FedRAMP 20x: Preparing for Continuous Validation

Ingrid Velasquez-Woodley headshot
Ingrid Woodley
Senior Director, Revenue Strategy
Matt Earley
Matt Earley
President, 38North Security

Matt Earley is 38North’s Founder and President. He started 38North to solve complex security challenges while developing trusted relationships with an elite client base.

For over 20 years, Matt Earley has designed and implemented security solutions for the US and Australian federal governments, critical infrastructure, utilities, and global finance and healthcare organizations.

Before founding 38North, Matt was the director of federal services at Endeavor Systems. He was responsible for Endeavor’s most prominent business unit, serving the Federal Aviation Administration, Department of Homeland Security, and some of the world’s largest security operations centers.

Matt has a Bachelor of Engineering in computer engineering from the University of Canberra in Australia and a Master’s in engineering management from George Washington University. He also is a Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP).

Meet the Author
Sam Leestma | FedRAMP | compliance | 38NorthSecurity
Sam Leestma
Vice President, Solutions Engineering

FedRAMP 20x introduces a major shift in how security is verified for cloud systems supporting the federal government. 

Instead of periodic assessments built around documentation, the program moves toward continuous validation, where systems regularly report their security posture through automation and measurable signals. 

But when organizations make that shift, an important question emerges: What actually goes wrong first? 

Watch the full discussion below. 

If you would rather read, here is the full discussion in written form: 

In the previous episode of our FedRAMP 20x series, we explored one of the most common questions organizations are asking: Is 20x actually easier than FedRAMP Rev. 5? 

The answer was nuanced: While FedRAMP 20x reduces documentation and introduces automation, it doesn’t necessarily reduce the work required to maintain security. Instead, it shifts that work earlier into engineering and deeper into day-to-day operations. 

In this episode, we go one level deeper: If compliance becomes continuous validation, and your system is effectively reporting its posture all the time, what is most likely to break first? 

And how should organizations prepare for that shift without overbuilding or freezing in analysis paralysis? 

Learn more: Is FedRAMP 20x Easier? What Leaders Need to Know

The Myth: Automation Will Handle Everything 

When teams first hear the phrase continuous validation, their instinct is often optimistic. They imagine automation doing most of the work: 

  • Connect telemetry. 
  • Plug in monitoring tools. 
  • Generate evidence automatically. 

And while automation plays a critical role in the FedRAMP 20x model, there’s a common misconception hiding underneath that assumption. 

Automation can measure systems. 

It can alert teams to issues. 

It can even generate machine-readable evidence. 

But what it cannot do is assign responsibility. 

And that’s why the first break organizations experience under continuous validation usually isn’t technical: It’s operational. 

Learn more: A FedRAMP 20x Primer for Executives

What Breaks First: Operational Maturity 

In traditional compliance models, organizations often build extensive documentation to demonstrate that they meet security requirements. But many of those processes are designed for periodic audits rather than continuous scrutiny. 

Under FedRAMP 20x, systems are evaluated far more frequently, and organizations must respond to security signals much faster. That requires a level of operational maturity that many teams have never had to maintain before. Clear ownership becomes essential. 

When a security indicator drifts out of tolerance, someone must know: 

  • Who is responsible for investigating the issue 
  • How it will be remediated 
  • Which procedures need to be activated 
  • How quickly the response must occur 

In other words, organizations must move from documenting security practices to operating them continuously. If those operational loops are unclear or inconsistent, continuous validation will expose that quickly. 

Leadership Blind Spots 

From a leadership perspective, FedRAMP 20x shifts pressure upstream. Areas that were once buried inside large documentation packages become immediately visible through automated reporting. Deployment hygiene, engineering maturity, and operational security discipline suddenly matter far more. 

If those capabilities are not already well established, continuous validation can feel unforgiving. Not because the security standards themselves are unrealistic, but because the system is constantly revealing how well an organization is actually operating. 

Under the 20x model, vulnerabilities may need to be detected and remediated on significantly shorter timelines. Security signals appear more frequently. Performance is measured more consistently. 

This can feel like a cultural shift for leadership teams used to compliance programs that revolve around documentation cycles rather than operational feedback, but it also creates a powerful opportunity. 

Organizations that demonstrate stable, responsive operations under continuous validation can signal a higher level of maturity to both government buyers and the broader market. 

Preparing Without Overbuilding 

One of the biggest fears organizations have when they first examine FedRAMP 20x is that they will need to rebuild their systems entirely. 

In practice, that’s rarely the case. Many organizations pursuing FedRAMP already operate under other security frameworks. Much of the underlying engineering work is often already in place. 

The real challenge usually lies in visibility and reporting, not in rebuilding infrastructure. 

Preparation typically starts with a few foundational steps: 

  • Assessing the current security architecture and identifying existing capabilities 
  • Reviewing procedures to ensure roles and responsibilities are clearly defined 
  • Testing operational processes such as incident response under tighter feedback loops 
  • Filling gaps in automation and telemetry where necessary 

Rather than building entirely new systems, organizations often need to tighten the loops around the systems they already have. Continuous validation rewards disciplined operations far more than it rewards complex tooling. 

A Strategic Opportunity 

From a commercial perspective, FedRAMP 20x represents more than just a compliance shift: It may also create competitive differentiation. 

If continuous validation becomes the dominant model, which many expect, organizations that can demonstrate stability and responsiveness under that model will stand out. Operational maturity becomes visible. Security discipline becomes measurable. 

And those signals can strengthen trust not only with federal buyers, but also with commercial customers evaluating the reliability of a cloud provider. 

In that sense, continuous validation is not simply a compliance exercise. 

It is also a strategic opportunity. 

The Takeaway 

When organizations move to continuous validation, the first thing that breaks is rarely tooling. More often, it is operational maturity. Processes designed for periodic audits suddenly have to function continuously. Engineering teams must take ownership of security outcomes in real time. And leadership teams must recognize that compliance programs built around documentation do not always translate directly into day-to-day operational discipline. 

FedRAMP 20x does not require perfection. But it does require consistency. 

The organizations that prepare thoughtfully (strengthening their engineering practices, tightening their operational feedback loops, and building real DevSecOps culture) will be best positioned to turn continuous validation into a strategic advantage. 

What’s Next 

In the next episode of our FedRAMP 20x series, we’ll tackle another important question: Is FedRAMP 20x actually more secure, or simply more visible? Stay tuned. 

Preparing for FedRAMP 20x?

If your organization is evaluating how continuous validation will affect your cloud architecture, engineering workflows, or compliance program, our team can help. Schedule a conversation with 38North Security to discuss your 20x readiness.

About the Authors
Ingrid Velasquez-Woodley headshot
Ingrid Woodley
Senior Director, Revenue Strategy
Matt Earley
Matt Earley
President, 38North Security

Matt Earley is 38North’s Founder and President. He started 38North to solve complex security challenges while developing trusted relationships with an elite client base.

For over 20 years, Matt Earley has designed and implemented security solutions for the US and Australian federal governments, critical infrastructure, utilities, and global finance and healthcare organizations.

Before founding 38North, Matt was the director of federal services at Endeavor Systems. He was responsible for Endeavor’s most prominent business unit, serving the Federal Aviation Administration, Department of Homeland Security, and some of the world’s largest security operations centers.

Matt has a Bachelor of Engineering in computer engineering from the University of Canberra in Australia and a Master’s in engineering management from George Washington University. He also is a Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP).

Meet the Author
Sam Leestma | FedRAMP | compliance | 38NorthSecurity
Sam Leestma
Vice President, Solutions Engineering