Only 48 Cloud Services Hold FedRAMP High authorization — and Agencies Are Feeling the Squeeze

The scarcity of FedRAMP High authorized cloud services is not an abstract compliance concern. It is a procurement bottleneck that forces federal agencies to make security tradeoffs with their most sensitive data.

Key Takeaways

  1. FedRAMP High Authorization Requirements and Market Gap. FedRAMP High authorization requires 421 security controls — nearly 30% more than FedRAMP Moderate — and only 48 cloud service offerings are fully authorized at this level. The FedRAMP Marketplace listed approximately 80 cloud services at the High impact level as of early 2025, with fewer than half holding full authorization. Federal agencies spent $11 billion on cloud services in 2024, with high-impact systems accounting for roughly 40% of expenditures. The gap between demand and supply at this tier forces agencies to rely on platforms that don’t meet the security requirements their most sensitive data demands.
  2. FedRAMP High In Process Status: Execution Milestone. FedRAMP High In Process status is not aspirational — it is an execution milestone indicating active federal agency review and independent third-party assessment. The FedRAMP authorization journey moves through three stages: Ready, In Process, and Authorized. “In Process” means the cloud service provider is actively working toward authorization with a federal agency sponsor and the 3PAO assessment is underway or complete. Organizations evaluating vendors should understand that this designation represents verified security capabilities under active federal review, not a marketing claim.
  3. CMMC Level 2 Readiness and FedRAMP High Control Inheritance. Only 46% of defense industrial base organizations consider themselves prepared for CMMC Level 2 certification, and FedRAMP High controls map directly to the NIST 800-171 practices that underpin CMMC. A Kiteworks and Coalfire survey of 209 DIB organizations found that 57% haven’t completed a NIST 800-171 gap analysis and 62% lack adequate governance controls. Meanwhile, the CyberSheath 2025 State of the DIB report found that only 1% of defense contractors feel fully prepared for CMMC audits. FedRAMP High control inheritance can compress compliance timelines by 50% or more for these organizations.
  4. Accelerating Threat Landscape and Compliance Challenges. The threat landscape is accelerating faster than most compliance programs can keep pace: AI-enabled adversary attacks increased 89% year-over-year and 82% of detections are now malware-free. The CrowdStrike 2026 Global Threat Report documented a 37% rise in cloud-conscious intrusions, with 35% involving valid account abuse. At the same time, the 2026 World Economic Forum Global Cybersecurity Outlook found that 65% of large companies now cite third-party and supply chain vulnerabilities as their greatest barrier to cyber resilience. General-purpose cloud tools at Moderate authorization levels were not designed for this threat environment.
  5. FedRAMP High-Validated Platforms and Multi-Framework Compliance. A platform delivering approximately 90% of CMMC Level 2 practices out of the box within a FedRAMP High-validated architecture changes the compliance calculus for defense contractors, federal agencies, and regulated enterprises simultaneously. According to the Kiteworks 2025 Data Forms Survey Report, 75% of government respondents require FedRAMP for their data workflows and 69% use FIPS 140-3 validated cryptographic modules. When a single vendor’s control inheritance satisfies CMMC, HIPAA, PCI DSS, DFARS, and ISO 27001 requirements, the multi-framework compliance problem becomes an architecture decision rather than a multi-year program for each framework.

The FedRAMP program classifies cloud services into three impact levels — Low, Moderate, and High — based on the potential consequences of a security breach. FedRAMP High requires 421 security controls drawn from NIST SP 800-53 Rev 5, nearly 30% more than the 325 controls at the Moderate baseline. These additional controls address advanced encryption requirements, physical access restrictions, personnel security vetting, and enhanced continuous monitoring. They exist because the data at this tier — national security operations, law enforcement coordination, emergency services, healthcare records, financial infrastructure — cannot tolerate compromise.

Yet as of early 2025, the FedRAMP Marketplace listed approximately 80 cloud service offerings at the High impact level. Only 48 held full authorization. Set that against $11 billion in federal cloud spending in 2024, with high-impact systems accounting for roughly 40% of expenditures, and the imbalance becomes clear. Agencies default to general-purpose productivity tools at the Moderate tier because the High-authorized options simply don’t exist for many use cases.

What FedRAMP High In Process Actually Means — and Why It’s Not a Marketing Label

Confusion about FedRAMP status designations is pervasive in the market. Vendors use “pursuing FedRAMP” or “FedRAMP-ready” loosely, which makes it essential to understand what “In Process” specifically signifies.

The FedRAMP compliance authorization journey has three distinct stages. FedRAMP Ready means a certified third-party assessment organization (3PAO) has reviewed the provider’s documentation and the FedRAMP Program Management Office has approved the readiness report. FedRAMP In Process means the provider is actively working toward authorization with a federal agency partner — the agency is reviewing the complete security package and the 3PAO is conducting or has completed its full security assessment. FedRAMP Authorized means the assessment is complete, the agency has granted an Authority to Operate (ATO), and the provider enters continuous monitoring.

The distinction matters. “In Process” is not a planning status. It signals that controls have been implemented, independently assessed by a 3PAO, and are under active federal review. Kiteworks Secure Gov Cloud reached FedRAMP High Ready in February 2025 following independent assessment by Coalfire Systems and approval by the FedRAMP PMO. It has since advanced to In Process, with an active federal agency partner reviewing the security package. This progression builds on nearly nine years of continuous FedRAMP Moderate Authorization, maintained since June 2017.

The Threat Environment That Makes FedRAMP High Non-Negotiable

The argument for FedRAMP High-level security is not theoretical. The threat data from the past year makes the case in operational terms.

The CrowdStrike 2026 Global Threat Report documented an 89% increase in AI-enabled adversary attacks year-over-year, with the average eCrime breakout time dropping to just 29 minutes. Cloud-conscious intrusions rose 37%, and 82% of all detections were malware-free — meaning traditional signature-based defenses are insufficient. State-nexus actors, particularly China-aligned groups, increased targeting of edge devices by 38%, using valid credentials and native tools to blend into normal operations while moving toward sensitive data.

For agencies operating at the High impact level, these are adversaries specifically targeting the types of data that FedRAMP High was designed to protect. The 2026 World Economic Forum Global Cybersecurity Outlook found that ransomware remains the top concern for CISOs globally, with supply chain disruption ranking second. Among large companies, 65% identified third-party and supply chain vulnerabilities as their greatest barrier to cyber resilience — up from 54% in 2025. When agencies exchange sensitive data through fragmented platforms at different authorization levels, each seam becomes an attack surface.

The CMMC Convergence: Why FedRAMP High Inheritance Is a Force Multiplier for Defense Contractors

FedRAMP High‘s significance extends well beyond federal agencies. For the defense industrial base, it represents the most powerful compliance accelerator available.

CMMC Level 2 requires organizations to demonstrate 110 security practices derived from NIST SP 800-171. FedRAMP High‘s 421 controls are drawn from the more comprehensive NIST SP 800-53 Rev 5, and they map directly to the NIST 800-171 requirements that underpin CMMC. When a vendor achieves FedRAMP High authorization, its customers inherit those validated controls rather than building and validating each one independently. That inheritance can compress compliance timelines by 50% or more.

The readiness data underscores how urgently this acceleration is needed. The Kiteworks and Coalfire survey of 209 DIB organizations found that only 46% consider themselves prepared for CMMC Level 2 certification. Fifty-seven percent haven’t completed a NIST 800-171 gap analysis. And 62% lack adequate governance controls. The CyberSheath 2025 State of the DIB report paints an even starker picture: Only 1% of defense contractors feel fully prepared for CMMC audits, down from 4% in 2024. The median SPRS score sits at 60 — a full 50 points below the required 110. Critical controls remain widely undeployed: 79% lack vulnerability management, 78% lack patch management, 74% lack DLP, and 73% haven’t implemented MFA.

A platform that delivers approximately 90% of CMMC Level 2 practices out of the box, backed by FedRAMP High-validated controls, changes the equation from a multi-year infrastructure build to an architecture decision.

One Implementation, Multiple Frameworks: The Compliance Convergence Argument

The real power of a FedRAMP High-validated architecture isn’t just FedRAMP compliance or CMMC acceleration. It’s the cascading control inheritance across every framework an organization faces.

Organizations in 2026 aren’t confronting a single regulatory obligation. They’re managing simultaneous deadlines across CMMC 2.0 for defense contracts, HIPAA for healthcare data, PCI DSS 4.0 for payment processing, DORA for EU financial services, NIS 2 for critical infrastructure, and ISO 27001 as a global baseline. At the control level, the overlap is substantial. The encryption architecture validated for FedRAMP High satisfies CMMC encryption practices, HIPAA’s technical safeguards, PCI DSS’s cryptographic requirements, and ISO 27001’s Annex A controls simultaneously.

According to the Kiteworks 2025 Data Forms Survey Report, organizations in the high-security segment — government and financial services — require FedRAMP, FIPS 140-3, CMMC 2.0, PCI DSS, region-specific data residency, immutable audit trails, and end-to-end encryption. This segment is inaccessible to vendors without government-grade certifications. A FedRAMP High-validated platform that unifies these controls into a single architecture eliminates the redundancy and timeline multiplication that comes from addressing each framework independently.

The FedRAMP 20x Context: Why Acting Now Matters More Than Waiting

The FedRAMP program itself is undergoing modernization through the FedRAMP 20x initiative, and the timeline has important implications for organizations making cloud security decisions today.

Phase 1 of FedRAMP 20x completed with a Low baseline pilot that demonstrated authorization in under two months. Phase 2, active through Q1 2026, involves a Moderate pilot with 13 participants. Wide-scale adoption for Low and Moderate authorizations is expected in Phase 3 (Q3–Q4 2026). But the FedRAMP 20x High baseline pilot isn’t expected until Q1–Q2 2027, with the legacy Rev5 authorization pathway expected to sunset in Q3–Q4 2027.

Organizations that wait for the 20x High pathway face a multi-year gap in high-security cloud capabilities. For defense contractors facing CMMC deadlines, federal agencies with mission-critical data exchange needs, and regulated enterprises navigating multi-framework compliance, the window for action is now — not when the 20x High pilot eventually launches.

The Kiteworks Approach: Purpose-Built Architecture for the Highest Federal Security Tier

Kiteworks is not adapting a general-purpose cloud tool for federal security requirements. The platform’s architecture was purpose-built for regulated data exchange — and its progression toward FedRAMP High authorization reflects that foundation.

The Kiteworks Secure Gov Cloud implements defense-in-depth protections within a hardened virtual appliance: embedded network firewall, web application firewall (WAF), intrusion detection, double encryption at rest with separate keys at the file and disk levels, single-tenant isolation that eliminates cross-tenant vulnerability exposure, and FIPS 140-3 validated cryptographic modules. These capabilities are built into the architecture itself, not applied as configurations to a productivity tool.

What distinguishes this approach is the breadth of data exchange methods governed under a single policy engine, one audit log, and one security architecture. Federal agencies exchange sensitive data through secure email, file sharing, SFTP, managed file transfer, web forms, API integrations, and AI-assisted analysis. Kiteworks consolidates every exchange method under unified FedRAMP High-level controls. The platform’s validation portfolio includes FedRAMP Moderate Authorized since June 2017, FedRAMP High In Process, SOC 2 Type II certified, ISO 27001/27017/27018 validated, IRAP assessed, and FIPS 140-3 validated. For CMMC, Kiteworks delivers approximately 90% of Level 2 practices out of the box.

What Federal Agencies, Defense Contractors, and Regulated Enterprises Should Do Now

First, audit your current FedRAMP authorization landscape. Identify which cloud services are authorized at which impact levels, and where mission-critical data flows through platforms that only hold Moderate or Low authorizations. According to the Kiteworks 2025 Data Forms Survey Report, 75% of government respondents require FedRAMP for their data workflows — if your exchange tools don’t meet that bar, you have an architecture gap.

Second, map your compliance framework overlaps before building framework-specific programs. Organizations pursuing CMMC, HIPAA, PCI DSS, and ISO 27001 simultaneously should identify control overlaps and invest in platforms that satisfy multiple frameworks from a single implementation. The Kiteworks and Coalfire survey data shows that organizations with completed gap analyses have dramatically better outcomes: 77% follow documented encryption standards versus 42% among those without.

Third, evaluate FedRAMP High In Process providers now, not after full authorization. Agencies and contractors that engage during the In Process stage can shape their architecture around the platform and gain first-mover advantage. Waiting for the “Authorized” designation means competing with every other organization that waited alongside you.

Fourth, quantify your CMMC timeline risk. If your organization’s median SPRS score is near the industry median of 60 and you haven’t completed a gap analysis, a 6–18-month certification timeline assumes you start now with validated controls — not from scratch. Inheritance from a FedRAMP High-authorized vendor is the fastest path to closing the 50-point gap.

Fifth, consolidate your data exchange channels under unified governance. The CrowdStrike 2026 Global Threat Report documents that 82% of detections are now malware-free, meaning attackers exploit gaps between systems. Every separate tool for email, file sharing, SFTP, and MFT is a seam in your security architecture.

The compliance clock isn’t slowing down. CMMC requirements are in contracts now. DORA enforcement began in January 2025. HIPAA penalties exceed $100M annually. The organizations that act on FedRAMP High inheritance today will be the ones positioned to compete, win contracts, and demonstrate the security posture their regulators and customers demand.

Frequently Asked Questions

FedRAMP High authorization accelerates CMMC Level 2 certification because FedRAMP High‘s 421 controls map directly to the NIST 800-171 practices that underpin CMMC. When your platform vendor holds FedRAMP High authorization, you inherit those validated controls rather than validating each independently. According to the Kiteworks and Coalfire survey, only 46% of DIB organizations consider themselves prepared — and inheritance can compress timelines by 50% or more.

FedRAMP High requires 421 security controls versus 325 at Moderate — a nearly 30% increase addressing advanced encryption, physical access, personnel vetting, and enhanced monitoring. High-impact classification covers data where a breach could cause severe or catastrophic harm, including law enforcement, emergency services, and national security. Only 48 cloud services hold full High authorization.

Consolidated data exchange governance matters because fragmented platforms create security gaps and audit blind spots. The CrowdStrike 2026 Global Threat Report found that 82% of detections are malware-free, meaning attackers exploit seams between systems. A unified platform governing email, SFTP, MFT, file sharing, web forms, and APIs under a single FedRAMP High policy engine eliminates those seams with one audit trail and one security architecture.

FedRAMP High control inheritance significantly reduces multi-framework compliance burden because the 421 controls overlap substantially with HIPAA, PCI DSS, CMMC, DFARS, and ISO 27001 requirements. Encryption, access controls, and audit logging validated for FedRAMP High satisfy requirements across all these frameworks simultaneously. One implementation maps to multiple certifications, eliminating the redundancy of building separate programs.

Waiting for FedRAMP 20x High is risky because the High baseline pilot isn’t expected until Q1–Q2 2027. The current Rev5 authorization pathway remains active through at least mid-2027. Organizations with CMMC deadlines, mission-critical data exchange needs, or active compliance programs face a multi-year capability gap if they wait. Engaging with FedRAMP High In Process providers now is the faster path to security.

Get started.

It’s easy to start ensuring regulatory compliance and effectively managing risk with Kiteworks. Join the thousands of organizations who are confident in how they exchange private data between people, machines, and systems. Get started today.

Table of Content
Share
Tweet
Share
Explore Kiteworks