General discussion and Q&A for RFC-0019 through RFC-0024! #115
Replies: 27 comments 65 replies
-
|
General question about the impact of 20x Moderate program on the Pen Test and Red Team Exercise required for Rev5 approval. Is there any change with 20x, or are the same Pen Test and Red Team Exercise required to secure FedRAMP Moderate through 20x? Thank you. |
Beta Was this translation helpful? Give feedback.
-
|
RFC-0019: Reporting Assessment Costs question
Quick clarification question to make sure Im reading this correctly. Does this part |
Beta Was this translation helpful? Give feedback.
-
|
Please Note: This comment is from @jsantore-cgc originally posted in this thread. I've moved this comment here to ensure it is captured in the general discussion thread on his behalf and closed the original thread. Original post follows. Let's try this again. After a wonderfully eloquent, convincing, and dare I say poetic discussion about this, my attempts to post failed, and all of that work went to /dev/null never to be seen again. So I will try this again. With many of the new RFCs, we see a lot of public notice of corrections. I'm not sure philosophically I agree with this, but put that aside for a moment. Any time there is a public punitive mechanism, there needs to be checks and balances, appeals, and other clearly defined processes to ensure fairness. The 3PAO corrective action details are in the Performance Management section (pg 4) of the Obligations and Performance Guide: The CSP corrective action details are in the Continuous Monitoring Playbook In both cases, there is an implied buffer before things are publicly posted:
For the CSP, it starts with a Detailed Finding Review (DFR) prior to escalation to a CAP. My concern is that starting with public notification/punitive measures acts to undermine good faith. Different stakeholders, operating transparently and in good faith, can have valid disagreements which do need to be discussed and resolved, but we shouldn't immediately jump to a CAP/public shaming. At least not initially. That forces people to be adversarial from the start, inhibits transparency, and forces everyone to play defense. I think we all agree that this is not in the best interest of our shared mission: securing and protecting government systems and data. Unfortunately, it didn't always play out that way historically. There was no presumption of good faith, and disciplinary measures were often meted out unlaterally with no mechanism to appeal. Thankfully, most of these typically got resolved with no harm and no foul, and did not (and should not) necessarily require public notification. There are potentially large sums of money and contractual obligations at stake here, and so corrective actions should be tempered with an initial presumption of good faith, and have a process for review and appeal. Even things we think are cut and dried aren't always. Consider the the RFC for 'Recommended Secure Configuration' (which is required, not recommended, but whatever...) Of those 10 standards, only two are technically 'MUST' but even there, there's room for interpretation and the guidance isn't always explicit. Let's say I, as a CSP, work in good faith to meet all 10 standards and upon review, FedRAMP does not agree with my interpretation. Again, I'm operating in good faith, transparently, and collaboratively. If FedRAMP does not agree, it seems reasonable to assume the next step is a discussion, and a cure period before there is any formal corrective action. I agree, bad faith in our world is bad and should be punished harshly and swiftly. Even still, though, there needs to be an adjudication of whether something was actually bad faith, and not just honest mistake. Also, the more I read some of the RFCs, the more 'corrective action will include...' type language which does not completely align with the 3PAO Obligations and Performance Guide and CSP Continuous Monitoring Playbook (e.g. unable to resubmit for X months or whatever). Since it looks like we're moving in the way of stricter corrective action and public notification, I think fairness and reasonableness requires both more clear definitions of these (perhaps an RFC itself?), as well as predefined mechanisms for appeal and review. |
Beta Was this translation helpful? Give feedback.
-
|
This question is targeted for RFC-0023. We lost our sponsor during the DOGE and our SAR package was never picked up and reviewed by the sponsoring agency. Our SAR just recently expired (1/17/2026). Could we still submit our package for FedRAMP to review once this RFC closes and get an ATO? |
Beta Was this translation helpful? Give feedback.
-
|
Reference RFC 0023 and the "Mandatory" "Optional" Rev5 Balance Improvement Releases. Our organization has completed the Full FedRAMP Moderate / NIST 800 53 MBL that the DoD mandated via the "Memorandum on FedRAMP Moderate Equivalency" from January 2024. In our execution of the Rev5 process we leveraged all FedRAMP Rev5 templates for the SSP and all appendices. We were assessed by a FedRAMP certified 3PAO and were given a passing assessment and letter of attestation. We produced a complete Body of Evidence as well. My ask for clarification is why is the MAS now Mandatory for us to go forward with a FedRAMP Certification (L4) if the MAS clearly states that if we have already a Rev5 based capture via the current Rev5 SSP template we do not have to go with the 20x MAS? Also - regarding the Significant Change Notifications, assuming we can continue with our existing Rev 5 SSP Front Matter documentation of the Authorization Boundary - we would also not be required to implement (at the time of application package submission) the SCN? |
Beta Was this translation helpful? Give feedback.
-
|
Pete,
First, thank you for the clarification. We (Egnyte) do not expect for you
to leverage our NIST / DoD FedRAMP Moderate Equivalency - I am just stating
that we have gone through this and have a complete BoE based on all FedRAMP
rev5 SSP templates.
It is also now clear that "if" we want to pursue the FedRAMP Rev 5
Certification / Sponsorless program. as proposed in RFC 0021 / 0023, being
aware that these are still RFCs and requirements may change, that we
(Egnyte) will have to accommodate all mandatory requirements for the
program.
Got it and thank you.
By the way, it is ok, we have been working to get a sponsor for years and
got caught up in all the wash - now that we have taken the Rev 5 path, been
assessed and validated by FedRAMP 3PAO, and are in a validated monthly
ConMon, we are good to keep going the Rev 5 Balance Improvement path.
- All the current USG Agencies we are working with now on sponsorship
are familiar with Rev 5 and know nada about 20x - we have to be the
educators in this respect.
Ok - as a company then, there are the the following Rev 5 Balance
Improvement Releases that will most likely be mandatory for the Sponsorless
FedRAMP Certification Program,
- FedRAMP Security Inbox
- Recommended Security Configuration
- Minimum Assessment Scope
- Significant Change Notification
- Authorization Data Sharing
- Vulnerability Detection and Response
- Collaborative Continuous Monitoring
As a company, we will be working the year to make sure we meet these and
all the recommendations (Musts and Shoulds) as defined.
Thank you again Sir,
Good stuff!!!
…On Mon, Jan 26, 2026 at 5:21 AM Pete Waterman ***@***.***> wrote:
Please note: FedRAMP does not provide guidance about FedRAMP Moderate
Equivalency or CMMC, those are both DOD things.
FedRAMP will not authorize services that are outside the scope of FedRAMP
(see MKG-GEN-SOF Scope of FedRAMP in RFC-0021
<https://www.fedramp.gov/rfcs/0021/> and the scope of FedRAMP defined in
M-24-15 <https://www.fedramp.gov/docs/authority/m-24-15/scope/>).
Also, a general reminder, RFC's are requests for comment on proposals and
not final guidance of any kind or even a guarantee that the proposal will
be implemented.
My ask for clarification is why is the MAS now Mandatory for us to go
forward with a FedRAMP Certification (L4) if the MAS clearly states that if
we have already a Rev5 based capture via the current Rev5 SSP template we
do not have to go with the 20x MAS?
RFC-0023 explains the reasoning behind this requirement for program
certification in the background:
*"FedRAMP 20x has also focused on making significant improvements to the
underlying authorization requirements to drastically reduce the cost and
resources required for government review so that FedRAMP can perform a
final assessment and authorization for a tiny fraction of this cost. Many
of these improvements are being made available along the Rev5 path in the
form of Balance Improvement Releases - typically optional changes to the
process that results in a quicker, cheaper, more efficient initial and
ongoing authorization process."*
Proper adoption of the Minimum Assessment Scope makes a more efficient
authorization process. The MAS is *not* a requirement for agency
authorization, it would only be required if FedRAMP itself is going to
invest the resources for the full program certification.
we would also not be required to implement (at the time of application
package submission) the SCN?
RFC-0023 proposes that program certification will only be available to
services that have implemented all Balance Improvement Releases at the time
of submission. These would need to be independently verified and validated
by an assessor in advance of submission.
—
Reply to this email directly, view it on GitHub
<#115 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BSSZSEOIIPM2Q7L6Z2FWQR34IYIF7AVCNFSM6AAAAACRSJ24HOVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTKNRQGYYTENY>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
Question on RFC-0024, what is the general readiness of FedRAMP and of agencies to consume machine readable packages? |
Beta Was this translation helpful? Give feedback.
-
|
Do you plan to publish the RFCs on GitHub in Markdown? This would be useful to quickly follow changes to the RFCs as they are revised over time. @pete-gov mentioned on the 2-4-2026 community call that the RFCs are already in Markdown format in a private repo. Can these be published publicly? |
Beta Was this translation helpful? Give feedback.
-
Public Comment on RFC-0021: Expanding the FedRAMP MarketplaceFirst and foremost, we want to apologize upfront for the length of this comment. We are strong advocates of FedRAMP and genuinely enthusiastic about the modernization efforts underway, including the 20x initiative and the broader push toward transparency and efficiency. We believe the PMO is moving the program in the right direction, and we want to be constructive partners in that effort. That said, certain aspects of RFC-0021 raise significant concerns for our organization and, we believe, for the broader FedRAMP ecosystem. We felt it was important to articulate those concerns thoroughly rather than superficially. We hope this comment is received in the spirit it is intended: as a good-faith effort to improve the proposal, not to obstruct progress. Background: Advisory-Focused 3PAOsOur organization is a 3PAO on the FedRAMP Marketplace that focuses primarily on advisory services. We want to be transparent about our position: we have a financial stake in this discussion, and we recognize that some may view our comments through that lens. We ask that our arguments be evaluated on their merits regardless. When we pursued A2LA accreditation years ago, we did so with FedRAMP's full knowledge that we intended to focus on advisory work. FedRAMP listed us on the marketplace under this model, and we have operated transparently in this capacity ever since. Our clients engage us specifically because we offer the technical rigor of an accredited organization without the conflict of interest that arises when the same firm advises on and then assesses a security program. We raise this history because some may ask why an organization that focuses on advisory services sought accreditation as an assessor. The answer is that for many of our customers, the accreditation demonstrates technical competence, and technical competence matters for advisory work. We maintain full assessment capabilities and could perform assessments for the right client engagement. Our business focus on advisory services is a strategic choice, not a limitation of capability. FedRAMP's decision to list 3PAOs on the marketplace reflected an understanding that CSPs benefit from having access to conflict-free advisors with verified qualifications. That understanding appears to have changed, and we believe the change warrants careful examination. The Recategorization ProblemWe anticipate that FedRAMP may respond to concerns like ours by noting that advisory-focused 3PAOs are not being eliminated, merely recategorized. Under this view, we would simply move from the 3PAO listing to the Advisory Services listing, and business would continue as usual. Some may further argue that our A2LA accreditation remains intact regardless of marketplace listing, and that we can continue to display our credentials on our own website and marketing materials. If our value proposition is real, the argument goes, the market will recognize it without needing a government URL. This framing understates how the FedRAMP ecosystem actually works. For federal contractors, agencies, and CSPs navigating the authorization process, the FedRAMP Marketplace is not merely a directory. It is the definitive source of truth. When procurement officers evaluate potential service providers, marketplace presence and categorization carry significant weight. Being listed as a 3PAO signals that an organization has met rigorous, third-party-verified standards for technical competence. Being listed as an advisor under the proposed MKT-ADV-* requirements signals only that an organization has a website, three client attestations, and contact information. If 3PAOs who do not perform assessments (or have not yet) are removed from the 3PAO listing, it does not simply change their category. It signals to the market that they have been decertified or are no longer in good standing. It forces affected organizations to explain a negative ("We are still accredited, we just aren't on the list anymore") rather than proving a positive. The government creates the market conditions in the FedRAMP ecosystem; changing the labeling schema has consequences for organizations that built their reputations within the existing framework. For CSPs evaluating potential advisors, believe it or not, the 3PAO designation is often one of the deciding factors, as evident by many of our clientele. It answers the question: "How do I know this firm actually knows what they're doing?" If advisory-focused 3PAOs are moved into a category with no competency requirements, that signal disappears. CSPs would have no way to distinguish between a firm that invested years and substantial resources in earning accreditation and a firm that set up a website last month. Some may argue that the market can sort this out, that sophisticated CSPs can evaluate advisors based on track record and reputation without relying on accreditation. We respectfully disagree. The FedRAMP market includes many first-time participants who lack the institutional knowledge to evaluate advisor qualifications independently. These CSPs rely on marketplace signals precisely because they cannot yet distinguish between qualified and unqualified guidance. Removing the only objective quality signal does not empower the market; it leaves inexperienced buyers vulnerable to poor advice. Due Process and Equal Treatment ConcernsThe note under MKT-RIA-ATT states that "FedRAMP recognized independent assessors that do not actually perform independent assessments will be removed from the Marketplace to avoid confusion." We have significant concerns about how this determination would be made and applied. Lack of Defined CriteriaThe RFC provides no criteria, process, or evidentiary standard for determining which 3PAOs "do not actually perform independent assessments." Who makes this determination? What factors are considered? Is it based on historical assessment volume? A stated business model? Marketing language? The RFC is silent on these questions, leaving the decision entirely to the discretion of the PMO without any defined parameters or accountability. Equal Treatment ConcernsWe note that there are currently fifteen 3PAOs listed on the FedRAMP Marketplace with zero completed assessments. Some of these organizations are traditional audit firms that maintain their accreditation and qualified staff but have not yet completed a FedRAMP assessment for various business reasons. Others may be newer entrants still building their practice. Still others, like our organization, focus their business development efforts on advisory services while maintaining full assessment capabilities. Under the language of this RFC, all fifteen of these organizations could potentially be subject to removal. Yet we suspect the PMO's intent is more targeted. If so, the RFC should clearly articulate the criteria that distinguish a 3PAO that "does not actually perform assessments" from one that simply has not yet performed assessments, or one that performs assessments selectively, or one that focuses on advisory work while retaining assessment capabilities. Without such criteria, the PMO would be making subjective, case-by-case determinations about which accredited organizations deserve marketplace recognition and which do not. If two 3PAOs both show zero assessments on the marketplace, both maintain A2LA accreditation, both employ qualified assessors, and both pay their annual certification fees, on what basis would one be removed while the other remains listed? The RFC provides no answer. The result is a policy that could be applied arbitrarily, favoring some organizations over others based on factors that are neither disclosed nor subject to review. Accreditation vs. ActivityMost fundamentally, we question the authority and appropriateness of removing 3PAO marketplace status from an organization that maintains all accreditation requirements. Our organization holds current A2LA accreditation. We employ qualified personnel. We meet every technical and administrative requirement that FedRAMP and A2LA impose on 3PAOs. We recertify annually like every other accredited assessor. We have the demonstrated capability to perform assessments and would do so for clients whose engagements meet our terms. The fact that we focus our business development on advisory services does not mean we lack assessment capability. It means we have made a business decision about where to concentrate our efforts. That decision could change. A client with the right circumstances could engage us for assessment work, and we would be fully qualified to perform it. Focusing on advisory work is not the same as being incapable of assessment work, and the RFC conflates these two very different situations. By removing marketplace recognition from a 3PAO that maintains all requirements, FedRAMP would effectively be making a business judgment about how accredited organizations should allocate their resources. It would be telling qualified firms that their accreditation is insufficient unless they also generate assessment revenue. This goes beyond marketplace organization into active market interference, handicapping a private company's ability to compete for work despite that company meeting every objective qualification standard. Questions for FedRAMPWe would ask FedRAMP to consider:
We are not seeking special treatment. We are seeking clarity, consistency, and due process. If FedRAMP believes that 3PAO marketplace listing should be contingent on assessment activity rather than accreditation status alone, that represents a significant policy change that should be clearly articulated, applied uniformly, and subject to defined procedures. The current RFC language, which simply states that certain organizations "will be removed" without specifying how or why, does not meet that standard. Why Advisor Competence Serves FedRAMP's InterestsWe recognize that some within FedRAMP may view advisor qualifications as outside the program's scope. The argument is straightforward: FedRAMP's statutory mandate is to authorize secure cloud services for the federal government. The program accredits assessors because the government relies on their testing to make risk decisions. Advisors, by contrast, work for CSPs, not the government. Under this view, it is not the government's role to certify, accredit, or tier private-sector consultants. We would offer a different perspective, one grounded in the practical realities of the authorization pipeline. The "Garbage In" ProblemThe PMO has long identified package quality as a significant challenge. Initial submissions frequently contain gaps, inconsistencies, and errors that require multiple rounds of revision before authorization can proceed. This "garbage in" problem contributes directly to the backlog that frustrates agencies, CSPs, and FedRAMP alike. Every deficient package consumes reviewer time that could be spent on well-prepared submissions. Poor advisory work is often the root cause. When a CSP engages an unqualified advisor, the resulting SSP, SAR, and POA&M reflect that lack of expertise. Controls are implemented incorrectly. Documentation fails to meet requirements. Boundary definitions create confusion. The assessor may identify these issues, but by then the problems are baked into the submission. The PMO inherits packages that require extensive remediation. Qualified advisors produce better packages. Organizations with demonstrated expertise in NIST 800-53, FedRAMP requirements, and cloud security architecture guide their clients toward compliant implementations from the outset. The resulting submissions are cleaner, more complete, and easier to review. This is not speculation; it is the predictable consequence of engaging qualified guidance early in the process. By removing the distinction between A2LA-accredited advisors and firms with no verified qualifications, FedRAMP is not simply reorganizing a directory. It is eliminating the only quality filter that currently helps CSPs identify advisors likely to produce authorization-ready packages. The result will be more CSPs engaging unvetted advisors, more deficient initial submissions, and more strain on an already overburdened review process. Preserving a quality signal for advisory services is not about helping accredited firms sell services. It is about helping FedRAMP receive better deliverables. FedRAMP 20x Makes This Even More CriticalEverything we have described above applies to the traditional authorization process. With FedRAMP 20x, the stakes are higher. However, it also raises the technical bar significantly. Under the traditional model, an advisor's primary deliverables were documentation: SSPs, policies, procedures, and assessment-ready artifacts. Under 20x, advisors must guide CSPs through implementing automated evidence collection, configuring systems to produce machine-readable compliance data, and architecting environments that can demonstrate security posture continuously rather than at a point in time. This requires genuine engineering depth, not just familiarity with NIST 800-53 control language. The margin for error also shrinks. In the traditional process, a human assessor could identify implementation gaps, ask clarifying questions, and work with the CSP to remediate issues before the package reached the PMO. The 20x model reduces that human review layer. Automated validation is binary: the KSI evidence either meets the requirement or it does not. If an unqualified advisor guides a CSP toward an implementation that cannot produce valid KSI evidence, there is no assessor in the loop to catch the mistake before it becomes a rejection. Put simply, 20x shifts more of the quality burden upstream, directly onto the advisory phase. The advisory engagement becomes the primary human touchpoint where implementation quality is determined. If that guidance is sound, the CSP enters the automated validation process well-positioned to succeed. If it is not, the CSP fails validation with less opportunity for human intervention to course-correct. We believe this makes the current moment particularly important for preserving quality signals in advisory services. As FedRAMP raises the technical bar through 20x, the need for qualified, technically rigorous advisors grows in proportion. We are concerned that lowering the barrier to advisory listing while simultaneously demanding higher technical sophistication from CSP implementations could work at cross-purposes, potentially slowing the very modernization effort that FedRAMP is working to accelerate. We raise this not as a criticism of 20x, which we genuinely support, but as a reason to be more deliberate, not less, about how the marketplace signals advisor quality during this transition. Why Advisor Competence Matters for CSPsThe MKT-ADV-* requirements establish no accreditation, certification, or technical competency standards for advisory services. We understand the appeal of a low barrier to entry: it encourages competition, avoids regulatory overreach, and lets the market determine which advisors succeed. Some may characterize a proposal for quality differentiation as gatekeeping, arguing that the only "good" advisors would be those wealthy enough to afford A2LA accreditation fees, while brilliant boutique consultants who know NIST 800-53 inside out would be locked out. We respectfully disagree with this framing. In cybersecurity, "trust but verify" is not gatekeeping; it is the baseline expectation. ISO 17020 accreditation is not merely paperwork. It ensures impartiality, technical consistency, and adherence to quality management standards. If a boutique firm is truly expert in FedRAMP requirements, meeting those standards should not be an insurmountable barrier. The accreditation process exists precisely to distinguish verified competence from self-reported expertise. The government relies on standards for virtually everything in the security and compliance space. Federal agencies require ISO 27001 certification for certain contractors. FedRAMP itself is built on NIST frameworks. The entire 3PAO program exists because self-attestation is insufficient for consequential security decisions. If standards matter for assessment, they should matter for advisory work as well, particularly given that advisors shape the security programs that assessors later evaluate. Lowering the bar to "anyone with a website and three attestations" does not democratize the advisory market. It degrades it. CSPs seeking qualified guidance would have no reliable way to distinguish verified expertise from confident marketing. Advisors Shape OutcomesAdvisors guide organizations through the entire FedRAMP journey. They help CSPs make foundational decisions about architecture, control implementation, boundary definition, and documentation. These early decisions shape everything that follows. An assessor evaluates a security program after it has been built; an advisor influences how it gets built in the first place. When an unqualified advisor provides poor guidance, the consequences compound. A CSP may spend months implementing controls incorrectly, developing documentation that does not meet requirements, or designing an architecture that cannot support the security objectives. By the time an assessor identifies these problems, the CSP has invested significant time and money in a flawed approach. In some cases, the CSP must start over. If FedRAMP requires rigorous accreditation for the entity that checks the work, it seems incongruous to require nothing for the entities that typically guide CSPs on how the work gets done. Conflict of Interest ImplicationsFedRAMP has long recognized the importance of separating advisory and assessment functions. Existing rules prohibit a 3PAO from assessing a system on which they provided advisory services. We acknowledge these safeguards and do not suggest they are being removed. Our concern is more subtle. If advisory-focused 3PAOs are recategorized into a listing with no quality differentiation, and if CSPs seeking qualified guidance cannot distinguish accredited advisors from unaccredited ones, the path of least resistance becomes engaging a 3PAO that offers both services. Those firms retain their accreditation signal. They can demonstrate verified competence. For a CSP trying to make a sound procurement decision, the 3PAO with both capabilities looks like the safer choice. The existing COI rules would still apply: the same firm could not advise and assess the same system. But the market pressure this RFC creates would push more CSPs toward firms that offer both services, increasing the likelihood of creative interpretations, staff rotations, or other arrangements that technically comply with COI rules while undermining their intent. We have seen these dynamics play out in other compliance markets, and we are concerned about replicating them here. Advisory-focused 3PAOs exist to give CSPs a third option: verified competence without the COI risk. Eliminating the quality signal that distinguishes this option does not eliminate demand for qualified, conflict-free advisory services. It simply makes that demand harder to satisfy. Concerns Regarding Advisory Service RequirementsRFC-0021 proposes that advisory firms listed on the marketplace "MUST have an appropriate web site that publicly shows...Types of consulting services offered, including a clear pricing structure." We wish to raise several concerns about this requirement. Statutory AuthorityWe note that the FedRAMP Authorization Act (44 USC 3607-3616) does not mention advisory services. The statute's scope is limited to cloud computing products and services, independent assessment services (defined as third-party organizations performing conformity assessments), and the authorization process itself. While FedRAMP may argue that marketplace listing is voluntary and therefore these requirements do not constitute regulation, we would ask for clarification on the authority under which FedRAMP proposes to mandate pricing disclosure for private-sector consultants who are not performing conformity assessments. Pricing Transparency and Complex EngagementsMore substantively, we question whether a "clear pricing structure" requirement serves CSPs well when applied to advisory services. We recognize and support the goal of price transparency. CSPs benefit from understanding the cost landscape before engaging service providers. However, the implementation assumes that advisory work can be meaningfully reduced to a published price list, and this assumption does not reflect how complex advisory engagements actually work. Not all advisory engagements are equal. A gap assessment for a mature organization with existing compliance infrastructure looks very different from a gap assessment for a startup building from scratch. A readiness engagement for a straightforward SaaS application differs fundamentally from one involving complex hybrid architectures, multiple interconnected systems, or significant engineering work to achieve compliance. Advisory firms that provide deep technical and engineering services cannot accurately represent their pricing in the same format as firms offering commoditized, checklist-driven consulting. The requirement for a "clear pricing structure" implicitly favors standardized, lower-touch advisory models. Firms that offer templated approaches can publish fixed prices because their scope is predictable. Firms that tailor their work to each client's architecture, maturity level, and specific challenges cannot meaningfully do the same without either understating their value or posting ranges so broad as to be uninformative. Practical Market EffectsWe are also concerned about the practical effects of published pricing on how CSPs evaluate potential advisors. In our experience, publishing price ranges can cause prospective clients to self-select out before understanding the value proposition. We have had multiple engagements where a CSP initially contacted us solely to satisfy their organization's "three vendor" procurement requirement, with no intention of pursuing our services because our published range appeared to exceed their budget. Yet once they had an opportunity to speak with us and understand our approach, they recognized the value and signed with us regardless of the initial range concern. This dynamic would be disrupted by a marketplace that emphasizes pricing as a primary comparison metric. CSPs browsing the advisory listings may filter or sort by price, dismissing higher-value providers before ever engaging in a conversation. The result is not better-informed procurement decisions but rather a race toward the lowest published price point, which often correlates with less thorough, less technical, and ultimately less effective advisory work. A Suggested AlternativeWe are not opposed to price transparency in principle. We simply observe that a requirement designed for commoditized services may not translate well to complex, engineering-intensive advisory work. A CSP comparing advisory firms based on a published price grid is likely comparing fundamentally different scopes, approaches, and levels of expertise, none of which the pricing field can convey. If FedRAMP's goal is to help CSPs make informed decisions about advisory services, we would suggest that qualitative information, such as areas of specialization, technical certifications, client references, and demonstrated expertise, may be more valuable than a pricing structure that cannot capture the variability inherent in serious advisory work. At minimum, we would ask that FedRAMP consider allowing advisory firms to indicate that pricing is engagement-dependent and available upon consultation, rather than requiring a public price list that may mislead more than it informs. Statutory ConsiderationsThe FedRAMP Authorization Act defines FedRAMP's scope around cloud computing products, services, and "independent assessment services." Advisory services are not mentioned in the statutory framework. We recognize that marketplace listing is voluntary. FedRAMP is not requiring advisory firms to do anything; it is simply setting criteria for who appears in a directory. Under this view, concerns about regulatory authority are misplaced. We would offer a practical counterpoint. The FedRAMP Marketplace has become the de facto mechanism through which agencies discover and evaluate cloud services and the firms that support them. For service providers, marketplace presence is not optional in any meaningful sense. Being unlisted, or being listed in a category that conveys no quality signal, has real market consequences that function similarly to regulatory exclusion even if they are not legally equivalent. We do not claim that FedRAMP lacks authority to organize its marketplace as it sees fit. We simply observe that the practical impact of these organizational decisions extends beyond mere categorization, and we ask that FedRAMP consider those impacts carefully. A Constructive Path ForwardWe recognize that our recommendation may appear self-serving. We are proposing a framework that would preserve a category in which we currently hold a competitive advantage. We ask that the proposal be evaluated on whether it serves CSPs, agencies, and FedRAMP's operational efficiency, not on whether it benefits us. We also understand the PMO's desire to ensure the "Assessor" list contains only organizations that actively perform assessments. When an agency or CSP clicks on the 3PAO listing, they reasonably expect to find firms that conduct assessments. Having some entries represent organizations that focus primarily on advisory work could create confusion and degrade the user experience. We take this concern seriously. However, we believe this is a categorization challenge that can be solved through user interface improvements rather than by removing qualified firms from the marketplace entirely. De-listing is a disproportionate response to what is fundamentally a labeling and filtering problem. Proposed Tiered FrameworkOur suggestion is a tiered approach to advisory listings, implemented through marketplace filters or distinct tabs: Tier 1 (Accredited Advisory) would include 3PAOs that maintain A2LA accreditation and focus primarily on advisory services while retaining assessment capabilities. These firms have demonstrated competence through the same process required of assessment-active firms and remain subject to ongoing oversight. Any organization willing to invest in accreditation could qualify for this tier; it is not limited to current participants. This tier could appear under an "Accredited Advisory" filter or tab, clearly distinguished from the "Assessment Services" listing while retaining recognition of verified A2LA status. Tier 2 (Non-Accredited Advisory) would include firms meeting the proposed MKT-ADV-* requirements without accreditation. This tier would remain open to any organization that meets the website, attestation, and contact information requirements. Benefits of This ApproachThis approach:
Some may argue that a tiered system adds complexity to a marketplace that should be simple. We would respond that meaningful distinctions are worth preserving, particularly when they help buyers make better decisions and improve the quality of submissions entering the review process. A marketplace that lists all advisors identically regardless of qualifications is simple, but it is not informative. The goal should be clarity, not just brevity. ConclusionWe support FedRAMP's efforts to improve marketplace transparency. We share the goal of helping CSPs find qualified assistance and navigate the authorization process more efficiently. Our concern is that the current proposal achieves the opposite of its intent. By recategorizing accredited 3PAOs that focus on advisory services into a listing with no quality threshold, and by creating no meaningful standards for advisory competence, this RFC would eliminate the primary signal CSPs use to identify qualified, conflict-free advisors. The likely result is not a more transparent marketplace but a less informative one, where CSPs either cannot distinguish qualified advisors from unqualified ones or default to engaging 3PAOs that offer both advisory and assessment services. The downstream consequences extend beyond market confusion. Unqualified advisors produce deficient packages. Deficient packages burden the authorization process. The authorization backlog grows. Everyone suffers. We also have serious concerns about the lack of defined criteria and due process for removal decisions. Fifteen 3PAOs currently show zero assessments on the marketplace. If FedRAMP intends to remove some but not others, the basis for that distinction should be transparent, consistently applied, and subject to review. Organizations that maintain all accreditation requirements should not have their marketplace status revoked based on undisclosed criteria or subjective PMO determinations. We believe FedRAMP can achieve its transparency and usability goals while preserving quality signals that serve CSPs, agencies, and the efficiency of the program itself. A simple UI solution, distinguishing "Accredited Advisory" from "Assessment Services" through filters or tabs, would address the user experience concern without the collateral damage of removing qualified firms from meaningful marketplace recognition. We would welcome the opportunity to discuss these concerns and explore alternative approaches. Thank you for considering this comment. We remain committed to supporting FedRAMP's mission and look forward to continued dialogue on these important issues. |
Beta Was this translation helpful? Give feedback.
-
|
Question(s): How would EU and International Framework be considered under RFC-0022? Are EU-based security frameworks like ISAE 3000/3402, ISO 27017, ENS (Spain), or ANSSI SecNumCloud (France) considered as potential "External Frameworks" under this RFC? The RFC states "Additional external security frameworks may be added to this list based on demand." What criteria will FedRAMP use to evaluate international frameworks? Considerations: ISO 27001 is already included, which is international. Does this signal openness to other international standards? Germany's C5 (Cloud Computing Compliance Controls Catalogue) and similar cloud-specific frameworks are widely used by hyperscalers. Are cloud-focused frameworks like C5 more or less likely to be added than general information security frameworks? |
Beta Was this translation helpful? Give feedback.
-
|
When is the cutoff date for comment on these RFCs? I was looking for it in the RFCs. I apologize if I am missing it. |
Beta Was this translation helpful? Give feedback.
-
|
I've seen multiple comments in RFCs about aligning FedRAMP and DoD Impact Levels. I understand how that would simplify things for the community, but I would be concerned about it causing problems as well as DoD probably never agreeing to such a policy unless FedRAMP was forced to follow their recommendations. For example, if DoD wanted to implement a tighter control on one of their levels, I can't see them being restricted because FedRAMP isn't agreeing to it or the FedRAMP community, who isn't being a customer for DoD not wanting the additional controls. Does anyone else feel that is a sustainable approach? It would either piss off non-DoD businesses by having to follow possibly more stringent DoD standards or hamstring DoD. Ultimately I feel it would mean "just get rid of FedRAMP and make all the federal government follow IL". |
Beta Was this translation helpful? Give feedback.
-
|
JustAnother3PAO, |
Beta Was this translation helpful? Give feedback.
-
|
I posted this in the RFC-0021 formal public comments as well, but thought I'd add it here in case there were any thoughts on the general intention behind it: "MKT-GEN-DOD requires information to be included in the Ongoing Authorization Reports from Collaborative Continuous Monitoring in CCM-OAR-AVL. However, Collaborative Continuous Monitoring is currently optional as a Balance Improvement Release for Rev5 authorizations. Thus the requirement for MKT-GEN-DOD appears to make the optional CCM now required for Rev5 authorizations to be listed on the Marketplace (that is, if RFC-0021 were to be published and effective prior to CCM being required broadly). This should be adjusted or clarified to avoid any ambiguity, i.e., is CCM in fact a requirement (and not optional) in order to demonstrate ongoing demand to be listed on the Marketplace per MKT-GEN-DOD?" And a second related question (this may belong in a different Discussion, but I wasn't seeing one) - in the Effective Dates and Applicability notes listed here: https://www.fedramp.gov/docs/rev5/balance/collaborative-continuous-monitoring/ there is a bullet saying:
Does the word "Providers" here mean "All providers with Rev5 authorizations" (ie, this is a deadline for all Rev5 auths and not just Beta participants), or "Providers participating in the Beta" (ie, this is a deadline for full/complete adoption by the Beta participants)? |
Beta Was this translation helpful? Give feedback.
-
|
I’m writing on behalf of a CSP that recently completed a full FedRAMP Rev5 Moderate assessment with a 3PAO (including 100% control coverage, no open risks, and a DoD Moderate Equivalency recommendation). We also previously completed a RAR and were listed as FedRAMP Ready for the one‑year period (expiring before July 2026). Our main issue is that we’re still trying to secure an agency sponsor, but RFC‑0023’s Program Certification path looks like a great alternative if sponsorship doesn’t happen in time. We want to avoid unnecessary rework, especially since we already invested in a full SAR and equivalency assessment. A few questions we hope can be clarified:
We appreciate the direction RFC‑0023 is going and just want to avoid redundant work here. |
Beta Was this translation helpful? Give feedback.
-
|
Short question on RFC-0021 Expanding the FedRAMP Marketplace - I hope, specifically on the FedRAMP-Recognized Independent Assessor Listings section. There is a deafening silence on the topics of 3PAO and A2LA in this section. This seems to read that this is the end of the PMO supporting the 3PAO program. Please advise on the intent of these RFCs regarding the 3PAO program. |
Beta Was this translation helpful? Give feedback.
-
|
A random comment on RFC-0019 - I'm always reminded that we need to be very specific when referencing certain things, and have seen a bit of chatter conflating M-24-15 with the FedRAMP Authorization Act (FRAA, which created 44 USC 3607-3616). Law vs Policy
M-24-15 does NOT provide guidance on every aspect of the FRAA but that does NOT matter when the law establishes requirements. As a general policy document, M-24-15 is actually a bit weird in that it often emphasizes sections of the law without adding anything else (presumably for context), but M-24-15 does not paint a complete picture of the requirements placed on FedRAMP. Some examples of statutory requirements that are completely ignored by M-24-15 include:
If you just look at M-24-15, you'd have no idea FedRAMP is required to do those things! M-24-15 also adds a significant number of responsibilities that are not included in the law, so we need to constantly reference both to keep track of our authority and responsibilities. Hopefully folks find this additional background interesting! We published the FedRAMP Authority & Responsibility section of the FedRAMP Documentation to help folks quickly reference some of these materials in a better web native experience than digging through weird pdfs as well. It's also worth noting that FedRAMP works very very very closely with GSA Office of General Counsel to ensure all activities align with our legal responsibilities and authorities. |
Beta Was this translation helpful? Give feedback.
-
|
RFC -0024 A thought for the community: with the Advent of advanced available AI models, do we think that machine readable formatting ingestion and conversion should become much more trivial (hey magic model, here is my csv, can you convert this to oscal and vice versa?) |
Beta Was this translation helpful? Give feedback.
-
|
RFC-0021: mkt-frx-pad: can I get some clarification on what the 'activity data' is? I assume this is the preparation/prioritization status? Can I get an idea of the types of changes this is proposing that is different than what is displayed today? |
Beta Was this translation helpful? Give feedback.
-
|
Hello, First time poster, and currently going through the FedRAMP process; I also sit as a voting member on the CVSS SIG. As I've been reading through the FedRAMP documentation for ConMon, I see that the docs call out using the base score (CVSS v3, hasn't been updated to CVSS v4). I hope this is the right format and place for this comment. This is the opposite of how the CVSS SIG is recommending to use the standard. Please see the Consumer Implementation Guide which I was the lead author of. https://www.first.org/cvss/v4.0/implementation-guide I am hoping we can get some alignment from FedRAMP organization to move from Base Scores to Environmental plus Threat (BTE) scores as it's a more accurate reflection without having to go through a deviation. Warm regards |
Beta Was this translation helpful? Give feedback.
-
|
Is it possible to hide the security email from the Marketplace or for us to provide an official notification only email? We get some spam on our security inbox because it's publicly-facing. But now that it may be more actively used for true emergencies and tests, it would be better for notifications and alerts if it is not easily found publicly. |
Beta Was this translation helpful? Give feedback.
-
|
@pete-gov can I get a clarification on this? Bullet points 3 and 4. This is saying the existing FedRAMP Pilot, Low, Moderate, High are going away and being replaced by Class A, B, C, D? I took the RFC as just asking about the proposed renamings and levels specified within it. |
Beta Was this translation helpful? Give feedback.
-
|
Clarification, does FedRAMP have a definition of 'service' as in the service that a CSP provides?
From this description it sounds like it is up to the providers to define their 'service', which makes sense, and then naturally the agencies determine if the service fits their needs, but I'd like to know if FedRAMP or another agency will whip out a service definition on an unsuspecting CSP when they submit their separation of service. |
Beta Was this translation helpful? Give feedback.
-
|
Are comments open on March 11 and close at end of day? Or are comments closed as of March 11 and March 10 is last date to submit? |
Beta Was this translation helpful? Give feedback.
-
|
Have a question regarding the language for FedRAMP Ready that was published in Notice 0008. Under the Initial Outcome for FedRAMP Ready section, it states: "Instead of simply retiring FedRAMP Ready as proposed in RFC-0023, FedRAMP will provide an alternative path for cloud service providers to convert their FedRAMP Ready or FedRAMP Ready assessment into a Class A FedRAMP Certification." Does this mean that "FedRAMP Ready assessments" can continue on past the July deadline but rather then being for a FedRAMP Ready Marketplace status, can be leveraged for the new Class A FedRAMP certification? Just need clarity if the July 28th deadline assumes end of life for the actual readiness assessment reports as well. Thanks! |
Beta Was this translation helpful? Give feedback.
-
|
One more question on Notice 0008 under "Initial Outcome for Implementing Program Certification": For part d where it lists "Completed a full FedRAMP assessment with a Security Assessment Plan and Security Assessment Report (SAP/SAR)", can you help confirm if FedRAMP Equivalency audits performed during the time period between 1/1/2025 and 3/1/2026 would count towards this Stage 2 process for Class B and C certifications? We have some CSPs asking this as it has been a goal to hopefully get on the Marketplace due to not having an agency sponsor, but have successfully passed a full FedRAMP Moderate baseline audit for Equivalency purposes. |
Beta Was this translation helpful? Give feedback.
-
|
As these RFCs are now closed, I'm opening a general Rev5 Q&A thread and closing this one. If you have further questions about the outcome of these RFCs, including the Public Notices, please pop over to #137 General discussion / Q&A on Rev5 improvements and changes in 2026. |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
This thread is for any general questions or discussion that isn't related to formal public comment. Folks from FedRAMP may participate in this thread and answer questions/etc. in a way that isn't possible in the formal public comment threads.
Beta Was this translation helpful? Give feedback.
All reactions