FedRamp - Secure configuration guide for SRA
FedRamp Moderate - SaaS
Document Information
- Product Name: BeyondTrust Secure Remote Access (SRA)
- Deployment Model: SaaS (Single-Tenant)
- Authorization Level: FedRAMP Moderate (Authorized)
- Document Version: 25.3.1
- Document Date: February 2026
- Applies To Product Release: 25.3.x
Versioning and Release History
| Version | Release Date | Product Version Alignment | Description of Changes | Security Impact |
|---|---|---|---|---|
| 25.3.1 | Dec 2025 | 25.3.1 | Initial Secure Configuration Guide for FedRAMP Moderate aligned to 25.3.1 release | Baseline configuration documentation |
| 25.3.2 | Feb 2026 | 25.3.2 | Maintenance updates | Latest iteration of security patches and bug fixes |
| 26.1.1 | TBD | 26.1.x | Next major feature release alignment | Reviewed for configuration impact |
Versioning Model
- 25.3.1 = Major feature release
- 25.3.2 = Maintenance release within 25.3 branch
- 26.1.1 = First major release of 2026
Each product release is evaluated for configuration impacting changes and this guide is updated accordingly.
System Overview
BeyondTrust Secure Remote Access (SRA) version 25.3.1 is a FedRAMP Moderate authorized SaaS solution providing secure, audited remote access to endpoints and systems.
Each customer receives a dedicated single-tenant SaaS environment.
Security Enforcement
- TLS 1.2+ (TLS 1.3 where supported)
- FIPS 140-3 validated cryptography
- Immutable audit logging
- Role-based access control (RBAC)
- Secure configuration defaults at provisioning
Administrative Account Security
Top-Level Administrative Role
The highest privilege role in SRA is Admin.
Admin users may:
- Configure authentication settings
- Manage RBAC permissions
- Modify session policies
- Configure IP allowlisting
- Manage logging settings
- Configure integration settings
Permissions can be assigned individually or through Group Policies.
Reference documentation:
https://docs.beyondtrust.com/rs/docs/cloud-users-security
Secure Access to Administrative Accounts
SRA 25.3.1 supports:
- SAML federation
- OIDC federation
- LDAP integration
- Local authentication (allowed but discouraged)
FedRAMP Secure Practice
- Federated authentication with MFA enforced at the IdP is strongly recommended
- MFA is supported at both the Identity Provider and local SRA levels
- Administrative access must use MFA
Administrative Lifecycle Management
Provisioning
- Admin accounts are created by existing Admin users
- RBAC follows least privilege principles
- Permissions may be scoped through Group Policies
Deprovisioning
- Federated users: governed by IdP lifecycle
- SCIM: minimal support
When an Admin account is removed:
- Access is immediately revoked
- Audit logs remain intact and immutable
Privileged Account Controls
Role-Based Access Control (RBAC)
SRA 25.3.1 uses granular RBAC with:
- Preconfigured least-privilege baseline at provisioning
- Customer assigned roles post provisioning
- Delegated administrative capabilities
- Group policy based permission assignment
Security sensitive settings require Admin level privileges.
Privileged Security Settings
Settings restricted to the Admin role include:
- Authentication configuration
- IP allowlisting
- Session recording enforcement
- Jump/Access policy configuration
- Credential injection controls
- Logging and retention policies
All security sensitive changes are logged.
Secure Defaults
| Configuration Area | Secure Default |
|---|---|
| TLS | 1.2 enforced; 1.3 where supported |
| Cryptography | FIPS 140-3 validated modules |
| Audit Logging | Enabled by default |
| Log Integrity | Immutable |
| IP Allowlisting | Enabled by default; configurable |
| Anonymous Access | Disabled |
| RBAC | Least privilege baseline |
| Session Recording | Enabled by policy |
Logging and Auditing
SRA 25.3.1 provides:
- Full session recording
- Command logging
- File transfer logging
- Authentication event logging
- Administrative configuration change logging
Audit logs:
- Are immutable
- Cannot be modified by Admin users
- Persist after user deprovisioning
- Support compliance review and forensic analysis
Network Security Configuration
IP Allowlisting
- Enabled by default
- Configurable by Admin users
- Restricts administrative access to approved IP ranges
Encryption
- All data in transit encrypted using TLS 1.2+
- TLS 1.3 enabled where supported
- FIPS 140-3 validated cryptographic modules used
Session Security Controls
SRA 25.3.1 enforces:
- VPN-less secure connectivity
- Session recording
- Credential injection (no credential exposure to end user)
- External access controls
- Policy based session governance
Decommissioning Procedures
Administrative Account Removal
- Access is immediately revoked
- RBAC associations removed
- Historical audit logs preserved
- No log deletion occurs
Tenant Decommissioning
- Data retention follows contractual and FedRAMP requirements
- Logs preserved per retention policy
- Environment securely decommissioned per FedRAMP Moderate requirements
Customer Configuration Responsibilities
Customers are responsible for:
- Assigning Admin roles appropriately
- Enforcing MFA at IdP (if federated)
- Maintaining secure IdP lifecycle controls
- Reviewing audit logs regularly
- Maintaining IP allowlist configuration
- Applying least privilege RBAC assignments
Compliance Alignment Summary
This Secure Configuration Guide for SRA 25.3.1 addresses FedRAMP Moderate requirements related to:
- Secure access to top-level administrative accounts
- Privileged account governance
- Secure defaults at provisioning
- Role-based restriction of security settings
- Administrative lifecycle management
- Immutable logging
- Encryption enforcement
Updated about 3 hours ago