Skip to main content
  • blogangle-right
  • FedRAMP 20x Roadmap: Key Dates for the Phased Rollout [January 2026 Update]

FedRAMP 20x Roadmap: Key Dates for the Phased Rollout [January 2026 Update]

  • January 20, 2026
Author

Emily Bonnie

Senior Content Marketing Manager

Reviewer

Rob Gutierrez

Senior Cybersecurity and Compliance Manager, CISA, CCSK, CMMC RP

Over the past year, FedRAMP 20x has steadily reshaped federal cloud authorizations. FedRAMP introduced Phase One and Phase Two pilots, tested a new Key Security Indicator–based assessment model, and began reworking standards around continuous monitoring, vulnerability management, and authorization data sharing.

In January 2026, FedRAMP followed that work with a coordinated set of updates, including six new Requests for Comment, the announcement of Phase Two Moderate pilot participants, and additional guidance tied to the FedRAMP Authorization Act.

For cloud service providers, the key question is not just what appears on the FedRAMP 20x roadmap, but how these changes affect their compliance efforts. After all, FedRAMP 20x is not just a procedural update to legacy FedRAMP — it represents a fundamental shift in how cloud security is assessed for federal agencies.

Note: Because FedRAMP 20x is still in active rollout, timelines and details may shift as priorities and staffing change. For the most up-to-date information, refer to the FedRAMP 20x Public Roadmap on GitHub.

The latest FedRAMP 20x updates: January 2026

On January 13, 2026, FedRAMP released six Requests for Comment, along with new program updates and Phase Two pilot announcements.

Each RFC targets a specific friction point that has historically slowed or complicated FedRAMP adoption. RFC-0019 focuses on reporting assessment costs, introducing new requirements for both Rev5 and 20x to give FedRAMP better visibility into assessment pricing without publicly exposing sensitive cost data.

RFC-0020 addresses authorization designations, proposing a shift away from traditional Low, Moderate, and High baselines toward a six-level designation system. This new system would align more naturally with continuous validation and machine-readable packages, where authorization is less about passing a single point-in-time review and more about maintaining a consistently high standard of evidence over time. For CSPs, this reinforces a core message of FedRAMP 20x: authorization is no longer a milestone you reach once, but a strong security posture you have to sustain continuously.

Several RFCs directly affect how CSPs show progress and maintain visibility. RFC-0021 proposes expanding the FedRAMP Marketplace to allow providers to be listed earlier in their journey, require pricing transparency, and formally include advisory and assessment firms.

RFC-0022 outlines how FedRAMP plans to leverage external frameworks, introducing a temporary validation path for services with existing assessments such as SOC 2, ISO 27001, GovRAMP, or CMMC Level 2 so agencies can pilot low-risk services without waiting for a full authorization.

The remaining RFCs focus on execution and sustainability. RFC-0023 introduces a sponsorless path for certain Rev5 authorizations, giving providers who are far along but blocked by agency sponsorship a way to complete authorization.

RFC-0024 proposes mandatory machine-readable authorization packages for Rev5, with defined deadlines for moving away from narrative-heavy documentation toward structured, deterministic data that agencies can automatically consume.

For CSPs, these RFCs mark a clear shift from planning to locking in how this modernized program will actually function in practice. Faster reviews assume cleaner submissions, continuous validation assumes operational discipline, and marketplace visibility reflects demonstrable progress.

How the FedRAMP 20x rollout is structured

The program rollout is structured in two major phases, supported by parallel updates to public tooling and targeted adjustments to legacy Rev5 requirements.

Phase One focuses on FedRAMP Low and serves as the proving ground for new standards and processes. Phase Two expands those lessons to FedRAMP Moderate and introduces higher expectations around continuous validation, cryptography, and remediation discipline. At the same time, Marketplace and Rev5 updates are reshaping how CSPs signal progress and maintain authorization over time.

Phase one: Modernizing FedRAMP Low

Phase One is where FedRAMP began pressure-testing the 20x model in real environments, starting with Low-impact systems. The goal is to see how these changes work in practice, gather feedback, and refine them before rolling them out at scale. 

It is also the first opportunity for CSPs to experience a faster, more automated path to authorization, while still meeting the government’s security requirements. By the end of Phase One, the standards tested here will become the foundation for how FedRAMP Low authorizations are handled going forward. 

Key milestones include:

  • August 15, 2025: Authorization Data Sharing Standard
    This standard allows CSPs to self-host FedRAMP authorization data, including continuous monitoring materials, without having to upload them to the FedRAMP Secure Repository. It offers more flexibility while keeping agencies informed.
  • August 29, 2025: Finalize FedRAMP 20x Low Authorization Standard
    Consolidates everything learned during the Phase One pilot into official Low authorization guidance for ongoing use.
  • September 4, 2025: Continuous Vulnerability Management Standard
    This standard merges reporting and monitoring into one unified set of requirements. It sets the expectation that CSPs will continuously detect, prioritize, and remediate vulnerabilities using automated systems.
  • September 12, 2025: Federal Information Technical Assistance
    Provides guidance on what qualifies as federal information for the purposes of the Minimum Assessment Scope, helping CSPs determine which data falls under FedRAMP requirements.
  • September 26, 2025: Finalize Key Security Indicators for FedRAMP Moderate
    Updates the metrics used for assessing FedRAMP Moderate authorizations, ensuring that Phase Two launches with clear and measurable expectations.
  • September 26, 2025: Agency Adoption Pilot for 20x Low
    Pairs early-adopting agencies with Phase One authorized CSPs to evaluate how 20x works in practice and identify opportunities for improvement.
  • October 3, 2025: Collaborative Continuous Monitoring Standard
    Introduces a formal structure for joint monitoring between CSPs and agencies, making the process more efficient and collaborative.
  • October 3, 2025: Agency Reuse Playbook for 20x
    Creates a resource for agencies explaining how to review and reuse 20x authorized services without unnecessary duplication of effort.

Recommended reading

FedRAMP 20x: What’s Changing for CSPs — and What Isn’t

Phase two: Scaling to FedRAMP Moderate

Once Phase One established that the 20x model could work at the Low impact level, FedRAMP shifted its focus to scaling those same principles to Moderate authorizations. This phase incorporates lessons learned during the pilot, but it also raises expectations, especially around continuous validation, cryptographic requirements, and modernization of legacy processes like POA&Ms. 

For CSPs, this is where the program moves closer to its vision of a largely automated, continuous authorization process that is faster to achieve and easier to maintain. Phase Two also provides the opportunity for CSPs authorized at Low to transition to Moderate more seamlessly.

Key milestones include:

  • October 31, 2025: Continuous Validation Standard
    Establishes expectations for near real-time validation of security controls, with a target of achieving 80 percent or more validation through automation.
  • October 31, 2025: FIPS Cryptographic Module Application for Commercial Services
    Provides updated guidance on how FIPS 140-3 requirements apply to commercial services, taking a more risk-based approach.
  • November 14, 2025: POA&M Standard
    Updates the decades-old Plans of Action and Milestones process, making it more relevant for modern cloud environments and aligning it with commercial best practices.
  • November 15, 2025: 20xP2 Moderate Pilot Submission and Review Window
    Opens the pilot for Moderate-level authorizations under 20x.
  • December 5, 2025: Finalize FedRAMP 20x Moderate Authorization Standard
    Publishes the final requirements for Moderate authorizations based on pilot results.
  • TBA: Finalize FedRAMP 20x High Authorization Standard
    While FedRAMP has not yet formally announced its plans for 20x High, the expectation is that work will begin after the Moderate standard is finalized. This future phase would adapt the 20x model to the unique requirements of High impact systems, ensuring the same efficiency, automation, and continuous monitoring improvements extend to the most sensitive federal workloads.

Modernizing FedRAMP.gov and the Marketplace

Policy changes are only part of the 20x transformation. The program is also investing in the tools and resources that agencies and CSPs rely on every day. 

FedRAMP.gov and the Marketplace are being redesigned to make it easier to find information, streamline listings, and ensure that outdated content is clearly marked and archived.

Key updates include:

  • August 15, 2025: Major Redesign of FedRAMP.gov
    Delivers a new design and reorganized content focused on 20x, with improved navigation and clearer separation of legacy materials.
  • September 30, 2025: Marketplace Redesign
    Refreshes the FedRAMP Marketplace to improve performance, filtering, and integration with FedRAMP.gov.
  • November 30, 2025: External Data-Driven Marketplace
    Moves toward a model where CSPs provide their own Marketplace listing data through secure feeds, reducing manual updates.

Rev5 balance improvements for a smoother transition

For CSPs already authorized under Rev5, the 20x rollout may feel like a major shift. To manage that transition, FedRAMP is introducing a series of balance improvement releases. 

These targeted updates allow CSPs to adopt certain 20x elements without undergoing a full reauthorization, simplifying the path forward and ensuring compliance remains manageable. The improvements also help agencies adjust to new expectations while still working with services already in use.

Key efforts include:

  • October 31, 2025: R5.SCN Significant Change Notification BIR
    Tests a streamlined process for reporting significant changes.
  • October 31, 2025: Consolidated R5 Continuous Monitoring Standard
    Clarifies and consolidates existing continuous monitoring requirements.
  • November 30, 2025: Establish DISA ILx One-Way Reciprocity
    Enables services authorized by DISA to be recognized under FedRAMP without duplicating effort.
  • December 19, 2025: R5.ADS Authorization Data Sharing Standard BIR
    Beta test for applying the Authorization Data Sharing Standard to Rev5 authorizations.
  • January 16, 2026: R5.MAS Minimum Assessment Standard BIR
    Tests adoption of the Minimum Assessment Scope for Rev5 authorizations, with FedRAMP signaling potential changes in approach based on limited pilot participation.
  • January 23, 2026: R5.CRS Continuous Vulnerability Management Standard BIR
    Beta test for the Rev5-aligned Continuous Vulnerability Management Standard, which has been reprioritized to align with broader 20x vulnerability management requirements.

What these updates mean if you’re already FedRAMP Moderate

If you already hold a FedRAMP Moderate authorization, the January updates are a signal to reassess how sustainable your current program is. Proposed changes to designations and validation levels will affect how your authorization is labeled and interpreted. Machine-readable expectations and balance improvements will gradually reduce tolerance for static, manually assembled packages.

This is a good moment to evaluate whether your current tooling and processes can support ongoing validation without quarterly scrambles, or whether they rely on institutional knowledge that won't scale under 20x.

What these updates mean if you’re starting from scratch

For CSPs just entering the federal market, FedRAMP 20x narrows the margin for trial and error. Faster paths exist, but they assume operational readiness. Teams that lack clean asset inventory, repeatable evidence collection, or ownership clarity often experience delays that feel surprising given the promise of 20x.

Preparing for FedRAMP 20x: Turning dates into an action plan

FedRAMP 20x is less about reducing paperwork and more about changing how security programs operate day to day. In our experience, teams that succeed under 20x approach authorization as an ongoing capability, not a one-time event. Evidence should be treated as a byproduct of your daily operations, and controls must be designed to hold up under continuous scrutiny.

Automation plays a central role, but it works best when it sits on top of clear ownership, reliable asset inventory, and disciplined change management. When those foundations are in place, continuous validation reduces friction.

At Secureframe, we've been closely involved in shaping and testing the 20x process from the early stages. We participated in the Phase One pilot, achieved our FedRAMP 20x Low Authorization under the new model, and are proud to have been selected for the Phase Two Pilot program. This hands-on experience has given us a clear view of readiness, where teams lose momentum, and what it takes to maintain authorization in a model built around continuous validation and transparency.

If you want to be ready for these milestones, start with a readiness assessment that focuses on scope clarity, evidence durability, and operational ownership. To help, we’ve created a FedRAMP Requirements Checklist that breaks down what you need to address at each stage.

FedRAMP Requirements Checklist

Get an overview of the technical and security requirements you’ll need to complete to meet the security requirements of the Low, Li-SaaS, Moderate, and High baselines.

Emily Bonnie

Senior Content Marketing Manager

Emily Bonnie is a seasoned digital marketing strategist with over ten years of experience creating content that attracts, engages, and converts for leading SaaS companies. At Secureframe, she helps demystify complex governance, risk, and compliance (GRC) topics, turning technical frameworks and regulations into accessible, actionable guidance. Her work aims to empower organizations of all sizes to strengthen their security posture, streamline compliance, and build lasting trust with customers.

Rob Gutierrez

Senior Cybersecurity and Compliance Manager, CISA, CCSK, CMMC RP

Rob Gutierrez is an information security leader with nearly a decade of experience in GRC, IT audit, cybersecurity, FedRAMP, cloud, and supply chain assessments. As a former auditor and security consultant, Rob performed and managed CMMC, FedRAMP, FISMA, and other security and regulatory audits. At Secureframe, he’s helped hundreds of customers achieve compliance with federal and commercial frameworks, including NIST 800-171, NIST 800-53, FedRAMP, CMMC, SOC 2, and ISO 27001.