Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » FedRAMP » Joint Authorization Board

Joint Authorization Board

A Joint Authorization Board or JAB provides FedRAMP (Federal Risk and Authorization Management Program) authorization to cloud service providers. 

The Board consists of the Chief Information Officers (CIOs) from the DHS (Department of Homeland Security, DoD (Department of Defense), and GSA (General Services Administration). 

The JAB reviews authorization packages based on the priority queue for cloud businesses. It is also responsible for assessing the requirements under the FedRAMP security authorization and updating it if necessary. 

Once a business has been selected to be sponsored by JAB, it will be required to create a Readiness Assessment Report (RAR) within a period of 60 days. An RAR contains specific information regarding the capability of the business toward meeting FedRAMP guidelines and requirements.

The JAB designates a “FedRAMP Ready,” stamp after which shows the CSP has been assessed by a Third Party Assessment Organization (3PAO)  and is acceptable as per FedRAMP requirements. After this, a CSP is listed in the FedRAMP marketplace.

After FedRAMP authorization, the JAB continues to monitor the cloud products and services of these business entities, ensuring the continuation of their level of compliance with standards on security and their ability to address issues that arise.

If the JAB grants provisional approval for any cloud service, agencies are empowered to provide their own security authorizations and ATOs. The board must also notify agencies promptly of any changes or removals of provisional approvals.

Additional reading

ISO 42001

What is ISO 42001? And Why Are We Talking About It Now?

If you’ve been paying attention to the news, you’ve probably noticed that AI regulation is a hot topic in everyone’s mind — from government officials to business leaders to customers. And with good reason. The rapid rise of Generative AI (GenAI) tools, such as large language models (LLMs), facial recognition systems, and real-time geolocation technology,…
SOC 2 Change management

Change Management for SOC 2: AICPA Guidelines

If your organization’s SOC 2 audit is around the corner, everyone in your team has surely worked hard to get that SOC 2 certificate. A ton of effort went into ensuring that the organization is demonstrating compliance for applicable Trust Service Criteria (TSC).  In your SOC 2 journey, are you ready to demonstrate evidence for…
Cybersecurity Automation Tools

8 Best Cybersecurity Automation Tools for 2025

The use of cybersecurity automation tools for human augmentation acts as a force multiplier, enhancing security capabilities and making a greater impact. By reducing trouble tickets, catching more threats, compensating for staff shortages, and fortifying resilience, these tools ease and complement the lives of infosec teams. The ever-growing security challenges cannot after all be battled…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.