FedRAMP (Federal Risk and Authorization Management Program) is the U.S. government's standardized approach to cloud security assessments. If you want to sell SaaS to federal agencies, FedRAMP authorization is no longer optional.
The process is rigorous. The average Moderate authorization takes 12–18 months and costs $500K–$1.5M in preparation, assessment, and consulting fees. But with the right preparation, companies have achieved it in 8–10 months.
This guide walks you through the complete authorization process with a practical checklist for each phase.
Phase 0: Determine Your FedRAMP Impact Level
Before you begin, you must determine the correct impact level for your system. This decision drives everything that follows — number of controls, security requirements, assessment cost, and timeline.
FedRAMP Low
- 125 controls (NIST SP 800-53)
- For systems where data loss or compromise causes limited business impact
- Typically: non-sensitive productivity apps, collaboration tools with no CUI
- Timeline: 6–12 months; Cost: $250K–$500K
FedRAMP Moderate
- 325+ controls
- Covers most federal SaaS applications handling Controlled Unclassified Information (CUI)
- Required for HR systems, financial systems, case management, and most enterprise SaaS
- Timeline: 12–18 months; Cost: $500K–$1.5M
FedRAMP High
- 420+ controls
- For systems where compromise could cause severe harm to individuals, critical infrastructure, or national security
- Required for law enforcement, emergency services, and systems handling classified-adjacent data
- Timeline: 18–24 months; Cost: $1M–$3M
Decision rule: When in doubt, choose Moderate. Upgrading from Low to Moderate after receiving a sponsor is expensive and time-consuming. Most SaaS companies pursuing federal contracts need Moderate or higher.
Phase 1: Pre-Authorization Readiness Checklist
Step 1.1 — Define Your System Boundary
The system boundary is the set of all components (hardware, software, people, policies) that will be included in your FedRAMP boundary. This is one of the most consequential decisions you make.
Step 1.2 — Select Your Authorization Path
There are two authorization paths:
- Agency Authorization: A specific federal agency sponsors your authorization. Faster to market with that agency. Auth may not be recognized by other agencies initially. Best for companies with an existing federal relationship.
- FedRAMP JAB (Joint Authorization Board): Government-wide authorization; DOD, DHS, and GSA all approve it. Much more broadly recognized, but highly competitive — JAB only takes ~12 new packages/year.
Most SaaS companies start with an Agency Authorization.
Step 1.3 — Select a 3PAO (Third Party Assessment Organization)
You must use a FedRAMP-accredited 3PAO to conduct your security assessment. Selection criteria:
Important: Do not hire a 3PAO who will also help you implement controls — independence is required. Use a compliance readiness consultant for implementation, 3PAO for assessment.
Phase 2: Documentation Checklist
FedRAMP requires an extensive documentation package. These are the core artifacts:
System Security Plan (SSP)
The SSP is your primary document — a 200–500 page description of your system and how it implements every required security control. Starting from scratch is painful. Use the official NIST template or a pre-built tool.
Supporting Documentation
Phase 3: Technical Control Implementation
The majority of your engineering effort goes here. Common areas that require the most work for modern SaaS companies:
Identity and Access Management
- Multi-factor authentication (MFA) required for all privileged users
- Account management with automated provisioning/deprovisioning
- Least privilege enforcement — no standing admin access
- PIV/CAC card support (for Moderate and above, federal users often require this)
- Session timeout: 15 minutes of inactivity
- Unique user IDs — no shared accounts
Audit Logging and Monitoring
- Comprehensive audit logging for all access events, privilege escalations, config changes
- Log retention: 1 year online, 3 years archived
- Real-time alerting for security events (SIEM integration)
- Insider threat detection capability
Vulnerability Management
- Authenticated vulnerability scans on all components using FedRAMP-approved scanner
- Scan frequency: weekly for OS/infrastructure, monthly for databases and web apps
- Remediation SLAs: Critical 30 days, High 90 days, Medium 180 days
- Plan of Action & Milestones (POA&M) for all open findings
Encryption Requirements
- FIPS 140-2/140-3 validated cryptographic modules — this is a hard requirement, not advisory. Check your entire stack for FIPS compliance.
- TLS 1.2 minimum for data in transit (TLS 1.3 preferred)
- AES-256 for data at rest
- Key management with documented rotation procedures
Most common surprise cost: FIPS 140-2 compliance for cryptographic modules. Many popular open-source libraries are NOT FIPS validated by default. You may need to configure specific builds, use FIPS-validated OpenSSL, or replace components entirely.
Phase 4: Assessment and Authorization
3PAO Readiness Assessment (Before Full Assessment)
Full Assessment Process
The 3PAO assessment typically takes 2–4 months:
- Kickoff: Scope confirmation, document submission, schedule planning (2 weeks)
- Documentation review: 3PAO reviews SSP, policies, procedures (3–4 weeks)
- Technical testing: Penetration testing, vulnerability scanning, policy compliance testing (4–6 weeks)
- Findings remediation: You fix findings; 3PAO validates fixes (4–8 weeks)
- Security Assessment Report (SAR): 3PAO delivers final report
ATO Process
- Agency Authorizing Official reviews SAR and SSP
- FedRAMP PMO reviews the package (JAB path: full PMO review)
- ATO granted (or Denial with required remediations)
- Continuous monitoring begins immediately
Phase 5: Continuous Monitoring (Post-ATO)
FedRAMP ATO is not one-and-done. You must maintain it with ongoing compliance activities:
- Monthly: Vulnerability scanning and POA&M updates
- Quarterly: Significant change request reviews
- Annual: Security controls assessment (subset), contingency plan testing, penetration test
- As needed: Incident reporting (major incidents within 1 hour to US-CERT)
Common Reasons FedRAMP Applications Fail
- FIPS non-compliance — cryptographic modules don't meet FIPS 140-2 validation requirements
- Insufficient boundary definition — third-party services not accounted for, or boundary too wide to secure
- Missing audit log coverage — gaps in logging that mean unauthorized access isn't detectable
- POA&M management — findings given wrong severity ratings or remediation milestones not met
- Contingency plan not tested — having a plan is not sufficient; it must be exercised annually