Vanta x FedRAMP 20x Moderate
BlogFedRAMP
April 28, 2026

From pilot to Moderate: Lessons from Vanta’s FedRAMP 20x journey

Written by
Arpita Husain
Security Analyst
Reviewed by
No items found.

Accelerating security solutions for small businesses 

Tagore offers strategic services to small businesses. 

A partnership that can scale 

Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate.

Standing out from competitors

Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

Vanta is now FedRAMP 20x Moderate authorized.

This milestone follows our FedRAMP 20x Low authorization less than one year ago. It also reflects our continued investment in Vanta for Government, which helps government vendors, federal agencies, and SLED organizations navigate the frameworks, workflows, and requirements shaping public sector security and compliance.

First announced in March 2025, the FedRAMP 20x program is designed to modernize the traditional authorization process, making it faster, more cost-effective, and more streamlined for both cloud service providers and federal agencies. 

Vanta achieved Moderate authorization as part of Phase 2 of the FedRAMP 20x pilot program, which builds on the automation-first approach introduced in Phase 1. Phase 3 will further build on these learnings to encourage wide-scale adoption of 20x Low and Moderate.

Below are three lessons we learned as we progressed from FedRAMP 20x Low to Moderate.

Lesson 1: Broad KSIs benefit from a clear security approach

FedRAMP 20x uses broad Key Security Indicators (KSIs), giving organizations flexibility to define meaningful security in their own environment. Unlike Rev. 5 Moderate—with 300+ highly prescriptive controls—20x shifts the focus to interpreting intent and implementing controls that effectively address it.

How we approached it

At the Moderate level, the expectation is not just to have automated checks, but to ensure those checks comprehensively cover critical areas such as identity, access, and infrastructure.

We started by breaking down the intent behind each KSI. From there, we identified specific, measurable security events that would demonstrate that intent in practice. These events became the foundation for our automated controls.

This approach allowed us to build controls that are both aligned with FedRAMP expectations and tailored to how our systems actually operate. In other words, we were able to focus on meaningful security for our company, which aligns with one of the overall goals of 20x.

Key takeaway: Clarity makes KSIs work

The flexibility of KSIs is a strength, but it requires clarity. Success depends on translating broad security goals into concrete, testable conditions. Organizations that invest upfront in defining what strong security looks like in their environment will be better positioned to build effective, automated controls.

Lesson 2: Raising the bar for automation makes FedRAMP 20x more scalable

The FedRAMP 20x pilot emphasizes automation, machine-readable validation, and KSIs to streamline the authorization process while maintaining a high bar for security.

This shift becomes more pronounced at the Moderate level. As part of the pilot, at least 70% of KSIs were required to be validated through automated, machine-readable methods. This defined threshold helped standardize what “high assurance” looks like in a model that otherwise allows for flexibility, raising the bar compared to traditional Rev. 5 approaches that rely more heavily on manual evidence collection.

How we approached it

Rather than focusing on what evidence to collect, we focused on how to continuously validate security controls in our environment.

For example, after defining our security approach, we developed more than 100 automated tests designed to validate key areas of our security posture on an ongoing basis.

This approach ensures that controls are not just documented, but actively enforced and continuously verified.

Key takeaway: Prioritize continuous, automated validation

This automation transforms compliance from a periodic, audit-driven exercise into an ongoing, engineering-driven process.

With continuous validation in place, issues surface immediately. When tests fail, they reflect real gaps—and can be addressed in real time. This creates a more accurate and actionable view of security posture while significantly improving scalability.

Lesson 3: FedRAMP 20x is a team sport

FedRAMP 20x shifts compliance from a documentation-heavy process to one deeply embedded in how systems are built and operated.

As a result, authorization is no longer confined to GRC or audit teams. Authorization can no longer sit solely with GRC or audit teams; it requires close collaboration across engineering, product, security, IT, and leadership.

How we approached it

At Vanta, we started the 20x program with strong support from our leadership team from the get-go. Both our CISO and CPO were involved in the program, starting with the 20x Low. 

For Moderate authorization, we worked closely across teams responsible for building and maintaining our systems to meet the demands of continuous testing and automation. During the test development phase, we held daily standups and maintained a centralized view of automated tests, ownership, and progress. This ensured alignment and accountability across teams.

Overall, FedRAMP 20x Moderate authorization was a coordinated effort across IT, security, GRC, engineering, product, and leadership. Early investment in collaboration was critical, particularly during the application phase, where we spent several weeks building and refining automated tests to meet program requirements.

Key takeaway: Don’t treat 20x as a compliance-only project

FedRAMP 20x should not be treated as a compliance-only initiative. It is a shared effort that depends on early and sustained collaboration across teams. Organizations that align engineering and security efforts from the outset will be better equipped to build scalable, continuously monitored compliance programs.

Apply Vanta’s learnings to your own program

For organizations considering FedRAMP 20x, the key is to approach it not as a checklist, but as an opportunity to rethink how security is defined, implemented, and measured.

Want to learn more about what your path to FedRAMP authorization could look like with Vanta? Request a demo with the Vanta for Government team.

Access Review Stage Content / Functionality
Across all stages
  • Easily create and save a new access review at a point in time
  • View detailed audit evidence of historical access reviews
Setup access review procedures
  • Define a global access review procedure that stakeholders can follow, ensuring consistency and mitigation of human error in reviews
  • Set your access review frequency (monthly, quarterly, etc.) and working period/deadlines
Consolidate account access data from systems
  • Integrate systems using dozens of pre-built integrations, or “connectors”. System account and HRIS data is pulled into Vanta.
  • Upcoming integrations include Zoom and Intercom (account access), and Personio (HRIS)
  • Upload access files from non-integrated systems
  • View and select systems in-scope for the review
Review, approve, and deny user access
  • Select the appropriate systems reviewer and due date
  • Get automatic notifications and reminders to systems reviewer of deadlines
  • Automatic flagging of “risky” employee accounts that have been terminated or switched departments
  • Intuitive interface to see all accounts with access, account accept/deny buttons, and notes section
  • Track progress of individual systems access reviews and see accounts that need to be removed or have access modified
  • Bulk sort, filter, and alter accounts based on account roles and employee title
Assign remediation tasks to system owners
  • Built-in remediation workflow for reviewers to request access changes and for admin to view and manage requests
  • Optional task tracker integration to create tickets for any access changes and provide visibility to the status of tickets and remediation
Verify changes to access
  • Focused view of accounts flagged for access changes for easy tracking and management
  • Automated evidence of remediation completion displayed for integrated systems
  • Manual evidence of remediation can be uploaded for non-integrated systems
Report and re-evaluate results
  • Auditor can log into Vanta to see history of all completed access reviews
  • Internals can see status of reviews in progress and also historical review detail
FEATURED VANTA RESOURCE

The ultimate guide to scaling your compliance program

Learn how to scale, manage, and optimize alongside your business goals.