Skip to content

FedRAMP Definitions

This document consolidates formal FedRAMP definitions for terms used in FedRAMP standards.

Effective Date(s) & Overall Applicability
  • Release: 25.11A
  • Published: 2025-11-18
  • Designator: FRD
  • Description: Updates and new definitions added for the FedRAMP 20x Phase Two pilot.

  • FedRAMP 20x:
    • This release is effective 2025-11-18 for 20x.
    • These definitions apply to all FedRAMP 20x documents, standards, requirements, and other materials.
  • FedRAMP Rev5:
    • This release is effective 2025-11-18 for Rev5 Balance Improvement Releases.
    • These definitions apply to all FedRAMP Rev5 documents, standard, requirements, and other materials that have been included in updates to Rev5 in a Balance Improvement Release.
Background & Authority
  • FedRAMP Authorization Act (44 USC § 3608) requires that the Administrator of the General Services Administration shall "establish a Government- wide program that provides a standardized, reusable approach to security assessment and authorization for cloud computing products and services that process unclassified information used by agencies"

Accepted Vulnerability

A vulnerability that the provider does not intend to fully mitigate or remediate, OR that has not or will not be fully mitigated or remediated within the maximum overdue period recommended or required by FedRAMP.

Also: accepted vulnerability, accepted vulnerabilities

ID: FRD-ALL-31

Adaptive

The type of significant change that does not routinely recur but does not introduce substantive potential security risks that need to be assessed in depth.

Note: Adaptive changes typically require careful planning that focuses on engineering execution instead of customer adoption, can be verified with minor changes to existing automated validation procedures, and do not require large changes to operational procedures, deployment plans, or documentation.

Also: adaptive

ID: FRD-ALL-10

Agency

Has the meaning given in 44 U.S. Code § 3502 (1), which is "any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency, but does not include—(A) the Government Accountability Office; (B) Federal Election Commission; (C) the governments of the District of Columbia and of the territories and possessions of the United States, and their various subdivisions; or (D) Government-owned contractor-operated facilities, including laboratories engaged in national defense research and production activities." Reference: 44 U.S. Code § 3502 (1)

Also: agency, agencies

ID: FRD-ALL-19

All Necessary Assessors

All entities who participate in the FedRAMP assessment of a cloud service offering in the context of a FedRAMP program authorization. This always includes FedRAMP and any FedRAMP recognized independent assessor contracted by the provider to perform a FedRAMP assessment.

Note: This standard identifies the requirements for an assessment and authorization performed by FedRAMP prior to any agency use of the cloud service offering, therefore agency assessment teams are not included in the FedRAMP assessment and authorization. The resulting FedRAMP authorization package will include all the materials agency authorization teams need to assess the cloud service offering for agency use, including evidence. Program authorization is an authorization path defined in Section IV © of OMB Memorandum M-24-15.

Also: all necessary assessors

ID: FRD-ALL-46

All Necessary Parties

All entities whose interests are affected directly by activity related to a specific cloud service offering in the context of a FedRAMP authorization. This always includes FedRAMP and any agency customer who is operating the cloud service offering, but may include additional parties depending on agreements made by the cloud service provider (such as consultants or third-party assessors). Potential agency customers or third-party cloud service providers should also be included in most cases but this is not a mandatory requirement under FedRAMP as ultimately the cloud service provider may choose who they wish to do business with.

Also: all necessary parties

ID: FRD-ALL-18

Authorization Package

Has meaning from 44 USC § 3607 (b)(8) which is "the essential information that can be used by an agency to determine whether to authorize the operation of an information system or the use of a designated set of common controls for all cloud computing products and services authorized by FedRAMP."

Note: In FedRAMP documentation, authorization package always refers to a FedRAMP authorization package unless otherwise specified. Reference: 44 USC § 3607 (b)(8)

Also: authorization package, authorization packages

ID: FRD-ALL-14

Authorization data

The collective information required by FedRAMP for initial and ongoing assessment and authorization of a cloud service offering, including the authorization package.

Note: In FedRAMP documentation, authorization data always refers to FedRAMP authorization data unless otherwise specified.

Also: authorization data

ID: FRD-ALL-15

Catastrophic Adverse Effect

A severe negative impact on an organization caused by the loss of confidentiality, integrity, or availability of its information. At a minimum, this includes effects that would likely: (i) result in a severe degradation in the availability or performance of services within the cloud service offering for 24+ hours; OR (ii) directly or indirectly result in unauthorized access, disclosure, or modification of a majority of the federal customer data stored within the cloud service offering.

Also: catastrophic adverse effect, catastrophic adverse effects

ID: FRD-ALL-32

Cloud Service Offering

A specific, packaged cloud computing product or service provided by a cloud service provider that can be used by a customer. FedRAMP assessment and authorization of the cloud computing product or service is based on the Minimum Assessment Standard.

Also: cloud service offering, cloud service offerings

ID: FRD-ALL-06

Drift

Changes to information resources that cause deviations from the intended and assessed state; common forms of drift include changes to configurations, deployed software, privileges, running processes, and availability.

Also: drift, drifts, drifting

ID: FRD-ALL-39

False Positive Vulnerability

A detected vulnerability that is not actually present in an exploitable state in the information resource; this includes situations where vulnerable software or code exist on an machine-based information resource but are not loaded, running, or otherwise in an operating state required for exploitation.

Note: This only applies if the vulnerability is not and was not present; a remediated vulnerability or a fully mitigated vulnerability cannot also be a false positive vulnerability.

Also: false positive vulnerability, false positive vulnerabilities

ID: FRD-ALL-29

FedRAMP Security Inbox

An email address that meets the requirements outlined in the FedRAMP Security Inbox requirements.

Also: security inbox, security inboxes, FSI

ID: FRD-ALL-45

Federal Customer Data

All electronic information, content, and materials that an agency or its authorized users upload, store, or otherwise provide to a cloud service for processing or storage. This does NOT include account information, service metadata, analytics, telemetry, or other similar metadata generated by the cloud service provider.

Note: In the context of FedRAMP authorization, "federal customer data" ONLY ever refers to data owned by federal agency customers. Agreements and contracts with specific agencies may require providers to protect additional data or even transfer ownshership of telemetry or usage data to the agency; always consult a lawyer that is familiar with company agreements and contracts when determining the scope of federal customer data.

Also: federal customer data

ID: FRD-ALL-01

Fully Mitigated Vulnerability

A vulnerability where the likelihood of exploitation or potential adverse impact of exploitation has been reduced from the original evaluation until either are negligible, but the vulnerability is still detected.

Also: fully mitigated vulnerability, fully mitigated vulnerabilities

ID: FRD-ALL-28

Handle

Has the plain language meaning inclusive of any possible action taken with information, such as access, collect, control, create, display, disclose, disseminate, dispose, maintain, manipulate, process, receive, review, store, transmit, use... etc.

Also: handle, handles, handled, handling

ID: FRD-ALL-03

Impact Categorization

The type of significant change that is likely to increase or decrease the impact level categorization for the entire cloud service offering (e.g. from low to moderate or from high to moderate).

Also: impact categorization

ID: FRD-ALL-12

Incident

Has the meaning given in 44 USC § 3552 (b)(2) applied to federal customer data, which is "an occurrence that (A) actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of [federal customer data]; or (B) constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies [related to federal customer data]." Reference: 44 USC § 3552 (b)(2)

Also: incident, incidents

ID: FRD-ALL-40

Information Resource

Has the meaning from 44 USC § 3502 (6): "information and related resources, such as personnel, equipment, funds, and information technology." This includes any aspect of the cloud service offering, both technical and managerial, including everything that makes up the business of the offering from non-machine-based information resources like organizational policies, procedures, employees, etc. to machine-based information resources like hardware, software, cloud services, code, etc.

Note: Information resources are either machine-based or non-machine-based; any requirement or recommendation that references information resources without specifying a type is inclusive of all information resources. Reference: 44 USC § 3502 (6)

Also: information resource, information resources

ID: FRD-ALL-02

Initial FedRAMP Assessment

The first full assessment of a cloud service offering seeking FedRAMP authorization, coordinated by the provider with all necessary assessors, that results in a FedRAMP authorization.

Also: initial FedRAMP assessment, IFRA

ID: FRD-ALL-48

Interim Requirement

A temporary requirement included as part of a FedRAMP Pilot or Beta Test that will likely be replaced, updated, or removed prior to the formal wide release of the requirement.

ID: FRD-ALL-13

Internet-Reachable Vulnerability (IRV)

A vulnerability in a machine-based information resource that might be exploited or otherwise triggered by a payload originating from a source on the public internet; this includes machine-based information resources that have no direct route to/from the internet but receive payloads or otherwise take action triggered by internet activity.

Notes:

  • The opposite of this is a "Not Internet-reachable Vulnerability" (NIRV).

  • Internet-reachability applies only to the specific vulnerable machine-based information resources processing the payload; please review the relevant FedRAMP technical assistance on internet-reachable vulnerabilities for examples.

Also: internet-reachable vulnerability, internet-reachable vulnerabilities, IRV, IRVs, NIRV, NIRVs

ID: FRD-ALL-24

Known Exploited Vulnerability (KEV)

Has the meaning given in CISA Binding Operational Directive 22-01, which is any vulnerability identified in CISA's Known Exploited Vulnerabilities catalog. Reference: CISA BOD 22-01

Also: known exploited vulnerability, known exploited vulnerabilities, KEV, KEVs

ID: FRD-ALL-25

Likely

A reasonable degree of probability based on context.

Also: likely, likelihood

ID: FRD-ALL-04

Likely Exploitable Vulnerability (LEV)

A vulnerability that is not fully mitigated, AND is reachable by a likely threat actor, AND a likely threat actor with knowledge of the vulnerability would likely be able to gain unauthorized access, cause harm, disrupt operations, or otherwise have an undesired adverse impact within the cloud service offering by exploiting the vulnerability.

Notes:

  • The opposite of this is a "Not Likely Exploitable Vulnerability" (NLEV).

  • At the absolute minimum, any vulnerability that an automated unauthenticated system can exploit over the internet is a likely exploitable vulnerability.

Also: likely exploitable vulnerability, likely exploitable vulnerabilities, LEV, LEVs, NLEV, NLEVs

ID: FRD-ALL-23

Limited Adverse Effect

A minor negative impact on an organization caused by the loss of confidentiality, integrity, or availability of its information. At a minimum, this includes effects that would likely: (i) result in degradation of the availability or performance of services within the cloud service offering for a minority of relevant users; OR (ii) directly or indirectly result in unauthorized access, disclosure, or modification of a small amount of the federal customer data stored within the cloud service offering by only a few relevant users.

Also: limited adverse effect, limited adverse effects

ID: FRD-ALL-34

Machine-Based (information resources)

Any information technology information resource—including systems, processes, software, hardware, services, cloud-native capabilities, and any other such capability, component, or resource—that relies primarily on mechanical or electronic devices (i.e. computers) for operation.

Note: All other information resources that do not rely on computers are non-machine-based information resources.

Also: machine-based, machine based

ID: FRD-ALL-50

Machine-Readable

Has the meaning from 44 U.S. Code § 3502 (18) which is "the term "machine-readable", when used with respect to data, means data in a format that can be easily processed by a computer without human intervention while ensuring no semantic meaning is lost" Reference: 44 U.S. Code § 3502 (18)

Also: machine-readable

ID: FRD-ALL-17

Negligible Adverse Effect

A small negative impact on an organization caused by the loss of confidentiality, integrity, or availability of its information. At a minimum, this includes effects that would likely: (i) result in minor inconvenience when accessing or using services within the cloud service offering; OR (ii) result in degradation of the availability or performance of services within the cloud service offering for only a few relevant users.

Also: negligible adverse effect, negligible adverse effects

ID: FRD-ALL-35

Ongoing Authorization Report (OAR)

A regular report that is supplied by FedRAMP Authorized cloud service providers to agency customers, aligned to the requirements and recommendations in the FedRAMP Collaborative Continuous Monitoring Standard.

Also: ongoing authorization report, OAR, OARs

ID: FRD-ALL-43

Overdue Vulnerability

A vulnerability that the provider intends to fully mitigate or remediate but has not or will not do so within the time frames recommended or required by FedRAMP.

Also: overdue vulnerability, overdue vulnerabilities

ID: FRD-ALL-30

Partially Mitigated Vulnerability

A vulnerability where the likelihood or potential adverse impact of exploitation has been reduced from the original evaluation but the risk of exploitation still exists and the vulnerability is still detected.

Also: partially mitigated vulnerability, partially mitigated vulnerabilities

ID: FRD-ALL-27

Persistent FedRAMP Assessment

Follow-on assessments of a cloud service offering focused on Key Security Indicators, coordinated by the provider with all necessary assessors, to maintain a FedRAMP authorization or change its impact categorization.

Also: persistent FedRAMP assessment, PFRA

ID: FRD-ALL-49

Persistent Validation

The systematic and persistent process of validating that information resources within a cloud service offering are operating in a secure manner as expected by the goals and objectives outlined by the provider against FedRAMP Key Security Indicators.

Also: persistent validation, persistently validate, persistently validated, validate, validated, validation

ID: FRD-ALL-47

Persistently

Occurring in a firm, steady way that is repeated over a long period of time in spite of obstacles or difficulties. Persistent activities may vary between actors, may occur irregularly, and may include interruptions or waiting periods between cycles. These attributes of persistent activities should be intentional, understood, and documented; the status of persistent activities will always be known.

Note: The use of persistently indicates a process that may not always occur continuously (without interruption or gaps) or regularly (on a consistent, predictable basis) but will repeat frequently in cycles. It aligns generally with historical misuse of "continuous" in federal information security policies.

Also: persistently, persistent

ID: FRD-ALL-38

Potential Adverse Impact (of vulnerability exploitation)

The estimated cumulative effect of unauthorized access, disruption, harm, or other adverse impact to agencies that likely could result if a threat actor exploits a vulnerability in the cloud service offering; as estimated following FedRAMP recommendations and requirements.

Also: potential adverse impact, potential adverse impacts

ID: FRD-ALL-36

Privileged account

An account with elevated privileges that enables administrative functions over some aspect of the cloud service offering that may affect the confidentiality, integrity, or availability of information beyond those given to normal users; levels of privilege may vary wildly.

Note: Any references to privileged accounts in FedRAMP materials should be presumed to apply to privileged roles or other similar capabilities that are used to assign privileges to privileged accounts.

Also: privileged account, privileged accounts

ID: FRD-ALL-42

Promptly

Without Unnecessary Delay.

Note: The use of promptly in FedRAMP materials frames conveys a need for urgent action where the expected time frame will vary by circumstance but earlier action is more likely to improve security outcomes and increase the security posture of a cloud service offering.

Also: promptly, prompt

ID: FRD-ALL-37

Quarterly Review

A regular synchronous meeting hosted by a FedRAMP Authorized cloud service provider for agency customers, aligned to the requirements and recommendations in the FedRAMP Collaborative Continuous Monitoring Standard.

Also: quarterly review, quarterly reviews

ID: FRD-ALL-44

Regularly

Performing the activity on a consistent, predictable, and repeated basis, at set intervals, automatically if possible, following a documented plan. These intervals may vary as appropriate between different requirements.

Also: regularly, regular

ID: FRD-ALL-07

Remediated Vulnerability

A vulnerability that has been neutralized or eliminated and is no longer detected.

Also: remediated vulnerability, remediated vulnerabilities

ID: FRD-ALL-26

Routine Recurring

The type of significant change that regularly and routinely recurs as part of ongoing operations, vulnerability mitigation, or vulnerability remediation.

Also: routine recurring

ID: FRD-ALL-09

Serious Adverse Effect

A significant negative impact on an organization caused by the loss of confidentiality, integrity, or availability of its information. At a minimum, this includes effects that would likely: (i) result in intermittent or ongoing degradation in the availability or performance of services within the cloud service offering, causing unpredictable interruptions to operations for 12+ hours; OR (ii) directly or indirectly result in unauthorized access, disclosure, or modification of a minority of the federal customer data stored within the cloud service offering.

Also: serious adverse effect, serious adverse effects

ID: FRD-ALL-33

Significant change

Has the meaning given in NIST SP 800-37 Rev. 2 which is "a change that is likely to substantively affect the security or privacy posture of a system." Reference: NIST SP 800-37 Rev. 2

Also: significant change, significant changes

ID: FRD-ALL-08

Third-party Information Resource

Any information resource that is not entirely included in the assessment for the cloud service offering seeking authorization.

Also: third-party information resource, third-party information resources

ID: FRD-ALL-05

Top-level administrative account

The most privileged account with the highest level of access within a cloud service offering for a customer organization, typically with complete control over all aspects of the cloud service offering, including managing resources, users, access, privileges, and the account itself.

Note: Any references to top-level administrative accounts in FedRAMP materials should be presumed to apply to top-level administrative roles or other similar capabilities that are used to assign top-level administrative account privileges.

Also: top-level administrative account, top-level administrative accounts

ID: FRD-ALL-41

Transformative

The type of significant change that introduces substantive potential security risks that are likely to affect existing risk determinations and must be assessed in depth.

Note: Transformative changes typically introduce major features or capabilities that may change how a customer uses the service (in whole or in part) and require extensive updates to security assessments, operational procedures, deployment plans, and documentation.

Also: transformative

ID: FRD-ALL-11

Trust Center

A secure repository or service used by cloud service providers to store and share authorization data. Trust centers are the complete and definitive source for authorization data and must meet the requirements outlined in the FedRAMP authorization data Sharing Standard to be FedRAMP-compatible.

Note: In FedRAMP documentation, all references to trust centers indicate FedRAMP-compatible trust centers unless otherwise specified.

Also: trust center, trust centers

ID: FRD-ALL-16

Vulnerability

Has the meaning given to "security vulnerability" in 6 USC § 650 (25), which is "any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of [...] management, operational, and technical controls used to protect against an unauthorized effort to adversely affect the confidentiality, integrity, and availability of an information system or its information." This includes gaps in Rev5 controls and 20x Key Security Indicators, software vulnerabilities, misconfigurations, exposures, weak credentials, insecure services, and all other such potential weaknesses in protection (intentional or unintentional). Reference: 6 USC § 650 (25)

Also: vulnerability, vulnerabilities

ID: FRD-ALL-20

Vulnerability Detection

The systematic process of discovering and identifying security vulnerabilities in information resources through assessment, scanning, threat intelligence, vulnerability disclosure mechanisms, bug bounties, supply chain monitoring, and other capabilities. This process includes the initial discovery of a vulnerability's existence and the determination of affected information resources within a cloud service offering.

Note: This definition applies to other forms such as "detect vulnerabilities" or simply "detection" / "detected" used in FedRAMP materials.

Also: vulnerability detection, detect vulnerabilities, detect, detection, detected

ID: FRD-ALL-21

Vulnerability Response

The systematic process of tracking, evaluating, mitigating, monitoring, remediating, assessing exploitation, reporting, and otherwise managing detected vulnerabilities.

Note: This definition applies to other forms such as "respond to vulnerabilities" or simply "response" / "responded" used in FedRAMP materials.

Also: vulnerability response, respond to vulnerabilities, respond, response, responded

ID: FRD-ALL-22