recommended reading

The ‘Ramp’ Into the Federal Cloud Market Is More Like a Climb

Dr. Cloud/

A program aimed at simplifying the required security documentation for cloud contractors is more of an obstacle course than an access way into the government sector, some agency and industry officials say.

The Federal Risk and Authorization Management Program, or FedRAMP, has blessed only five out of about 100 vendors applying for reusable certifications that affirm their Web services are safe for agencies governmentwide. All cloud providers interested in selling technology to agencies must comply with FedRAMP controls, such as data backups, by June 2014.

Federal officials say part of the reason for the low passing rate is the rigor of the criteria. FedRAMP bills itself as "a standardized approach to cloud security assessments, authorization, and monitoring." The idea is for companies to endure the process once and then not have to undergo separate evaluations by each agency customer, officials say. 

"Every cloud provider we’ve worked with has been completely blown away by the level of effort that it takes to do this," FedRAMP program manager Matthew Goodrich said during a May discussion hosted by Nextgov. "While the first lift is going to be incredibly hard, you don’t have to do that lift again . . . Once it’s done once, there’s not repeated questions, there’s not additional things to ask."

However, agencies still need to meet other security prerequisites after a company’s service is FedRAMP-approved to activate the cloud technology. For instance, a FedRAMP-authorized cloud does not provide certain access restrictions mandated by regulations under the 2002 Federal Information Security Management Act, or FISMA. An agency must add more security components, as such as two-factor authentication and the ability to record Web sessions.  

Meanwhile, agencies uneasy with the answers they see in FedRAMP documentation can ask the vendor to undergo additional scrutiny, or refuse to accept the contractor at all.

Kevin Dulany, chief of risk management oversight for the Pentagon's office of the chief information officer, used Amazon as an example. The server giant clinched a FedRAMP authorization last month.

"I’m going to use your security artifacts and that body of evidence for me to make my own risk decision" and "my process is going to be about a two week process of verification and I’m going to make my own decision," he said. And the decision might be that "I can’t accept that risk based upon my own operational mission needs."

A 'Super Complicated Area'

In Dulany’s hypothetical situation, even if he chooses to accept Amazon’s security level, the system would still need more controls, according to Amazon’s business collaborators.

Xceedium, a cybersecurity firm that partners with Amazon to mesh the cloud environment with user access restrictions, helps “meet that space of additional requirements that are necessary to deploy in the cloud,” Ken Ammon, the company’s chief strategy officer, said during an interview. “A FedRAMPed [cloud] doesn't provide the necessary agency user security controls to meet FISMA requirements. The agency must add additional security components.”

FedRAMP "is a super complicated area," Ammon added. "It is certainly, by design maybe, not a simple thing to grasp."

And so the Web services industry is not convinced that FedRAMP makes security assessments more efficient. 

"It certainly runs the risk of being a process that drags everybody down," Mike Hettinger, a director with the Software and Information Industry Association, said during an interview. The small number of approvals reflects the difficulty of the method, he said.

When contractors and their agency customers switch from creating a rapport with each other “to sort of a general assessment, a sort of top level assessment, you're not going to have that intimate relationship," Hettinger said. At that point, "you have a process that isn't streamlining but is creating a process that is more challenging."

Officials with the General Services Administration, the agency running FedRAMP, responded that documents illustrating how cloud providers meet federal security requirements and any associated risks will differ among providers.

Officials acknowledged that even with FedRAMP, by order of FISMA, agencies still must apply a risk management framework, as well as select, implement and assess appropriate controls.

(Image via Dr. Cloud/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.