rigor. |
Beta Was this translation helpful? Give feedback.
-
|
Other international frameworks should also be considered as external frameworks for level 1, such as CCCS, IRAP, and ISMAP. Significant numbers of controls overlap and would be satisfactory for the use cases described in this RFC. |
Beta Was this translation helpful? Give feedback.
-
Feedback: Leveraging External Frameworks for Level 1 AuthorizationThank you for RFC-0022 proposing a temporary Level 1 authorization pathway using external assessment frameworks (SOC 2, ISO 27001, HITRUST). I support rapid authorization pathways for low-risk services. However, RFC-0022 creates a CRITICAL legal ambiguity with FISMA § 3544 that requires DOJ/OMB clarification before scaling federal adoption. CRITICAL: FISMA § 3544 Statutory Conflict IdentifiedThe ConflictFISMA Statute (44 U.S.C. § 3544(b)(3)): RFC-0022 Proposal: The Problem: Auditor Challenge ScenarioFederal inspector general (IG) or auditor reviewing Level 1 authorization:
Legal Risk Assessment
Recommendation #1: Seek DOJ/OMB Legal Opinion BEFORE Scaling Level 1What Is Needed: Specific Legal Questions for DOJ:
Outcome:
Recommendation #2: If Proceeding, Require NIST Equivalency DocumentationIf DOJ opinion permits external frameworks under FISMA, RFC-0022 implementation must include: Equivalency Mapping RequiredFor each external framework (SOC 2, ISO, HITRUST), create FedRAMP-published equivalency document: ResultAgencies would use equivalency docs to justify "Level 1 (SOC 2) + agency-specific controls = FISMA-compliant system." Provides legal defensibility. Recommendation #3: 12-Month Sunset + Transition Plan MandatoryAgreement with RFC-0022: 12-month pilot for Level 1 is appropriate caution. However, implementation must include:
Why This Matters: Recommendation #4: Restrict Level 1 Scope (Critical Gap in RFC-0022)Issue: RFC-0022 doesn't specify what "Level 1" means in terms of system risk/scope. Could CSP use Level 1 for:
FedRAMP Should Specify Level 1 Scope Limits: Success Criteria: FedRAMP publishes "Level 1 Scope & Restrictions" doc that agencies reference in authorization decisions. Issue: First-Customer Risk for Early AdoptersProblem: Level 1 CSP with SOC 2 assessment has never been deployed in federal environment. Early-adopting agency becomes "first customer," bearing risk that production use exposes gaps SOC 2 assessment didn't catch. Example First-Customer Risk:
Recommendation:
ClosingMy Position: I support RFC-0022's goal of faster authorization for low-risk services. However:
Recommendation:
Submitted by: Trevor Lowing (private citizen, personal capacity) |
Beta Was this translation helpful? Give feedback.
-
|
GovRAMP supports the inclusion of GovRAMP Authorized and Provisionally Authorized as acceptable frameworks. GovRAMP recommends the following amendments to RFC 22: 1) GovRAMP recommends that GovRAMP Ready and GovRAMP Core be included as acceptable frameworks. GovRAMP Ready. GovRAMP Core. 2) GovRAMP does not support restricting products that leverage external frameworks to the 20x path exclusively. Consistent with the flexibility provided in RFC 22, providers should be permitted to choose the path that best aligns with their readiness and business model—either Rev. 5 or 20x. Opening both paths (Rev. 5 and 20x) will help with the objectives mentioned in RFC-0021, Expanding the FedRAMP Marketplace. Some providers may leverage alternative frameworks to serve federal customers and support FedRAMP’s goal of expanding the marketplace; however, they may not yet be prepared to commit to a 20x path until agencies demonstrate consistent acceptance of that approach. Limiting these providers to a single path could create unnecessary barriers to entry, particularly for small and medium-sized businesses, as well as for solutions that are not fully cloud-native. 3) GovRAMP welcomes this initial step and recommends that a next phase focus on establishing an accelerated path to higher FedRAMP authorizations where appropriate (e.g., GovRAMP Authorized – Moderate Impact to Level 3). 4) GovRAMP recommends excluding SOC 2 Type II as an acceptable framework because it does not provide the rigor, consistency, or ongoing assurance required to support risk-based authorization decisions. SOC 2 reports allow significant scoping flexibility, enabling service providers to exclude systems or controls, which can materially limit the depth and comparability of the assessment when compared to a NIST SP 800 53–based evaluation. In addition, SOC 2 is fundamentally a point in time, retrospective attestation and lacks a true continuous monitoring component. While reports may cover varying historical periods, they do not provide real-time or ongoing visibility into whether a provider continues to operate as attested. Continuous monitoring is a core value proposition of modern authorization programs—including the intent of the 20x approach—and without it, agencies lack the assurance needed to validate a provider’s sustained security posture over time. At a minimum, FedRAMP should ensure that they do not accept reports that have a “qualified opinion.” 5) Please clarify the statement: “Providers will be allowed to maintain FedRAMP Validated Level 1 status for up to one year from the first agency reuse of this FedRAMP authorization.” Specifically, is the one-year period triggered by the first agency reuse or the second agency reuse? And please define what happens after the one-year mark |
Beta Was this translation helpful? Give feedback.
-
|
Overall, I strongly support this pathway. Validated Level 1 appropriately lowers the barrier for pilot use cases while still maintaining guardrails. That said, a few refinements would strengthen the external framework section. First, MKT-LEF-ASF should require that listed frameworks meet a higher bar. For SOC 2 Type II, only unqualified opinions should be accepted. A qualified opinion should be a red flag even at Level 1. I fully support leveraging SOC 2 Type II here — it meaningfully assesses operational effectiveness over time and, in some areas (e.g., vulnerability management monitoring), goes beyond the point-in-time nature of traditional initial FedRAMP assessments. Second, there should be a required attestation that the federal boundary to be authorized is fully within the scope of the external assessment. There is no guarantee that a SOC 2, GovRAMP, or HITRUST audit actually covers the specific systems or services an agency intends to use. Scope alignment must be explicit. Third, these external assessments should be recent. I recommend requiring completion within the last six months prior to submission. If this is meant to support near-term pilot decisions, stale audit artifacts should not be acceptable. For StateRAMP/GovRAMP, only full authorizations should qualify — not provisional or “progressing” statuses. The assessment must be complete and comparable in rigor to support even low-risk federal pilots. Finally, I strongly support requiring CSPs pursuing this pathway to align with 20x exclusively. With the known sunset of Rev5, allowing new entrants to pursue legacy paths creates unnecessary fragmentation. If a provider has not already committed to Rev5, they should be building toward 20x. This keeps the program modernized and avoids dual-track complexity. |
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from CoreWeave on Wed Feb 11 @ 2:45pm. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc.
|
Beta Was this translation helpful? Give feedback.
-
|
MKT-LEF-ASF Approved Security Frameworks
|
Beta Was this translation helpful? Give feedback.
-
|
I think this RFC represents a thoughtful and pragmatic step toward implementing OMB Memorandum M 24 15 and accelerating agency access to low risk cloud capabilities. The FedRAMP Validated Level 1 designation appropriately balances reuse of existing commercial security investments with preservation of agency risk authority and time bound authorization conditions. Leveraging widely adopted external security frameworks for temporary pilot use is aligned with NIST risk management guidance and addresses long standing barriers to entry for innovative cloud providers serving limited or targeted federal use cases. While the proposal intentionally does not establish formal reciprocity with external frameworks, it would be valuable to define a forward looking roadmap for structured reciprocity evaluation. As written, FedRAMP Validated Level 1 facilitates reuse of materials for Low impact pilot use but stops short of creating a scalable reciprocity model. Clarifying how FedRAMP will assess framework equivalency over time would support transparency and consistency and provide providers and agencies with clearer expectations. In particular, consideration should be given to Moderate impact systems. Most federal mission systems operate at the Moderate level, and currently no transitional mechanism exists for providers that have already undergone independent Moderate equivalent assessments under frameworks such as GovRAMP Authorized, ISO IEC 27001, HITRUST r2, CMMC Level 2, or FedRAMP Ready. Establishing a controlled and time bound Moderate pilot pathway could meaningfully reduce duplicative assessment burden while preserving federal risk standards and agency decision authority. For example, a Moderate pilot designation could allow limited reuse of independently assessed NIST 800 53 Revision 5 Moderate aligned frameworks under enhanced continuous monitoring expectations, mandatory control mapping to FedRAMP requirements, and a defined transition period into full FedRAMP 20x validation. Such a pathway would not constitute blanket reciprocity but rather a structured bridge for agencies performing risk informed pilot deployments. Additional clarification around the 12 month validation requirement would also be helpful. If a provider timely enters the FedRAMP 20x validation pipeline but final validation is pending due to PMO processing timelines or assessor availability, it would be beneficial to clarify whether that submission satisfies the transition requirement. Clear guidance would reduce uncertainty for agencies and providers and avoid unintended service disruption. Further, publishing a transparent framework equivalency evaluation methodology would strengthen the implementation of Section V of OMB M 24 15. Defining how external frameworks are assessed for control coverage, independence rigor, continuous monitoring maturity, and enforcement mechanisms would create a scalable foundation for future reciprocity decisions and reduce ambiguity in how frameworks such as GovRAMP are considered. Finally, additional guidance defining negligible or low risk use cases could improve consistency across agencies. Providing scenario based examples tied to FIPS 199 categorization or common deployment models would help Authorizing Officials apply this pathway in a more uniform and defensible manner. Overall, this RFC is a strong step toward accelerating secure cloud adoption for low risk use cases. Expanding the proposal to include a defined Moderate pilot bridge and a transparent reciprocity evaluation framework would further advance the objectives of FedRAMP 20x while maintaining rigorous risk management standards. |
Beta Was this translation helpful? Give feedback.
-
|
FedRAMP PMO, I appreciate the opportunity to provide comments on RFC-0022 regarding the proposed FedRAMP Validated Level 1 designation and the temporary pathway leveraging external security frameworks. I strongly support the proposed approach to accept widely recognized external security frameworks as part of a time-limited authorization mechanism. This is a pragmatic and strategically aligned step that advances the objectives outlined in OMB Memorandum M-24-15 to accelerate federal access to secure commercial cloud technologies while preserving agency risk ownership. In particular, I would like to express specific support for the inclusion of GovRAMP (formerly StateRAMP) as an approved external framework under MKT-LEF-ASF. GovRAMP is already closely aligned to FedRAMP in several important respects: Control Baseline Alignment Independent Assessment Rigor Public Sector Relevance Maturity Signaling The inclusion of GovRAMP therefore represents a rational reuse of existing assurance artifacts rather than a dilution of standards. It enables qualified providers to enter the federal ecosystem more efficiently while preserving the expectation that full FedRAMP 20x Validation must be achieved within the prescribed timeframe. |
Beta Was this translation helpful? Give feedback.
-
|
I support the overall initiative of FedRAMP Validated Level 1, with revisiting the list of frameworks under MKT-LEF-ASF. Obviously not all frameworks are built the same and the quality and consistency of those reports within some frameworks on the commercial side can vary. Other NIST based frameworks listed such as GovRAMP have undergone a full traditional Rev 5 baseline assessment and reviewed/authorized by the GovRAMP PMO and should be given credit towards a FedRAMP Marketplace listing. CMMC Level 2 certification would also translate well for FedRAMP Level 1 considering the rigor and needing to meet all 110 practices within 800-171. |
Beta Was this translation helpful? Give feedback.
-
CSP-AB submits the following comments:MKT-LEF-ASF Approved Security Frameworks - External security assessments
MKT-LEF-ASF Approved Security Frameworks - SOC 2 Type II
|
Beta Was this translation helpful? Give feedback.
-
|
The initiative allowing Federal agencies to pilot new cloud services is an excellent step toward opening the FedRAMP market to emerging providers and lowering barriers of entry. To ensure the initiative's success, the FedRAMP program should provide additional guidance on the transition from an active pilot to a full authorization path, as well as the expected outcomes once a pilot concludes. Furthermore, the FedRAMP program should more clearly define "Authorizing individuals." The current language is broad, ranging from a CIO to any civil servant. Without specific directives, agencies are likely to default to the most risk-averse approach, typically CIO involvement, which may slow the process. |
Beta Was this translation helpful? Give feedback.
-
|
FedRAMP’s effort to leverage widely adopted commercial frameworks is a pragmatic step toward accelerating access to modern cloud services. In that context, we believe it is important to distinguish between frameworks that meaningfully validate security posture and those that primarily validate documentation. SOC 2 Type II is a management-scoped attestation engagement conducted by an independent CPA firm under AICPA standards. While it provides valuable assurance for commercial customers, it does not establish a uniform, government-aligned security baseline comparable to FedRAMP. As such, it should be treated carefully within this pathway and so as not to be viewed as equivalent to a government-aligned authorization framework. We are encouraged to see the inclusion of GovRAMP, which is more directly aligned with government security requirements and provides stronger structural comparability to FedRAMP expectations. Clear differentiation among external frameworks will be important to ensure agencies fully understand the risk posture associated with FedRAMP Validated Level 1 offerings. |
Beta Was this translation helpful? Give feedback.
-
|
Comments from Fortreum:
|
Beta Was this translation helpful? Give feedback.
-
|
I strongly support this proposal. It meaningfully reduces barriers to entry into the FedRAMP ecosystem while appropriately leveraging prior security investments and independent assessments made by CSPs. I recommend explicitly including FedRAMP Moderate Equivalency within requirement MKT-LEF-ASF. While it may be implied under CMMC Level 2, explicitly naming it would eliminate ambiguity and provide clearer guidance to CSPs and assessors. Additionally, the final guidance should clarify expectations for evidence recency (e.g., testing performed within the past 12 months). Clear recency criteria will help ensure equivalency determinations are based on current security posture rather than legacy assessment artifacts. Overall, this is a pragmatic step toward expanding participation without reducing rigor. |
Beta Was this translation helpful? Give feedback.
-
|
The Alliance for Digital Innovation (ADI) appreciates the opportunity to comment on RFC-0022, Leveraging External Frameworks. We support the goal of improving efficiency and accelerating secure cloud adoption by recognizing external frameworks where appropriate. FedRAMP Validated Level 1 has the potential to serve as a useful innovation accelerator, but its long-term credibility will depend on clear limits, strong supply chain controls, and avoiding shortcuts that prioritize speed at the expense of consistent, scalable security outcomes. We believe the KSIs for Level 1 provide a gap around supply chain risk. Given the prevalence of recent high-profile incidents exploiting software supply chains, foundational safeguards such as software integrity, visibility into third-party dependencies, and secure build environment practices should be incorporated. In addition, security awareness training and business continuity and disaster recovery planning should be included as well. We also caution against characterizing certain cloud deployments as presumed “low risk.” We understand that agencies have the flexibility to make individual risk determinations. However, modern cloud systems are deeply interconnected through APIs, identity, and shared infrastructure. Even narrowly scoped deployments may create broader agency exposure depending on integration points and potential blast radius. We believe that a clearer articulation of how risk will be evaluated in interconnected environments would strengthen confidence in the Validated Level 1 designation. Finally, the proposal to allow agencies to reuse a Level 1 authorization for higher-impact systems through “significant compensating controls” raises concerns about fragmented and inconsistent security postures that are hard to assess at scale. Services intended for Moderate or higher impact environments should instead progress through the appropriate FedRAMP authorization level pathway (either Rev 5 or 20x when available) to preserve clarity and consistency across the federal ecosystem. Thank you for your consideration on this matter. |
Beta Was this translation helpful? Give feedback.
-
|
RFC-0022: Leveraging External Frameworks
• “The service boundary described in this package is fully within the scope of the external assessment materials provided, except for the following explicitly listed components.”
Personal capacity note: This comment is submitted in an individual capacity and does not represent any employer or organization. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
RFC-0022 Leveraging External Frameworks
❓ Please note that FedRAMP will not answer questions in this thread as it is reserved for public comment. If you would like to ask a question or generally discuss this RFC informally, please use the General discussion / Q&A for RFC-0019 through RFC-0024 thread. Thank you!
Status: Closed
Start Date: January 13, 2026
Closing Date: February 26, 2026
Summary
This RFC proposes a temporary high speed path to FedRAMP authorization for cloud services with existing security assessments from external security frameworks so that federal agencies and providers can test and pilot these services prior to investing in a full FedRAMP authorization path.
This authorization, part of the FedRAMP 20x path and designated as FedRAMP Validated Level 1, allows providers that meet certain criteria to receive a FedRAMP Validated authorization by meeting only a small portion of 20x Low requirements - without additional independent verification and validation from a FedRAMP recognized independent assessor. This authorization will meet the necessary legal and policy requirements to allow agencies to test or pilot the use of these services based on their own risk determinations.
This process does NOT establish “reciprocity” with any external framework but does allow limited reuse of existing assessment and certification materials for a temporary authorization. Providers will be allowed to maintain the FedRAMP Validated Level 1 status for up to 1 year from the first agency reuse of this FedRAMP authorization. Agency reuse of this authorization should be limited to negligible and low risk systems.
This RFC is aligned with one other concurrent RFC that has additional details on specific topics but has been published separately to encourage topic-specific comments:
Background & Authority
This proposed authorization combines multiple authorities and responsibilities into a single opportunity, aligned with priorities from the Office of Management and Budget and the Federal CIO outlined in OMB Memorandum M-24-15.
OMB M-24-15, Section IV: “To identify more cloud service offerings that could become FedRAMP authorized, and to accelerate their eventual path to being authorized, FedRAMP will provide procedures for issuing a time-specific temporary authorization, as discussed in NIST risk management guidelines, that would allow Federal agencies to pilot the use of new cloud services that do not yet have a full FedRAMP authorization.”
NIST SP 800-37 Rev 2, Appendix F: “If the authorizing official, after reviewing the authorization package, determines that the risk to organizational operations, organizational assets, individuals, other organizations, and the Nation is acceptable, an authorization to operate is issued for the information system… The authorizing official may choose to authorize the system to operate only for a short period of time if it is necessary to test a system in the operational environment before all controls are fully in place, (i.e., the authorization to operate is limited to the time needed to complete the testing objectives). [Formerly referred to as an interim authority to test.]”
OMB M-24-15, Section V: “FedRAMP will establish criteria for accepting widely-recognized external security frameworks and certifications applicable to cloud products and services, based on FedRAMP's assessment of relevant risks and the needs of Federal agencies. This will include leveraging external security control assessments and evaluations in lieu of newly performed assessments, as well as designating certifications that can serve as a full FedRAMP authorization, if appropriate.”
Greg Barbaccia, Federal CIO, at the FedRAMP 20x Phase 2 Launch: “We know that if we want the government to accept and adopt incredible technology, we need to meet you half way. Ideally more. [...] We want to accept existing commercial frameworks and documentation, saving you time, saving you money…”
Motivation
All civil servants deserve access to high quality tools for non-sensitive use cases with a minimum investment of agency time and funding. Cloud services often have highly specific use cases for agency users that aren’t enterprise-wide and might even be limited to only a few certain users in large agencies. The current policy environment makes the assessment, authorization, and deployment of smaller services for targeted use cases almost impossible for most agencies because it never makes sense to spend tens of thousands of dollars to review the security of a service that won’t be deployed enterprise-wide.
At the same time, cloud services are often available at low cost for groups of users such that yearly licenses for 500 users might only cost $10/mo each for a total yearly revenue of $60,000. The profit from a deal like that with a single agency would cover a fraction of the salary for a single security engineer or compliance expert… so without large expensive deals guaranteed there is little reason to invest in a FedRAMP authorization. In its current state, law and policy effectively blocks agency access to such services by requiring a FedRAMP authorization by default.
FedRAMP must make it as simple as possible for agencies to quickly obtain and maintain a FedRAMP authorization for cloud services they intend to use for non-sensitive use cases while simultaneously encouraging commercial cloud service providers to enter the federal market and generate revenue to invest in the additional capabilities necessary for initial and ongoing authorization of higher impact use cases.
To meet this need, FedRAMP will leverage statutory and policy authority to create a special time-limited FedRAMP authorization status for cloud services that meet widespread commercial security requirements called FedRAMP Validated Level 1.
FedRAMP Validated Level 1 will be a special designation during the Preparation phase for a cloud service provider, consistent with the Preparation phase of the NIST Risk Management Framework, to indicate that the provider is carrying out the essential activities necessary to prepare the organization to manage its security and privacy risks following the FedRAMP 20x process. This special designation highlights that the cloud service offering may already meet many of the underlying expectations for managing security but has yet to fully implement the government-specific requirements and recommendations necessary for a FedRAMP 20x Validation.
Proposed Requirements for FedRAMP Validated Level 1
All relevant proposed requirements and recommendations for the FedRAMP Marketplace process discussed in RFC-0021 also apply, including the requirements and recommendations for cloud service offerings in the Preparation status.
The following requirements and recommendations apply to ALL cloud services seeking to obtain and maintain FedRAMP Validated Level 1; unless otherwise stated in a specific requirement, the default corrective actions for cloud service providers that fail to address these requirements will be as follows:
Corrective Actions: Requirements will be enforced under a 3 strike rule over the lifetime of a cloud service offering’s continuous Marketplace listing:
MKT-LEF-PRE Preparation State Listing Required
MKT-LEF-ASF Approved Security Frameworks
MKT-LEF-MAP Mapping to Key Security Indicators
MKT-LEF-AFM Availability of Full Materials
MKT-LEF-IVV Independent Verification and Validation
MKT-LEF-FPS Formal Procedures for Submission
MKT-LEF-DFV Deadline for FedRAMP Validation
MKT-LEF-ATO Authorization to Operate Notification
MKT-LEF-NLR Negligible or Low Risk Use Cases
MKT-LEF-RFM Review Full Materials
MKT-LEF-LIO Low Impact Only
MKT-LEF-ROQ Require Ongoing FedRAMP Qualification
Related Updates to the Minimum Assessment Scope
To avoid confusion related to this FedRAMP Validation level (which is intended only for agency use), FedRAMP will update the Minimum Assessment Scope under FRR-MAS-03 for both 20x and Rev5 as follows:
FRR-MAS-03 Non-FedRAMP Authorized Third-Party Information Resources
Beta Was this translation helpful? Give feedback.
All reactions