Frameworks

FedRAMP Architecture for US Government Cloud: Planning Compliance with Sparx EA

By Ryan Schmierer  ·  January 26, 2026

Sparx EA gives cloud service providers and Federal agency IT teams the governance framework to model FedRAMP system boundaries, NIST SP 800-53 control implementations, and SSP architecture diagrams in a single governed repository: with an MDG-configured compliance register that tracks every control from requirement to implementation.

FedRAMP (Federal Risk and Authorization Management Program) is the US Federal government’s framework for assessing and authorizing cloud services for government use. For cloud service providers (CSPs) seeking FedRAMP authorization, the System Security Plan (SSP) is the core architectural and compliance document: and it is a significant undertaking, requiring detailed architecture diagrams, control-by-control implementation narratives, and a governed process for maintaining compliance over time. For Federal agencies consuming FedRAMP-authorized services, understanding the system boundary and the control inheritance model is an architectural governance requirement. Sparx EA provides the modeling environment to build and maintain FedRAMP compliance architecture rigorously: system boundary definitions, NIST 800-53 control modeling, SSP diagram production, and a live compliance register that reflects the current state of control implementation. This article explains how to build a FedRAMP compliance architecture in Sparx EA and configure the MDG for FedRAMP control governance.

Key Takeaways


What FedRAMP Is: and Why It Requires Architecture

FedRAMP is the Federal government’s standardized approach to cloud security assessment, authorization, and continuous monitoring. It was established by OMB in 2011 to eliminate the inefficiency of each Federal agency conducting its own security assessment of cloud services. Under FedRAMP, a cloud service undergoes a single rigorous security assessment that can then be reused by multiple agencies: the “do once, use many times” model.

The framework has three authorization levels, determined by the potential impact of a security breach:

FedRAMP Low: Applies to cloud systems where the potential impact of a breach is limited: no personal information, no critical mission data. The control baseline is a subset of NIST SP 800-53 controls. Few Federal use cases qualify for Low; it is primarily used for public-facing informational systems.

FedRAMP Moderate: The most common authorization level, applying to systems handling Controlled Unclassified Information (CUI): data where a breach would have serious but not catastrophic consequences. Moderate requires implementation of approximately 325 NIST SP 800-53 controls. Most cloud services used by Federal agencies for operational purposes require Moderate authorization.

FedRAMP High: For systems handling data where a breach could have severe or catastrophic consequences: law enforcement data, financial information, health information of Federal beneficiaries. High requires implementation of approximately 421 NIST SP 800-53 controls and includes the strictest requirements for personnel screening, physical access controls, and incident response.

The System Security Plan (SSP) is the primary FedRAMP deliverable. It is a comprehensive document (typically hundreds of pages) describing the cloud system: its architecture, its boundary, its data flows, and the implementation of each NIST SP 800-53 control in the applicable baseline. The SSP must include specific architecture diagrams: network topology, data flow diagrams, authentication architecture, and a boundary diagram showing what is in scope for the ATO.


Modeling the FedRAMP System Boundary in Sparx EA

The FedRAMP system boundary is the defined scope of the cloud service: every component, service, and network element that is within the ATO scope and must therefore comply with all applicable NIST controls. Defining the boundary correctly is one of the most important and contested aspects of FedRAMP authorization. Too broad, and the control implementation burden becomes unmanageable. Too narrow, and the authorizing official (AO) will expand it during assessment.

In Sparx EA, the FedRAMP system boundary is modeled as a Package or Boundary container element that groups all in-scope components. Within the boundary:

Application Components represent cloud services and application tiers: web application tier, API layer, backend processing services, administrative portals. Each component is tagged with its deployment model (cloud-native microservice / containerized / VM-based / SaaS dependency).

Technology Nodes represent infrastructure components: web application firewall (WAF), load balancers, compute instances (EC2, Azure VMs, GKE pods), managed database services (RDS, Azure SQL, Cloud SQL), object storage (S3, Azure Blob, GCS), key management services (AWS KMS, Azure Key Vault), and monitoring infrastructure (CloudWatch, Azure Monitor, logging services).

Communication Networks represent network segments: the public-facing network (internet-facing load balancer and WAF), the application tier network, the data tier network (private subnet), and the management network (for administrative access).

External dependencies: components outside the system boundary that the in-scope system depends on: are modeled as Application Components outside the boundary container, with Usage relationships connecting them to in-scope components. FedRAMP requires documentation of all external services: other FedRAMP-authorized services (which can inherit controls through the Leveraged ATO model), non-FedRAMP services (which require additional justification), and corporate IT systems used for administration.


NIST SP 800-53 Control Modeling

The NIST SP 800-53 control catalog is organized into 20 control families:

AC (Access Control), AT (Awareness and Training), AU (Audit and Accountability), CA (Assessment, Authorization, and Monitoring), CM (Configuration Management), CP (Contingency Planning), IA (Identification and Authentication), IR (Incident Response), MA (Maintenance), MP (Media Protection), PE (Physical and Environmental Protection), PL (Planning), PM (Program Management), PS (Personnel Security), PT (Personally Identifiable Information Processing and Transparency), RA (Risk Assessment), SA (System and Services Acquisition), SC (System and Communications Protection), SI (System and Information Integrity), SR (Supply Chain Risk Management).

In Sparx EA, each NIST control is modeled as a Requirement element within a hierarchical package structure mirroring the 20 control families. The «FedRAMP Control» MDG stereotype carries tagged values:

Controls designated as Inherited are linked to the cloud platform’s P-ATO (Provisional ATO) control implementation: for example, a service built on AWS GovCloud inherits the physical security controls (PE family) from AWS’s existing FedRAMP High P-ATO. Inheritance relationships in Sparx EA connect the Inherited control Requirements to the parent cloud platform’s Application Component, making the control inheritance chain transparent and auditable.


SSP Architecture Diagrams from Sparx EA

FedRAMP requires specific architecture diagrams in the SSP. Sparx EA produces all of them:

System Boundary Diagram: The ArchiMate Technology layer diagram showing all in-scope components within the boundary container, all external dependencies outside the boundary, and the network segments connecting them. This is the primary diagram for the SSP’s Architecture Overview section.

Network Topology Diagram: A Technology layer diagram focused on network elements: subnets, security groups, network ACLs, firewalls, load balancers: showing the network architecture of the cloud environment. For AWS deployments, this shows the VPC structure, availability zones, and internet gateway configuration. For Azure, the VNet structure, NSGs, and Azure Firewall.

Data Flow Diagram: A combined Application and Technology layer diagram showing the flow of government data through the system: from the point of entry (user request via the internet), through the application tier, to the database, and back. Ports and protocols are labeled on each flow. This diagram directly supports the SC (System and Communications Protection) family control implementations.

Authentication Architecture Diagram: An Application layer diagram showing the identity and authentication architecture: the identity provider, the authentication flows (OAuth 2.0, SAML 2.0, PIV/CAC for Federal users), the privileged access management system, and the MFA implementation. This supports the IA (Identification and Authentication) and AC (Access Control) family implementations.

All four diagrams are maintained in the Sparx EA repository and updated whenever the architecture changes: ensuring the SSP diagrams remain current without manual re-drawing.


MDG Design: The FedRAMP Control Stereotype

The FedRAMP MDG extension for Sparx EA provides:

  1. «FedRAMP Control»: extends Requirement, carries the full set of NIST control tagged values
  2. «FedRAMP Boundary»: extends Package or Boundary element, marks the ATO scope
  3. «FedRAMP System Component»: extends Application Component, records component type (Web Tier / API / Data Tier / Admin) and cloud service type
  4. «FedRAMP Infrastructure»: extends Technology Node, records cloud provider, service type (Compute/Storage/Network/Security), and cloud-native service name
  5. «Inherited Control»: extends Association, documents the control inheritance relationship and the source P-ATO
  6. «POA&M Item»: extends Risk element, records the Plan of Action and Milestones for controls not yet satisfied: scheduled completion date, remediation description, and responsible party

Model validation rules enforce: all in-scope Application Components must have a «FedRAMP System Component» stereotype; all Network elements must have a protocol and encryption tagged value; no control can have Implementation Status = Implemented without a corresponding Implementation Date; all POA&M Items must have a scheduled completion date.


Continuous Monitoring Architecture in Sparx EA

FedRAMP requires continuous monitoring (ConMon): an ongoing program of automated security assessment, vulnerability management, and plan of action tracking after initial authorization. The ConMon architecture is documented in Sparx EA:

Vulnerability Scanning: Application Components representing the vulnerability scanner (Tenable.io/Nessus, Qualys, Rapid7) with scanning relationships to in-scope Technology Nodes. Scan frequency tagged values on scan relationships: monthly for OS/infrastructure, monthly for web application (if applicable).

SIEM and Log Aggregation: The centralized log management and SIEM platform (Splunk, Microsoft Sentinel, AWS Security Hub, Google Chronicle) modeled as an Application Component collecting logs from all in-scope components.

POA&M Tracking: «POA&M Item» elements in Sparx EA represent open vulnerabilities and control deficiencies, with scheduled completion dates and responsible party tagged values. A Power BI report via EA GraphLink provides the ConMon dashboard: open POA&M items by age, severity, and control family: essential for the monthly ConMon deliverable to FedRAMP PMO or agency AO.


FAQ

Q1: How long does it take to achieve FedRAMP Moderate authorization? FedRAMP Moderate authorization typically takes 12–24 months from initial assessment engagement to ATO issuance. The timeline depends on: the maturity of the existing security architecture, the quality and completeness of the SSP documentation, the responsiveness of the 3PAO (Third-Party Assessment Organization) and JAB or agency AO, and the number and severity of findings from the assessment. Starting with a well-documented Sparx EA architecture model significantly accelerates the SSP documentation phase.

Q2: What is the difference between a FedRAMP P-ATO and an ATO? A Provisional Authority to Operate (P-ATO) is issued by the FedRAMP Joint Authorization Board (JAB: GSA, DoD, DHS) and represents a government-wide provisional authorization that Federal agencies can use. An Agency ATO is issued by a specific Federal agency’s authorizing official and applies to use of the cloud service by that agency. P-ATOs are more reusable (any agency can use) but harder to obtain; Agency ATOs are faster for the initial authorization but must be established separately with each using agency.

Q3: How does FedRAMP handle multi-cloud architectures? Multi-cloud architectures: where the cloud service spans AWS, Azure, or GCP simultaneously: must include all cloud environments within the FedRAMP system boundary. Each cloud platform’s FedRAMP-authorized infrastructure can contribute inherited controls via their respective P-ATOs. In Sparx EA, each cloud environment is modeled as a separate Technology layer package within the overall boundary, with inter-cloud communication documented as cross-package Data Flow relationships.

Q4: What is the FedRAMP Moderate control baseline coverage for encryption? For encryption, the key FedRAMP Moderate controls include: SC-8 (Transmission Confidentiality and Integrity: requires FIPS-validated cryptography for data in transit), SC-28 (Protection of Information at Rest: requires encryption of government data at rest), and SC-28(1) (Cryptographic Protection: specifically requiring FIPS 140-2/3 validated modules). In Sparx EA, these controls are modeled as Requirements, and each storage and network element that handles government data is linked to them via Realisation relationships, documenting the specific FIPS-validated mechanism used.

Q5: How should we handle FedRAMP compliance for containerized microservices architectures? Container orchestration platforms (Kubernetes, ECS, EKS) introduce specific FedRAMP considerations: container image security (CM-7, SI-3: hardened base images, image scanning), container runtime security (AU-12: container audit logging), network policy (SC-7: microsegmentation within the cluster), and secrets management (IA-5: credential management via Kubernetes Secrets or a secrets management service). In Sparx EA, the container platform is modeled as a Technology Node (the Kubernetes cluster), with individual microservices as Application Components, and the security controls as Requirements linked to the platform and each service.

Q6: Can Sparx EA support the FedRAMP SSP documentation requirement directly? Yes. Sparx EA’s document generation capability (using RTF or DOCX templates) can produce SSP sections directly from the model: control implementation narratives from tagged values on «FedRAMP Control» elements, component inventories from Application Component and Technology Node element lists, and architecture diagram exports from Sparx EA diagrams. This reduces the manual effort of SSP documentation significantly and ensures the SSP remains consistent with the authoritative Sparx EA model.

Q7: How does Sparx EA support FedRAMP readiness assessments before the formal 3PAO assessment? A FedRAMP Readiness Assessment (FRA), conducted before the formal 3PAO assessment, reviews whether a cloud service has implemented the most critical FedRAMP controls and is ready for formal assessment. In Sparx EA, an FRA can be conducted by reviewing the Implementation Status tagged values on all Moderate baseline controls: identifying controls that are Not Implemented or Partially Implemented. A Power BI report via EA GraphLink provides the FRA dashboard: percentage of controls implemented by family, open POA&M items by severity, and estimated time to full implementation.

Q8: What does Sparx Services’ Deploy engagement deliver for FedRAMP architecture? Sparx Services’ Deploy engagement for FedRAMP delivers: a Sparx EA Pro Cloud Server deployment, a FedRAMP MDG configuration with all NIST SP 800-53 Moderate baseline controls pre-populated as «FedRAMP Control» elements, a system boundary package structure, the four required SSP architecture diagram templates, and a ConMon tracking package with POA&M management. The Amplify engagement adds the ongoing architecture governance capability: training the customer’s team to maintain the FedRAMP architecture model through the ConMon program.


Work With Sparx Services

FedRAMP authorization is an architecture challenge. Sparx Services’ Deploy engagement delivers a FedRAMP-grade Sparx EA configuration: NIST SP 800-53 Moderate baseline pre-populated, system boundary structure established, SSP diagram templates ready. Our Amplify engagement builds your team’s FedRAMP compliance architecture practice.

Deploy from $30,000 | Amplify from $45,000. Contact us to discuss your FedRAMP architecture program.

Contact Sparx Services | Explore Deploy | Explore Amplify

Share this article

Ready to make your EA investment work harder?

Talk to a Sparx Services architect about where your organization is on the journey and what the next stage looks like.