The Rasco in You article header

The Rasco in You: Are We Ready to Run with the Big Dogs?

This is the story of our government watchdog, whom we'll affectionately refer to as Rasco. Rasco is a Bullmastiff, bred to be a champion—strong, capable, and trustworthy—an embodiment of federal compliance and a reflection of us who have been in its service. But Rasco, the steadfast guardian of federal IT, has a sedentary lifestyle. Rasco’s meticulous review of paper-based compliance packages led to our watchdog becoming lethargic and bloated over time. Rasco could still win the annual dog show, but couldn’t keep up with the sleek, cybersecurity-fit commercial dogs running in the park. Rasco’s days are spent sitting on the porch, barking at perceived threats from a safe, but inactive distance. I met Rasco early in my career, fresh into the world of federal cybersecurity (circa 2006). One of my first engagements was with HHS/NIH, where I observed a clearly frustrated network engineer walk out of the conference room after a long and grueling audit meeting and mumble under his breath, "This is nothing more than a jobs program for white collar workers." The sentiment, delivered with the sigh of a man who'd just seen his soul’s energy drained by a thousand paper cuts, has stuck with me for years. At the time, I was taken aback. But with nearly two decades of experience in this field, I've come to not only admit he was spot on, but also to promise myself never to be the poster child of that sentiment.

For decades, federal compliance prioritized process over performance, and documentation over protection. It is a world where a well-written narrative in a System Security Plan is often more highly valued than a securely engineered, resilient system.

But now, supercharged by OMB Memorandum M-24-15, Rasco finally has a chance to get off the porch and embrace a new, lean, agile, athletic lifestyle: FedRAMP 20X. This is Rasco’s journey of reinvention and change to run with the big dogs.

The Era of the Paper-Pusher: Rasco's Youth

Rasco's story begins long before the modern FedRAMP program existed, in a world governed by the Federal Information Security Management Act (FISMA) of 2002. FISMA, a law, planted the seed. Still, it was up to the National Institute of Standards and Technology (NIST) to provide the soil—specifically, the Risk Management Framework (RMF) and its companion catalog of security controls, NIST SP 800-53. This structure became the foundation for Rasco's early training, then known as the Certification and Accreditation (C&A) process.

However, this early C&A process was not designed to accommodate the dynamism of the cloud. It was a paperwork exercise, a world where our dog Rasco learned sedentary habits. Reports from the Government Accountability Office (GAO) and Inspectors General (IG) from this era frequently painted a picture of a compliance landscape plagued by administrative shortcomings, not tangible security outcomes. The criticisms were precise: inaccurate system inventories, inconsistent application of methodologies, and a failure to track corrective actions through Plans of Actions & Milestones (POA&Ms). The primary goal was to satisfy auditors with a checklist of artifacts, not to genuinely reduce risk. The unintended consequence was the cultivation of a compliance-driven culture that prioritized administrative tasks over hands-on security engineering.

The DoD, for its part, had its own version of a risk management framework, the DoD Information Assurance Certification and Accreditation Process (DIACAP). It was a comprehensive, procedural, and documentation-heavy framework that mandated a structured approach to evaluating security controls. It was a key indicator of the pre-cloud security mindset, centered around a meticulous "Certification and Accreditation Package" that could run to hundreds of pages. This was a static, insular system. It was the perfect environment for a watchdog like Rasco to get comfortable on the porch, watching the world go by from a safe, but inactive distance. The "Information Assurance" professional was born from this era, a person skilled in policy writing, GRC tool management, and meticulous audit evidence collection—not the hands-on technical expert that would one day be required.

Rasco's Awkward Adolescence: The Birth of FedRAMP

The moment of truth came in 2010 with the government’s "Cloud First" mandate. It was the moment someone threw a ball into the park for Rasco, but Rasco was still tied to an old paperwork-based leash. The old methods were a major bottleneck, hindering the very cloud adoption the government was so keen to embrace. So, with the help of a crucial OMB memorandum in 2011, the FedRAMP program was formally established. Its new mission was to create a "standardized, reusable approach" to security assessments, a principle of "approve once, use often" of consumable cloud service offerings.

It was a brilliant idea! The FedRAMP PMO had to establish mission success, but lacked a suitable framework for agile commercial cloud services companies adopting a threat-informed, risk-based approach to cybersecurity. The solution was to adapt Rasco to FedRAMP. But the tried-and-true approach to cybersecurity was still fundamentally document-heavy. For many Cloud Service Providers (CSPs), the biggest hurdle wasn't a lack of strong security, but the struggle to translate modern commercial practices into FedRAMP’s bureaucratic requirements. The process of documentation could be expensive and time-consuming, creating a significant barrier to entry for many innovative companies. This complexity led to the rise of a "cottage industry" of Third-Party Assessment Organizations (3PAOs) and advisory firms, proving that navigating FedRAMP had become a specialized skill in itself. It was the moment when we, as practitioners, learned to be masters of the arcane, adept at turning technical reality into a bureaucratic narrative.

A New Diet and a New Goal: FedRAMP Rev 5 and DoD's Full Circle

As the program matured, so did the cybersecurity threat landscape. The need to address new, complex risks led to the most significant update in the program's history: the shift to a baseline based on NIST SP 800-53 Revision 5. This transition was Rasco’s first major diet plan. This wasn't a simple update; it was an attempt to address new, complex threats. Revision 5 introduced a greater emphasis on practical risk management and privacy, directly integrating across the minimum control baselines. It also added a new Supply Chain Risk Management (SCRM) control family, designed to protect the integrity of the supply chain—a crucial evolution in the face of increasingly salient cyberattacks.

While Rasco consumed a slightly healthier diet, the sedentary lifestyle still led to bloating and a slower pace. Rasco’s sluggish pace made it impossible to keep up with the agile commercial sector. The government watchdog had become a paperwork-laden guardian, a far cry from the lean, agile security solutions needed in the modern age. The frustration was palpable, both for the CSPs trying to get authorized and for the FedRAMP PMO. It was clear that a new, more effective fitness regimen was needed.

A parallel and equally important development was the DoD's shift from its insular DIACAP framework. On March 12, 2014, the DoD officially replaced DIACAP with DoD Instruction 8510.01, adopting the civilian-standard Risk Management Framework (RMF) and NIST SP 800-53 catalog of security controls. This was a crucial step towards interoperability and modernization, paving the way for the FedRAMP+ concept. This approach leverages the work of FedRAMP's assessment and authorization process and then adds specific security controls to meet the DoD's unique requirements. This full circle from a unique, internal process to an integrated, collaborative one showed that even the most entrenched bureaucracies could change. It was a sign that Rasco, while still a bit slow, was moving in the right direction.

Rasco's Personal Trainer: The 20X Revolution

The sedentary lifestyle is over. FedRAMP 20X, supercharged by OMB Memorandum M-24-15, is Rasco's personal (re)trainer. This isn't just a new program; it's a fundamental reimagining of Rasco’s mission. The days of being measured in reams of paper are over. Now, Rasco is focused on proving security outcomes with real-time data, and this new training plan is a direct response to the lingering criticisms of a "rigid, paperwork-heavy assessment process." The shift is from a compliance-focused, control-narrative model to a threat-informed, risk-based approach. This means Rasco is no longer just checking a box; the watchdog is actively hunting for threats using a new suite of analytics.

Rather than manual reports, FedRAMP 20X introduces Key Security Indicators (KSIs) and Key Security Metrics (KSMs) to measure the program's effectiveness in real-time. This model is further enhanced by incorporating external threat intelligence, specifically from the CISA Known Exploited Vulnerabilities (KEVs) catalog and the Exploit Prediction Scoring System (EPSS). This means Rasco's new fitness tracker is not only monitoring the health of our newly transformed watchdog, but also comparing vulnerabilities against a real-time list of what attackers are actively exploiting.

FedRAMP 20X represents a massive shift in how we, as practitioners, train alongside Rasco. The old world of compliance demanded skills in policy writing, GRC tool management, and collecting screenshots for manual review. It was a role focused on navigating and documenting a bureaucratic process—a true master of Rasco's old-school habits.

Instead, FedRAMP 20X demands a new kind of practitioner: a technologist. The latest training regimen requires skills in API integration, "compliance-as-code," cloud-native architecture, and automation scripting. This is a hands-on, engineering-focused skillset designed for an environment where compliance is baked into the development lifecycle from the start, rather than being a retrospective exercise in documentation. The FedRAMP 20X professional must be an expert in building secure systems and using modern tools to produce machine-readable evidence continuously.

Assessment Methodologies Reimagined

The sedentary lifestyle is over. FedRAMP 20X, supercharged by OMB Memorandum M-24-15, is Rasco's personal (re)trainer. Now, Rasco is focused on proving security outcomes with real-time data. Instead of manual reports, FedRAMP 20X introduces Key Security Indicators (KSIs) and Key Security Metrics (KSMs) to measure the program's effectiveness in real-time. This model is further enhanced by incorporating external threat intelligence from the CISA Known Exploited Vulnerabilities (KEVs) catalog and the Exploit Prediction Scoring System (EPSS). Instead, FedRAMP 20X demands a new kind of practitioner: a technologist. The latest training regimen requires skills in API integration, "compliance-as-code," cloud-native architecture, and automation scripting.

Assessment Methodologies Reimagined

The assessment methodology under FedRAMP 20X is arguably its most transformative change. The traditional Rev 5 assessment was a "point-in-time, manual review of documents, interviews, and screenshots." This process was slow, prone to human error, and could not keep pace with the agile development cycles of modern cloud services. A CSP would spend months compiling a hundreds-page Word or PDF document (the SSP), and a 3PAO would then manually review it for compliance. This methodology narrated adherence to security controls.

The 20X assessment, by contrast, is a continuous, automated validation of live telemetry and machine-readable evidence. This method validates a threat-informed and risk-based posture. A core technology enabling this shift is the Open Security Controls Assessment Language (OSCAL). OSCAL is a structured, machine-readable format that replaces legacy documents with dynamic data. Instead of a reviewer manually reading a narrative description of an encryption setting, an automated tool can parse an OSCAL file to confirm that all storage systems are encrypted. This automated validation process reduces human error and review time, and it allows for a "digital authorization package" that can be continuously updated and monitored. This shift fundamentally changes the nature of the assessment. It moves the program from a reactive, periodic audit to a proactive, continuous state of compliance, where automated tools, not manual labor, perform the verification of security controls.

The Race Begins

Rasco isn't a lean, mean, running machine just yet. The transition to FedRAMP 20X will take time and require continued effort from everyone involved. But the direction is clear, and the motivation is strong. The new principles of automation and continuous monitoring are the guidon flag Rasco needs to become leaner, faster, and more agile.

The era of the paperwork-laden watchdog is ending, and the age of the cybersecurity-fit practitioner is dawning. Rasco is finally stepping off the porch and getting ready to run with the big dogs. After years as the federal champion, Rasco is now preparing to become a world-class protector of federal IT systems. And we, as practitioners, have the chance to be right there running with this champion.

Final Thoughts: Anticipation and Preparation are Key

The modernization of federal compliance, spearheaded by FedRAMP 20X, will usher in a new generation of federal cloud compliance experts. A deep understanding of NIST SP 800-53 and the skills to write detailed and nuanced security assessment reports (SARs) will become less valuable over time. These practitioners will be most useful during the bridging period from Rev 5 to 20X. However, eventually Rev 5 practitioners will become the compliance industry's version of the COBOL developer as the federal government as a whole adopts key mandates from OMB Memorandum 24-15, effectively implementing a threat-informed, risk-based approach to cybersecurity.

To stay ahead, I advise my colleagues to upskill, as the role of FedRAMP 3PAOs will shift from audit to continuous validation. This new role demands an understanding of the OSCAL framework and proficiency in languages like Python, Java, C++, R, and Julia, as well as familiarity with data formatting standards such as XML, JSON, and YAML. By embracing these changes, practitioners can run alongside the champion, preparing to become a world-class protector of federal IT systems.

P.S. What Rasco Represents

The name Rasco serves as a powerful reminder of the old, cumbersome world of federal compliance that FedRAMP 20X is designed to leave behind. Each letter represents a key element of that legacy process:

  • Risk: The constant calculus of potential harm. In the old world, it was often a static, paper-based assessment, a snapshot in time. In the new world, it’s a living, breathing metric informed by real-time data.
  • Authorization: The ATO, or Authorization to Operate. The holy grail of the process. For years, this was the ultimate sign of success, the culmination of a prolonged, arduous paperwork exercise.
  • Security: The core purpose. This is about the controls and standards we put up. But Rasco's flaw was in prioritizing the documentation of those controls over the actual, functional security they were meant to provide.
  • Compliance: The act of adherence. The checkbox. The central, and most onerous, part of Rasco's life was proving that every single box was checked, regardless of the real-world impact.
  • Onerous: A word that perfectly encapsulates the process. It speaks to the burden, the complexity, and the sheer weight of a system that often requires immense resources to navigate. This is the part of Rasco that FedRAMP 20X is finally training away.