RFC-0023 Rev5 Program Certifications #113
Replies: 31 comments 16 replies
-
|
@pete-gov: LPC-GEN-LMR should reference RFC-0023 (not 20) in the notes section |
Beta Was this translation helpful? Give feedback.
-
Comment on RFC-0023: Rev5 Program CertificationsThis RFC addresses a real and pressing problem: qualified CSPs stranded in authorization limbo due to agency sponsorship constraints rather than security deficiencies. The sponsorless Rev5 path is a pragmatic bridge that honors prior investments while the ecosystem transitions to 20x. I offer the following observations: On Trusted Assessor DefinitionThe 3-authorization threshold within 12 months to achieve "trusted" status creates a significant barrier for smaller or specialized 3PAOs. This risks concentrating assessment work among a handful of large firms, potentially reducing competition and increasing costs for CSPs. Consider either:
Additionally, clarify whether authorizations completed under the legacy JAB process count toward the 12-month lookback, or only post-JAB Certifications. On LPC-GEN-LVL (Level 1-4 Limitation)The exclusion of Level 5+ is understandable given resource constraints, but leaves High-impact CSPs without a sponsorless path. For CSPs serving national security-adjacent missions (e.g., critical infrastructure sectors), the agency sponsorship bottleneck is often more acute, not less. Consider whether a limited pilot—perhaps 2-3 High authorizations annually, could serve this underserved segment without materially impacting PMO capacity. On LPC-GEN-MBA (Mandatory Balance Release Adoption)Requiring participation in "the first beta" for all future Balance Improvement Releases places significant operational burden on CSPs who may lack the engineering bandwidth to continuously adopt pre-production requirements. Suggest modifying to require adoption within a defined window after open beta (e.g., 60 days post-open-beta), rather than mandating first-beta participation. On Corrective Actions (LPC-GEN-IRI)The 1-month and 3-month resubmission penalties are reasonable deterrents against incomplete submissions, but the 11-requirement threshold for escalation to a 3-month penalty warrants scrutiny. A package missing 11 minor documentation elements should not receive the same penalty as one missing an entire appendix. Consider distinguishing between:
On LPC-TIM-EOL (December 16, 2026 Deadline)The hard cutoff with "no grace period" for incomplete packages creates cliff-edge risk for CSPs in active assessment. Given typical 3PAO engagement timelines, CSPs would need to begin assessment no later than Q2 2026 to have reasonable confidence of meeting this deadline. Recommend either:
On FedRAMP Ready RetirementThe July 28, 2026 retirement date and November 17, 2026 listing expiration provide adequate notice. However, clarify whether Legacy FedRAMP Ready status confers any advantage for Preparation-state listing (per RFC-0021) or for the Program Certification queue. On LPC-FRX-GRC (3:1 GRC Prioritization)The 3:1 prioritization for agency-facing GRC tools is a welcome recognition that these platforms accelerate the broader ecosystem. However, the distinction between "agency-use" and "CSP-use" GRC tools may prove difficult to adjudicate—many platforms serve both. Suggest publishing clear eligibility criteria or requiring a brief attestation of intended agency use cases as part of the submission. |
Beta Was this translation helpful? Give feedback.
-
|
This would be an amazing opportunity for any company that is having difficulties securing a sponsor to complete their FedRAMP journey. Our company had a sponsor but they had to step back with all of the volatility of the DOGE initiatives and such. I think any company who has progressed to at least a "Ready" status would have a great deal of interest in this, as they have already invested heavily in the effort to achieve FedRAMP Authorization. Our company was already pretty close to the finish line when we lost our sponsorship commitment, so we are in a situation where we have a FedRAMP compliant and functional product that can't make it over the finish line without direct sponsorship. According to the specs of this RFC, this would only need a short additional remediation period to cover the additional requirements (such as CCM), but overall, it appears to be a much more streamlined pathway to Authorization. I would like to see some more definition around the SCR notifications, distinguishing between what might constitute a routine vs adaptive vs transformative (etc.) change. Overall, I would love to see this implemented and I think it presents a significant opportunity, especially for CSPs looking to move from a Ready status to Authorized. |
Beta Was this translation helpful? Give feedback.
-
|
I disagree with the "trusted assessor" definition here. Moss Adams would have qualified as a "trusted assessor" in 2022 and it turns out they were not-so-trusted. Other active 3PAOs also technically qualify, but I ASKed a wise SAGE who disagreed. If the intent is to have an accurate assessment, then the authorizing agency (PMO) should review the package and captured evidence. Don't spend 1.5 hours Finelling with boundary diagrams, actually review "what" the 3PAO reviewed and make sure that is actually reflects the control requirements. If the PMO is going to be issuing authorizations, every one of these authorizations should be going towards tools that will accelerate and enhance 20x validation. Such tools have no value to a federal agency, but they will benefit the FedRAMP eco-system. The best agency to authorize such tools would be the PMO. |
Beta Was this translation helpful? Give feedback.
-
|
The proposed “Trusted Assessor” designation introduces an unnecessary restriction on the FedRAMP assessment ecosystem. FedRAMP already maintains rigorous recognition, oversight, and corrective action processes for all credentialed 3PAOs. Creating an additional volume-based tier does not improve security outcomes and instead limits competition, increases costs, constrains assessor capacity, and slows cloud solution availability to the Federal Government. Recent FedRAMP modernization efforts have successfully reduced bottlenecks and improved market efficiency. Restricting certifications and validations to a small subset of assessors reverses that progress and reintroduces structural barriers. FedRAMP’s goals of scalability, speed, and market competition are best achieved by allowing all FedRAMP-recognized 3PAOs to perform assessments under consistent oversight. |
Beta Was this translation helpful? Give feedback.
-
|
Having some customer conversations on this RFC and others. This question came up: If a CSP were to lose its agency sponsor, could this path be pursued to renew FedRAMP Authorization via Program Certification instead of an annual assessment with an agency? |
Beta Was this translation helpful? Give feedback.
-
|
Thank you for the continued transparency and engagement on these RFCs. I wanted to ask for clarification on something that has come up in client conversations, as the language in LPC-TIM-EOL appears to create some uncertainty when read alongside recent FedRAMP guidance. During the Digital Government Institute "FedRAMP 20x: Faster, More Secure Cloud Adoption" webinar, @pete-gov indicated that currently Rev5 authorized CSPs would not be forced to transition, stating: "If you are currently Rev 5 authorized and you want to stay Rev 5 authorized for the next 15 years, it is not on my radar to take that away from you." We understand that Could you help clarify:
We want to ensure we are advising clients correctly. Any clarification on the distinction between the Program Certification submission deadline and the broader Rev5 authorization ecosystem would be greatly appreciated. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
|
Implementing the path to FedRAMP Certification outlined in RFC‑0023 provides significant value by removing the agency‑sponsor requirement for FedRAMP Rev5 Certification, allowing qualified cloud service providers to pursue authorization independently, an especially impactful improvement for our organization as a financial‑services CSP that has historically faced delays due to limited agency support and sponsorship availability. This sponsor-less path, combined with the adoption of Rev5 Balance Improvement Releases, reduces authorization friction, lowers compliance overhead, and streamlines assessment activities. These changes will accelerate time‑to‑market, improve predictability in authorization timelines, and strengthen the competitiveness of security‑focused CSPs serving federal customers and consumers. Additionally, by implementing the Rev5 Balance Improvement Releases, our organization will be well‑positioned to adopt FedRAMP 20x as an early adopter. |
Beta Was this translation helpful? Give feedback.
-
|
Gap #1: Eligibility Threshold Clarity Gap #2: Cost Transparency for Program Certification Gap #3: Transition Path to FedRAMP 20x Gap #4: Appeals or Reconsideration Process Gap #5: Continuous Monitoring Scope Definition Gap #6: Marketplace Labeling and Agency Interpretation Gap #7: Intake Capacity and Throttling Transparency Gap #8: Security Outcome Metrics Gap #9: Transition Risk for CSPs Currently Pursuing FedRAMP Ready |
Beta Was this translation helpful? Give feedback.
-
|
I agree with the proposed Program Sponsorship, but I'm concerned that given there is no guarantee that FedRAMP 20x will be implemented, I expect that the need for Program Sponsorship to go beyond the expected timeline discussed in this RFC. Until there is clear acceptance of FedRAMP 20x across both federal civilian and to include DoD/DoW acceptance, Rev 5 will be the only viable path for some time. Specifically, with CMMC requiring FedRAMP Moderate (or equivalent), having those B2B SaaS providers that do not have a product that a federal agency would be interested in will require a sponsorless option. I expect that it will take an EO to ensure that FedRAMP 20x is accepted government wide. There also needs to be a discussion with the GovRAMP/StateRAMP community on if 20x will be honored. Ideally, the sponsorless 20x path in the future will be the one standard that all gov't, include state and local will accept. |
Beta Was this translation helpful? Give feedback.
-
Feedback: FedRAMP Rev5 Program Certifications (Sponsorless Authorization)Thank you for RFC-0023 proposing the "Program Certification" pathway for CSPs to achieve FedRAMP authorization without requiring an agency sponsor to fund the assessment. This addresses real barrier to entry for new CSPs. However, RFC-0023 requires clarification on federal contract authority, procurement implications, and the December 16, 2027 sunset timeline. Summary: Operational & Legal Assessment✅ FISMA-Compliant: RFC-0023 does not violate FISMA (44 U.S.C. § 3544). Agency AO still authorizes system; RFC-0023 just removes the requirement for government-funded assessment. Critical Issue #1: Contract Authority for "Sponsorless" AuthorizationThe QuestionTraditional FedRAMP Sponsorship Model:
RFC-0023 Program Certification:
Authority Question for OMB/General CounselIssue: Federal Acquisition Regulation (FAR Part 16, updated under FAR 2.0 modernization) establishes that agencies must have statutory or regulatory authority to enter into contracts. If an agency adopts a Program-Certified service (without being the sponsor), under what authority? Scenario:
Current RFC-0023 Gap: Doesn't address federal procurement law authority for sponsorless adoption. Recommendation to FedRAMP PMORequest DOJ/OMB Guidance: Clarify whether Program Certification determination by FedRAMP PMO constitutes sufficient "federal validation" for non-sponsor agencies to authorize under their own ATOs, or whether agencies must conduct independent authorization. Outcome Option 1:
Outcome Option 2:
Critical Issue #2: December 16, 2027 Sunset Deadline — Contract Planning RequiredThe RealityRFC-0023 sunsets Program Certification pathway December 16, 2027. After that date, no new Program Certifications will be issued. Services authorized before deadline remain valid, but CSP must complete full Rev5 or transition to 20x. Federal Procurement ImpactScenario A: Agency signs contract BEFORE Dec 16, 2027
Scenario B: Agency signs contract AFTER Dec 16, 2027
Contract Authority Gaps (FAR Implications & FAR 2.0 Modernization)FAR Part 16 (Contract Types), modernized under FAR 2.0 to support flexible commercial practices, requires clarity on:
Current RFC-0023 Gap: Silent on these contract law questions. Recommendation to FedRAMP PMOPublish "Program Certification Contract Planning Guide" (by March 2026) specifying: Issue #3: "First Customer" Risk for Program-Certified CSPsThe ProblemUnlike full FedRAMP authorization (which requires government/industry review), Program Certification relies on FedRAMP PMO 3PAO validation only. CSP may not have been "battle-tested" in operational federal environment. First-Customer Risk Example:
Current RFC-0023 Gaps
Recommendation to FedRAMP PMOWarning Label for Program-Certified CSPs: CSP Transition Commitment:
Issue #4: NIST RMF Phase Timing — Compress "Authorize" Phase RiskThe Timing QuestionFull FedRAMP Authorization Timeline (Current): Program Certification Timeline (implied by RFC-0023): Problem: Program Cert pathway compresses the Authorize phase (where government/industry review findings). This shifts review burden to agencies adopting the service. Recommendation to FedRAMP PMONIST RMF Guidance for Program Certs: This clarifies that Program Cert doesn't eliminate agency's Authorize responsibility. Issue #5: Privacy Implications Not AddressedGap: Privacy Act (5 U.S.C. § 552a) Compliance UnknownQuestion: If Program-Certified service processes Personally Identifiable Information (PII), has FedRAMP assessed Privacy Act compliance? Issue: NIST SP 800-53 includes privacy controls (PE, SA families), but assessment rigor varies. Program Cert doesn't clarify whether privacy controls were explicitly validated. Recommendation to FedRAMP PMOPrivacy Assessment Clarification:
ClosingMy Position: RFC-0023 sponsorless authorization is operationally sound and addresses real CSP barriers. However:
Recommendation: Submitted by: Trevor Lowing (private citizen, personal capacity) |
Beta Was this translation helpful? Give feedback.
-
|
I’m writing on behalf of a CSP that recently completed a full FedRAMP Rev5 Moderate assessment with a 3PAO (including 100% control coverage, no open risks, and a DoD Moderate Equivalency recommendation). We also previously completed a RAR and were listed as FedRAMP Ready for the one‑year period. Our main issue is that we’re still trying to secure an agency sponsor, but RFC‑0023’s Program Certification path looks like a great alternative if sponsorship doesn’t happen in time. We want to avoid unnecessary rework, especially since we already invested in a full SAR and equivalency assessment. A few questions we hope can be clarified:
We appreciate the direction RFC‑0023 is going and just want to avoid redundant work here. |
Beta Was this translation helpful? Give feedback.
-
|
Overall, I strongly support this RFC. Providing a sponsorless Rev5 Program Certification path is a practical bridge while 20x adoption scales, and it helps break the longstanding agency sponsor bottleneck. I recommend explicitly allowing indirect demand (as introduced in RFC-0021) to qualify as sufficient demand for Program Certification. If an already FedRAMP-authorized CSP demonstrates intent to leverage a service within its authorized boundary, that should be treated as meaningful federal demand. Requiring a direct agency sponsor perpetuates the same structural friction this RFC is attempting to solve. Agencies are already capable of reviewing continuous monitoring materials and inherited service relationships today. There is no reason indirect use cases cannot be treated similarly. Incorporating indirect demand as a qualifying signal would modernize the model and better reflect how cloud ecosystems actually operate. Overall, this is a strong step forward in moving beyond the legacy sponsor-dependent model. |
Beta Was this translation helpful? Give feedback.
-
|
My feedback for: "Trusted Assessor" Requirement Creates Market Concentration
Note: Currently it SEEMS that Trusted Assessor would only be for the Rev5 initial assessments and is not clear if this will stick around for 20x. However the mere suggestion of such a designation is entirely counter to the objectives of providing cost effective and industry competitive 3PAO ecosystem. Either way this is not looked upon as positive. How marketplace transparency compounds the problem: The perverse effect: Complexity and Technical Requirements Favor Well-Resourced Providers
Time Pressure Disadvantages Late-Stage Smaller Providers
We urge FedRAMP to consider the following modifications to ensure these RFCs do not inadvertently favor large incumbents: |
Beta Was this translation helpful? Give feedback.
-
|
Question: Who will be providing oversight of continuous monitoring? |
Beta Was this translation helpful? Give feedback.
-
|
FedRAMP is proposing an additional requirement for achieving “Trusted Assessor” status: Serving as the primary assessor for three (3) Cloud Service Offerings (CSOs) that achieve initial FedRAMP Validation within a 12-month period. |
Beta Was this translation helpful? Give feedback.
-
|
The sponsorless authorization path is something that I'm happy to see come to fruition. While, the removal of RAR's has been long expected and RAR's have always been a consolation prize. I hope that this is a test trial as having sponsors as optional participants in the process, willing to eat some of the cost and risk for an initial assessment, is far more ideal than the limbo many CSPs operate in. I understand the requirements for the Trusted Assessor and the need as an initial Assessment requires far more rigor and attention to detail than an annual assessment. As well as Rev 5 and generally newer CSPs are under more scrutiny due to the maturation of the FedRAMP program. That being said, 3 might be too many, as the market, especially for initial assessments, is very consolidated. A single initial seems more fair while ensuring quality. With the clarification that is due to this being a limited time pathway and restrictions need to be in place as to not exacerbate FedRAMP. |
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from GovDash on Fri Feb 20 @ 4pm. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc. GovDash is formally expressing strong interest in pursuing the sponsorless certification pathway under the evolving FedRAMP modernization framework. GovDash helps businesses win and deliver government contracts that advance American interests. Our acquisition and procurement platform is a single, secure, workflow-driven system for the full contracting lifecycle, from opportunity discovery and capture through proposal execution, award, and post-award operations. In 2025 alone, GovDash customers won more than $5B in government contracts. Our software directly supports the missions of federal procurement offices and the businesses that support them, and achieving formal, independent security validation is a strategic priority. Over the past 12 months, GovDash has made significant investments in cybersecurity and compliance. Our platform aligns with FedRAMP Moderate controls under NIST SP 800-53 Rev. 5. In December 2025, we completed a FedRAMP Moderate Equivalency assessment and now undergo monthly continuous monitoring. We have also developed internal automation capabilities that enable continuous compliance validation and structured security evidence generation across our application and infrastructure. For this sponsorless certification effort, we selected Ignyte Assurance as our 3PAO based on their expertise in continuous validation, automation-driven assessment methodologies, and multi-regulatory experience. Their technical approach aligns with the objectives of the FedRAMP 20x initiatives, particularly the emphasis on scalable, repeatable, and automation-supported validation. The sponsorless certification pathway is important to GovDash because it enables security validation grounded in technical readiness and measurable controls rather than sponsorship timing alone. As we support both contractors and agency procurement offices, a standardized and scalable authorization model is essential to responsible growth in the federal market. The Defense Innovation Unit, Navy RCO, DHS Procurement Innovation Lab are all actively seeking pilots for improving procurement processes using new technology for solicitation generation, vendor evaluation and management. FedRAMP PMO is in a fantastic position to support pre-authorization activities to accelerate agency missions. We saw your recent note on LinkedIn and strongly encourage continued development of this pathway as a viable option for serious CSPs investing in secure, scalable validation models. |
Beta Was this translation helpful? Give feedback.
-
|
The following public comment was received via email from ClassLink on Fri Feb 20 @ 9am. I am copy/pasting into the public comment record on their behalf as required by the FedRAMP public comment process. This is not an endorsement of the commenter or the content within the comment. I have adjusted the formatting so that the email displays properly with the bullets and bolded text included in the original (copy/paste into github strips this out) but have not changed any content. Any remaining oddities in the formatting may be a result of my missing a specific header/etc. ClassLink is formally expressing strong interest in pursuing the sponsorless certification pathway in partnership with our trusted 3PAO, Ignyte. By way of background, ClassLink is a cloud-based education technology company providing identity, access, and analytics solutions to K-12 and higher education institutions. We directly support DoDEA and more than 100 federally funded institutions, serving over 25 million users across 3,000+ educational organizations worldwide. We selected Ignyte Platform as our 3PAO based on their depth of experience across multiple regulatory frameworks (3PAO, C3PAO, DoD IL, ISO, PCI-DSS and others), their classified experience with the DoW and their capability to validate and continuously assess our security posture through automation-enabled processes for persistent validation. As a security-centric organization, our objective is not marketplace access as a growth mechanism. Rather, we view certification as an affirmation of our commitment to safeguarding the institutions and communities we serve. For us, this pathway represents a principled alignment with doing the right thing independent of commercial considerations. We would be disappointed to see this option no longer available, as we believe ClassLink is well-positioned to serve as a strong candidate under this model. |
Beta Was this translation helpful? Give feedback.
-
|
If there is demand, then I like the RFC. Here is some input worth considering should you have enough demand:
Reasons why it would be beneficial to allow a CSP to reuse a recently created SAR/SSP/SAP Package:
This is my input should there be enough demand. I'm not aware of the number of FedRAMP Equivalent CSPs who want to sell to the DIB and the fed gov't that are in this situation and interested. It could be zero or greater than ten. I'm not sure. I recommend to CSPs that are actually interested in this and reading this comment to put there name out there so FedRAMP has real data/examples to work off. |
Beta Was this translation helpful? Give feedback.
-
|
The FedRAMP Program Management Office objective to ensure assessor familiarity with the sponsorless authorization process is appropriate and aligned with maintaining program integrity. However, as others have mentioned, the realities of requiring three annual initial assessments per year as the primary threshold for Trusted Assessor designation may unintentionally shrink the pool of eligible 3PAOs, increase assessment costs, extend queue times / constrain assessor capacity, create market concentration risk, and create circular eligibility barriers. Familiarity with the sponsorless model is fundamentally a process and governance alignment issue. It can be effectively achieved through structured enablement mechanisms such as mandatory sponsorless process training, publication of a detailed sponsorless assessment playbook, PMO-led onboarding sessions for 3PAOs, and enhanced QA oversight during an assessor’s first sponsorless engagement. These approaches directly address process competence without limiting participation based solely on prior volume. Additionally, introducing a witness audit model—where the PMO observes actual control testing and walkthrough execution—could create a performance-based qualification mechanism. ISO certification bodies go through this same process, where their assessment process is observed and recommendations are provided to strengthen the assessment process. Observed execution is a stronger proxy for competence than historical certification counts. Requiring prior sponsorless certifications as a threshold risks concentrating work among a limited set of assessors and slowing overall program scalability. This potentially could be a particularly acute issue since it’s fair to anticipate a flood of CSPs pursuing the sponsorless path. Historically, FedRAMP authorizations have been constrained by the sponsorship requirement. Is it our view that removing the sponsor requirement but replacing it with a constrained market of ‘Trusted Assessors” will shift the authorization choke point from agencies to assessors. Performance-based and enablement-focused approach could better balance quality assurance with the capacity required to support modernization objectives. |
Beta Was this translation helpful? Give feedback.
-
CSP-AB Submits the following comment:Can FedRAMP use this as a model for CSPs that are leveraged by other CSPs (indirect demand). One of the biggest challenges is the leveraging of only FedRAMP authorized services and while that requirement has been relaxed there will still be cases where an external system would need to transmit, store or process government or sensitive data. The marketplace to be expanded so that these CSPs can get an authorization and not just a validation level from the FR PMO. |
Beta Was this translation helpful? Give feedback.
-
|
For Trusted Assessor Removing the agency sponsor bottleneck is a meaningful improvement. However, the current Trusted Assessor criteria may unintentionally shift the constraint from agency sponsorship to assessor availability and cost. If only a limited number of assessors qualify, concentrated demand could create scheduling delays that affect all CSPs, as well as pricing pressure that may disproportionately impact smaller providers. Additional clarification would be helpful regarding whether a CSP with a recent full Rev5 assessment performed by a FedRAMP-recognized assessor - and a current SAR within the active assessment cycle - may submit for Program Certification using an updated SAR that reflects delta testing, updated scans, and an updated attestation, rather than undergoing a duplicative full reassessment. For example, we are currently undergoing our full Rev5 annual assessment, expected to result in an updated SAR in July 2026. Clarifying whether such an assessment could be leveraged for Program Certification submission would improve predictability for CSPs already operating within the established Rev5 lifecycle. For Mandatory Balance Improvement Release Adoption RFC-0023 proposed that Program Certification submissions must implement all Balance Improvement Releases at the time of submission. In RFC-0020, the Rev5 Balance Improvement Releases are associated with the proposed Certified level 4 designation. Should sponsorless Program Certification therefore be understood as aligning with Certified Level 4 expectations, rather than the Certified Level 3 (Moderate) authorization? Clarification on this alignment would help CSPs plan implementation scope, resourcing, and certification strategy. |
Beta Was this translation helpful? Give feedback.
-
|
LPC-GEN-ATA Assessment by Trusted Assessor
LPC-GEN-LVL Level Limited
LPC-TIM-EOL End of Life for Legacy Program Certification
|
Beta Was this translation helpful? Give feedback.
-
|
The introduction of a sponsorless option represents a significant advancement for all CSPs. Regarding the initial beta requirements for Rev5 Balance Improvements, we are prepared to commit to these terms as they provide a clear and tangible path forward. |
Beta Was this translation helpful? Give feedback.
-
|
I absolutely love the idea of the Program Certification for both 20x and Rev5. The only issue I have is with the time limit. With DoD/DoW not wanting to adopt 20x (at least for now), there is still a need for CSPs to invest in Rev5 as the DoD/DoW IL baselines build off of Moderate. What would make zero sense is for an organization to do 20x for FedCiv and then have to go build a Rev5 environment for DoD/DoW, but instead build a Rev5 environment that can be Certified for FedRAMP and then authorized by DISA at the appropriate IL level. But by time-bounding this to only 2026, it leaves organizations in 2027 right where they are today. My suggestion is, until DoD/DoW is open to adopting the 20x baseline, FedRAMP should be willing to review both styles of package and issue program certifications, allowing organizations to implement the baseline of their choosing based on their addressable market. Reuse of effort is key here for the CSP market. |
Beta Was this translation helpful? Give feedback.
-
|
Comments from Fortreum:
Thanks! |
Beta Was this translation helpful? Give feedback.
-
|
Given the sustained difficulty CSPs have faced in securing agency sponsors, this is a practical and much appreciated evolution—even if intended as a temporary measure. Regarding LPC-GEN-IBR, I support the concept of collaborative continuous monitoring (CCM), but I am concerned that agencies unwilling to sponsor may also be reluctant to meaningfully participate in CCM activities. CSP must / will do their part but any measures to help with engagement would strengthen this provision. For LPC-GEN-IRI, I strongly support efforts to reduce churn and back-and-forth during intake and review. However, given the number of new requirements and the flexibility in implementation approaches, there may be situations where CSPs and assessors reasonably believe they have met requirements but FedRAMP disagrees or requests additional detail. It would be unfortunate for CSPs to incur a one- or three-month resubmission delay due to good-faith misunderstandings. The approach should distinguish between material deficiencies and clarification gaps, and should also provide clear guidance on constitutes a “complete” package so all parties (CSP, 3PAO, and FedRAMP) are in alignment. Again, thank you for this proposal. It could really address what has been a long standing bottleneck in the ecosystem. |
Beta Was this translation helpful? Give feedback.
-
|
RFC-0023: Rev5 Program Certifications (No Sponsor Required) I appreciate the opportunity to comment on RFC‑0023. I am submitting this feedback in an individual capacity as a FedRAMP senior assessor and practice lead who actively supports cloud service providers in meeting FedRAMP requirements. I support the sponsorless path as a time‑limited bridge for qualified providers while the ecosystem transitions toward FedRAMP 20x. To improve clarity and fairness, the comments below focus on Trusted Assessor criteria, corrective action processes, program mechanics and alignment with related RFCs. Perspective: Senior assessor, implementation‑focused, seeking objective, auditable and fair requirements.
Personal capacity note: This comment is submitted in an individual capacity and does not represent any employer or organization. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
RFC-0023 Rev5 Program Certifications
❓ Please note that FedRAMP will not answer questions in this thread as it is reserved for public comment. If you would like to ask a question or generally discuss this RFC informally, please use the General discussion / Q&A for RFC-0019 through RFC-0024 thread. Thank you!
Status: Closed
Start Date: January 13, 2026
Closing Date: February 26, 2026
Summary
This RFC proposes a time-limited opportunity for cloud service providers who have already completed significant progress towards a FedRAMP Rev5 Certification but are struggling to find an agency sponsor due to budgetary constraints with agency information security programs. FedRAMP will offer program authorizations for FedRAMP Certification to cloud service offerings at Level 1-4 to cloud service providers who adopt certain optional Rev5 Balance Improvement Releases and undergo a complete independent assessment.
This RFC also proposes a timeline for phasing out FedRAMP Ready in favor of this new path and FedRAMP 20x Validations.
This RFC is aligned with other concurrent RFCs that have additional detail on specific topics but have been published separately to encourage topic-specific comments:
Background
The primary benefit of the agency authorization path for FedRAMP is the distribution of initial costs across the federal government: the legacy Rev4 and Rev5 authorization paths were so expensive for the government that each such initial authorization might cost hundreds of thousands of dollars while ongoing continuous monitoring can cost tens of thousands of dollars. Centralizing authorization along these paths in a single entity like FedRAMP would require considerably more than the $25mil allocated at peak for FedRAMP in FY24 (let alone the $10mil budget FedRAMP operates on today).
A year ago FedRAMP had a backlog of 100+ cloud services waiting for final assessment and authorization and nearly all funding and resources went to eliminating that backlog during the last half of FY25. This was highly successful, and for the last few months there have been less than 10 cloud services in that final review queue for FedRAMP Certification at any given time.
FedRAMP 20x has also focused on making significant improvements to the underlying authorization requirements to drastically reduce the cost and resources required for government review so that FedRAMP can perform a final assessment and authorization for a tiny fraction of this cost. Many of these improvements are being made available along the Rev5 path in the form of Balance Improvement Releases - typically optional changes to the process that results in a quicker, cheaper, more efficient initial and ongoing authorization process.
Motivation
For many years the struggle for agency sponsorship has been the single biggest challenge for cloud service providers to overcome while seeking a FedRAMP authorization. This struggle is even harder today as budgets and resources for many agency information security programs shifted unexpectedly. Many cloud service providers have invested significant effort and funding into the Rev5 authorization path and have realistic demand from agencies but are still unable to finalize an authorization due to the complexity of agency sponsorship expectations.
FedRAMP has spent the past year under an aggressive multi-faceted modernization effort to eliminate the years-long FedRAMP authorization backlog while building and piloting a more efficient and more secure approach to assessment and authorization. Many cloud services that invested in the legacy Rev5 path are interested in the modern approach but are caught between continuing forward on that path or waiting for a formal 20x path that will likely require significant rework in the short term.
At FedRAMP’s current staffing level, and assuming successful implementation of our FY26 and FY27 staffing plan, we are able to take on more Rev5-based assessment and authorizations than we are currently receiving from agency authorizations. We estimate that by applying the improvements to the Rev5 process available via Balance Improvement Releases that we may be able to complete 40-50 program authorizations for Rev5 this year while demand for 20x authorizations builds.
Opening a sponsorless Rev5 Certification path will provide a release valve for agencies and cloud service providers that are currently stuck in limbo pending wide-scale adoption of FedRAMP 20x at the risk of providers investing in a process that will soon be defunct. Nonetheless, given FedRAMP’s mission to ensure civil servants have access to all the modern tools and capabilities that they need, supporting Rev5 Certification for services that are almost ready to go over the next year is the right thing to do.
Ultimately it is up to each business to make its own determination about how to invest resources; if a business wants to invest in a Rev5 Certification while knowing this path is a legacy path that will be phased out over the next few years then so be it; FedRAMP will ensure agencies can use that product in the interim.
Retiring FedRAMP Ready
FedRAMP Ready will be rapidly phased out to prevent unnecessary investment and make room for this new Certification path.
The proposed process for retiring FedRAMP Ready on July 28, 2026 is as follows:
Proposed Requirements for Rev5 Program Certification
The following term will be defined in FedRAMP materials related to these requirements:
Trusted Assessor: A FedRAMP-recognized independent assessor with no corrective action in the last 12 months that was the primary assessor for 3 cloud service offerings granted initial FedRAMP Certification in the last 12 months is trusted for FedRAMP Certification; OR a FedRAMP-recognized independent assessor with no corrective action in the last 12 months that was the primary assessor for 3 cloud service offerings granted initial FedRAMP Validation in the last 12 months is trusted for FedRAMP Validation.
Notes:
Trusted assessor status applies at the beginning of an assessment - if a trusted assessor loses that status during the assessment, FedRAMP will not hold this against either the cloud service provider or the independent assessor.
FedRAMP will note trusted assessor status on the FedRAMP Marketplace.
The following requirements apply for all cloud services that wish to obtain and maintain a FedRAMP Program Certification for Rev5 without an agency sponsor; these requirements must be met and assessed prior to submission to FedRAMP.
LPC-FRX-MCM Minimum Continuous Monitoring
LPC-FRX-GRC Prioritization of Some GRC Tools
LPC-GEN-PRE Preparation State Listing Required
LPC-GEN-LVL Level Limited
LPC-GEN-IBR Implement Balance Releases
LPC-GEN-LMR Legacy Machine-Readable Package Requirements
LPC-GEN-MBA Mandatory Balance Improvement Release Adoption
LPC-GEN-ATA Assessment by Trusted Assessor
LPC-GEN-IRI Included Required Information
LPC-GEN-AVV Assessors Verify and Validate All Requirements
LPC-TIM-EOL End of Life for Legacy Program Certification
Beta Was this translation helpful? Give feedback.
All reactions