Back to Blog
ComplianceMarch 11, 202611 min read

Our FedRAMP High Journey: 18 Months of Controlled Paranoia

FedRAMP High is the most rigorous security authorization in the federal cloud ecosystem. We spent 18 months earning it. Here is an honest account of what the process actually looks like — the parts that worked, the parts that nearly broke us, and what we would do differently if we started over.

David Reyes

CISO, Novastraxis

In August 2025, Novastraxis received our FedRAMP High Provisional Authority to Operate (P-ATO) from the Joint Authorization Board. That single sentence took 18 months, 420 documented security controls, two dedicated GovCloud regions, three full assessment cycles, and more red-lined spreadsheets than I care to remember. This article is the story of that journey — not the sanitized version you put in a press release, but the real version that I wish someone had written for me before we started.

FedRAMP (Federal Risk and Authorization Management Program) provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services used by federal agencies. FedRAMP High is the most stringent baseline, required for systems processing high-impact data — information whose loss of confidentiality, integrity, or availability could have severe or catastrophic effects on organizational operations, assets, or individuals. Think law enforcement records, emergency services data, and financial regulatory systems.

Fewer than 20 cloud service providers hold FedRAMP High authorization. There are good reasons for that. The requirements are exhaustive, the assessment process is demanding, and the continuous monitoring obligations are permanent. But for Novastraxis, serving the federal market was a strategic imperative, and FedRAMP High — not Moderate — was the only authorization that would give our government customers the confidence to run their most sensitive workloads on our platform.

Why We Pursued FedRAMP High (Not Moderate)

The first strategic decision was whether to pursue FedRAMP Moderate or FedRAMP High. Moderate covers the majority of federal use cases and requires approximately 325 controls from NIST SP 800-53. High adds roughly 100 additional controls and significantly increases the rigor of assessment for shared controls. Most cloud service providers start with Moderate and later upgrade to High. We went straight for High.

The rationale was both strategic and practical. Strategically, our target customers — defense agencies, law enforcement, and financial regulators — required High authorization. Pursuing Moderate first would have delayed our ability to serve these customers by 12-18 months. Practically, our existing security posture was already close to the High baseline. We held SOC 2 Type II, ISO 27001, PCI DSS Level 1, and HIPAA compliance. The incremental effort to reach High versus Moderate was significant but not double — we estimated roughly 40% more effort for the additional controls, most of which were extensions of controls we had already implemented.

In retrospect, this was the right call. The market differentiation of being one of fewer than 20 FedRAMP High authorized providers has been substantial. Every federal procurement conversation starts with compliance, and having High authorization removes the single largest barrier to adoption. The customers we pursued needed High — Moderate would not have been sufficient.

The 3PAO Selection Process and What We Learned

The Third-Party Assessment Organization (3PAO) is the independent auditor that assesses your system against the FedRAMP requirements. Selecting the right 3PAO is one of the most consequential decisions in the entire process, and it is one that most organizations do not spend enough time on.

We evaluated four FedRAMP-accredited 3PAOs over a six-week period. The evaluation criteria went beyond cost and schedule. We looked at their experience with High authorizations specifically (some 3PAOs have extensive Moderate experience but limited High experience), their familiarity with our technology stack (Kubernetes, microservices, eBPF-based security), their team composition (we wanted senior assessors, not junior staff learning on our engagement), and their approach to assessment findings (collaborative problem-solving versus adversarial gotcha-finding).

We selected Coalfire Systems, and they were excellent. The single most important factor was their deep experience with cloud-native architectures. Several 3PAOs we spoke with were still primarily experienced with traditional datacenter assessments and struggled to map Kubernetes security controls to NIST 800-53 control families. Coalfire had assessed multiple Kubernetes-native cloud platforms and could engage with our architecture on its own terms rather than forcing it into a traditional assessment framework.

The lesson: do not treat 3PAO selection as a procurement exercise. Treat it as hiring a critical partner for an 18-month engagement. Interview their actual assessment team, not just their sales team. Ask for references from recent High authorization engagements. And negotiate the scope of the assessment carefully — ambiguity in the boundary definition will cost you months of rework later.

Building the System Security Plan: 420 Controls Documented

The System Security Plan (SSP) is the cornerstone document of FedRAMP authorization. It describes every security control implementation, every system component, every data flow, and every security boundary in your environment. For FedRAMP High, the SSP must address 421 controls across 20 control families from NIST SP 800-53 Revision 5. Our SSP, when completed, was 1,847 pages long.

Writing the SSP was the single most time-consuming phase of the authorization process. Each control requires a detailed implementation statement that describes how your system implements the control, what specific technologies and processes are involved, and how you verify that the control is operating effectively. Vague or generic statements are rejected — assessors want specifics. For access control (AC-2), for example, we documented the exact RBAC roles, the provisioning workflow, the review cadence, the deprovisioning trigger conditions, the audit log retention policy, and the monitoring alerts that detect unauthorized access changes.

We assigned control ownership across 14 engineering teams, with each team responsible for documenting the controls they implemented. A dedicated GRC team coordinated the effort, maintained the SSP template, reviewed submissions for consistency and completeness, and managed the overall timeline. The SSP took approximately 8 months to produce in its initial version, went through three internal review cycles, and underwent two rounds of revision based on 3PAO feedback before the assessment began.

SSP development timeline:

  • Months 1-2: Boundary definition, system architecture documentation, and control assignment to engineering teams
  • Months 3-6: Control implementation statements drafted by engineering teams, evidence artifacts identified and collected
  • Months 7-8: Internal QA review, consistency checks, gap remediation for identified control weaknesses
  • Months 9-10: 3PAO readiness assessment and SSP revisions based on assessor feedback before formal assessment begins

The Assessment Process: What Auditors Actually Look For

The formal 3PAO assessment for FedRAMP High took approximately 12 weeks. During that period, our assessors reviewed every control implementation statement in the SSP, examined evidence artifacts for each control, conducted interviews with control owners, performed vulnerability scanning and penetration testing, and observed operational procedures in action.

What surprised me most was what the assessors focused on versus what we expected. We had spent enormous effort on technical controls — encryption algorithms, network segmentation, access control mechanisms — and those were certainly tested rigorously. But the assessors spent an equal amount of time on operational controls: incident response procedures, change management workflows, personnel security practices, and configuration management processes. They wanted to see not just that a control existed, but that it was actively operated, regularly tested, and continuously monitored.

The penetration test was more comprehensive than any commercial pentest we had experienced. The assessment team spent three weeks on it, covering external attack surface, internal network segmentation, application-layer vulnerabilities, container escape scenarios, and social engineering attempts. They found two medium-severity findings and seven low-severity findings, all of which we remediated before the authorization decision. Zero critical or high findings — a result I credit to the extensive internal security testing we conduct year-round.

The most valuable insight from the assessment process was the importance of evidence quality. Assessors do not just want to hear that you rotate credentials every 90 days — they want to see the automated rotation logs, the monitoring alert that fires when rotation fails, the incident record from the last time a rotation issue was escalated, and the post-incident review that improved the process. The depth of evidence expected for FedRAMP High is an order of magnitude beyond what commercial compliance frameworks require.

Continuous Monitoring: The Part Nobody Talks About

Getting the authorization is the beginning, not the end. FedRAMP requires continuous monitoring (ConMon) that includes monthly vulnerability scanning and reporting, annual penetration testing, ongoing Plan of Action and Milestones (POA&M) management, significant change requests for any material system modifications, and annual security assessments covering a subset of controls. The ConMon obligations are permanent and non-negotiable.

The monthly vulnerability scan reporting alone is a substantial operational commitment. Every finding must be categorized, prioritized, assigned a remediation timeline, and tracked to closure. Critical findings must be remediated within 30 days. High findings within 90 days. Medium within 180 days. And every month, you submit a ConMon report to the FedRAMP Program Management Office documenting the current state of all findings, new findings, and remediation progress.

The significant change request process is where many organizations underestimate the ongoing cost. Any material change to the authorized system — new services, architecture changes, significant infrastructure updates, new data flows — requires a documented change request that may trigger additional 3PAO assessment. We have submitted 14 significant change requests in the year since authorization, each requiring 2-6 weeks of documentation and review. This is the hidden operational cost of FedRAMP that organizations must plan for before they commit to the authorization process.

Our monthly ConMon deliverables include:

  • Infrastructure vulnerability scan results with full finding categorization and remediation tracking
  • Web application scan results covering all customer-facing and internal administrative interfaces
  • Updated POA&M with status changes, new milestones, and evidence of completed remediations
  • Inventory updates reflecting any changes to system components, network topology, or data flows
  • Incident reports for any security events meeting the FedRAMP reporting threshold

Tools and Automation That Saved Us

Without automation, FedRAMP High authorization is a manual nightmare. The volume of evidence collection, vulnerability tracking, and reporting would overwhelm any team relying on spreadsheets and email. We invested heavily in automation from the beginning, and it was one of the best decisions we made.

Our GRC platform handles automated evidence collection for approximately 70% of our controls. For technical controls like encryption configuration, access control settings, and logging pipeline configuration, automated collectors pull evidence directly from production systems on a daily basis. This eliminates the scramble of evidence collection before assessments and provides continuous assurance that controls are operating as documented.

For vulnerability management, we built a custom pipeline that integrates our scanning tools with the POA&M tracking system. When a new vulnerability is detected, it is automatically categorized using CVSS scoring, assigned a remediation timeline based on FedRAMP requirements, and routed to the appropriate engineering team. Remediation evidence is collected automatically when the finding is resolved in subsequent scans. This reduced our monthly ConMon report preparation time from approximately 80 person-hours to 12 person-hours.

Configuration management automation was equally critical. We use infrastructure-as-code for our entire GovCloud environment, with policy-as-code guardrails that prevent non-compliant configurations from being deployed. Every infrastructure change is validated against our NIST 800-53 control requirements before it reaches production. This is not just good security practice — it is essential for managing the significant change request process, because our IaC diffs provide the detailed change documentation that the FedRAMP PMO requires.

What We'd Do Differently

Hindsight provides clarity that foresight never can. If I were starting the FedRAMP High journey again, here are the changes I would make based on our experience.

Hire a dedicated FedRAMP program manager from day one

We tried to run the program with our existing GRC team for the first four months. It was a mistake. FedRAMP is a full-time program management effort that requires deep knowledge of the FedRAMP process, relationships with the PMO, and experience navigating the assessment timeline. Hiring someone who had been through the process before accelerated everything.

Define the authorization boundary with surgical precision early

Every system component inside the boundary must be fully documented and assessed. We initially defined our boundary too broadly, including services that did not need to be in scope. Narrowing the boundary six months into the process required significant SSP rework. Define it right the first time and keep it as small as possible while still covering the services your government customers need.

Invest in automated evidence collection before writing the SSP

We wrote control implementation statements and then built evidence collection. In retrospect, building the evidence collection first would have informed better implementation statements and identified gaps earlier. If you cannot automatically prove a control is working, the control needs to be redesigned before you document it.

Budget for the ongoing ConMon cost from the start

The initial authorization cost is significant, but the ongoing continuous monitoring cost is what most organizations underestimate. Plan for 3-4 full-time equivalents dedicated to ConMon activities, plus annual 3PAO assessment costs, penetration testing, and the operational overhead of significant change requests. This is a permanent cost of holding FedRAMP authorization.

Advice for Companies Starting Their FedRAMP Journey

For organizations considering FedRAMP authorization, here is the unvarnished advice I wish I had received before we started. These are the non-obvious lessons that do not appear in the FedRAMP documentation.

1

Start with a gap assessment against NIST 800-53 High

Before committing to FedRAMP, conduct an honest gap assessment against the NIST 800-53 High baseline. If you are starting from scratch with no existing compliance framework, the gap will be enormous and the timeline will be 24-36 months. If you already hold SOC 2 and ISO 27001, the gap is manageable and 12-18 months is realistic. Know your starting position before you commit resources.

2

Engage the FedRAMP PMO early and often

The FedRAMP Program Management Office is more accessible than most organizations realize. They offer intake meetings, readiness assessments, and ongoing guidance throughout the process. Establishing a relationship with the PMO early prevents misunderstandings about requirements and timeline expectations that can cause costly delays later.

3

Build your GovCloud environment as a separate, purpose-built deployment

Do not try to carve a FedRAMP boundary out of your existing commercial infrastructure. Build a dedicated GovCloud environment with its own network boundaries, its own identity plane, and its own operational procedures. The boundary definition will be cleaner, the assessment will be simpler, and the ongoing ConMon burden will be contained to the GovCloud environment.

4

Get executive sponsorship with realistic timeline and budget expectations

FedRAMP High is an organizational commitment, not just an engineering project. It requires sustained investment over 18+ months and permanent ongoing operational cost. Ensure your executive team understands the full lifecycle cost — initial authorization, continuous monitoring, annual assessments, and the engineering overhead of maintaining compliance through system changes.

Was It Worth It?

Unequivocally, yes. FedRAMP High authorization has opened an entire market segment for Novastraxis. Federal agencies that previously could not consider our platform are now active customers. The security rigor required by the process materially strengthened our overall security posture — many of the controls and processes we implemented for FedRAMP now benefit our entire customer base, not just government customers. And the continuous monitoring discipline has made our security operations more systematic and measurable.

But it is not a decision to make lightly. The investment is substantial, the timeline is long, and the ongoing obligations are permanent. If your business case requires it, the return is there. If you are pursuing FedRAMP because it seems like a nice credential to have, think carefully about whether the investment is justified. For us, it was the right strategic decision at the right time, and I am proud of what our team accomplished.

For more information about our compliance certifications, visit our Compliance Center. For details about our government solutions, including our dedicated GovCloud regions, see our Government Solutions page. And if you are starting your own FedRAMP journey and want to compare notes, I am always happy to talk — reach out through our contact page.

Ready to Explore FedRAMP-Authorized Infrastructure?

Novastraxis holds FedRAMP High P-ATO authorization with dedicated GovCloud regions in Ashburn, VA and San Antonio, TX. Our GRC team can walk you through our authorization package and compliance documentation.