The Label Is the Liability
FedRAMP High authorisation has become synonymous with security maturity in the federal marketplace, yet it guarantees neither — it merely certifies that an organisation has invested enough capital in compliance theatre to satisfy a checklist auditor, while systematically weakening the operational security posture that would actually survive a determined adversary.
The Federal Risk and Authorisation Management Program (FedRAMP) is a government-wide initiative that requires cloud service providers (CSPs) offering services to US federal agencies to undergo continuous security assessment against a baseline of controls derived from NIST SP 800-53. FedRAMP High applies the most stringent control set — it mandates encryption in transit and at rest, multi-factor authentication, continuous monitoring, incident response capability, and comprehensive audit logging across systems handling information classified at Impact Level 3 (moderate confidentiality, integrity and availability impact). The program has certification pathways through accredited Third-Party Assessment Organisations (3PAOs), periodic assessment by the Joint Authorization Board (JAB), and agency-specific authorizations. By late 2024, approximately 200 cloud offerings held active FedRAMP authorisation across all levels; the High tier commands the largest federal procurement budget.
Yet the operational reality is inverted. FedRAMP High compliance — the process of achieving, documenting, and maintaining authorisation — consumes engineering capacity, introduces architectural rigidity, and creates observability blind spots that sophisticated adversaries exploit with precision. The framework itself becomes a constraint on the very agility and resilience that modern infrastructure demands. This dynamic has played out repeatedly in recent federal incidents: CSPs holding FedRAMP High authorisation were still compromised because the compliance posture masked critical architectural vulnerabilities.
The Industry Narrative: Control Density Without Control Efficacy
The standard industry response to FedRAMP High is to treat it as a technical and operational rite of passage. AWS GovCloud, Microsoft Azure Government, Google Cloud FedRAMP, and dozens of smaller specialised providers have invested millions in control implementation, CISO hiring, 3PAO relationships, and continuous assessment infrastructure. Trade publications celebrate each new authorisation as a market milestone. Vendor marketing materials frame FedRAMP High as a trust signal; federal procurement officers reference it as a risk-mitigation requirement in RFPs. The implicit narrative is sound: more controls, more auditing, more compliance documentation equals more security.
The Snowflake incident of September 2024 complicated this story. An attacker obtained credentials for a Snowflake customer account through credential-theft malware targeting the customer's corporate environment (not Snowflake's infrastructure). The attacker then accessed sensitive federal data stored in that Snowflake instance. Snowflake itself had no FedRAMP authorisation at the time, but the incident exposed a systemic assumption embedded in the FedRAMP model: that compliance boundaries align with operational control boundaries, and that an organisation's security posture depends primarily on what happens within the CSP's perimeter. The Snowflake case showed the opposite — the adversary never needed to penetrate Snowflake. They entered through the customer's uncontrolled supply chain. Snowflake's encryption, logging, and access controls were functionally inert.
The Change Healthcare ransomware attack (February–May 2024) struck a different regulatory nerve. Change Healthcare operates under HIPAA and was subject to OCR (Office for Civil Rights) investigation. The attack exploited an unpatched ForcePoint SSL VPN appliance. The attacker gained network persistence, moved laterally, exfiltrated patient records, and encrypted critical billing and claims systems. Change Healthcare's remediation involved vendor patch management, enhanced EDR deployment, and SIEM tuning — the classic trilogy of post-breach controls. Yet the attack persisted for weeks across a complex multi-vendor environment because the fundamental architecture had not changed. The attacker had multiple persistence vectors; killing one merely meant activating another. FedRAMP High would have mandated the same detection and response infrastructure that Change Healthcare already possessed and that failed to prevent the attack. The framework provides no primitives for architectural isolation or post-breach resistance.
The Scattered Spider attacks on MGM Resorts and Caesars Entertainment (September 2023) demonstrated a different failure mode — social engineering against privileged users, then lateral movement through uncontrolled trust relationships. Both organisations had sophisticated SIEM, EDR, and incident response capabilities. What they lacked was a substrate where the attacker's persistence vector (command execution on a single endpoint) could not propagate to sensitive systems. Neither organisation operated a zero-knowledge architecture where access to one system revealed nothing about other systems. The attacker moved laterally because the architecture permitted it — not because monitoring was absent. FedRAMP High frameworks mandate monitoring; they do not mandate zero-knowledge design.
The Structural Flaw: Compliance-Driven Architecture
FedRAMP High's implicit model assumes that security derives from the density and formality of controls. The framework requires organisations to implement specific technical and operational controls (e.g., AC-2 Account Management, SI-2 Flaw Remediation, SI-4 Information System Monitoring, AU-2 Audit Events), document their implementation, have them verified by a 3PAO against NIST SP 800-53 baselines, and then maintain continuous monitoring to demonstrate persistent compliance.
This creates a perverse organisational incentive: optimise for auditability rather than resilience. An organisation can achieve FedRAMP High authorisation with a comprehensively logged, monitored, and documented infrastructure that is nonetheless vulnerable to well-crafted attacks. The Synnovis ransomware attack on NHS trusts (June 2024), whilst not a federal compliance matter, illustrated this clearly — the organisation had EDR, logging, and incident response procedures, yet the attacker encrypted critical pathology systems because the attacker's lateral movement vectors (network access, privilege escalation) were not architecturally constrained.
The core problem is conceptual: FedRAMP High treats security as an assurance property (something verified after the fact by auditors) rather than a substrate property (something engineered into architecture such that breach is architecturally difficult, not merely undetected). NIST SP 800-53 is a control framework, not a capability framework. It mandates that organisations log access to sensitive data; it does not mandate that access to sensitive data be cryptographically bound to a device posture that changes continuously. It requires incident response plans; it does not require that the architecture itself be hostile to dwell time and lateral movement.
The operational cost emerges from this contradiction. An organisation pursuing FedRAMP High must:
— Hire compliance specialists to map business processes to NIST controls. — Implement and maintain SIEM, EDR, SOAR, and continuous monitoring infrastructure that generates terabytes of log data annually. — Conduct annual or continuous third-party assessments (3PAO engagements cost £200,000–£500,000 per cycle for large organisations). — Freeze architectural innovation because changes require control re-assessment. — Maintain control documentation across a constantly shifting codebase and infrastructure. — Respond to control gaps discovered in assessments by bolting on additional point solutions (DLP, CASB, IAM systems), each adding operational complexity.
The result is that a FedRAMP High organisation is often less able to respond rapidly to zero-day vulnerabilities, architectural drift, and adversarial innovation than an organisation that started from first principles around resilience. The compliance posture becomes a constraint on the engineering posture.
The PULSE Reading: Post-Breach Resistance as Architectural Primitive
FedRAMP High's failure is not that it mandates too few controls. It is that it mandates controls in the wrong layer of the stack — the detection and response layer — whilst leaving the data and access planes vulnerable to architectural attack.
PULSE doctrine inverts this priority. Rather than optimising for auditability, we optimise for post-breach resistance: the property that a breach in one system or trust domain does not cascade to others. This is not achieved through better monitoring (all detection-based approaches suffer from false negatives, dwell time, and adversarial evasion). It is achieved through architecture.
Consider a federal agency managing intelligence or financial data. FedRAMP High requires that all access be logged, all systems be scanned for vulnerabilities, and incidents be detected and contained. In practice, an attacker who gains credentials to a single system can enumerate, access, and exfiltrate data across the entire environment—because the data plane trusts that credentials are legitimate. The agency's EDR and SIEM will eventually detect the activity, but the damage is concurrent with the breach, not subsequent to detection.
A post-breach-resistant architecture inverts this. The data plane operates on the principle that every access request is adversarially novel. A user's credentials prove authentication, but do not imply authorisation. Access to sensitive data requires cryptographic proof of a current device state (e.g., TPM quote, attestation), continuous behavioural veracity (e.g., anomaly scoring against a continuously adaptive baseline), and zero-knowledge verification that the requester's role actually warrants that specific data access in that specific context. These checks occur at the data plane, not the control plane.
Further: the architecture is constructed such that data is compartmented and encrypted with key material held in devices that themselves are subject to continuous posture challenges. An adversary who compromises the administrative network cannot access operational data because the encryption keys are not present in the administrative domain. An adversary who compromises a single database node cannot read the data because the data is encrypted under keys derived from per-request device state attestation.
This requires domain-specific primitives—not general-purpose SIEM or EDR. A financial network handling federal funds might employ:
— Cryptographic capability-based access tokens that encode specific data access rights and device state assertions. — Continuous posture attestation at the data plane: requests to sensitive data trigger per-request validation of device state, rather than relying on session tokens or role-based access tokens valid across multiple requests. — Temporal binding: keys and authorisations decay over short windows (seconds to minutes), forcing re-verification rather than allowing long-lived credentials to persist. — Zero-knowledge proofs to validate that a user's role entitles them to a specific data access without revealing the full RBAC model to the client.
The compliance burden shrinks dramatically because the security properties emerge from the substrate, not from external monitoring. Audit logging becomes a byproduct of the control plane, not the primary security mechanism. The organisation can update the operational architecture without refreezing it for compliance assessment.
Implementation Principles for Federal Systems
Organisations subject to FedRAMP High (or considering it) should decouple the goal — federal data protection — from the method (control density). Three architectural principles follow:
Sovereign Data Compartmentation. Each logical data domain (e.g., classified intelligence, financial records, operational technology) should be encrypted with key material held in a dedicated hardware security module (HSM) or trusted execution environment (TEE) that never exports the keys. Access to data in one compartment should reveal nothing about the existence, structure, or provenance of data in other compartments.
Continuous Adversarial Posture Drift. Rather than implementing static access controls that grant privileges for fixed session durations, implement cryptographic primitives that require systems to continuously prove their security posture (software integrity, hardware configuration, absence of persistence mechanisms) as a prerequisite for each sensitive operation. Proof of security posture decays over time — requests older than five minutes require re-verification.
Control-Plane and Data-Plane Isolation. Administrative access to the control plane (e.g., ability to modify access policies, view audit logs) should be cryptographically separated from the data plane. An adversary compromising administrative credentials cannot read protected data because the data encryption keys are not present in the administrative domain.
The Operational Trade-Off: Compliance Velocity vs. Resilience Velocity
The honest reckoning: an organisation operating under PULSE architectural principles may take longer to achieve initial FedRAMP High authorisation because the 3PAO and JAB are accustomed to evaluating NIST control implementations, not architectural properties. The compliance framework was designed for control-based assessment, not capability-based assessment.
However, once authorised, such an organisation can iterate on its security substrate continuously — adding new threat models, implementing emerging cryptographic primitives, adjusting posture challenges — without awaiting re-assessment cycles. The compliance burden becomes a one-time investment followed by continuous innovation. Traditional FedRAMP High organisations face the opposite: rapid initial compliance followed by frozen architecture and escalating operational cost.
Over a five-year cycle, the architectural approach yields lower total cost of ownership, higher resistance to novel attacks, and genuine rather than performative federal-grade security.
Call to Operators
Organisations responsible for sovereign federal data or critical infrastructure under FedRAMP High should examine whether their current architecture is delivering resilience or merely compliance labels; we invite qualified practitioners to request a technical briefing under mutual NDA.
Request a briefing under executed Mutual NDA.
PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.
Request Briefing →