FedRAMP Deviation Requests: When and How to Submit
None
<p>FedRAMP is a government-wide program meant to ensure a standardized baseline for information security throughout the cloud service providers working with the federal government.</p><p>It’s a tall order. Setting forth standards that are robust enough to cover all the bases, while being open and flexible enough to cover every CSP, is not easy. NIST has spent a very long time with a lot of experts developing the standards FedRAMP is based on, and the FedRAMP process is iterated and developed over time to get better and better at it.</p><div class="code-block code-block-13" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-13-1" data-info="WyIxMy0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="U2hvcnQ=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/cruisecon-virtual-west-2025/home?ref=in-article-ad-2&utm_source=sb&utm_medium=referral&utm_campaign=in-article-ad-2" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2025/10/Banner-770x330-social-1.png" alt="Cruise Con 2025"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p>Even so, there are always going to be businesses and cloud services that don’t quite fit the mold.</p><p>So, what happens when that’s the case? It would have to be one of three things.</p><ol> <li aria-level="1">The CSP is ineligible for FedRAMP authorization due to this deviation from the framework; the incompatibility makes it impossible to comply.</li> <li aria-level="1">The CSP is granted authorization regardless, potentially opening up a security hole through the inconsistent implementation of the standard.</li> <li aria-level="1">The CSP addresses the gap in a specific way, documents it, and applies for a deviation exemption.</li> </ol><p>Option two is obviously bad and removes the entire point of the framework. Option one is also bad, as many businesses could be perfectly secure, but by not meeting an inapplicable guideline, they can’t provide services to the government.</p><p>Fortunately, FedRAMP has a process built in for handling these cases: the deviation request process. It’s option three, and while it’s quite narrow in scope, it’s critical for the CSPs that it applies to.</p><p>What is a deviation request, when does it apply, and how do you submit such a request? Let’s run through everything you need to know.</p><h2>What is a FedRAMP Deviation?</h2><p>A deviation is what happens when a CSP’s architecture or operations don’t quite fit the standards and rules laid out in NIST SP 800-53 and FedRAMP itself, but can still be addressed and mitigated in an acceptable way.</p><p>They are <em>not </em>an excuse to use alternative methods of securing a system. Instead, they are the option available if using the normally mandatory means of securing a system would unduly hinder or break the operations of that system.</p><p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-25818" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-is-a-FedRAMP-Deviation.jpg" alt="What is a FedRAMP Deviation" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-is-a-FedRAMP-Deviation.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-is-a-FedRAMP-Deviation-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-is-a-FedRAMP-Deviation-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-is-a-FedRAMP-Deviation-600x336.jpg 600w" sizes="(max-width: 1000px) 100vw, 1000px"></p><p>For example, if data that needs to be secured lives on an unsecured system, this will trip a flag showing a vulnerability that needs to be remediated. However, if that unsecured system is completely airgapped and inaccessible from any source, it doesn’t really matter if it’s insecure, because it can’t be reached through any means other than access-controlled visiting in person.</p><p>Normally, you would have to secure that system anyway. However, since it’s both irrelevant and could potentially hinder accessibility, you could instead submit a deviation request for the system to get it approved as-is.</p><h2>When are FedRAMP Deviations Requested?</h2><p>A deviation request is submitted when the deviation is discovered, analyzed, and determined to warrant a deviation.</p><p>This can be during the initial auditing process to obtain approval. More often, though, it occurs as <a href="https://www.ignyteplatform.com/blog/fedramp/conmon-fedramp-continuous-monitoring/">part of continuous monitoring</a>. Systems change and architectures evolve over time, and they all need to remain secure. If a fault is detected and needs to be explained rather than fixed, a deviation request can be submitted.</p><p>A deviation request is <em>not </em>used when a security control is not applicable. The N/A designation is for controls that apply to systems the CSP doesn’t have or use, not for systems that exist and are vulnerable.</p><p><img decoding="async" class="alignnone size-full wp-image-25819" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/When-are-FedRAMP-Deviations-Requested.jpg" alt="When are FedRAMP Deviations Requested" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/When-are-FedRAMP-Deviations-Requested.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/When-are-FedRAMP-Deviations-Requested-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/When-are-FedRAMP-Deviations-Requested-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/When-are-FedRAMP-Deviations-Requested-600x336.jpg 600w" sizes="(max-width: 1000px) 100vw, 1000px"></p><p>Similarly, a deviation request is <em>not </em>a significant change request, though the two are similar requests with similar processes. A significant change request is for cases where a large-scale change is made to the CSP’s systems and needs to be reviewed.</p><h2>What Are the Three Types of Deviation Requests?</h2><p>Deviations from the norm in FedRAMP fall into one of three categories, and knowing which category it is becomes a critical part of requesting the deviation in the first place. The category of the fault indicates what measures need to be proven to request and be granted a deviation.</p><p>The first category is the <b>false positive. </b>These occur when an automated scanner finds a vulnerability, but that vulnerability is either not actually present or is not actually exploitable within your systems.</p><p>For example, if your systems are built using a specific software ecosystem and a library is flagged as vulnerable, when that library just shares a name with a vulnerable library from another ecosystem, it can be a false positive. Automated scanners don’t necessarily have context to understand when they’re wrong and can flag non-issues as vulnerabilities.</p><p>The second category is the <b>risk adjustment.</b> A risk adjustment is when a vulnerability is identified and does exist within your systems; however, the scanner identifies it as a higher risk than it actually is. This happens most commonly when you are aware of the risk and have taken steps to mitigate it, but can’t fix it entirely according to FedRAMP standards. You can file a deviation request in order to have the risk’s severity reduced so it doesn’t hurt your authorization.</p><p>The third category is an <b>operational requirement. </b>These are risks that are known and flagged in scans, but can’t be fixed without harming the CSP’s operations.</p><p>For example, if the CSP requires a specific port to be opened for access to function, but that port is commonly a vector of attack, the fact that the port is open will be flagged as a vulnerability. By proving that your CSP needs the port open, you can get a deviation granted to remain authorized despite the vulnerability.</p><p><img decoding="async" class="alignnone size-full wp-image-25814" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Are-the-Three-Types-of-Deviation-Requests.jpg" alt="What Are the Three Types of Deviation Requests" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Are-the-Three-Types-of-Deviation-Requests.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Are-the-Three-Types-of-Deviation-Requests-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Are-the-Three-Types-of-Deviation-Requests-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Are-the-Three-Types-of-Deviation-Requests-600x336.jpg 600w" sizes="(max-width: 1000px) 100vw, 1000px"></p><p>Notably, FedRAMP will not grant a deviation request for a high-impact operational requirement. However, if you have taken steps to remediate it, you can file a simultaneous risk adjustment and operational requirement deviation request to validate that you’ve mitigated the risk as much as possible.</p><h2>What Goes into a Deviation Request?</h2><p>A deviation request is a multi-part process.</p><p>It starts with identifying the fault, analyzing it, and determining the need for a deviation. Many faults need remediation and can’t be waived with a deviation, so this initial analysis is extremely important.</p><p>If a fault is analyzed and it’s determined that it can’t be addressed without significant obstruction to operations, or that it’s otherwise secure and lower-risk (or even inapplicable) than a scanner shows, a deviation request can be filed.</p><p>A deviation request requires two things. First, it requires the CSP to fill out <a href="https://www.fedramp.gov/resources/documents/rev4/REV_4_FedRAMP-Vulnerability-Deviation-Request-Form.xlsx" rel="nofollow noopener">the deviation request form</a> (XLSX link). Second, it needs to be documented in <a href="https://www.ignyteplatform.com/blog/compliance/how-can-poams-help-improve-your-security-budgeting-process/">the CSP’s POA&Ms</a>.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-25815" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Goes-into-a-Deviation-Request.jpg" alt="What Goes into a Deviation Request" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Goes-into-a-Deviation-Request.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Goes-into-a-Deviation-Request-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Goes-into-a-Deviation-Request-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Goes-into-a-Deviation-Request-600x336.jpg 600w" sizes="auto, (max-width: 1000px) 100vw, 1000px"></p><p>The deviation request form requires a lot of specific information.</p><ul> <li aria-level="1">The name of the CSP.</li> <li aria-level="1">The name of the specific system.</li> <li aria-level="1">The impact level of the CSP’s authorization.</li> <li aria-level="1">The submission date of the deviation request.</li> <li aria-level="1">The name and title of the CSP’s point of contact.</li> <li aria-level="1">The phone number and email of the point of contact.</li> <li aria-level="1">The DR number and POA&M ID.</li> <li aria-level="1">The scan ID.</li> <li aria-level="1">The related CVE.</li> <li aria-level="1">The assets impacted by the CVE.</li> <li aria-level="1">The vulnerability name and source.</li> <li aria-level="1">The initial risk rating.</li> <li aria-level="1">The CVSS score.</li> <li aria-level="1">The original detection date for the vulnerability.</li> <li aria-level="1">Information from the scanning tool of the vulnerability and suggested remediation.</li> <li aria-level="1">Added information about the vulnerability from the CSP.</li> <li aria-level="1">The type of DR from the three above.</li> <li aria-level="1">The requested adjusted severity rating and CVSS score.</li> <li aria-level="1">The date of DR submission.</li> <li aria-level="1">The rationale for submitting the DR.</li> <li aria-level="1">A submission of evidence and attachments to prove the need for the DR.</li> <li aria-level="1">An operational impact statement of normal remediation and justification.</li> <li aria-level="1">Deep information on a potential attack, including the vector, complexity, privileges required, user interaction required, and impact metrics.</li> <li aria-level="1">Status tracking information for the DR.</li> <li aria-level="1">Additional comments from government entities, including the GSA, the DoD, the DHS, and others, as necessary.</li> </ul><p>You can see all of this in the DR request form under the DR Sheet tab.</p><h2>Will a Deviation Request be Granted?</h2><p>There’s a generally high rate of acceptance of deviation requests, but that alone is misleading. That’s because the bar to even file a deviation request is quite high. By the time you’ve reached a point of identifying that a deviation request is a possibility, you’ve likely exhausted the other options.</p><p>A deviation request needs to be submitted to your point of contact within your sponsoring agency. That individual is the one who will make the determination. After all, as a member of the government, it’s their data at risk if your vulnerability is exploited.</p><p>If the justification for a deviation request is weak, if the point of contact can identify other options for mitigation to explore that you haven’t, or if security is genuinely compromised by the fault regardless of mitigations, they can deny the deviation request.</p><p>This is not a unilateral decision, generally speaking. The entire deviation request process will require significant dialogue with stakeholders, agency contacts, and other relevant people. Everyone here is on the same side, trying to ensure the best security possible in situations where it may not be ideal to follow the letter of the law.</p><p>Generally speaking, if a deviation request is going to be denied, it’s for one of a handful of reasons.</p><ul> <li aria-level="1">The justification isn’t good enough. You have to have a very valid, evidence-backed reason for wanting a deviation rather than just doing the work to fix an issue. Deviations are most commonly for false positives for this reason.</li> <li aria-level="1">The evidence is insufficient. Even having a valid reason can leave you hanging if you don’t have enough valid documentation to prove your claims.</li> <li aria-level="1">You’re trying to use a deviation request for something that isn’t a deviation, like a significant change request or a not-applicable control.</li> </ul><p>As long as you are well-documented and maintain good communication with your 3PAO and your POC within your sponsoring agency, you should be able to navigate the process effectively.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-25820" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/Will-a-Deviation-Request-be-Granted.jpg" alt="Will a Deviation Request be Granted" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/Will-a-Deviation-Request-be-Granted.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/Will-a-Deviation-Request-be-Granted-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/Will-a-Deviation-Request-be-Granted-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/Will-a-Deviation-Request-be-Granted-600x336.jpg 600w" sizes="auto, (max-width: 1000px) 100vw, 1000px"></p><p>If you need assistance with documentation and evidence collection, consider exploring the Ignyte Assurance Platform. Our platform is made to <a href="https://www.ignyteplatform.com/integrated-risk-management-platform/">track and maintain evidence and documentation across multiple frameworks</a> smoothly and effectively. With it, you can aggregate everything from your core evidence to your POA&M status. Give us a call to see how it can work for you, with deviation requests and more.</p><h2>What Happens Upon a Deviation Approval?</h2><p>If the deviation request is approved, business continues as usual. The deviation is noted in the POA&Ms for the CSP and becomes part of continuous monitoring.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-25817" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-Upon-a-Deviation-Approval.jpg" alt="What Happens Upon a Deviation Approval" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-Upon-a-Deviation-Approval.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-Upon-a-Deviation-Approval-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-Upon-a-Deviation-Approval-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-Upon-a-Deviation-Approval-600x336.jpg 600w" sizes="auto, (max-width: 1000px) 100vw, 1000px"></p><p>If, in the future, something changes in a way that the flaw is mitigated or removed, or the deviation is no longer necessary, it can then be resolved. Otherwise, it just needs to be monitored and maintained just like any other identified threat.</p><h2>What Happens if a Deviation is Denied?</h2><p>If you submit a deviation request and have it denied, what happens?</p><p>You have a few possibilities.</p><p>First, you can try again. As part of open dialogue with your agency POC, they’ll tell you why they rejected the request, and you can try to fix the problem if it’s relevant. For example, if you don’t have sufficient evidence to back up your position, you can gather more evidence and testing to prove it and try again.</p><p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-25816" src="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-if-a-Deviation-is-Denied.jpg" alt="What Happens if a Deviation is Denied" width="1000" height="560" srcset="https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-if-a-Deviation-is-Denied.jpg 1000w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-if-a-Deviation-is-Denied-300x168.jpg 300w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-if-a-Deviation-is-Denied-768x430.jpg 768w, https://www.ignyteplatform.com/wp-content/uploads/2025/11/What-Happens-if-a-Deviation-is-Denied-600x336.jpg 600w" sizes="auto, (max-width: 1000px) 100vw, 1000px"></p><p>Second, you can accept the judgment and take actions to fix the problem according to FedRAMP rules. This isn’t really applicable to false positives that often, but for risk adjustments and for operational requirements, it might take some work, but it can be done. If your agency POC believes that you can do so without undue burden, and you can’t prove otherwise, you’ll just need to put in that work.</p><p>Third, if this causes irreconcilable friction between you and your agency, there may be no option but to end the contract. If you believe and have proven that your CSP can’t operate without the fault, and that you’ve taken steps to mitigate it, but your agency believes that’s still not good enough, there’s no middle ground to be found.</p><p>Most of the time, though, you’ll be able to figure something out. Maybe there’s an approach you didn’t think of that can remediate the issue. Maybe you can find better evidence to prove the need and keep the contract.</p><p>The goal, after all, is secure operations. Your sponsoring agency doesn’t want to lose your functionality any more than you want to lose their contract. Keep working at it, and you’ll find a way to navigate the situation appropriately.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/11/fedramp-deviation-requests-when-and-how-to-submit/" data-a2a-title="FedRAMP Deviation Requests: When and How to Submit"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Ffedramp-deviation-requests-when-and-how-to-submit%2F&linkname=FedRAMP%20Deviation%20Requests%3A%20When%20and%20How%20to%20Submit" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Ffedramp-deviation-requests-when-and-how-to-submit%2F&linkname=FedRAMP%20Deviation%20Requests%3A%20When%20and%20How%20to%20Submit" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Ffedramp-deviation-requests-when-and-how-to-submit%2F&linkname=FedRAMP%20Deviation%20Requests%3A%20When%20and%20How%20to%20Submit" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Ffedramp-deviation-requests-when-and-how-to-submit%2F&linkname=FedRAMP%20Deviation%20Requests%3A%20When%20and%20How%20to%20Submit" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Ffedramp-deviation-requests-when-and-how-to-submit%2F&linkname=FedRAMP%20Deviation%20Requests%3A%20When%20and%20How%20to%20Submit" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.ignyteplatform.com">Ignyte</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Max Aulakh">Max Aulakh</a>. Read the original post at: <a href="https://www.ignyteplatform.com/blog/fedramp/fedramp-deviation-requests-submit/">https://www.ignyteplatform.com/blog/fedramp/fedramp-deviation-requests-submit/</a> </p>