Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary Β» FedRAMP Β» Joint Authorization Board

Joint Authorization Board

A Joint Authorization Board or JAB provides FedRAMP (Federal Risk and Authorization Management Program) authorization to cloud service providers. 

The Board consists of the Chief Information Officers (CIOs) from the DHS (Department of Homeland Security, DoD (Department of Defense), and GSA (General Services Administration). 

The JAB reviews authorization packages based on the priority queue for cloud businesses. It is also responsible for assessing the requirements under the FedRAMP security authorization and updating it if necessary. 

Once a business has been selected to be sponsored by JAB, it will be required to create a Readiness Assessment Report (RAR) within a period of 60 days. An RAR contains specific information regarding the capability of the business toward meeting FedRAMP guidelines and requirements.

The JAB designates a “FedRAMP Ready,” stamp after which shows the CSP has been assessed by a Third Party Assessment Organization (3PAO)  and is acceptable as per FedRAMP requirements. After this, a CSP is listed in the FedRAMP marketplace.

After FedRAMP authorization, the JAB continues to monitor the cloud products and services of these business entities, ensuring the continuation of their level of compliance with standards on security and their ability to address issues that arise.

If the JAB grants provisional approval for any cloud service, agencies are empowered to provide their own security authorizations and ATOs. The board must also notify agencies promptly of any changes or removals of provisional approvals.

Additional reading

Cybersecurity Governance: Leading Security with Strong Policies

The evolving threat landscape is giving rise to several new problems like end-point vulnerabilities, third-party attacks, IoT threats, social engineering exploits, etc. While companies cannot eliminate such incidents, they can prepare and minimize the impact of these threats.  This is where cybersecurity governance comes inβ€”it helps companies formulate security strategies, enable business continuity, meet stakeholder…

Top 6 Drata Alternatives & Competitors in 2026

TL; DR Drata helps organizations become audit-ready quickly, but challenges may arise after onboarding. Customers often find that add-ons increase the total cost, evidence uploads cannot be edited, and teams may need to re-upload documents when changes occur. This guide compares six Drata alternatives, highlighting their advantages in automation, evidence management, reporting, and scalability to…

AI Governance Tools: What They Are, Why They Matter, and How to Choose the Right One

TL;DR AI governance tools inventory AI systems, enforce policies, and automate audit evidence for frameworks like ISO 42001 and the EU AI Act. Tool selection depends on governance ownership, regulatory scope, and whether you’re managing vendor AI adoption or building internal models. By 2026, AI governance will no longer be optional for many companies: the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.