Skip to content

Recommended Secure Configuration

Effective Date(s) & Overall Applicability for Rev5

  • Required (Wide Release) beginning 2026-03-01.
  • These requirements apply after March 1, 2026, to all FedRAMP Rev5 cloud services that are listed in the FedRAMP Marketplace.
  • This process supplements the Customer Responsibilities Matrix and other existing materials - all existing Rev5 materials are still required to be maintained.
  • FedRAMP does not provide a specific template for the information required in this guidance to enable cloud service providers to share innovative solutions. As long as all requirements and recommendations in this document are addressed, providers are encouraged to share their Recommended Secure Configuration information in a way that makes the most sense for them and their customers.

Mandatory Adoption for Rev5

  • FedRAMP will begin enforcement of this process after March 1, 2026. Providers who do not have Recommended Secure Configuration guidance that meets the requirements and recommendations in this document will receive corrective action.
  • Beginning 2026-03-01, corrective action will include public notification that the provider does not meet this requirement.
  • Beginning 2026-05-01, corrective action will include revocation of FedRAMP authorization and downgrade to FedRAMP Ready.
  • Beginning 2026-07-01, corrective action will include complete removal from the FedRAMP Marketplace and a ban on FedRAMP authorization for three months.

All customers benefit from simple, easy to follow, easy to understand instructions for securely configuring a cloud service offering. Cloud service providers often provide a wide range of configuration options to allow individual customers to pick and choose their security posture based on their individual customer needs and are best positioned to provide instructions about the overall security impacts of many of these choices.

This process outlines simple requirements for FedRAMP authorized cloud service providers to effectively communicate the security impact of common settings to new and current agency customers.

Version 25.11B published on 2025-11-24

History:

ID Published Description
25.11B 2025-11-24 No material changes to content; updated JSON structure with additional information about Rev5 application added.
25.11A 2025-11-18 Initial release of the Recommended Secure Configuration (RSC) process for the FedRAMP 20x Phase Two pilot.
Background & Authority

Requirements & Recommendations

These requirements and recommendations apply ALWAYS to ALL FedRAMP Authorized cloud services based on the current Effective Date(s) and Overall Applicability of this document.

FRR-RSC-01 Top-Level Administrative Accounts Guidance

Providers MUST create and maintain guidance that includes instructions on how to securely access, configure, operate, and decommission top-level administrative accounts that control enterprise access to the entire cloud service offering.

Note: This guidance should explain how top-level administrative accounts are named and referred to in the cloud service offering.

Applies to: Low, Moderate, High

FRR-RSC-02 Top-Level Administrative Accounts Security Settings Guidance

Providers MUST create and maintain guidance that explains security-related settings that can be operated only by top-level administrative accounts and their security implications.

Applies to: Low, Moderate, High

FRR-RSC-03 Privileged Accounts Security Settings Guidance

Providers SHOULD create and maintain guidance that explains security-related settings that can be operated only by privileged accounts and their security implications.

Applies to: Low, Moderate, High

FRR-RSC-04 Secure Defaults on Provisioning

Providers SHOULD set all settings to their recommended secure defaults for top-level administrative accounts and privileged accounts when initially provisioned.

Applies to: Low, Moderate, High

FRR-RSC-05 Comparison Capability

Providers SHOULD offer the capability to compare all current settings for top-level administrative accounts and privileged accounts to the recommended secure defaults.

Applies to: Low, Moderate, High

FRR-RSC-06 Export Capability

Providers SHOULD offer the capability to export all security settings in a machine-readable format.

Applies to: Low, Moderate, High

FRR-RSC-07 API Capability

Providers SHOULD offer the capability to view and adjust security settings via an API or similar capability.

Applies to: Low, Moderate, High

FRR-RSC-08 Machine-Readable Guidance

Providers SHOULD provide recommended secure configuration guidance in a machine-readable format that can be used by customers or third-party tools to compare against current settings.

Applies to: Low, Moderate, High

FRR-RSC-09 Publish Guidance

Providers SHOULD make recommended secure configuration guidance available publicly.

Applies to: Low, Moderate, High

FRR-RSC-10 Versioning and Release History

Providers SHOULD provide versioning and a release history for recommended secure default settings for top-level administrative accounts and privileged accounts as they are adjusted over time.

Applies to: Low, Moderate, High