Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » FedRAMP » Joint Authorization Board

Joint Authorization Board

A Joint Authorization Board or JAB provides FedRAMP (Federal Risk and Authorization Management Program) authorization to cloud service providers. 

The Board consists of the Chief Information Officers (CIOs) from the DHS (Department of Homeland Security, DoD (Department of Defense), and GSA (General Services Administration). 

The JAB reviews authorization packages based on the priority queue for cloud businesses. It is also responsible for assessing the requirements under the FedRAMP security authorization and updating it if necessary. 

Once a business has been selected to be sponsored by JAB, it will be required to create a Readiness Assessment Report (RAR) within a period of 60 days. An RAR contains specific information regarding the capability of the business toward meeting FedRAMP guidelines and requirements.

The JAB designates a “FedRAMP Ready,” stamp after which shows the CSP has been assessed by a Third Party Assessment Organization (3PAO)  and is acceptable as per FedRAMP requirements. After this, a CSP is listed in the FedRAMP marketplace.

After FedRAMP authorization, the JAB continues to monitor the cloud products and services of these business entities, ensuring the continuation of their level of compliance with standards on security and their ability to address issues that arise.

If the JAB grants provisional approval for any cloud service, agencies are empowered to provide their own security authorizations and ATOs. The board must also notify agencies promptly of any changes or removals of provisional approvals.

Additional reading

What Is Cybersecurity? Understanding Its Importance in the Digital Age

As digital landscapes continue to evolve at an accelerated pace, new tools, technologies, and systems are added to them daily. These are necessary tools for businesses to grow, but they also open up doors to new vulnerabilities and threats. This is why cybersecurity has become ubiquitous in our digital world.  Cybersecurity is the process of…

ISO 27001 Policy Template: Key Sections & Free PDF

Implementing ISO 27001 can feel like staring at a blank page with a looming deadline. Defining security controls, documenting your policies, and identifying gaps are challenging, especially without a clear starting point. You need structure, consistency, and airtight documentation – winging is not an option for audit-readiness. That’s where ISO 27001 policy templates come in….

Top 10 Third Party Risk Management Certifications – Eligibility & Exam Costs

Third-party risk management certification is more valuable than ever as companies move from passive identification to active vendor risk management. EY’s 2025 Global TPRM Survey reports that 57% of organizations now choose remediation when risks are identified, up from 17% in 2023, reflecting this shift toward action. This blog discusses the top TRPM certifications and…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.