Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » FedRAMP » Joint Authorization Board

Joint Authorization Board

A Joint Authorization Board or JAB provides FedRAMP (Federal Risk and Authorization Management Program) authorization to cloud service providers. 

The Board consists of the Chief Information Officers (CIOs) from the DHS (Department of Homeland Security, DoD (Department of Defense), and GSA (General Services Administration). 

The JAB reviews authorization packages based on the priority queue for cloud businesses. It is also responsible for assessing the requirements under the FedRAMP security authorization and updating it if necessary. 

Once a business has been selected to be sponsored by JAB, it will be required to create a Readiness Assessment Report (RAR) within a period of 60 days. An RAR contains specific information regarding the capability of the business toward meeting FedRAMP guidelines and requirements.

The JAB designates a “FedRAMP Ready,” stamp after which shows the CSP has been assessed by a Third Party Assessment Organization (3PAO)  and is acceptable as per FedRAMP requirements. After this, a CSP is listed in the FedRAMP marketplace.

After FedRAMP authorization, the JAB continues to monitor the cloud products and services of these business entities, ensuring the continuation of their level of compliance with standards on security and their ability to address issues that arise.

If the JAB grants provisional approval for any cloud service, agencies are empowered to provide their own security authorizations and ATOs. The board must also notify agencies promptly of any changes or removals of provisional approvals.

Additional reading

cyber security risk assessment

How To Perform a Cyber Security Risk Assessment?

Digital assets and data are the lifeblood of every organization today. But as with everything precious, they’re constantly at risk of being unlawfully accessed, tampered with, stolen, or transmitted. Such malicious actions can not only cause irreparable harm and damage to the organization but can severely hamper future business prospects.  Cyber risk assessments are periodical…

Sprinto Named Cloud Compliance Leader in G2

For the fourth consecutive quarter, Sprinto has been named as Leader of Security Compliance by G2, the world’s leading business software review platform. This is a huge deal for us, and we couldn’t have done it without our amazing customers’ continued support and loyalty. But wait, there’s more! Sprinto has also earned recognition as a…
defense in depth

Defense In Depth (DiD): A Castle Approach To GRC With Layered Defenses

In 2016, the U.S. Department of Homeland Security (DHS) listed Defense in Depth (DiD) as a recommended strategy for improving ‘industrial control system cybersecurity’ practices. This was done in a bid to make systems less attractive to attackers during a period experiencing a sharp increase in cyber incidents.  So, is DiD a new concept or…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.