Significant Change Notifications¶
The Significant Change Notifications rules supply a simple framework allowing providers to make significant changes to their own products while keeping agency customers in the loop. These rules organize significant changes into clear categories so agencies can understand the expected risk and make authorization decisions accordingly.
Rule Sections
General Provider Responsibilities¶
These rules apply to providers with FedRAMP Certifications of any type.
Maintain Audit Records¶
SCN-CSO-MAR
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MUST maintain auditable records of the significant change evaluation activities required by SCN-CSO-EVA (Evaluate Changes) and make them available to FedRAMP.
Note: These audit records must be available to FedRAMP on request; these records do not need to be included in the FedRAMP Certification package by default.
Required Information¶
SCN-CSO-INF
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MUST include at least the following information in Significant Change Notifications:
- Service Offering FedRAMP ID
- Assessor Name (if applicable)
- Related Vulnerability (if applicable)
- Significant Change type and explanation of categorization
- Short description of change
- Reason for change
- Summary of customer impact, including changes to services and customer configuration responsibilities
- Plan and timeline for the change, including for the verification, assessment, and/or validation of impacted Key Security Indicators or controls
- Copy of the business or security impact analysis
- Name and title of approver
Note: Structure of the information may vary depending on how the provider tracks this internally.
Terms: Significant Change, Validation, Verification, Vulnerability
Historical Notifications¶
SCN-CSO-HIS
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MUST keep 12 months of historical Significant Change Notifications available with their FedRAMP Certification Data.
Terms: Certification Data, Significant Change
Human and Machine-Readable¶
SCN-CSO-HRM
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MUST make ALL Significant Change Notifications and related audit records available in human-readable and machine-readable formats.
Note: During the SCN beta, many cloud service providers met this requirement by using carefully structured and organized csv files to meet human-readable and machine-readable requirements simultaneously.
Terms: Machine-Readable, Significant Change
Additional Relevant Information¶
SCN-CSO-ARI
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MAY include additional relevant information in Significant Change Notifications.
Note: This allows providers to convey whatever additional information they think is relevant without worrying about negative consequences from not following an exact template.
Terms: Significant Change
Notification Mechanisms¶
SCN-CSO-NOM
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MAY notify necessary parties in a variety of ways as long as the mechanism for notification is clearly documented in the FedRAMP Certification package and easily accessible.
Notes:
- The sharing mechanism should be designed based on the needs of the provider and their customers and may vary between providers.
- The default sharing mechanism for most providers during the SCN beta was to send an email to agency customers and upload a copy of the notification to the provider's secure sharing location.
Terms: Certification Package
Emergency Changes¶
SCN-CSO-EMG
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MAY execute significant changes (including transformative changes) during an emergency or incident without following the Significant Change Notification rules in advance. In such emergencies, providers MUST follow all relevant procedures, notify all necessary parties, retroactively provide all Significant Change Notification materials, and complete appropriate assessment after the incident.
Note: Procedures for emergency changes should be documented in the FedRAMP Certification package.
Terms: All Necessary Parties, Certification Package, Incident, Significant Change, Transformative Change
Evaluate Changes¶
SCN-CSO-EVA
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MUST evaluate all potential significant changes to determine the type of significant change and follow the appropriate Significant Change Notification rules.
- Is it a significant change? --> Continue evaluation and follow the Significant Change Notification rules.
- If it is, is it an FedRAMP Certification class change? --> This requires a new assessment and cannot be done under the Significant Change Notification rules.
- If it is not, is it a routine recurring change? --> Follow the Routine Recurring Change rules (SCN-RTR Routine Recurring Changes).
- If it is not, is it a transformative change? --> Follow the Transformative Change rules (SCN-TRF Transformative Changes).
- If it is not, then it is an adaptive change --> Follow the Adaptive Change rules (SCN-ADP Adaptive Changes).
Terms: Adaptive Change, Certification Class Change, Routine Recurring Change, Significant Change, Transformative Change
Adaptive Changes¶
These rules apply to all adaptive significant changes.
Notification Requirements¶
SCN-ADP-NTF
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
This FRR includes a notification requirement!
- Notify all necessary parties by update using FedRAMP Certification Data.
Providers MUST notify all necessary parties within 10 business days after finishing adaptive changes, also including the following information:
Timeframe: 10 business days
- Summary of any new risks identified and/or vulnerabilities resulting from the change (if applicable)
Notes:
- Activities that match the adaptive significant change type are a frequent and normal part of iteratively improving a service by deploying new functionality or modifying existing functionality in a way that is typically transparent to customers and does not introduce significant new security risks.
- In general, most changes that do not happen regularly will be adaptive changes. This change type deliberately covers a wide range of activities in a way that requires assessment and consideration.
Tips on adaptive changes
Key Tests:
-
Requires minimal changes to security plans or procedures
-
Requires some careful planning and project management to implement, but does not rise to the level of planning required for transformative changes
-
Requires verification of existing functionality and secure configuration after implementation
Examples:
-
Updates to operating systems, containers, virtual machines, software or libraries with known breaking changes, complex steps, or service disruption
-
Deploying larger than normal incremental feature improvements in code or libraries that are the work of multiple weeks of development efforts but are not considered a major new service
-
Changing cryptographic modules where the new module meets the same standards and characteristics of the former
-
Replacing a like-for-like component where some security plan or procedure adjustments are required (e.g., scanning tool or managed database swap)
-
Adding models to existing approved AI services without exposing federal customer data to new services
Terms: Adaptive Change, All Necessary Parties, Regularly, Significant Change, Vulnerability
Routine Recurring Changes¶
These rules apply to all routine recurring significant changes.
No Notification Requirements¶
SCN-RTR-NNR
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers SHOULD NOT make formal Significant Change Notifications for routine recurring changes; this type of change is exempted from notification requirements.
Notes:
- Activities that match the routine recurring significant change type are performed regularly and routinely by cloud service providers to address flaws or vulnerabilities, address incidents, and generally perform the typical maintenance and service delivery changes expected during day-to-day operations.
- These changes leverage mature processes and capabilities to identify, mitigate, and remediate risks as part of the change. They are often entirely automated and may occur without human intervention, even though they have an impact on security of the service.
- If the activity does not occur regularly and routinely then it cannot be a significant change of this type (e.g., replacing all physical firewalls to remediate a vulnerability is obviously not regular or routine).
Tips on ongoing operations
Key Tests:
-
Routine care and feeding by staff during normal duties
-
No major impact to service availability
-
Does not require executive approval
Examples:
-
Provisioning or deprovisioning capacity to support service elasticity
-
Changing or tuning performance configurations for instances or services
-
Updating and maintaining operational handling of information flows and protection across physical and logical networks (e.g., updating firewall rules)
-
Generating or refreshing API or access tokens
Tips on vulnerability management
Key Tests:
-
Minor, incremental patching or updates
-
Significant refactoring or migration process NOT required
-
No breaking changes
Examples:
-
Updating security service or endpoint signatures
-
Routine patching of devices, operating systems, software or libraries
-
Updating and deploying code that applies normal fixes and improvements as part of a regular development cycle
-
Vulnerability remediation activity that simply replaces a known-bad component(s) with a better version of the exact same thing, running in the exact same way with no changes to processes
Terms: Incident, Regularly, Routine Recurring Change, Significant Change, Vulnerability
Transformative Changes¶
These rules apply to all transformative significant changes.
Notification of Initial Plans¶
SCN-TRF-NIP
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
This FRR includes a notification requirement!
- Notify all necessary parties by update using FedRAMP Certification Data.
Providers MUST notify all necessary parties of initial plans for transformative changes at least 30 business days before starting transformative changes, including a summary of any likely security impacts or changes in risk.
Timeframe: 30 business days
Notification of Final Plans¶
SCN-TRF-NFP
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
This FRR includes a notification requirement!
- Notify all necessary parties by update using FedRAMP Certification Data.
Providers MUST notify all necessary parties of final plans for transformative changes at least 10 business days before starting transformative changes, including updates to all previously sent information.
Timeframe: 10 business days
Notification After Finishing¶
SCN-TRF-NAF
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
This FRR includes a notification requirement!
- Notify all necessary parties by update using FedRAMP Certification Data.
Providers MUST notify all necessary parties within 5 business days after finishing transformative changes, including updates to all previously sent information.
Timeframe: 5 business days
Notification After Verification¶
SCN-TRF-NAV
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
This FRR includes a notification requirement!
- Notify all necessary parties by update using FedRAMP Certification Data.
Providers MUST notify all necessary parties within 5 business days after completing the verification, assessment, and/or validation of transformative changes, also including the following information:
Timeframe: 5 business days
- Updates to all previously sent information
- Summary of any new risks identified and/or vulnerabilities resulting from the change (if applicable)
- Copy of the security assessment report (if applicable)
Terms: All Necessary Parties, Transformative Change, Validation, Verification, Vulnerability
Update Documentation¶
SCN-TRF-UPD
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers MUST publish updated service documentation and other materials to reflect transformative changes within 30 business days after finishing transformative changes.
Timeframe: 30 business days
Note: This requirement is focused on service documentation like user guides, information listed in the marketplace, and other such materials; it does not require updating the system security plan or FedRAMP Certification package.
Third-Party Review¶
SCN-TRF-TPR
Changelog:
- 2026-05-04: Initial reset for the Consolidated Rules for 2026 Public Preview.
Providers SHOULD engage a third-party assessor to review the scope and impact of the planned change before starting transformative changes if human validation is necessary; such reviews SHOULD be limited to security decisions that require human validation.
Note: Activities that match the transformative significant change type are rare for a cloud service offering, adjusted for the size, scale, and complexity of the service. Small cloud service offerings may go years without transformative changes, while hyperscale providers may release multiple transformative changes per year.
Tips on transformative changes
Key Tests:
-
Alters the service risk profile or require new or significantly different actions to address customer responsibilities
-
Requires significant new design, development and testing with discrete associated project planning, budget, marketing, etc.
-
Requires extensive updates to security assessments, documentation, and how a large number of security requirements are met and validated
Examples:
-
The addition, removal, or replacement of a critical third party service that handles a significant portion of information (e.g., IaaS change)
-
Increasing the security categorization of a service within the offering that actively handles federal customer data (does NOT include impact change of entire offering - see FedRAMP Certification class change)
-
Replacement of underlying management planes or paradigm shift in workload orchestration (e.g., bare-metal servers or virtual machines to containers, migration to kubernetes)
-
Datacenter migration where large amounts of federal customer data is moved across boundaries different from normal day-to-day operations
-
Adding a new AI-based capability that impacts federal customer data in a different way than existing services or capabilities (such as integrating a new third-party service or training on federal customer data)
Terms: Cloud Service Offering, Significant Change, Transformative Change, Validation