FedRAMP Rev 5
Federal Risk and Authorization Management Program (FedRAMP) provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by US federal agencies. Based on NIST SP 800-53 Rev 5, FedRAMP defines Low, Moderate, High, and LI-SaaS impact baselines with specific control requirements and parameters for cloud service providers.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (5)
Access Control and Authentication
FedRAMP-specific access control and identification/authentication requirements
| Code | Title |
|---|---|
| CJIS-4 | Access Control |
| CJIS-5 | Identification and Authentication |
| CJIS-6 | Account Management |
| FEDRAMP-AC-1 | Access Control Policy and Procedures |
| FEDRAMP-AC-17 | Remote Access |
| FEDRAMP-AC-2 | Account Management |
| FEDRAMP-AC-3 | Access Enforcement |
| FEDRAMP-AC-4 | Information Flow Enforcement |
| FEDRAMP-AC-6 | Least Privilege |
| FEDRAMP-IA-1 | Identification and Authentication Policy |
| FEDRAMP-IA-2 | Identification and Authentication (Organizational Users) |
| FEDRAMP-IA-5 | Authenticator Management |
| FEDRAMP-IA-8 | Identification and Authentication (Non-Organizational Users) |
| ICS-AC-1 | Role-based access control |
| ICS-AC-2 | Authentication mechanisms |
| ICS-AC-3 | Account management |
| ICS-AC-4 | Physical access controls |
| NIS2-IA-11 | Access Control Policy |
| NIS2-IA-12 | Multi-Factor Authentication |
Audit, Assessment and Risk
Audit logging, security assessment, and risk management requirements
| Code | Title |
|---|---|
| FEDRAMP-AU-1 | Audit and Accountability Policy |
| FEDRAMP-AU-2 | Event Logging |
| FEDRAMP-AU-3 | Content of Audit Records |
| FEDRAMP-AU-6 | Audit Record Review, Analysis, and Reporting |
| FEDRAMP-AU-9 | Protection of Audit Information |
| FEDRAMP-CA-1 | Assessment, Authorization, and Monitoring Policy |
| FEDRAMP-CA-2 | Control Assessments |
| FEDRAMP-CA-7 | Continuous Monitoring |
| FEDRAMP-RA-3 | Risk Assessment |
| FEDRAMP-RA-5 | Vulnerability Monitoring and Scanning |
Incident Response and Maintenance
Incident response, maintenance, media protection, and system integrity requirements
| Code | Title |
|---|---|
| FEDRAMP-IR-1 | Incident Response Policy |
| FEDRAMP-IR-4 | Incident Handling |
| FEDRAMP-IR-6 | Incident Reporting |
| FEDRAMP-IR-8 | Incident Response Plan |
| FEDRAMP-MA-2 | Controlled Maintenance |
| FEDRAMP-MP-2 | Media Access |
| FEDRAMP-SI-2 | Flaw Remediation |
| FEDRAMP-SI-3 | Malicious Code Protection |
| FEDRAMP-SI-4 | System Monitoring |
| FEDRAMP-SI-5 | Security Alerts, Advisories, and Directives |
Personnel, Planning and Governance
Personnel security, planning, program management, and supply chain risk management
| Code | Title |
|---|---|
| FEDRAMP-PE-3 | Physical Access Control |
| FEDRAMP-PE-6 | Monitoring Physical Access |
| FEDRAMP-PL-2 | System Security and Privacy Plans |
| FEDRAMP-PL-4 | Rules of Behavior |
| FEDRAMP-PS-3 | Personnel Screening |
| FEDRAMP-PS-4 | Personnel Termination |
| FEDRAMP-PT-1 | PII Processing and Transparency Policy |
| FEDRAMP-PT-3 | PII Minimization and Retention |
| FEDRAMP-SR-1 | Supply Chain Risk Management Policy |
| FEDRAMP-SR-3 | Supply Chain Controls and Processes |
System Protection and Communications
System and communications protection, configuration management, and contingency planning
| Code | Title |
|---|---|
| 3.10 | Physical and Environmental Protection |
| 3.13 | System and Communications Protection |
| 3.13.1 | Boundary Protection Assessment |
| 3.14 | System and Information Integrity |
| 3.8 | Maintenance |
| FEDRAMP-CM-1 | Configuration Management Policy |
| FEDRAMP-CM-2 | Baseline Configuration |
| FEDRAMP-CM-6 | Configuration Settings |
| FEDRAMP-CP-9 | System Backup |
| FEDRAMP-SC-1 | System and Communications Protection Policy |
| FEDRAMP-SC-12 | Cryptographic Key Establishment and Management |
| FEDRAMP-SC-13 | Cryptographic Protection |
| FEDRAMP-SC-28 | Protection of Information at Rest |
| FEDRAMP-SC-7 | Boundary Protection |
| FEDRAMP-SC-8 | Transmission Confidentiality and Integrity |
Maps to 642 other frameworks
Frequently Asked Questions
What is FedRAMP Rev 5?
FedRAMP Rev 5 is a compliance framework from United States with 5 domains and 64 controls. Federal Risk and Authorization Management Program (FedRAMP) provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by US federal agencies. Based on NIST SP 800-53 Rev 5, FedRAMP defines Low, Moderate, High, and LI-SaaS impact baselines with specific control requirements and parameters for cloud service providers. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does FedRAMP Rev 5 have?
FedRAMP Rev 5 has 64 controls organised across 5 domains. The largest domains are Access Control and Authentication (19 controls), System Protection and Communications (15 controls), Audit, Assessment and Risk (10 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does FedRAMP Rev 5 map to?
FedRAMP Rev 5 maps to 642 other compliance frameworks. The top mapping partners are South Korea ISMS-P (58% coverage), FAA Cybersecurity Framework for Aviation (55% coverage), TISAX — Trusted Information Security Assessment Exchange (55% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with FedRAMP Rev 5 compliance?
Start your FedRAMP Rev 5 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about FedRAMP Rev 5 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 64 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required