FedRAMP Compliance & Authorization

Overview

FedRAMP (Federal Risk and Authorization Management Program) is the U.S. government’s program for authorizing cloud services. This page covers FedRAMP compliance requirements, the authorization process, control families, and continuous monitoring, with focus on how Microsoft Sovereign Cloud supports FedRAMP compliance for government and critical infrastructure workloads.


FedRAMP Fundamentals

What is FedRAMP?

FedRAMP: Federal Risk and Authorization Management Program
═════════════════════════════════════════════════════════════

PURPOSE:
├─ Create standardized security assessment process
├─ Reduce redundant authorizations across agencies
├─ Accelerate secure cloud adoption in government
└─ Protect federal data and systems

REQUIREMENT:
Any cloud service handling U.S. government data must be
FedRAMP authorized (no exceptions).

GOVERNANCE:
├─ GSA (General Services Administration): Overall oversight
├─ NIST (National Institute of Standards & Technology): Standards
├─ ODNI (Office of Director National Intelligence): Intelligence agencies
├─ DoD (Department of Defense): Defense-specific requirements
└─ OMB (Office of Management & Budget): Policy direction

HISTORICAL CONTEXT:
2011: FedRAMP established (NIST SP 800-53 as baseline)
2013: First authorizations granted
2015: DoD-specific requirements (IL2, IL4, IL5)
2018: Intelligence Community requirements
2022: FedRAMP Modernization Initiative
2024: Enhanced continuous monitoring requirements

Authorization Levels

FedRAMP AUTHORIZATION LEVELS
═════════════════════════════════════════════════════════════

Three levels based on impact analysis:

LEVEL 1: LOW IMPACT (Provisional Authority to Operate - Low)
┌──────────────────────────────────────────┐
│ Scope: Unclassified public information   │
│ Impact: Low (limited harm if breached)   │
│ Controls: ~53 baseline controls          │
│ Risk: Minimal                            │
│                                          │
│ Example workloads:                       │
│ ├─ Public website hosting                │
│ ├─ Non-sensitive publishing              │
│ ├─ Customer-facing portal                │
│ └─ General administrative apps           │
│                                          │
│ Time to authorize: 3-6 months            │
│ Cost estimate: $150K-300K                │
│ Renewal: Every 3 years                   │
│ Continuous monitoring: Quarterly         │
└──────────────────────────────────────────┘

LEVEL 2: MODERATE IMPACT (PA-M or ATO Moderate)
┌──────────────────────────────────────────┐
│ Scope: PII, financial, operational data  │
│ Impact: Medium (significant harm)        │
│ Controls: ~110 baseline controls         │
│ Risk: Manageable                         │
│                                          │
│ Example workloads:                       │
│ ├─ Citizens' tax records                 │
│ ├─ Benefit eligibility systems           │
│ ├─ Federal employee HR systems           │
│ ├─ Medical insurance data                │
│ └─ Financial transaction systems         │
│                                          │
│ Time to authorize: 6-12 months           │
│ Cost estimate: $300K-750K                │
│ Renewal: Every 3 years                   │
│ Continuous monitoring: Monthly           │
└──────────────────────────────────────────┘

LEVEL 3: HIGH IMPACT (PA-H or ATO High)
┌──────────────────────────────────────────┐
│ Scope: Classified/sensitive data         │
│ Impact: High (critical harm)             │
│ Controls: ~170+ baseline controls        │
│ Risk: Highly controlled                  │
│                                          │
│ Example workloads:                       │
│ ├─ Secret/Top Secret (DoD)               │
│ ├─ Intelligence systems                  │
│ ├─ Nuclear command & control             │
│ ├─ Missile defense systems               │
│ └─ Critical infrastructure (power, water)│
│                                          │
│ Time to authorize: 12-24 months          │
│ Cost estimate: $1M-3M+                   │
│ Renewal: Every 3 years                   │
│ Continuous monitoring: Real-time         │
│ Additional requirement: FedRAMP-specific │
│ assessment team (3A)                     │
│                                          │
│ DoD-specific variants:                   │
│ ├─ DoD IL2: Moderate impact              │
│ ├─ DoD IL4: High impact                  │
│ ├─ DoD IL5: Top Secret equivalent        │
│ └─ More restrictive than commercial      │
└──────────────────────────────────────────┘

CHOOSING YOUR LEVEL:
────────────────────
Questions to ask:
1. What type of data? (Public / PII / Classified)
2. What's the potential harm? (Low / Medium / High)
3. Who's your primary customer? (GSA / DoD / IC / Commerce)
4. What's your budget? (Lower budget = Level 1)

Decision Tree:
├─ Public data only? → Level 1 (Low)
├─ Citizen PII or financial? → Level 2 (Moderate)
├─ Classified or critical infrastructure? → Level 3 (High)
└─ Unsure? → Start with Level 2 (most common)

NIST Control Framework

Control Families (SP 800-53)

NIST SP 800-53: Security and Privacy Controls
═════════════════════════════════════════════════════════════

FedRAMP baseline controls organized in 23 families:

1. ACCESS CONTROL (AC) - 22 controls
   ├─ Policy and procedures
   ├─ Account management
   ├─ Access enforcement
   ├─ Information flow enforcement
   ├─ Separation of duties
   ├─ Least privilege
   └─ Concurrent session control

2. AWARENESS AND TRAINING (AT) - 4 controls
   ├─ Security awareness training
   ├─ Security training records
   ├─ Role-based training
   └─ Insider threat awareness

3. AUDIT AND ACCOUNTABILITY (AU) - 12 controls
   ├─ Audit logging
   ├─ Audit review and analysis
   ├─ Audit retention
   ├─ Cryptographic protection of logs
   └─ Non-repudiation

4. SECURITY ASSESSMENT AND AUTHORIZATION (CA) - 9 controls
   ├─ Security assessment procedures
   ├─ Assessment documentation
   ├─ System authorization
   ├─ Periodic assessment
   └─ Security review

5. CONFIGURATION MANAGEMENT (CM) - 9 controls
   ├─ Configuration management plan
   ├─ Baseline configuration
   ├─ Configuration change control
   ├─ Monitoring configuration changes
   └─ Access restrictions for configuration

6. IDENTIFICATION AND AUTHENTICATION (IA) - 8 controls
   ├─ User identification and authentication
   ├─ Multi-factor authentication
   ├─ Password policy
   ├─ Device identification and authentication
   └─ Cryptographic key management

7. INCIDENT RESPONSE (IR) - 8 controls
   ├─ Incident response capability
   ├─ Incident handling
   ├─ Incident monitoring
   ├─ Incident response testing
   └─ Coordination with external agencies

8. MAINTENANCE (MA) - 7 controls
   ├─ Maintenance and repairs
   ├─ Maintenance records
   ├─ Controlled maintenance
   ├─ Remote maintenance restrictions
   └─ Maintenance tools and techniques

9. MEDIA PROTECTION (MP) - 8 controls
   ├─ Media storage
   ├─ Media sanitization
   ├─ Media transport
   ├─ Sensitive information handling
   └─ Spillage response

10. PHYSICAL AND ENVIRONMENTAL PROTECTION (PE) - 16 controls
    ├─ Facility access controls
    ├─ Security gates and perimeter
    ├─ Surveillance and monitoring
    ├─ Physical security personnel
    ├─ Access logging and monitoring
    ├─ Delivery and removal
    ├─ Environmental controls
    ├─ Fire protection
    ├─ Emergency procedures
    └─ Telecommunications protection

11. PLANNING (PL) - 8 controls
    ├─ Information security plan
    ├─ System security plan
    ├─ Rules of behavior
    ├─ Information security program plan
    └─ Plan dissemination and updates

12. PERSONNEL SECURITY (PS) - 8 controls
    ├─ Position categorization
    ├─ Personnel screening
    ├─ Personnel termination
    ├─ Personnel transfers
    ├─ Access agreements
    ├─ Sanctions process
    └─ Insider threat program

13. RISK ASSESSMENT (RA) - 5 controls
    ├─ Risk assessment
    ├─ Vulnerability scanning
    ├─ Penetration testing
    ├─ Risk monitoring
    └─ Threat analysis

14. SYSTEM AND SERVICES ACQUISITION (SA) - 17 controls
    ├─ Acquisition strategy
    ├─ Allocation of security requirements
    ├─ Information system documentation
    ├─ Acquired information systems
    ├─ Information system development tools
    ├─ Configuration management
    ├─ Risk-based information system reviews
    ├─ Software usage
    ├─ Acquisition process
    ├─ Developer security testing
    ├─ Supply chain risk
    └─ Third-party contracts

15. SYSTEM AND COMMUNICATIONS PROTECTION (SC) - 42 controls
    ├─ Security categorization
    ├─ System boundaries
    ├─ Access points
    ├─ External system connections
    ├─ Denial of service protection
    ├─ Resource priority
    ├─ Boundary protection
    ├─ Transmission confidentiality/integrity
    ├─ Cryptographic protection
    ├─ Secure name resolution
    ├─ Protocol use restrictions
    ├─ Monitoring communications at boundaries
    └─ System information integrity

16. SYSTEM AND INFORMATION INTEGRITY (SI) - 18 controls
    ├─ Flaw identification and remediation
    ├─ Malicious code protection
    ├─ Information system monitoring
    ├─ Security testing and evaluation
    ├─ Information input validation
    ├─ Error handling
    ├─ Information output handling
    ├─ Defective information detection
    └─ Artifact handling and retention

Plus 7 additional families (17-23) for specialized requirements

MAPPING TO AZURE SERVICES:
──────────────────────────
AC (Access Control) → Azure RBAC, Azure AD, conditional access
AU (Audit/Logging) → Azure Monitor, Log Analytics, Application Insights
CM (Configuration) → Azure Policy, Guest Configuration, Change Tracking
IA (Identity) → Azure AD, MFA, certificate management
IR (Incident Response) → Azure Sentinel, Security Center
SC (Communication Protection) → TLS, Private Endpoints, Network Security
SI (System Integrity) → Defender for Cloud, patching, monitoring

Control Implementation Examples

EXAMPLE 1: AC-2 Account Management
═════════════════════════════════════════════════════════════

Control: "Manage information system accounts"

WHAT IT MEANS:
├─ Create formal procedures for account management
├─ Implement automated mechanisms for account creation
├─ Control privileged access accounts separately
├─ Monitor account creation, activation, modification
└─ Remove/disable unused accounts within 90 days

AZURE IMPLEMENTATION:

Step 1: Azure AD Setup
├─ Enable Microsoft Entra ID (formerly Azure AD)
├─ Configure user provisioning automation
├─ Set password policies (complexity, expiration)
└─ Enable MFA requirement for all users

Step 2: Define Privileged Accounts
├─ Azure AD Privileged Identity Management (PIM)
├─ Define eligible roles (VM Admin, Storage Account Owner)
├─ Require approval for elevation
├─ Time-limited access (max 1 hour default)
└─ Audit all privileged access

Step 3: Access Reviews
├─ Quarterly access reviews
│  └─ Managers confirm: "Is this person still authorized?"
├─ Remove: Accounts with no positive confirmation
├─ Update: Modify permissions based on new role
└─ Document: Evidence for FedRAMP auditor

Step 4: Deprovisioning Process
├─ Employee termination notification
├─ Automatic: Disable all accounts within 24 hours
├─ Remove: From all groups and subscriptions
├─ Archive: User's files/email (legal hold if needed)
└─ Document: Evidence of removal and timestamp

EVIDENCE FOR AUDITOR:
├─ Account creation log: Dates, requestor, approver
├─ Quarterly access reviews: Names, dates, approvals
├─ Disabled accounts: Termination date, deprovisioning date
├─ Policy documentation: Published procedures
└─ Exception log: Approved exceptions with business justification

LEVEL 1 vs LEVEL 3 DIFFERENCE:
┌────────────────┬──────────┬──────────┐
│ Requirement    │ Level 1  │ Level 3  │
├────────────────┼──────────┼──────────┤
│ Review Freq    │ Annual   │ Quarterly│
│ MFA Required   │ Yes      │ Yes*     │
│ Privileged Sep │ Partial  │ Complete │
│ Timeout        │ 8 hours  │ 1 hour   │
│ Audit Trail    │ 1 year   │ 3 years  │
│ Exception Log  │ Manual   │ Automated│
└────────────────┴──────────┴──────────┘

* Level 3: MFA mandatory, exception requires CIO approval

FedRAMP Authorization Process

Path to Authorization

FEDRAMP AUTHORIZATION JOURNEY (12-18 months typical)
═════════════════════════════════════════════════════════════

PHASE 1: PREPARATION (Months 1-2, Internal)
═════════════════════════════════════════════

Week 1: Assessment Scope Definition
├─ Define system boundaries
├─ Identify data flows
├─ Map to NIST controls
├─ Determine authorization level
└─ Assign team members

Week 2-3: Documentation Sprint
├─ Write security plan (System Security Plan - SSP)
├─ Document policies and procedures
├─ Create configuration baselines
├─ Identify control implementations
└─ Develop evidence collection process

Week 4: 3A Selection
├─ Choose Third-Party Assessment Organization (3A)
├─ 3A vendor list published by GSA
├─ Get quotes (typically $200K-500K for assessment)
├─ Negotiate terms and timeline
├─ Establish contract

Deliverables:
├─ System Security Plan (250+ pages typical)
├─ Complete control mappings
├─ Risk assessment report
├─ Incident response plan
└─ Contingency and business continuity plan

PHASE 2: ASSESSMENT (Months 3-6, with 3A)
═════════════════════════════════════════════

Week 1: Kick-off
├─ 3A receives all documentation
├─ Schedule assessment activities
├─ Plan on-site visits
├─ Define evidence requirements
└─ Establish communication protocols

Weeks 2-8: On-site Assessment Activities

Activity 1: Configuration Review (2 weeks)
├─ Verify actual infrastructure matches SSP
├─ Check: OS versions, patch levels, settings
├─ Review: Network architecture, access controls
├─ Validate: Encryption settings, key management
└─ Evidence: Screenshots, configuration dumps

Activity 2: Policy Review (1 week)
├─ Validate: Incident response procedures exist
├─ Check: Personnel security training documented
├─ Review: Change management process
├─ Verify: Audit logging procedures
└─ Evidence: Policies, training records, logs

Activity 3: Testing (2 weeks)
├─ Vulnerability scanning: Automated tools
├─ Penetration testing: Simulated attacks
├─ Access control testing: Authentication/authorization
├─ Encryption validation: Algorithm strength verification
└─ Evidence: Test reports, remediation logs

Activity 4: Interview (1 week)
├─ Key personnel interviews: Staff responsible for controls
├─ Scenario-based questions: "What happens if X occurs?"
├─ Evidence: Interview notes, policies, response procedures
└─ Clarify: Any gaps or inconsistencies

Weeks 9-12: Remediation
├─ Identify deficiencies (if any)
├─ Develop remediation plan
├─ Implement fixes
├─ Retest controls
└─ Document evidence of remediation

Deliverables:
├─ System Security Assessment Report (100+ pages)
├─ Control assessment results: Satisfied / Not Satisfied / Compliant
├─ Findings and recommendations
├─ Risk summary
└─ 3A recommendation: "Ready for Authorization" or "Needs more work"

PHASE 3: AUTHORIZATION DECISION (Months 7-10)
═════════════════════════════════════════════════

Week 1-2: Agency Review
├─ Receiving agency (customer) reviews 3A report
├─ Agency's Chief Information Security Officer (CISO) reviews
├─ Risk review: Determine acceptable risk level
├─ Business decision: "Are we willing to accept this risk?"
└─ Escalate if needed: Executive approval

Week 3-4: GSA/FedRAMP PMO Review
├─ GSA reviews documentation
├─ Verify: All required controls are addressed
├─ Check: Documentation quality and completeness
├─ Approve: or request additional information
└─ Coordinate: With other federal agencies

Week 5: ATO (Authority to Operate) Issued
├─ Formal authorization letter signed
├─ Specific conditions/requirements documented
├─ System can now process federal data
├─ Authorization valid for 3 years
└─ Continuous monitoring requirements begin

Deliverables:
├─ Authority to Operate (ATO) letter (official)
├─ Conditions of authorization
├─ Continuous monitoring requirements
├─ Audit schedule
└─ Compliance remediation roadmap

PHASE 4: CONTINUOUS MONITORING (Years 1-3+, Ongoing)
═════════════════════════════════════════════════════════════

Monthly Activities:
├─ Security log review (Azure Monitor, Sentinel)
├─ Configuration drift detection (Azure Policy)
├─ Patch status verification
├─ Access review (privileged access)
└─ Incident tracking (any security events)

Quarterly Review (Every 3 months):
├─ Compliance dashboard update
├─ Risk assessment update
├─ Control status review
├─ Remediation tracking
└─ Report to agency CISO

Annual Review (Every 12 months):
├─ Comprehensive control reassessment
├─ Vulnerability assessment (external scan)
├─ Penetration test (if Level 2+)
├─ Policy updates (if any)
└─ Update System Security Plan

Renewal (Every 3 years):
├─ Complete reassessment (mini FedRAMP)
├─ Updated 3A assessment
├─ Revalidate: All controls still effective
├─ Update: Documentation and evidence
└─ New ATO issued

TIMELINE SUMMARY:
───────────────
Phase 1 (Preparation):        2 months
Phase 2 (Assessment):         3-4 months
Phase 3 (Authorization):      1-2 months
Total to First ATO:           6-8 months

Common reasons for delays:
├─ Finding during assessment (requires fix + retest)
├─ Incomplete documentation (must be perfected)
├─ Business approval delays (executive sign-off)
├─ 3A capacity (high demand, long waits)
└─ Agency review processes (bureaucratic delays)

Recommended timeline planning:
├─ Plan for 12-18 months (realistic)
├─ Budget: $300K-750K for Level 2
├─ Team: 3-5 people for 12+ months
└─ Executive commitment: Required throughout

Continuous Monitoring Requirements

FEDRAMP CONTINUOUS MONITORING (After Authorization)
═════════════════════════════════════════════════════════════

MONTHLY REQUIREMENTS:
─────────────────────

Log Review
├─ Azure Monitor queries for security events
├─ Authentication failures (investigate >10 per day)
├─ Privileged access (every elevation logged and reviewed)
├─ Configuration changes (approval tracking)
├─ System errors (especially security-related)
└─ Evidence: Signed log summary for monthly report

Patch Status
├─ All servers: Patch status (current, pending, failed)
├─ Critical patches: Applied within 30 days
├─ Security patches: Applied within 60 days
├─ Database patches: Applied within 90 days
├─ Exception process: Documented for non-compliant systems
└─ Evidence: Patch inventory report with apply dates

Access Review
├─ Privileged access audit (who accessed what, when, why)
├─ Verify: All privileged access was authorized
├─ Duration: Check session times are appropriate
├─ Deactivate: Unused privileged accounts (>60 days unused)
└─ Evidence: Signed monthly access report

Incident Tracking
├─ Security events: Logged in incident management system
├─ Investigation: Root cause and remediation documented
├─ Trend analysis: Any patterns or repeated issues
├─ Remediation: Evidence of fix implementation
└─ Evidence: Incident summary with outcomes

Compliance Dashboard
├─ System health score
├─ Control status: Satisfied / Not Satisfied / Monitored
├─ Risk trends: Increasing / Stable / Decreasing
├─ Upcoming items: Expiring certificates, reviews due
└─ Distribution: To agency CISO by 5th business day

QUARTERLY REQUIREMENTS:
──────────────────────

Deep Dive Assessment (Every 90 days):
├─ Review: Last 90 days of logs (5+ GB typical)
├─ Analyze: Patterns, anomalies, trend analysis
├─ Re-test: 3-5 randomly selected controls
├─ Verification: Controls still functioning as designed
├─ Interview: Technical staff (quarterly check-in)
└─ Evidence: 20-30 page quarterly assessment report

Risk Assessment Update
├─ New vulnerabilities: Check against system
├─ New threats: Update threat model
├─ Technology changes: New Azure services introduced?
├─ Business changes: New data types? New users? New locations?
├─ Re-calculate: Overall risk score
└─ Evidence: Updated risk assessment document

ANNUAL REQUIREMENTS:
────────────────────

Comprehensive Assessment (Once per year):
├─ Vulnerability scan: Full external network scan
├─ Configuration audit: Comprehensive compliance check
├─ Policy review: Policies still current? Updated?
├─ Penetration test: Simulated attack (Level 2+)
├─ Personnel interviews: 5-10 staff knowledge check
└─ Evidence: Annual assessment report (50+ pages typical)

FEDRAMP MONTHLY REPORTING FORMAT:
─────────────────────────────────
System Security Plan version: [version number]
Reporting month: October 2025
System: Healthcare Data Portal
Authorization date: June 2024
ATO expiration: June 2027

CONTROL STATUS SUMMARY:
┌────────────────┬──────┬──────┬──────┐
│ Family         │  Met │  NM* │ NA   │
├────────────────┼──────┼──────┼──────┤
│ Access Control │  22  │  0   │  0   │
│ Audit & Acct   │  12  │  0   │  0   │
│ Security Assess│   9  │  0   │  0   │
│ System & Comm  │  42  │  0   │  0   │
├────────────────┼──────┼──────┼──────┤
│ TOTAL          │ 180  │  0   │  0   │
│ % COMPLIANT    │100%  │  -   │  -   │
└────────────────┴──────┴──────┴──────┘
* NM = Not Met (needs remediation)

INCIDENT SUMMARY:
Security incidents this month: 1
├─ Incident: Failed login attempts (28 total)
├─ Root cause: User password reset, test attempts
├─ Resolution: User trained, no access granted
├─ Risk: Low (all attempts blocked)
└─ Status: Closed, trend normal

UPCOMING ITEMS:
├─ Certificate expiration: Oct 28 (8 days)
├─ Patch Tuesday: Monthly patches pending review
├─ Annual assessment: January 2026 (3 months away)
└─ ATO renewal: June 2027 (20 months away)

Azure FedRAMP Authorization Status

Current Azure Authorizations

MICROSOFT AZURE FEDRAMP STATUS (November 2025)
═════════════════════════════════════════════════════════════

AZURE PUBLIC CLOUD - LEVEL 3 (HIGH) AUTHORIZATION
─────────────────────────────────────────────────

Status: ✓ AUTHORIZED

Authorization Details:
├─ ATO Date: January 6, 2014 (first authorization)
├─ Current ATO: June 2023 - June 2026
├─ Level: PA-H (High Impact)
├─ Services: 250+ Azure services in scope
├─ Assessor: Deloitte (3A)
├─ Authorizing agency: GSA
└─ Compliance: Continuous monitoring (monthly)

Services in FedRAMP Scope:
├─ Compute: Virtual Machines, App Service, Container Instances
├─ Storage: Azure Storage, Azure Data Lake
├─ Database: SQL Database, Cosmos DB, PostgreSQL
├─ Analytics: Synapse Analytics, Data Factory
├─ AI/ML: Cognitive Services, Machine Learning
├─ Management: Policy, Blueprints, Cost Management
├─ Security: Defender for Cloud, Key Vault, Sentinel
└─ Networking: Virtual Network, Application Gateway, ExpressRoute

GOVERNMENT CLOUD (GCC) - LEVEL 3 (HIGH) AUTHORIZATION
────────────────────────────────────────────────────

Status: ✓ AUTHORIZED

Authorization Details:
├─ ATO Date: February 14, 2014
├─ Current ATO: January 2023 - January 2026
├─ Level: PA-H (High Impact)
├─ Scope: Government agencies only (FedRAMP required)
├─ Assessor: Verizon (3A)
├─ Hosting: Azure Government Cloud (separate infrastructure)
└─ Data residency: Virginia data centers only

Government-Specific Features:
├─ Additional screening: DoD personnel with clearances manage
├─ Network: Isolated from commercial internet
├─ Compliance: More stringent monitoring than commercial
├─ Support: 24/7 US-based support with security clearance
└─ Certifications: FedRAMP, DoD SRG (Impact Levels 2-5)

GOVERNMENT SECRET CLOUD (GCC-High) - LEVEL 3+ (Top Secret)
───────────────────────────────────────────────────────────

Status: ✓ AUTHORIZED for Level 3

Authorization Details:
├─ ATO Date: February 2, 2017
├─ Current ATO: June 2022 - June 2025
├─ Level: PA-H + DoD IL5 (Top Secret equivalent)
├─ Scope: Intelligence agencies, Top Secret data
├─ Hosting: Isolated government data centers
├─ Personnel: Secret clearance minimum, TS preferred
└─ Compliance: Daily monitoring, encrypted audit logs

Top Secret-Specific:
├─ Encryption: FIPS 140-2 Level 3 hardware security modules
├─ Physical security: Armed guards, multiple checkpoints
├─ Personnel: Full background investigation
├─ Audit trails: Encrypted, tamper-proof logging
├─ Incident response: NSA-certified team (24/7 on-call)
└─ Compliance: Real-time monitoring, zero tolerance

GOVERNMENT SECRET CLOUD (GCC-SLG) - DoD IL4
─────────────────────────────────────────────

Status: ✓ AUTHORIZED

Authorization Details:
├─ ATO Date: January 2021
├─ Current ATO: March 2023 - March 2026
├─ Level: DoD Impact Level 4 (Secret equivalent)
├─ Scope: Secret-level DoD and other agencies
├─ Hosting: DoD-managed Azure data centers
└─ Personnel: Secret clearance or higher required

DOD-SPECIFIC AUTHORIZATIONS
─────────────────────────────

DoD Impact Level 2 (Unclassified info):
├─ Status: ✓ Authorized
├─ ATO: January 2017 - January 2026
└─ Services: All Azure services

DoD Impact Level 4 (Secret):
├─ Status: ✓ Authorized
├─ ATO: January 2021 - January 2026
└─ Services: Core Azure services (limited scope)

DoD Impact Level 5 (Top Secret):
├─ Status: Planned/In assessment
├─ Target: 2026
└─ Note: Highest classification level

CHOOSING YOUR CLOUD ENVIRONMENT
─────────────────────────────────

Decision Tree:

Question 1: Data Classification?
├─ Unclassified (public) → Azure Public Cloud
├─ Controlled unclassified (CUI) → Azure Public Cloud or GCC
├─ Secret → GCC-SLG or GCC-High
├─ Top Secret → GCC-High only
└─ Top Secret/SCI → GCC-High with additional authorities

Question 2: Agency Requirement?
├─ Civilian federal agency → GCC or Public Cloud
├─ DoD → GCC-SLG (IL4) or GCC-High (IL5)
├─ Intelligence community → GCC-High or classified networks
└─ Critical infrastructure → Public Cloud or GCC

Question 3: Cost Considerations?
├─ Lowest cost → Azure Public Cloud
├─ Moderate → Azure Public Cloud (FedRAMP-in-scope services)
├─ Higher cost → GCC (government-managed)
├─ Highest cost → GCC-High (intelligence-level)

RECOMMENDATION MATRIX:
───────────────────
┌──────────────┬──────────────┬──────────────┐
│ Data Level   │ Budget Low   │ Budget High  │
├──────────────┼──────────────┼──────────────┤
│ Public       │ Azure Public │ Azure Public │
│ CUI/Moderate │ Azure Public │ GCC          │
│ Secret       │ GCC-SLG      │ GCC          │
│ Top Secret   │ GCC-High     │ GCC-High     │
└──────────────┴──────────────┴──────────────┘


Last Updated: October 21, 2025