Agency Authorization Playbook
Agency Authorization Playbook
FedRAMP Agency
Authorization Playbook
Version 4.0
12/06/2024
info@fedramp.gov
FedRAMP.gov
Agency Playbook
02/15/2024 3.0 All Updated to add clarity and align with FedRAMP
Rev 5 updates made to FedRAMP
guidance documents and templates.
fedramp.gov
Agency Playbook
TABLE OF CONTENTS
Introduction 1
1.0 Why Use FedRAMP 1
2.0 Why This Document 1
3.0 What You Will Get From This Document 2
Understanding the FedRAMP Marketplace 3
4.0 FedRAMP Designations 3
FedRAMP Agency Liaison Program 4
5.0 Program Overview 4
6.0 Program Benefits Include: 4
7.0 How to Leverage FedRAMP Agency Liaisons 4
Initial FedRAMP Agency Authorization 5
Partnering for Initial FedRAMP Authorization 6
8.0 Common Questions About Partnership 6
Preparation 7
9.0 Readiness Assessment 7
10.0 Pre-Authorization 8
10.1 Partnership Establishment 8
10.2 Authorization Planning 9
10.3 Work Breakdown Structure and In Process Request 10
10.4 Kickoff Meeting 11
Authorization 14
11.0 Full Security Assessment 14
12.0 Agency Authorization Process 14
12.1 Agency Review of Security Authorization Package 14
12.2 SAR Debrief 15
12.3 Remediation 18
12.4 Agency Final Review and ATO 18
12.5 FedRAMP Review 19
Continuous Monitoring 20
13.0 Collaborative ConMon 21
13.1 ConMon Best Practices 21
Use FedRAMP for Support 22
fedramp.gov
Agency Playbook
Introduction
fedramp.gov page 1
Agency Playbook
fedramp.gov page 2
Agency Playbook
Federal agencies are encouraged to use the FedRAMP Marketplace as a resource to:
● Research CSOs that are FedRAMP Authorized, FedRAMP Ready, or FedRAMP In Process
● Research federal agencies that use FedRAMP Authorized CSOs
● Research FedRAMP recognized 3PAOs
CSOs that are FedRAMP Authorized are made available for government-wide use. Federal
agencies can leverage the security documentation of a FedRAMP Authorized CSO by following the
process outlined in FedRAMP’s Reusing Authorizations for Cloud Products Quick Guide.
● FedRAMP Ready: A designation provided to CSOs, which indicates that a 3PAO attests to a
CSO’s security capabilities, and that a FedRAMP Readiness Assessment Report (RAR) has
been reviewed and deemed acceptable by FedRAMP. FedRAMP Ready indicates a CSO has
a high likelihood of successfully completing an initial FedRAMP authorization.
● FedRAMP In Process: A designation provided to CSOs that are actively working toward a
FedRAMP authorization. For updates, federal agencies can either contact the cloud provider
via the email address provided on the CSO’s FedRAMP Marketplace page, or reach out
directly to FedRAMP via intake@fedramp.gov.
● FedRAMP Authorized: A designation provided to CSOs that have successfully completed
the FedRAMP authorization process. FedRAMP Authorized CSOs are available for
government-wide reuse.
You can learn more about FedRAMP’s Marketplace designations by reviewing the “Marketplace
Designations” section on the About FedRAMP Marketplace webpage.
fedramp.gov page 3
Agency Playbook
Every CFO Act agency has an agency liaison who can serve as the subject matter expert and
resource for questions about FedRAMP. Many sub agencies and departments have designated
fedramp.gov page 4
Agency Playbook
their own liaisons as well. If you are unsure who your agency liaison is, please contact
intake@fedramp.gov. If your agency does not have a liaison identified, FedRAMP can help you
designate a point of contact and enroll your federal agency in the program.
* The full security assessment may be performed in advance of the Authorization phase or
completed during the Authorization phase. This is dependent on the federal agency’s review
approach.
fedramp.gov page 5
Agency Playbook
Is there an additional level of effort associated with being the initial authorizing agency?
As the initial authorizing agency, are we responsible for performing Continuous Monitoring
(ConMon) oversight on behalf of other leveraging agencies?
Does FedRAMP accept both an Authority to Operate (ATO) and an Authority to Use (ATU)?
What happens if my agency decides to stop using the Cloud Service Offering (CSO)?
What happens if a Cloud Service Offering (CSO) loses its agency customers?
fedramp.gov page 6
Agency Playbook
Preparation
FedRAMP Ready indicates that a CSP has utilized the services of a FedRAMP recognized 3PAO to
conduct a FedRAMP Readiness Assessment, and the 3PAO has determined that the CSP is fully
ready to pursue (and likely to achieve) a FedRAMP authorization for the CSO. The results of a
FedRAMP Readiness Assessment are documented in a FedRAMP provided Readiness Assessment
Report (RAR) template. The RAR is submitted to FedRAMP for review and approval. Once
approved, the CSO achieves a FedRAMP Ready designation on the FedRAMP Marketplace, and the
RAR is made available to federal agencies via the FedRAMP secure repository.
To understand the scope of a FedRAMP Readiness Assessment, federal agencies can review the
FedRAMP Moderate RAR Template or the FedRAMP High RAR Template. At a high level, the
FedRAMP Readiness Assessment is primarily focused on the status of technical capabilities versus
the status of documentation. While some CSPs may have a fully developed system security plan
(SSP) at the time of the assessment, a completed SSP is not required. During the FedRAMP
Readiness Assessment, 3PAOs validate the CSP’s ability to meet specific federal mandates (e.g.,
the use of FIPS 140 validated encryption), the CSP’s ability to satisfy technical security
requirements, and the CSP’s maturity in areas such as change management and ConMon.
Federal agencies should consider partnering with a CSO that has achieved the FedRAMP Ready
designation if the CSO meets the federal agency’s mission needs. FedRAMP Ready indicates that
the CSP has done most of the heavy lifting and just needs a federal agency to partner with them to
pursue an initial FedRAMP authorization.
fedramp.gov page 7
Agency Playbook
10.0 Pre-Authorization
During the Pre-Authorization phase, the federal agency and CSP agree to partner on a FedRAMP
authorization. The federal agency and CSP then work together to prepare for and develop a plan
for the agency authorization and hold a formal kickoff meeting.
During the Partnership Establishment phase, the federal agency agrees to partner with a CSP to
pursue an initial FedRAMP authorization. If you are thinking about partnering with a CSP, consider
the following steps, and, if needed, schedule a call with your FedRAMP Agency Liaison to talk
through the process:
● Clearly define your federal agency’s mission needs and specific requirements for a CSO and
begin researching possible providers.
● Understand the sensitivity of the data that will be used with the CSO. To categorize your
data, review the NIST Federal Information Processing Standards (FIPS) Publication 199,
Standards for Security Categorization of Federal Information and Information Systems.
● Review the FedRAMP Marketplace to see if there is a CSO that meets your mission needs
and is able to provide the right level of security given the data.
● If you find a CSO that meets your mission needs, but is not on the FedRAMP Marketplace,
meet with the associated CSP to determine the organization’s willingness and commitment
to pursue a FedRAMP authorization. If the CSP would like to learn more about the FedRAMP
process, direct them to the FedRAMP CSP Authorization Playbook. If the CSP has not
already done so, instruct the CSP to complete FedRAMP’s CSP Information Form.
Completing the form will generate a unique FedRAMP ID for the system and provide
valuable resources in an automated follow-up email.
Consider the following when determining the CSP’s readiness for pursuing a
FedRAMP authorization:
fedramp.gov page 8
Agency Playbook
The purpose of the Planning phase is to set up the authorization for success. The authorization
planning process is a collaborative effort between the federal agency and CSP. During the Planning
phase, stakeholders will:
fedramp.gov page 9
Agency Playbook
As your federal agency finalizes the Authorization Planning phase, complete the following actions:
1. Complete a Work Breakdown Structure (WBS) and submit a FedRAMP In-Process Request
to FedRAMP via intake@fedramp.gov. The completion of this form indicates to FedRAMP
that your federal agency is ready to begin coordinating a kickoff meeting with the CSP and
3PAO (optional and recommended). It also indicates that you have reviewed and approved
the WBS, and 3PAO testing is scheduled within six (6) months. At this point, FedRAMP will
provide a copy of the kickoff meeting presentation template to the CSP.
2. Instruct your CSP to begin working on the kickoff meeting presentation. A copy of the CSP’s
completed presentation must be sent to FedRAMP via intake@fedramp.gov for review and
feedback prior to confirming a date and time for the kickoff meeting.
fedramp.gov page 10
Agency Playbook
See the FedRAMP In Process section on the About FedRAMP Marketplace webpage for more
information about the FedRAMP In Process request, WBS, and the full criteria for a CSP to be listed
as In Process. Your federal agency’s FedRAMP Liaison will be able to assist in the actions listed
above.
The purpose of the kickoff meeting is to formally begin the FedRAMP agency authorization process
by introducing key team members, reviewing the CSO, and ensuring all stakeholders are aligned on
the overall process. Review FedRAMP’s Kickoff Briefing guidance to understand the full scope of a
FedRAMP facilitated kickoff meeting.
At the conclusion of the kickoff meeting, all stakeholders will have a shared understanding of:
● The overall authorization process, milestones, deliverables, roles and responsibilities, and
schedule.
● The roles and responsibilities of all project team members, including federal agency, CSP,
and 3PAO personnel.
● The CSO’s purpose and function, authorization boundary, data flows, known security gaps
and plans for remediation, federal agency-specific requirements, customer responsible
controls, and areas that may require federal agency risk acceptance.
● The federal agency’s process for reviewing the authorization package and reaching a
risk-based authorization decision.
● Best practices and tips for success.
fedramp.gov page 11
Agency Playbook
FedRAMP
CSP
fedramp.gov page 12
Agency Playbook
Agency
○ Decide how the CSP and federal ● Describe the federal agency’s process for
agency teams will communicate and performing a quality and risk review of the
collaborate throughout the process. authorization package.
Ensure the right team members attend the ● Describe the federal agency’s process for
kickoff meeting: reaching an authorization decision and
issuing an ATO letter.
● While the federal agency business owner
is welcome to attend, it is important to
include the federal agency team members
that will be responsible for reviewing the
authorization package and making
authorization decisions.
Helpful Tip: If there are any additional internal administrative requirements, such as
uploading to any governance, risk management, and compliance (GRC) tools, they should
be communicated at the kickoff meeting and built into the authorization timeline.
fedramp.gov page 13
Agency Playbook
Authorization
The CSP is responsible for delivering a security package that is clear, complete, concise, and
consistent to adequately describe how they implement security controls for their system using the
required FedRAMP Templates. The federal agency’s role, in this step of the process, is to review the
documentation provided by the CSP and provide feedback where deemed necessary. The ultimate
goal is for the CSP to provide a security package that other federal agencies can leverage for
review.
During the Full Security Assessment phase, the 3PAO performs an independent security
assessment of the system. Depending on the federal agency’s review approach determined in the
Authorization Planning phase, the federal agency may review and approve the SSP and SAP prior
to the start of the 3PAO assessment.
During this step, the 3PAO tests and validates the CSP’s implementation of security controls,
validates vulnerability scans, and performs penetration testing. At the conclusion of the
assessment, the 3PAO develops a SAR, which documents the results of the security assessment
and includes a recommendation for FedRAMP authorization.
The CSP will then develop a POA&M based on the SAR findings. The POA&M documents the CSP’s
plan and timeline for remediating residual risk that remained at the conclusion of the security
assessment.
During this phase, the federal agency team conducts a review of the CSO authorization package
that includes: the SSP and appendices, SAP, SAR, and POA&M. The purpose of the review is to
ensure that the authorization package clearly and accurately reflects the security posture of the
CSO in order for the federal agency authorizing official (AO) to make an informed risk-based
authorization decision.
fedramp.gov page 14
Agency Playbook
FedRAMP recommends establishing a regular cadence of meetings that include the federal agency,
CSP, and 3PAO throughout the quality and risk review in order to address federal agency questions
and concerns in real time. This might include longer in-person working sessions to address specific
areas of the CSO.
The purpose of the SAR debrief is to help inform the federal agency’s risk review of the CSO. During
the SAR debrief, the 3PAO presents the results of the security assessment, the CSP presents the
plan and timeline for remediating residual risk, and the partnering agency describes the remaining
milestones and tips for success. At the conclusion of the SAR debrief, all stakeholders will have a
shared understanding of:
fedramp.gov page 15
Agency Playbook
FedRAMP
fedramp.gov page 16
Agency Playbook
Agency
fedramp.gov page 17
Agency Playbook
12.3 Remediation
To ensure the authorization package clearly and accurately reflects the security and risk posture of
the CSO, the CSP and 3PAO may be required to address documentation gaps or inconsistencies
identified by the federal agency review team.
Examples include:
In some cases, the 3PAO may be required to perform delta testing to validate risk remediations or
perform additional testing if the federal agency review team identifies gaps in the initial
assessment scope, e.g. if the 3PAO failed to validate the encryption status of federal data/metadata
at rest and in transit or failed to test a component essential to the operation of the CSO.
The federal agency’s review of remediation work can happen on an iterative, or linear basis,
depending on the federal agency’s preference. It is important to maintain constant communication
between the federal agency and CSP throughout the remediation process to ensure that the gaps
and other areas of concern are being addressed to the federal agency’s satisfaction.
At the end of the Remediation phase, the federal agency, CSP, and 3PAO should conduct a formal
close-out meeting to review all changes, address questions in real time, and obtain approval to
move forward to the final review and ATO phase.
During this phase, the federal agency review team finalizes its review of the authorization package,
and the federal agency AO issues an ATO for the CSO. FedRAMP provides an ATO letter template
that federal agency AOs are encouraged to use. The ATO letter is sent to the CSP and
info@fedramp.gov.
fedramp.gov page 18
Agency Playbook
The process for closing out the review and issuing an ATO varies from federal agency to agency.
The implementation, testing, and documentation of customer controls in the federal agency’s GRC
tool typically occurs during this phase, but may occur later in the authorization process after the
ATO for the CSO is issued. As described in the Authorization Planning section, the federal agency’s
process and timeline for reaching an authorization decision and issuing an ATO should be defined
early in the process and communicated to all stakeholders to manage expectations.
Once the federal agency AO issues the ATO letter, FedRAMP performs a review of the authorization
package to determine suitability for government-wide reuse. The scope of FedRAMP’s review
includes:
● A quality review to ensure the authorization package clearly and accurately represents the
security and risk posture of the CSO. While the initial authorizing agency conducts a quality
review of the authorization package, FedRAMP’s review is considered ‘a final set of eyes’ to
ensure uniformity across all packages listed on the FedRAMP Marketplace.
● A security review to ensure compliance with FedRAMP requirements and standards.
● A risk review to identify weaknesses or deficiencies that must be addressed before the
FedRAMP Marketplace status is changed to FedRAMP Authorized.
After the ATO letter is received, the following steps are performed to get to a FedRAMP Authorized
designation:
1. CSP and 3PAO upload current versions of package deliverables to the FedRAMP secure
repository for Low and Moderate packages, or to the CSP’s repository for High packages.
2. CSP completes and submits FedRAMP Initial Authorization Package Checklist to
info@fedramp.gov.
3. FedRAMP verifies that all package deliverables are uploaded.
4. Package is placed in the FedRAMP review team’s queue; packages are reviewed in the order
they are received.
5. The FedRAMP review team sends draft review report to all stakeholders (CSP, 3PAO, and
federal agency).
○ Draft report documents’ findings are identified during FedRAMP’s review and any
areas that require clarification.
fedramp.gov page 19
Agency Playbook
Continuous Monitoring
Throughout the Authorization phase, CSPs are required to maintain the system, which includes
performing ConMon activities. The CSP’s ability to demonstrate a mature ConMon process is one of
the areas evaluated during the 3PAO’s assessment and during the federal agency and FedRAMP’s
review of the authorization package. Failure to demonstrate a mature ConMon process will prevent
or delay a FedRAMP Authorized designation.
Once the Authorization phase is complete and the CSO achieves a FedRAMP Authorized
designation, the CSP:
The CSP is responsible for implementing the ConMon processes and tools to maintain an
acceptable security posture. Each federal agency that issues an ATO for a CSO is responsible for
reviewing the CSP’s ConMon activities to ensure the security posture remains sufficient for its own
use and supports an ongoing authorization. This includes reviewing the monthly POA&M,
approving deviation requests/significant changes, and reviewing the results of the annual
assessment.
fedramp.gov page 20
Agency Playbook
These activities are described in the FedRAMP Continuous Monitoring Strategy Guide. Please refer
to this document for a more in-depth overview of these activities.
● Authorization Planning: Start talking to the CSP about ConMon early in the process,
especially if you have ConMon requirements that exceed FedRAMP’s requirements. If you do,
you should make the CSP aware of those requirements before authorizing the system.
● Continuous Monitoring: Ask the CSP to hold a monthly ConMon meeting. As additional
federal agency customers begin using the CSO, ask the CSP to hold a monthly collaborative
ConMon meeting.
○ The meeting should be held at least one week after the monthly ConMon deliverables
are submitted. This will give the federal agency team time to review the deliverables
and come to the meeting ready with questions and recommendations for approvals
of deviation requests or significant change requests.
○ A monthly ConMon meeting agenda might include:
■ Discussion of past due POA&Ms.
■ Deviation requests pending approval.
■ Significant change requests (i.e., planned changes, changes pending approval,
and status of implementation and testing).
■ Status of annual assessment.
fedramp.gov page 21
Agency Playbook
● Continuous Monitoring Accountability: Think about how you will hold the CSP accountable
for meeting ConMon requirements. The FedRAMP Continuous Monitoring Performance
Management Guide provides recommended actions the agency AO may take when a
FedRAMP Authorized CSP fails to maintain an adequate ConMon capability. Section 3 of
this guide also provides recommendations for processes that federal agencies should use to
perform oversight of CSOs authorized via the FedRAMP agency authorization path.
fedramp.gov page 22