FedRAMP levels

How to prepare for FedRAMP Low and the 20x pilot: Eligibility and requirements

Written by
Vanta
Reviewed by
Lucas Hogue
GRC Subject Matter expert
Note
FedRAMP is undergoing updates that may affect authorization requirements. Some information on this page may change as new guidance is finalized. View official changelog  |  Read full disclaimer

Illustration highlighting FedRAMP Low Impact level, showing a laptop with cloud folders and a checkmark next to “Low Impact,” while Moderate and High Impact appear faded in the background.

FedRAMP Low, Moderate, and High are the three impact levels under the Federal Risk and Authorization Management Program (FedRAMP). These levels are primarily determined using FIPS 199, which evaluates the potential impact on confidentiality, integrity, and availability (CIA). Other factors like the system’s function and its role in the federal operations also influence the level.

FedRAMP Low applies to cloud systems where the loss of confidentiality, integrity, or availability would have a limited adverse effect. These systems typically support public-facing or low-risk federal workloads that do not process sensitive information such as CUI.

The emerging FedRAMP 20x pilot also builds on this baseline by introducing automation and cloud-native, machine-readable workflows to modernize compliance processes and reduce friction in authorizing low-impact systems. 

This guide will help you assess if you should pursue FedRAMP Low, opt for FedRAMP 20x, or level up with Moderate or High impact levels. We’ll discuss:

  • Who needs FedRAMP Low
  • What’s required for this baseline
  • How to prepare for FedRAMP Low authorization

What is FedRAMP Low?

FedRAMP Low is the baseline security standard for cloud service providers (CSPs) that work with government agencies and handle federal data categorized as low impact under FIPS 199 (Federal Information Processing Standard Publication 199). It requires the smallest set of security controls among the Low, Moderate, and High baselines.

This baseline is designed for systems where a breach of confidentiality, integrity, and availability would have a limited adverse effect. For example, a website that hosts general public-facing information about a federal agency would need the FedRAMP Low baseline since a potential data breach would cause minor operational impact, and no sensitive data would be exposed.

The main difference among these baselines is the type and sensitivity of data they protect and the potential impact to its confidentiality, integrity, and availability. Low-impact cloud service offerings (CSOs) only handle public or minimally sensitive data and typically do not access sensitive personally identifiable information (PII) beyond what’s needed for basic logins.

Once a system requires storing or processing higher-risk, sensitive PII, it must switch to a Moderate baseline. Finally, if a CSP has access to highly sensitive data such as law enforcement or mission-critical information, it often warrants a FedRAMP High categorization.

To define the appropriate impact level, you need to go through a formal FIPS 199 impact assessment and consult with your sponsoring federal agency. Avoid relying solely on policy assumptions or internal judgment.

Bonus: You can read about other authorization levels in these Vanta guides:

{{cta_withimage44="/cta-blocks"}} | FedRAMP checklist

Who needs FedRAMP Low authorization?

The FedRAMP Low baseline is required for cloud service providers (CSPs) that aim to sell services handling non-sensitive and publicly releasable federal data. This could refer to data with minimal confidentiality requirements, such as public policies, open datasets, and general census reports on government websites.

This entry-level authorization level is generally pursued by CSPs wanting to enter the FedRAMP Marketplace, including:

  • Cloud services that target low-risk federal use cases
  • Public-facing services handling little or no sensitive data
  • Lightweight SaaS applications like to-do apps, collaboration tools, and calendar apps

In practice, nearly any cloud service a federal agency wants to use must at least meet the Low baseline, with a few expectations for services like social media and search engines.

What is required for the FedRAMP Low baseline?

Each FedRAMP baseline requires CSPs to implement a specific set of controls from NIST Special Publication (SP) 800-53, including both base controls and, if applicable, control enhancements.

The requirement for FedRAMP Low is to integrate 156 security controls across applicable control families. Here are some of the main categories with the highest number of controls:

Family Number of controls
Identification and Authentication 16
System and Communication Protections 14
Access Control 11
Supply Chain Risk Management 112
Audit and Accountability 10
Security Assessment and Authorization 10
Physical and Environmental Protection 10

CSPs must explain how each security control is met in the System Security Plan (SSP), a formal document that describes integrated and inherited controls, data flows, and the system infrastructure. The controls must then be independently validated by a 3PAO (third-party assessment organization) for FedRAMP Low authorization.

What is the FedRAMP LI-SaaS baseline?

The Low-Impact Software as a Service (LI-SaaS) baseline is a tailored subset of the Low baseline for systems with minimal security risk. It was designed for simple SaaS applications that only store basic login details (such as email, username, and password).

FedRAMP LI-SaaS baseline requires the same number of security controls (156), but reduces the 3PAO validation burden to accelerate the authorization process. Under FedRAMP Rev. 5, only 66 controls require independent 3PAO testing, and 90 can be met through CSP attestation. This means the SSP documentation requirements are also simplified compared to a standard FedRAMP Low authorization.

Eligibility requirements for LI-SaaS

Cloud providers can qualify for LI-SaaS if they meet the following requirements:

  • Be fully operational (and not in the development phase)
  • Contain no PII other than what is required for login (username, email, password)
  • Fall under a SaaS application according to NIST SP 800-145
  • Run entirely in a cloud environment
  • Are rated as Low impact under FIPS 199
  • Operate on a FedRAMP-approved PaaS or IaaS or provide their own underlying infrastructure within the authorization boundary

To summarize, if your cloud service stores:
  • Basic login data: Opt for LI-SaaS
  • Agency data beyond logins: Opt for Low
  • Other federal data with higher sensitivity: Consider Moderate or High

Does FedRAMP Low 20x automate low-impact authorization?

The U.S. General Services Administration (GSA) introduced the FedRAMP 20x Phase One pilot program in early 2025 to test automation for low-impact authorizations and gradually move to higher tiers. As of November 2025, Phase Two of the pilot is in progress, but participation is limited and not open to the public. FedRAMP is targeting approximately 10 Moderate pilot authorizations during Phase Two. Interested providers should review FedRAMP’s Phase Two Pilot Eligibility and Participation Criteria.

The FedRAMP 20x transforms authorization logistics by expressing requirements as a set of Key Security Indicators (KSIs) mapped to the underlying NIST SP 800-53 Rev. 5 controls and designed to automate validation.

The 20x program modernizes the Low baseline through initiatives such as:

  • Machine-readable security packages using standardized schemas
  • Automated validation of KSIs to streamline review
  • Programmatic submission of evidence to the FedRAMP PMO
  • A more predictable and outcome-focused authorization process

Traditionally, LI‑SaaS and other low-impact systems require a federal agency sponsor to review their security package and issue an Authority to Operate (ATO), which can be time-consuming. To reduce this dependency, the FedRAMP 20x Phase One pilot allows vendors to obtain a 12-month Low authorization directly from the FedRAMP Program Management Office (PMO) without a sponsor.

After that, agencies may choose to issue an ATO. CSPs can also eventually transition to a Moderate or High level. Note that a scaled 20x model for High impact systems has not yet been announced as of writing.

Here’s a comparison between FedRAMP Low and FedRAMP 20x key differences:

Criteria FedRAMP Low FedRAMP 20x
Controls NIST SP 800-53 Rev. 5 control set KSIs mapped to NIST SP 800-53 Rev. 5 controls for automated validation
Automation Manual SSP Machine-readable formats and automated evidence
Sponsorship Requires an agency sponsor FedRAMP can issue a 12-month authorization without a sponsor
Evidence submission Traditional package submission to sponsoring agency Machine-readable package submitted to the FedRAMP PMO using publicly developed schemas that standardize evidence formats

How to prepare for FedRAMP Low authorization

Approaching the authorization process methodically can make the process smoother. Here are the steps to follow under the standard Rev. 5 process used for FedRAMP Low authorizations:

  1. Determine if you qualify for FedRAMP Low or LI-SaaS: Use a FIPS 199 assessment to confirm that you should pursue the Low baseline. Determine your authorization boundary, detailing what parts of the system are in scope.
  2. Conduct a gap analysis vs. NIST 800-53: Compare your current security posture against required NIST 800-53 controls to identify missing practices, policies, and safeguards.
  3. Address the gaps: Remediate the control gaps uncovered. Draft or update the missing policies and procedures to create the foundation for your SSP.
  4. Engage a 3PAO for formal assessment: Hire a 3PAO to conduct a formal independent security assessment. They’ll attest if you’ve properly implemented the controls and then issue the Security Assessment Report (SAR).
  5. Submit the authorization package: Compile your SSP, SAR, and other relevant documentation and submit it to your sponsoring agency for review. The agency verifies the package and decides whether to issue the FedRAMP Low ATO.
  6. Automate evidence collection and monitoring: Once authorized, use automation tools to streamline evidence collection, continuous monitoring, and reporting to maintain compliance.

Note: The steps above reflect the traditional, agency-sponsored FedRAMP Low process under NIST 800-53 Rev. 5. FedRAMP 20x follows a distinct authorization model with different patterns, automation workflows, and validation  approach. For Low authorization under 20x, see our dedicated FedRAMP 20x guide.

{{cta_withimage44="/cta-blocks"}} | FedRAMP checklist

FedRAMP Low authorization cost and timelines

The FedRAMP Low may cost less than Moderate or High authorization, but it’s still a notable investment of a team’s time and resources.

The most common friction points for Low authorization are obtaining an agency sponsor, incomplete documentation, asset scoping and boundary definition, and insufficient control implementation. To be successful, organizations seeking authorization will need financial resources and a high level of expertise.

Connor Snyder

The overall cost can be broken down into two segments:

  1. Initial costs (pre-certification, gap remediation, and authorization): $500,000 to $1,000,000
  2. Annual costs (maintenance and monitoring): $150,000 to $250,000

The Low authorization process can take up to 12–18 months. It depends on your readiness and agency sponsorship, such as how fast you’ll secure one, their capacity, and engagement terms.

For cloud-native solutions that don’t store PII, LI-SaaS could be a more economical solution. It is usually less expensive. The lighter validation requirements may enable you to complete it in a few months, which is distinctly faster compared to a year or more required for the Low baseline.

Regardless of which authorization you pursue, using a compliance solution such as Vanta can help you proceed with more structure and confidence.

Achieve guided FedRAMP Low readiness with Vanta

Vanta is a robust agentic trust platform that supports complex compliance and assurance programs with automated workflows, built-in resources, and continuous monitoring. The platform maps many FedRAMP requirements into easy-to-manage, actionable tasks, reducing the guesswork for still-maturing teams.

Vanta automates evidence collection through integrations with 400+ solutions. You can also track the progress of actions, evidence, and milestones in a unified dashboard and remediate gaps proactively for faster readiness.

Here are some of the key features of Vanta’s dedicated FedRAMP product:

  • Pre-built templates mapped to FedRAMP
  • Accessing and monitoring third-party vendors
  • AI-powered policy management
  • Access to the Vanta partner network to find a 3PAO and consultants
  • Continuous monitoring to support post-authorization obligations
  • FedRAMP 20x pilot support

Book a custom demo to watch Vanta FedRAMP in action and discuss tailored solutions.

{{cta_simple39="/cta-blocks"}} | FedRAMP product page

Disclaimer
FedRAMP is currently undergoing significant updates, including proposed changes to the cloud authorization process and related program requirements. As these updates continue to evolve and new guidance is issued, some information on this resource page may not fully reflect the most current FedRAMP policies or requirements at the time of reading. We are actively monitoring these developments and will update our content as changes are finalized to ensure alignment with the latest official guidance.

To learn more, visit FedRAMP's official changelog

Get started with FedRAMP:

Start your FedRAMP journey with these related resources.

FedRAMP Authorization Checklist cover image

FedRAMP Authorization Checklist

Here’s the step-by-step process to achieve FedRAMP authorization for the first time.

FedRAMP Authorization Checklist
FedRAMP Authorization Checklist
A book with the word FedRAMP on it.

The ultimate guide to FedRAMP: A requirements guide for authorization

Learn about FedRAMP authorization, from impact levels to compliance steps, to unlock opportunities with U.S. federal agencies.

The ultimate guide to FedRAMP: A requirements guide for authorization
The ultimate guide to FedRAMP: A requirements guide for authorization

Lessons learned from Vanta’s FedRAMP® 20x pilot program

A behind-the-scenes look at how Vanta navigated the FedRAMP 20x pilot.

Lessons learned from Vanta’s FedRAMP® 20x pilot program
Lessons learned from Vanta’s FedRAMP® 20x pilot program