Getting Software Approved on Your Gov Mac: The FedRAMP Process

Installing software on your government Mac isn’t as simple as downloading from the App Store. Federal security requirements mandate that software be reviewed and approved through processes like FedRAMP. Understanding this process helps you request and obtain the tools you need for your work.

Why Software Approval Matters

Federal agencies restrict software for critical reasons:

  • Security risk: Unvetted software could contain vulnerabilities or malware
  • Data protection: Software may transmit data to unauthorized locations
  • Compliance: Federal systems must use authorized solutions
  • Supply chain: Software provenance must be verified
  • Support: Approved software has vendor support relationships

Understanding FedRAMP

The Federal Risk and Authorization Management Program (FedRAMP) standardizes security assessment for cloud services.

FedRAMP Basics

  • Provides standardized approach to security assessment
  • Authorizes cloud products for government use
  • Three impact levels: Low, Moderate, High
  • Ongoing monitoring ensures continued compliance

FedRAMP Authorization Levels

  • Low: Limited impact if compromised (e.g., public websites)
  • Moderate: Serious impact (most agency systems)
  • High: Severe or catastrophic impact (sensitive systems)

Finding FedRAMP Authorized Products

The FedRAMP Marketplace lists authorized cloud services:

  • Visit marketplace.fedramp.gov
  • Search by product name or category
  • Verify authorization status and level
  • Check if your agency has existing ATO

The Software Request Process

Step 1: Identify Your Need

Before requesting software, document:

  • What task you need to accomplish
  • Why existing approved tools are insufficient
  • How many users need the software
  • What data the software will access

Step 2: Check Approved Software Lists

Your agency likely maintains approved software catalogs:

  • Check Self Service app for available software
  • Review agency intranet software catalogs
  • Ask IT about approved alternatives
  • Search your agency’s IT service portal

Step 3: Submit a Request

If the software isn’t approved, submit a formal request:

  1. Complete software request form (IT service portal)
  2. Provide business justification
  3. Include software vendor information
  4. Note FedRAMP status if applicable
  5. Identify funding source if required

Step 4: Security Review

Your request triggers security assessment:

  • IT security reviews the software
  • Risk assessment is conducted
  • Compliance requirements are verified
  • Testing may be performed

Step 5: Approval and Deployment

If approved:

  • Software is added to approved catalog
  • Installation package is created
  • Deployment through Self Service or MDM
  • License management is established

Timeline Expectations

Software approval takes time:

  • Already approved software: Days to weeks
  • FedRAMP authorized cloud service: Weeks to months
  • Non-FedRAMP cloud service: Months (requires agency ATO)
  • Desktop software: Weeks to months depending on complexity

Plan ahead for software needs rather than waiting until urgent.

Common Approved Software Categories

Productivity

  • Microsoft 365 (GCC/GCC High)
  • Adobe Acrobat (approved versions)
  • Zoom for Government
  • Box for Government

Development

  • Xcode (Apple)
  • Visual Studio Code (with restrictions)
  • Git (command line)
  • Homebrew (some agencies)

Browsers

  • Safari (built-in)
  • Microsoft Edge
  • Google Chrome (approved versions)
  • Firefox (approved versions)

What To Do While Waiting

If your software request is pending:

  • Use approved alternatives where possible
  • Work with IT on temporary solutions
  • Document workarounds you’re using
  • Check request status periodically
  • Escalate through your management if mission-critical

Prohibited Software

Some software is explicitly prohibited:

  • Software from adversary nations (specified by CISA)
  • Peer-to-peer file sharing applications
  • Unauthorized remote access tools
  • Gaming or entertainment software (usually)
  • Cryptocurrency mining applications
  • Software with known security vulnerabilities

Personal Software on Government Macs

Generally, you cannot install personal software on government Macs:

  • MDM policies block unauthorized installations
  • App Store access may be restricted
  • Admin rights are typically not granted
  • Personal use of government equipment is limited

Shadow IT Risks

Using unauthorized software (shadow IT) creates risks:

  • Security vulnerabilities unknown to IT
  • Data may be stored in unauthorized locations
  • Compliance violations may occur
  • No IT support if problems arise
  • Potential disciplinary action

Always work through proper channels for software needs.

Advocating for Better Tools

If the approval process is too slow or burdensome:

  • Provide feedback through proper channels
  • Document mission impact of delays
  • Suggest process improvements
  • Work with your CIO office on systemic issues
  • Participate in technology working groups

The software approval process protects federal systems, but it should also enable mission accomplishment. Understanding the process helps you navigate it effectively while maintaining security compliance.

David Chen

David Chen

Author & Expert

David Chen is a professional woodworker and furniture maker with over 15 years of experience in fine joinery and custom cabinetry. He trained under master craftsmen in traditional Japanese and European woodworking techniques and operates a small workshop in the Pacific Northwest. David holds certifications from the Furniture Society and regularly teaches woodworking classes at local community colleges. His work has been featured in Fine Woodworking Magazine and Popular Woodworking.

35 Articles
View All Posts