KSIs vs. NIST Controls in FedRAMP 20X – What’s Changed?

FedRAMP 20X’s KSIs are meant to simplify compliance for cloud providers. Learn which controls are excluded from NIST 800-53, what’s added, and how a risk-based approach with Paramify simplifies your transition to this cloud-native, flexible framework.

Isaac Teuscher
|
53
min read

In This Article

A lot of people are curious how the new FedRAMP 20X KSIs relate to NIST control families (NIST 800-53, NIST 800-171, etc).

FedRAMP 20X is meant to simplify federal cybersecurity compliance. But, since KSIs aren’t directly tied to NIST controls, some worry that it will add extra work and control mappings.

Let’s set your mind at ease. Here we’ll explain what a KSI is, break down the differences between a KSI and control, and show where there are differences between the 20X KSIs and NIST families, so you can know what to expect moving forward 

What is a KSI? 

A KSI is a Key Security Indicator. This is a measurable metric or control used to assess the security posture of cloud services in FedRAMP. 

KSIs are designed to provide a standardized, machine-readable, way to evaluate and monitor the security of a CSPs by focusing on critical security controls or outcomes. 

How is a KSI Different from a Control?

Traditional NIST 800-53 controls can be complex and broad. KSIs aim to simplify and streamline security assessments by targeting specific, high-impact security indicators that are easier to automate and validate.

KSIs are part of FedRAMP’s modernization efforts to make security assessments more efficient, scalable, and cloud-native. 

They focus on measurable outcomes (e.g., system uptime, patch management compliance, or incident response times) rather than prescriptive processes to give CSPs more flexibility in how they demonstrate compliance.  

20x KSIs vs 104 selected 800-53 controls

The FedRAMP PMO has made it clear that the 20X KSIs will not just be an abstraction layer on top of NIST 800 controls.

KSIs are meant to show capabilities and provide flexibility for CSPs.

But, KSIs also have “related controls” that show how they may relate to NIST controls. 

FedRAMP 20X is currently in the pilot phase for FedRAMP Low.

It can be a useful exercise to compare the current FedRAMP Low baseline requirements (NIST 800-53 selected controls) to the 20X KSI “related controls” to see what the focus of 20X requirements are from a NIST control lens.

When we dig into the related controls a few key insights emerge.

NIST 800-53 Rev 5 Controls Excluded from FedRAMP 20X

Which NIST 800-53 Rev 5 Controls for FedRAMP Low are excluded from the FedRAMP 20X KSI “related controls”?

NIST 800-53 Rev 5 Controls Excluded from FedRAMP 20x KSI “Related Controls”
Control Family Excluded Controls
Access Control (AC) AC-8, AC-18, AC-19
Awareness and Training (AT) AT-1, AT-2(2), AT-4
Audit and Accountability (AU) AU-5, AU-6
Security Assessment and Authorization (CA) CA-2, CA-2(1), CA-5, CA-6, CA-7, CA-7(4), CA-8
Configuration Management (CM) CM-5
Contingency Planning (CP) CP-3
Identification and Authentication (IA) None excluded
Incident Response (IR) IR-2
Maintenance (MA) All excluded
Media Protection (MP) All excluded
Physical and Environmental Protection (PE) All excluded
Planning (PL) PL-4, PL-4(1), PL-8, PL-10, PL-11
Personnel Security (PS) PS-6
Risk Assessment (RA) RA-2
System and Services Acquisition (SA) SA-4(10)
System and Communications Protection (SC) SC-15, SC-20, SC-21, SC-22
System and Information Integrity (SI) SI-12
Supply Chain Risk Management (SR) SI-11(1)

Notes:

  • Control Families with "All Excluded": For Maintenance (MA), Media Protection (MP), and Physical and Environmental Protection (PE), all controls within these families are excluded from the FedRAMP 20x KSI “related controls.”
  • No Exclusions: The Identification and Authentication (IA) family has no controls excluded.
  • Source Context: This table reflects the exclusions specific to the FedRAMP 20x initiative’s KSI framework, which focuses on streamlined, high-impact security indicators for low-impact systems as part of FedRAMP’s modernization efforts.

Learn more: CISA Secure Software Development Attestation Form

Which NIST 800-53 Rev 5 Controls that are 20x KSI “related controls” are added to existing FedRAMP Low controls?

Access Control (AC)
AC-23 Employ [Assignment: organization-defined techniques] for [Assignment: organization-defined data storage objects] to detect and protect against unauthorized data mining.
Awareness and Training (AT)
AT-6 Provide feedback on organizational training results to the following personnel [Assignment: organization-defined frequency]: [Assignment: organization-defined personnel].

What Fewer KSIs Means for Your Security Program 

KSIs are reducing and simplifying the control set for FedRAMP. 

There are a lot more controls removed than added (as you can see above). 

Some NIST control families like Maintenance (MA), Media Protection (MP), and Physical and Environmental Protection (PE) which are included in the FedRAMP Low Baseline, are completely excluded from 20x KSIs.  

This is good news for CSPs and it’s possible because the KSIs are Cloud Native. A cloud service offering will already inherit most controls in these families from their LaaS providers (AWS, Azure, GCP, etc). 

The change to KSIs is meant to give you flexibility that wasn’t possible with the required detail and rigidity of NIST controls.

KSIs are Simple With Risk-Based Security

KSIs shouldn’t be seen as a new set of requirements. They are based on NIST FedRAMP baselines but modernized for cloud native offerings and condensed to focus on capabilities.

If you’re concerned about updating your security program, it all boils down to this: 

If you do risk management and have secure practices you will be fine.

When you manage risk effectively any control standard will be easy to assess because you have made risk-based decisions to protect your assets, processes and people. 

Paramify’s risk solutions focus on managing risk first. We’re participating in the FedRAMP phase 1 pilot to get a first-hand look at what’s changing with FedRAMP 20X. We’ll stay up to date on changes, so you can know your security program meets compliance requirements no matter what changes. 

Prepare for FedRAMP 20X

Implementing a risk-based security approach is simple when you use Paramify. You can even build the majority of your security strategy in just 45 - 60 minutes

Have questions? Please reach out — our team loves to help. 

Sign up for free demo of Paramify below, or request a demo video, to start preparing for FedRAMP 20X today: 

What does Paramify do?

Risk-based vs compliance-based security: Here's the difference

How automation can improve your security program

Isaac Teuscher
A Security Engineer leading the technical implementation of cloud and AI-driven security. With experience in NIST 800-53 and FedRAMP, Isaac collaborates with executive teams to build scalable security programs that meet the highest federal compliance standards.
May 2025
Related posts

Paramify blog

Interviews, tips, guides, industry best practices, and news.

Top FedRAMP 3PAO Assessors to Use With Paramify

Find the best audit partner for your FedRAMP authorization with this list of the top 8 3PAO assessors, perfectly paired with Paramify to accelerate your compliance journey and save time and costs.
Read post

5 Things to Look for in a FedRAMP 20x GRC Tool

The top 5 must-have features in a FedRAMP 20x GRC tool that can slash your authorization time and unlock federal markets for your innovative software.
Read post

The New FedRAMP VDR Standard

What’s FedRAMP’s new VDR Standard? Here’s what it is, how it might affect your organization and how automation can make it simple. 
Read post
How do I find the right tool for 20x?

We recommend finding a tool that does these 5 things: 

  1. Puts an emphasis on information assurance
  2. Has automated evidence collection and validation
  3. Uses a transparent process
  4. Balances automation and manual attestations
  5. Includes flexible validation scheduling

→ Get more tips to find the best tool for your 20x process.

Does Paramify support the updated vulnerability standard introduced with FedRAMP 20x?

POA&M templates often fail and lead to bad security practices. VDR shifts compliance from point-in-time snapshots to continuous readiness. The goal is to bring agencies and vendors closer to true continuous ATO.

But, you can't manually sift through vulnerabilities and hit required timelines. You’ll need processes that detect, assess, and patch automatically where possible.

Paramify will alert you to LEVs and IRVs instantly. From there you can prioritize the N5s and automate the fixes for lower ones. 

Find out how VDR works and watch below to learn how Paramify helps:

How do I manage Continuous Security Assessment of my cloud service offering?

20x requires continuous assessment of your tool so agencies can get a more real-time understanding of your security posture.

With Paramify you can automatically retrieve, store, and validate the evidence required for continuous assessment of your FedRAMP 20x KSIs.

Will Paramify help me build a Trust Center

Trust Centers are a requirement for FedRAMP 20x authorization. Paramify will help you build out your own trust center that will include details on your compliance programs. 

Check out Paramify’s trust center as an example.

Is FedRAMP Authorized the same as an Authority to Operate (ATO)?

FedRAMP Authorization is different from an Authority to Operate (ATO). In the past, you could only get FedRAMP Authorized with an ATO — and to get an ATO you’d have to have an agency sponsor. 

You can get FedRAMP Authorized without a sponsor, but your ATO comes once an agency begins using you. Having the authorization in advance will speed up the process and provide agencies with more options that have necessary security controls already in place.

Do Federal Agencies Accept 20x?

Yes, when you’ve completed FedRAMP 20x your company will be added to the FedRAMP Marketplace. From there federal agencies can choose your product.

Do AI companies get priority access to 20x?

They very much do.

Find out if your AI tool qualifies or learn more about the AI fast-track to 20x.

Are pen tests and red team exercises required for 20x Moderate?

We’re still finding out the details on 20x Moderate. We’ve heard suggestions that pen tests and red teams are not being included for moderate-level 20x assessments, though agencies may still request them independently.

We’ll update as we learn more.

How Do I Generate Machine Readable Documentation?

Paramify automatically creates and updates any required reporting as you implement your KSIs and update their statuses. 

Machine-readable or not, documentation sucks. So we’re taking care of it.

When will 20x be available for me?

The 20x program is still being developed — it’s a little like building the airplane in flight. 

The fine folks at FedRAMP are testing, receiving feedback and iterating as they go. To do this they’re piloting the different impact levels individually. 

  • The pilot for FedRAMP 20x low is complete and open for new submissions. 
  • Moderate and High-level 20x are expected to be available by early 2026

Psst: Federal agencies are looking to fast-track fedRAMP Authorization for AI tools. If you're looking for authorization for your AI tool, you can get started now.

How Long Does FedRAMP 20x Take?

Expect to move much faster with 20x. Paramify and the other companies we helped through the process were able to submit in less than 30 days.

Get more info here:

How Much Does FedRAMP 20x Cost?

FedRAMP 20x is significantly less expensive than traditional FedRAMP. Expect to spend between $145k to $180k initially and $235k to $360k annually to maintain authorization. 

Find a full breakdown of the cost of FedRAMP and FedRAMP 20x to know what to expect and how to reduce your spend.

What is a KSI (Key Security Indicator)?

A KSI is a Key Security Indicator. This is a measurable metric or control used to assess the security posture of cloud services in FedRAMP. 

KSIs provide a standardized, machine-readable way to evaluate and monitor the security of a CSPs by focusing on critical security controls or outcomes.

Learn about KSIs or read here to see how they compare to traditional controls.

Is your company eligible for 20x?

You’re eligible for 20x if: 

  • Your tool is cloud-native on an authorized platform (AWS, Azure, GCP).
  • Can create a machine-readable file to show evidence of 20x KSIs. 
  • Have a FedRAMP-savvy 3PAO to audit your submission

If you’ve done a SOC 2 type 2 audit (or something similar) in the last year, it can also speed up your process. 

→ Find 20x eligibility requirements to see if it’s right for you

Is 20x as secure as FedRAMP Rev 5

FedRAMP 20x is designed to be as secure as Rev 5, if not more so

20x emphasizes flexible, risk-based mitigations and automation over rigid manual processes — aligning better with modern RMF principles for adaptive threat handling. 

This shift reduces outdated implementations while maintaining or enhancing overall security standards.

We believe risk-based security beats checklist compliance every time:

How is FedRAMP 20x different from Rev5?

Traditional FedRAMP relies on detailed NIST-based controls, manual reviews, agency sponsorships, and lengthy authorization processes that can take months or years. 

FedRAMP 20x, introduced by the GSA in March 2025, accelerates the process for cloud-native services. 20x emphasizes automation, machine-readable documentation, real-time monitoring, and doesn’t require an agency sponsorship.  Authorizations are possible much faster without reducing security. 

→ Find out if 20x is a good fit for your organization.

How is FedRAMP 20x different from traditional FedRAMP?

20x introduces automation, key security indicators (KSIs), continuous monitoring validation, and streamlined authorization (sometimes without sponsor requirements).

Compare KSIs to Rev 5 controls

Do I need an agency sponsor?

Yes, for now. But, agency sponsorship requirements are evolving — FedRAMP 20x does not require a sponsor.

How do I pick the best 3PAO for my project?

Consider experience with similar environments, references, price, and knowledge of specific cloud implementations.

Find the best assessor for your CSP with these tips

What is a 3PAO?

A Third Party Assessment Organization is an accredited independent assessor that conducts key security testing and assessment for FedRAMP. 

→ Find a recommended 3PAO