Service B is being utilized without explicit FedRAMP authorization coverage. While the service implements TLS 1.3 for connection security and includes authentication controls, its use outside the authorized service boundary requires risk assessment and continuous monitoring.
+
+
+
+
+ Use of Non-Authorized Service B from Awesome Cloud
+
+
Service B is being utilized from the Awesome Cloud environment but is not included within the explicit FedRAMP authorization boundary. This requires risk assessment and ongoing monitoring to ensure security controls are adequate.
+
+
+
The use of non-authorized services, even from an authorized cloud provider, introduces potential security risks if not properly assessed and monitored. While Service B implements security controls including TLS 1.3 and authentication mechanisms, its operation outside the FedRAMP authorized boundary requires additional scrutiny and continuous risk management.
+
+ open
+
+
+
+
+
+
+
+ 2025-03-31T04:59:00-05:00
+
+ Service B Security Assessment and Documentation
+
+
A comprehensive security assessment of Service B will be conducted to include:
+
+
Detailed documentation of security controls and their effectiveness
+
Validation of TLS 1.3 implementation
+
Review of authentication mechanisms
+
Assessment of data protection measures
+
Development of continuous monitoring procedures
+
+
+
+
+ Complete Security Assessment of Service B
+
+
Conduct full security assessment and document findings, including recommendations for additional controls if needed.
+
+
+
+
+
+
+
+
+
+ example finding
+
+
finding description
+
+
+
+
+
+
+
example target description
+
+
+
+
+
+ example poam item
+
+
poam item description
+
+
+
+
\ No newline at end of file
diff --git a/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml b/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
index 90403e53f..27b8273c1 100644
--- a/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+++ b/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
@@ -1115,8 +1115,7 @@ leveraged-authorization assembly:
-
-
+
@@ -1217,6 +1216,7 @@ leveraged-authorization assembly:
+
@@ -1314,6 +1314,7 @@ for connectivity (e.g., system monitoring, system alerting, download updates, et
+
@@ -1385,6 +1386,7 @@ the system POC roles reference parties that represent the connection provider.
+
@@ -1447,6 +1449,8 @@ or as a result to the leveraged system's OSCAL-based SSP.
+
+
@@ -1546,6 +1550,7 @@ leveraged-authorization assembly:
+
@@ -1627,6 +1632,7 @@ property.
+
@@ -1649,6 +1655,7 @@ property.
+
+
+
+
+
+
\ No newline at end of file
diff --git a/src/validations/constraints/content/ssp-has-poam-resource-INVALID.xml b/src/validations/constraints/content/ssp-has-poam-resource-INVALID.xml
new file mode 100644
index 000000000..40b69fafa
--- /dev/null
+++ b/src/validations/constraints/content/ssp-has-poam-resource-INVALID.xml
@@ -0,0 +1,30 @@
+
+
+
+
+
+
+
+ Signed System Security Plan
+
+
SSP Signature
+
+
+
+
+ 00000000
+
+
The FedRAMP PMO is formulating guidelines for handling digital/electronic signatures in
+OSCAL, and welcome feedback on solutions.
+
For now, the PMO recommends one of the following:
+
+
Render the OSCAL SSP content as a PDF that is digitally signed and attached.
+
Render the OSCAL SSP content as a printed page that is physically signed,
+scanned, and attached.
+
+
If your organization prefers another approach, please seek prior approval from the
+FedRAMP PMO.
+
+
+
+
\ No newline at end of file
diff --git a/src/validations/constraints/content/ssp-import-profile-resolves-to-fedramp-content-INVALID.xml b/src/validations/constraints/content/ssp-import-profile-resolves-to-fedramp-content-INVALID.xml
deleted file mode 100644
index f8367f2fa..000000000
--- a/src/validations/constraints/content/ssp-import-profile-resolves-to-fedramp-content-INVALID.xml
+++ /dev/null
@@ -1,3 +0,0 @@
-
-
-
\ No newline at end of file
diff --git a/src/validations/constraints/content/ssp-network-component-has-implementation-point-INVALID-2.xml b/src/validations/constraints/content/ssp-network-component-has-implementation-point-INVALID-2.xml
index 03dc7f5f1..9aa6c8012 100644
--- a/src/validations/constraints/content/ssp-network-component-has-implementation-point-INVALID-2.xml
+++ b/src/validations/constraints/content/ssp-network-component-has-implementation-point-INVALID-2.xml
@@ -4,29 +4,13 @@
xsi:schemaLocation="http://csrc.nist.gov/ns/oscal/1.0 https://github.com/usnistgov/OSCAL/releases/download/v1.1.2/oscal_ssp_schema.xsd"
uuid="12345678-1234-4321-8765-123456789012">
-
- Firebase CLI Connection
-
-
CLI for updating firebase Secure connection to an external API for data enrichment.
-
-
-
-
- Firebase CLI Connection
CLI for updating firebase Secure connection to an external API for data enrichment.
-
-
-
- nvm CLI Connection
-
-
CLI for updating nvm Secure connection to an external API for data enrichment.
The FedRAMP PMO resides within GSA and supports agencies and cloud service providers
+through the FedRAMP authorization process and maintains a secure repository of
+FedRAMP authorizations to enable reuse of security packages.
+
+
+
+ Prepared By
+
+
The organization that prepared this SSP. If developed in-house, this is the CSP
+itself.
+
+
+
+ Prepared For
+
+
The organization for which this SSP was prepared. Typically the CSP.
+
+
+
+ System Security Plan Approval
+
+
The individual or individuals accountable for the accuracy of this SSP.
+
+
+
+ Cloud Service Provider
+ CSP
+
+
+
+ Information System Owner
+
+
The individual within the CSP who is ultimately accountable for everything related to
+this system.
+
+
+
+ Authorizing Official
+
+
The individual or individuals who must grant this system an authorization to
+operate.
+
+
+
+ Authorizing Official's Point of Contact
+
+
The individual representing the authorizing official.
+
+
+
+ System Administrator
+
+
+ Information System Management Point of Contact (POC)
+
+
The highest level manager who responsible for system operation on behalf of the
+System Owner.
+
+
+
+ Information System Technical Point of Contact
+
+
The individual or individuals leading the technical operation of the system.
+
+
+
+ General Point of Contact (POC)
+
+
A general point of contact for the system, designated by the system owner.
+
+
+
+
+ System Information System Security Officer (or Equivalent)
+
+
The individual accountable for the security posture of the system on behalf of the
+system owner.
+
+
+
+ Privacy Official's Point of Contact
+
+
The individual responsible for the privacy threshold analysis and if necessary the
+privacy impact assessment.
+
+
+
+ Owner of an inventory item within the system.
+
+
+ Administrative responsibility an inventory item within the system.
+
+
+ ICA POC (Local)
+
+
The point of contact for an interconnection on behalf of this system.
+
+
+
Remove this role if there are no ICAs.
+
+
+
+ ICA POC (Remote)
+
+
The point of contact for an interconnection on behalf of this external system to
+which this system connects.
+
+
+
Remove this role if there are no ICAs.
+
+
+
+ ICA Signatory (Local)
+
+
Responsible for signing an interconnection security agreement on behalf of this
+system.
+
+
+
Remove this role if there are no ICAs.
+
+
+
+ ICA Signatory (Remote)
+
+
Responsible for signing an interconnection security agreement on behalf of the
+external system to which this system connects.
+
+
+
Remove this role if there are no ICAs.
+
+
+
+ Consultant
+
+
Any consultants involved with developing or maintaining this content.
+
+
+
+ Customer
+
+
Represents any customers of this system as may be necessary for assigning customer
+responsibility.
+
+
+
+ Document Creator
+
+
+ Provider
+
+
The provider of a leveraged system, external service, API, CLI.
+
+
+
+ [SAMPLE]Unix Administrator
+
+
This is a sample role.
+
+
+
+ [SAMPLE]Client Administrator
+
+
This is a sample role.
+
+
+
+ Leveraged Authorization Users
+
+
Any internal users of a leveraged authorization.
+
+
+
+ External System Owner
+
+
The owner of an external system.
+
+
+
+ External System Management Point of Contact (POC)
+
+
The highest level manager who responsible for an external system's operation on
+behalf of the System Owner.
+
+
+
+ External System Technical Point of Contact
+
+
The individual or individuals leading the technical operation of an external
+system.
+
+
+
+ Approver
+
+
An internal approving authority.
+
+
+
+ CSP HQ
+
+ Suite 0000
+ 1234 Some Street
+ Haven
+ ME
+ 00000
+
+
+
There must be one location identifying the CSP's primary business address, such as
+the CSP's HQ, or the address of the system owner's primary business location.
+
+
+
+ Primary Data Center
+
+ 2222 Main Street
+ Anywhere
+ --
+ 00000-0000
+ US
+
+
+
+
There must be one location for each data center.
+
There must be at least two data center locations.
+
For a data center, briefly summarize the components at this location.
+
All data centers must have a "type" property with a value of "data-center".
+
The type property must also have a class of "primary" or "alternate".
+
+
+
+ Secondary Data Center
+
+ 3333 Small Road
+ Anywhere
+ --
+ 00000-0000
+ US
+
+
+
+
There must be one location for each data center.
+
There must be at least two data center locations.
+
For a data center, briefly summarize the components at this location.
+
All data centers must have a "type" property with a value of "data-center".
+
The type property must also have a class of "primary" or "alternate".
+
+
+
+ Example Organization
+ ExOrg
+
+
+
+
+ Cloud Service Provider (CSP) Name
+ CSP Acronym/Short Name
+
+ 11111111-2222-4000-8000-003000000001
+
+
Replace sample CSP information.
+
+ CSP information must be present and associated with the "cloud-service-provider" role
+via
+ responsible-party
+ .
+
+
+
+
+ Federal Risk and Authorization Management Program: Program Management Office
+ FedRAMP PMO
+
+
+
+ info@fedramp.gov
+
+ 1800 F St. NW
+ Washington
+ DC
+ 20006
+ US
+
+
+
This party entry must be present in a FedRAMP SSP.
+
The uuid may be different; however, the uuid must be associated with the
+"fedramp-pmo" role in the responsible-party assemblies.
+
+
+
+ Federal Risk and Authorization Management Program: Joint Authorization Board
+ FedRAMP JAB
+
+
+
This party entry must be present in a FedRAMP SSP.
+
The uuid may be different; however, the uuid must be associated with the
+"fedramp-jab" role in the responsible-party assemblies.
+
+
+
+
+ External Organization
+ External
+
+
Generic placeholder for any external organization.
+
+
+
+ Agency Name
+ A.N.
+
+
Generic placeholder for an authorizing agency.
+
+
+
+ Name of Consulting Org
+ NOCO
+
+
+ poc@example.com
+
+ 3333 Corporate Way
+ Washington
+ DC
+ 00000
+ US
+
+
+
+ [SAMPLE]Remote System Org Name
+
+
+ [SAMPLE]ICA POC's Name
+
+ person@ica.example.org
+ 2025551212
+ 11111111-2222-4000-8000-004000000007
+
+
+ [SAMPLE]Example IaaS Provider
+ E.I.P.
+
+
Underlying service provider. Leveraged Authorization.
+
+
+
+ [SAMPLE]Person Name 1
+
+
+ name@example.com
+ 2020000001
+ 11111111-2222-4000-8000-003000000001
+ 11111111-2222-4000-8000-004000000001
+
+
+ [SAMPLE]Person Name 2
+
+ name@example.com
+ 2020000002
+
+ Address Line
+ City
+ ST
+ 00000
+ US
+
+ 11111111-2222-4000-8000-004000000001
+
+
+ [SAMPLE]Person Name 3
+
+ name@example.com
+ 2020000003
+
+ Address Line
+ City
+ ST
+ 00000
+ US
+
+ 11111111-2222-4000-8000-004000000001
+
+
+ [SAMPLE]Person Name 4
+
+ name@example.com
+ 2020000004
+
+ Address Line
+ City
+ ST
+ 00000
+ US
+
+ 11111111-2222-4000-8000-004000000001
+
+
+ [SAMPLE]Person Name 5
+
+ name@example.com
+ 2020000005
+
+ Address Line
+ City
+ ST
+ 00000
+ US
+
+ 11111111-2222-4000-8000-004000000001
+
+
+ [SAMPLE]Person Name 6
+
+ name@example.com
+ 2020000006
+
+ Address Line
+ City
+ ST
+ 00000
+ US
+
+ 11111111-2222-4000-8000-004000000004
+
+
+ [SAMPLE]Person Name 7
+
+ name@example.com
+ 2020000007
+
+ Address Line
+ City
+ ST
+ 00000
+ US
+
+ 11111111-2222-4000-8000-004000000001
+
+
+ [SAMPLE] IT Department
+
+
+ [SAMPLE]Security Team
+
+
+ Leveraged Authorization User
+
+
+ Name of Leveraged System A Provider
+
+
+ Name of Leveraged System B Provider
+
+
+ Name of Leveraged System C Provider
+
+
+ Name of Service Provider
+
+
+ Name of Telco Provider
+
+
+ 11111111-2222-4000-8000-004000000018
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+ 11111111-2222-4000-8000-004000000001
+ 22222222-2222-4000-8000-004000000001
+
+
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official
+FedRAMP 3.0.0 release.
+
Must adjust accordingly for applicable baseline and revision.
+
+
+
+
+
+ F00000000
+ System's Full Name
+ System's Short Name or Acronym
+
+
+
[Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above]
+offering using a multi-tenant [insert based on the Deployment Model above] cloud
+computing environment. It is available to [Insert scope of customers in accordance with
+instructions above (for example, the public, federal, state, local, and tribal
+governments, as well as research institutions, federal contractors, government
+contractors etc.)].
+
NOTE: Additional description, including the purpose and functions of this system may be
+added here. This includes any narrative text usually included in section 9.1 of the
+SSP.
+
NOTE: The description is expected to be at least 32 words in length.
+
+
+
+
+
Remarks are required if service model is "other". Optional otherwise.
+
+
+
+
+
+
Remarks are required if deployment model is "hybrid-cloud" or "other". Optional
+otherwise.
+
+
+
+
+
+
+
+
+
+
+
+
+ fips-199-moderate
+
+
+
+
+ Information Type Name
+
+
For now, this is a required field. In the future we intend
+to pull this information directly from FedRAMP's records
+based on the "leveraged-system-identifier" property's value.
+
+
+
+
+
For now, this is a required field. In the future we intend
+to pull this information directly from FedRAMP's records
+based on the "leveraged-system-identifier" property's value.
Use one leveraged-authorization assembly for each underlying authorized
+cloud system or general support system (GSS).
+
For each leveraged authorization there must also be a "system" component.
+The corrisponding "system" component must include a
+"leveraged-authorization-uuid" property
+that links it to this leveraged authorization.
The user assembly is being reviewed for continued applicability
+under FedRAMP's adoption of Rev 5.
+
Currently, FedRAMP will only process user content if it includes the
+FedRAMP "separation-of-duties-matrix" property/extension. All other user
+entries will be ignored by validation rules, but may be displayed by tools.
The "provider" role is required for the component representing
+a leveraged system. It must reference exactly one party
+(via party-uuid), which points to a party of type "organization"
+representing the organization that owns the leveraged system.
+
+
+
+
+
+
+
+
This is a leveraged system within which this system operates.
+It is explicitly listed on the FedRAMP marketplace with a status of
+"FedRAMP Authorized".
+
Requirements
+
Each leveraged system must be expressed as a "system" component, and must have:
+
+
the name of the system in the title - exactly as it appears in the FedRAMP
+Marketplace
+
a "leveraged authorization-uuid" core property that links this component to the
+leveraged-authorization entry
+
an "implementation-point" core property with a value of "external"
+
A "nature-of-agreement" property/extension with an appropriate allowed value. If the value is
+"other", use the proeprty's remarks to descibe the agreement.
+
an "authentication-method" property/extension with a value of "yes", "no" or
+"not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+llowed values are the 800-63
+information type identifiers.
+
A "provider" responsible-role with exactly one party-uuid entry
+that indicates which organization is the provider of this leveraged system.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+users. This must have one or more "privilege-uuid" property/extensions. Each references
+a user assembly entry.
+
+
+
Where relevant, this component should also have:
+
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+their system (such as in an OSCAL-based CRM).
+
+
+
Links to the vendor website describing the system are encouraged, but not required.
+
Services
+
A service within the scope of the leveraged system's authorization boundary
+is considered an "authorized service". Any other service offered by the
+leveraged system is considered a "non-authorized service"
+
Represent each authorized or non-authorized leveraged services using a
+"service" component. Both authorized and non-authorized service components
+are represented the same in OSCAL with the following exceptions:
+
+
The component for an authorized servcie includes a
+ "leveraged-authorization-uuid" property. This
+ property must be excluded from the component of a
+ non-authorized leveraged service.
+
The component for a non-authorized service must include
+a "still-supported" property/extension.
+
The component for a non-authorized service must have
+a "poam-item" link that references a corrisponding entry in this system's
+POA&M.
+
+
Both authorized and non-authorized leveraged services include:
+
+
+ a "provided-by" link with a URI fragment that points
+to the "system" component representing the leveraged system.
+(Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
the name of the service in the title (for authorized services this should be
+exactly as it appears in the FedRAMP Marketplace
+
an "implementation-point" core property with a value of "external"
+
an "authentication-method" property/extension with a value of "yes", "no" or
+"not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+llowed values are the 800-63
+information type identifiers.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+users. This must have one or more "privilege-uuid" property/extensions. Each references
+a user assembly entry.
+
+
Although SSP Table 7.1 also requires data categoriation and hosting
+environment information about non-authorized leveraged services,
+these datails are derived from other content in this SSP.
+
+
+
+
+ Service A
+
+
An authorized service provided by the Awesome Cloud leveraged authorization.
+
Describe the service and what it is used for.
+
+
+
+
+
+
+
+
+
+
+
+
+
This is a service offered by a leveraged system and used by this system.
+It is explicitly listed on the FedRAMP marketplace as being included in the
+scope of this leveraged system's ATO, thus is considered an "Authorized Service.
+
+
Each leveraged service must be expressed as a "service" component, and must have:
+
+
the name of the service in the title - exactly as it appears in the FedRAMP
+Marketplace
+
a "leveraged authorization-uuid" property that links this component to the
+leveraged-authorization entry
+
an "implementation-point" property with a value of "external"; and
+
+ a "provided-by" link with a URI fragment that points to the
+"system" component representing the leveraged system. (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
+
+
Where relevant, this component should also have:
+
+
One or more "information-type" properties, where the allowed values are the 800-63
+information type identifiers.
+
At least one responsible-role that indicates the authorized userswith a role-id of "leveraged-authorization-users" and exactly
+one or more party-uuid entries that indicates which users within this system may
+interact with the leveraged systeme.
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+their system (such as in an OSCAL-based CRM).
+
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+required.
+
The following fields from the Leveraged Authorization Table are handled in the
+leveraged-authorization assembly:
+
+
Package ID, Authorization Type, Impact Level
+
+
+
The following fields from the Leveraged Authorization Table are handled in the
+"system" component representing the leveraged system as a whole:
+
- Nature of Agreement, CSP Name
+
+
+
+
+
+
+ Service B
+
+
An non-authorized service provided by the Awesome Cloud leveraged authorization.
+
Describe the service and what it is used for.
+
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method.
+
If 'no', explain why no authentication is used.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This is a service offered by a leveraged system and used by this system.
+It is NOT explicitly listed on the FedRAMP marketplace as being included
+in the scope of the leveraged system's ATO, thus is treated as a
+non-authorized, leveraged service.
+
+
Each non-authorized leveraged service must be expressed as a "service" component, and must have:
+
+
the name of the service in the title - exactly as it appears in the FedRAMP
+Marketplace
+
an "implementation-point" property with a value of "external"; and
+
one or two "direction" prperty/extensions
+
One or more "information-type" property/extensions, where the allowed values are the 800-63
+information type identifiers, and the cited types are included full list of system information types.
+
exactly one "poam-item" link, with an href value that references the
+POA&M and a resource-fragment that represents the
+POAM&M ID (legacy) in a Excel workbook or poam-item-uuid (preferred)
+in an OSCAL-based POA&M.
+
+ a "provided-by" link with a URI fragment that points to the
+"system" component representing the leveraged system. (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
+
+
+
The "leveraged-authorization-uuid" property must NOT be present, as this is how
+tools are able to distinguish between authorized and non-authorized services
+from the same leveraged provider.
+
+
Where relevant, this component should also have:
+
+
At least one responsible-role that indicates the authorized userswith a role-id of "leveraged-authorization-users" and exactly
+one or more party-uuid entries that indicates which users within this system may
+interact with the leveraged systeme.
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+their system (such as in an OSCAL-based CRM).
+
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+required.
+
The following fields from the Leveraged Authorization Table are handled in the
+leveraged-authorization assembly:
+
+
Package ID, Authorization Type, Impact Level
+
+
+
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+their system (such as in an OSCAL-based CRM).
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+required.
+
+
The following fields from the Leveraged Authorization Table are handled in the
+leveraged-authorization assembly:
+
- Package ID, Authorization Type, Impact Level
+
+
The following fields from the Leveraged Authorization Table are handled in the
+"system" component assembly:
+
- Nature of Agreement, CSP Name
+
+
An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+
+
+
+
+
+ Other Cloud SaaS
+
+
An external system to which this system shares an interconnection.
+
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method.
+
If 'no', explain why no authentication is used.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Each interconnection to one or more remote systems must have:
+
+
a "system" component (this component)
+
an "interconnection" component
+
+
Each "system" component must have:
+
+
an "asset-type" property with a value of "saas", "paas", "iaas" or "other"
+
an "implementation-point" property with a value of "external"
+
a "status" field with a state value of "operational"
+
if an interconnection exists with this system and there are
+remote listening ports, one or more "protocol" assemblies must
+be provided.
+
+
While not required, each "system" component should have:
+
+
an "inherited-uuid" property if the value was provided by the system owner
+
a "compliance" property/extension if appropriate
+
an "authorizing-official" responsible-role
+
an "system-owner" responsible-role
+
an "system-poc-management" responsible-role
+
an "system-poc-technical" responsible-role
+
+
Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP
+properties/extensions for these roles, instead favor the core OSCAL
+responsible-roles constructs, and the NIST-standard roles of
+"authorizing-official", "system-owner", "system-poc-management
+and "system-poc-technical"
+
+
+
+
+
+ [EXAMPLE]Authorized Connection Information System Name
+
+
Describe the purpose of the external system/service; specifically, provide reasons
+for connectivity (e.g., system monitoring, system alerting, download updates, etc.)
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method in the remarks.
+
If 'no', explain why no authentication is used in the remarks.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+
+
+
+
+
+
+
+
+
+
Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
Each interconnection to one or more remote systems must have:
+
+
one "system" component for each remote system sharing the connection
+
an "interconnection" component (this component)
+
+
Each "interconnection" component must have:
+
+
an "implementation-point" property with a value of "external"
+
a "status" field with a state value of "operational"
+
one or two "direction" properties
+
a "nature-of-agreement" property/extension
+
one or more "authentication-method" properties/extensions.
+
a "hosting-environment" proptery/extension
+
at least one local ipv4 address, ipv6 address or URI via the appropriate property, with the class set to "local"
+
at least one remote ipv4 address, ipv6 address or URI via the appropriate property, with the class set to "remote"
+
at least one "protocol" field with the name set to "local" or "remote" depending on which side is "listening" on the identified ports.
+
at least one "agreement" link with an href vlue that refers to a back-matter resource containing the interconnection security agreemnet (ISA)
+
exactly one "used-by" link with an href value that refers to the "this-system" component.
+
one or more "used-by" links with href values that refer to each "system" component representing a remote system sharing the connection.
+
exactly one "provider" responsible role that references the party information for the organization the provides the connection.
+
+
Authentication methods must address both system-authentication as well as
+user authentication mechanisms.
+
Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
+
If the interconnection travels across the public Internet, the provider may be the cloud hosting provider or the Internet provider
+
+
While not required, each "interconnection" component should have:
+
+
an "inherited-uuid" property if the value was provided by the system owner
+
a "compliance" property/extension if appropriate
+
an "system-poc-management" responsible-role
+
an "system-poc-technical" responsible-role
+
+
Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP
+properties/extensions for these roles, instead favor the core OSCAL
+responsible-roles constructs, and the NIST-standard roles of
+"system-poc-management" and "system-poc-technical". With an interconnection,
+the system POC roles reference parties that represent the connection provider.
For each external system with which this system connects:
+
Must have a "system" component (this component).
+
Must have an "interconnection" component that connects this component with the
+"this-system" component.
+
+ If the leveraged system owner provides a UUID for their system (such as in an
+OSCAL-based CRM), it should be reflected in the
+ inherited-uuid
+ property.
+
+
Must include all leveraged services and features from the leveraged authorization
+here.
+
For an external system, the "implementation-point" property must always be present
+with a value of "external".
+
Each interconnection must be defined with both an "system" component and an
+"interconnection" component.
+
Must include all leveraged services and features from the leveraged authorization
+here.
+
+
+
+
+ Service C
+
+
A service provided by an external system other than the leveraged system.
+
Describe the service and what it is used for.
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method in the remarks.
+
If 'no', explain why no authentication is used in the remarks.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+
+
+
+
+
+
+
This can only be known if provided by the leveraged system.
+such as via an OSCAL-based CRM, component definition,
+or as a result to the leveraged system's OSCAL-based SSP.
- IMPORTANT: Due to a known error in core OSCAL (versions =1.1.2) constraints,
+this property is blocked from proper use.
+
- a status with a state value of "operational"
+
+
Where relevant, this component should also have:
+
- One or more "information-type" properties, where the allowed values are the 800-63
+information type identifiers.
+
- A responsible-role with a role-id of "leveraged-authorization-users" and exactly
+one or more party-uuid entries that indicates which users within this system may
+interact with the leveraged systeme.
+
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+their system (such as in an OSCAL-based CRM).
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+required.
+
+
The following fields from the Leveraged Authorization Table are handled in the
+leveraged-authorization assembly:
+
- Package ID, Authorization Type, Impact Level
+
+
The following fields from the Leveraged Authorization Table are handled in the
+"system" component assembly:
+
- Nature of Agreement, CSP Name
+
+
An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+
+
+
+
+ Service C
+
+
A service provided by an external system other than the leveraged system.
+
Describe the service and what it is used for.
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method in the remarks.
+
If 'no', explain why no authentication is used in the remarks.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+
+
+
+
+
Either describe a risk associated with this service, or indicate there is no identified risk.
+
If there is no risk, please explain your basis for that conclusion.
+
+
+
+
+
If there are one or more identified risks, describe any resulting impact.
+
+
+
+
+
If there are one or more identified risks, describe any mitigating factors.
This is a service provided by an external system other than the leveraged system.
+
- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
+
As a result, the "leveraged-authorization-uuid" property is not applicable and must
+NOT be used.
+
All services require the "implementation-point" property. In this case, the property
+value is set to "external.
+
All external services would normally require a "provided-by" link; however, a known
+bug in core OSCAL syntax prevents the use of this property at this time.
+
+ If the leveraged system owner provides a UUID for their service (such as in an
+OSCAL-based CRM), it should be reflected in the
+ inherited-uuid
+ property.
+
+
+
+
+
+ Management CLI
+
+
None
+
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method in the remarks.
+
If 'no', explain why no authentication is used in the remarks.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+
+
+
+
+
+
+
Either describe a risk associated with this CLI, or indicate there is no identified risk.
+
If there is no risk, please explain your basis for that conclusion.
+
+
+
+
+
If there are one or more identified risks, describe any resulting impact.
+
+
+
+
+
If there are one or more identified risks, describe any mitigating factors.
This links to a FIPS 140-2 validated software component that is used by this
+inventory item. This type of linkage to a validation through the component is
+preferable to the link[rel='validation'] example above.
COMMENTS: If needed, provide additional information about this inventory item.
+
+
+
+
+
None.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
None.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
None.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
None.
+
+
+
+
+
+
+
+
+
+
Asset wasn't running at time of scan.
+
+
+
+
+
+
+
None.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
None.
+
+
+
+
+
+
+
+
+
+
Asset wasn't running at time of scan.
+
+
+
+
+
+
+
Email-Service
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Appendix A - FedRAMP SSP Rev5 Template
+
This description field is required by OSCAL.
+
FedRAMP does not require any specific information here.
+
+
+
+
+
+
+ Merger or acquisition, change in leadership, update to regulatory requirements, system upgrade or replacement, or significant security incident.
+
+
+ Events that would trigger a review and update of the current access control policy include: changes in the organizational structure, modifications to system or application configurations, updates to user roles or responsibilities, or the occurrence of a security incident or breach.
+
+
+ Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ System Administrators, Network Engineers, and Security Personnel
+
+
+ All employees, contractors, and third-party users with access to organizational systems and data.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+
+
+
Describe how Part a is satisfied within the system.
+
Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+
In this case, a link must be provided to the policy.
+
FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
Describe any customer-configured requirements for satisfying this control.
+
+
+
+ quarterly for privileged access, annually for non-privileged access
+
+
+ userid, password, role, job function.
+
+
+ 8 hours
+
+
+ 8 hours
+
+
+ 24 hours
+
+
+ Privileged Access Administrator, Cybersecurity Operations Center (CSOC) Team Lead
+
+
+ Account Management Policy: All requests for account creation, modification, or removal must be submitted through the IT Service Desk and approved by the system owner. Account creations require a valid business need and a completed Account Request Form. Accounts will be disabled after 90 days of inactivity and removed after 180 days. Modifications to accounts must be documented and approved by the system owner. Accounts will be enabled or disabled based on user role and job function.
+
+
+ System Owners, Information System Security Officers (ISSOs), and Authorizing Officials
+
+
+ Example value: "username, password, account-type, expiration-date, access-level, department, job-function
+
+
+ AC-02(01): Group and role membership prerequisites and criteria are defined as follows: (i) group membership requires approval by a designated manager; (ii) role membership requires completion of a background check and a minimum of 6 months of employment with the organization.
+
+
+ 11111111-2222-4000-8000-004000000010
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
The component-uuid above points to the this system component.
+
Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.
+
This can also be used to provide a summary, such as a holistic overview of how multiple components work together.
+
While the this system component is not explicitly required within every statement, it will typically be present.
+
+
+
+
+
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
+
+
+
+
Optional description.
+
Consumer-appropriate description of what may be inherited as provided by the leveraged system.
+
In the context of this component in satisfaction of AC-2, part a.
+
The provided-uuid links this to the same statement in the leveraged system's SSP.
+
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+
+
+
+
+
Description of how the responsibility was satisfied.
+
The responsibility-uuid links this to the same statement in the leveraged system's SSP.
+
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+
Tools should use this to ensure all identified customer responsibility statements have a corresponding satisfied statement in the leveraging system's SSP.
+
+
+
+
+
+
+ merger with another company, change in regulatory requirements, or major system upgrade
+
+
+ Annually
+
+
+ Examples of events that would require the current awareness and training policy to be reviewed and updated include: major changes to organizational policies or procedures, changes to relevant laws or regulations, personnel changes, or significant security incidents.
+
+
+ Every 2 years
+
+
+ The Chief Information Security Officer (CISO) is appointed to oversee and manage the awareness and training policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ All employees, contractors, and third-party users with access to organizational systems and data.
+
+
+ All employees, contractors, and third-party users with access to organization's information systems
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Modification to system access controls, changes to data repositories, or alterations to business processes
+
+
+ Annually
+
+
+ Changes to relevant laws or regulations, changes to the organization's mission or business operations, changes to audit or accountability policies, or discovery of unauthorized access or data breaches.
+
+
+ Every 2 years
+
+
+ The Chief Information Security Officer (CISO) is designated as the official responsible for managing the audit and accountability policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Chief Information Security Officer, Information System Security Manager, and all personnel with access to the system
+
+
+ CEO, CISO, IT Managers, System Administrators, and All Users with Privileged Access
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+
+
+
+
+ Modification of security policies, changes to system architecture, or updates to system components.
+
+
+ Annually
+
+
+ Changes to laws or regulations, updates to system/software, or changes to organizational policies or procedures.
+
+
+ Every 2 years
+
+
+ The Chief Information Security Officer (CISO) is designated as the official responsible for managing the assessment, authorization, and monitoring policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ System Administrators, Information Security Officers, and IT Managers
+
+
+ Chief Information Security Officer (CISO), IT Managers, System Administrators, and Security Team Members
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Merger or acquisition, major system upgrade, or change in regulatory requirements.
+
+
+ Annually
+
+
+ Examples of events that would require the current configuration management policy to be reviewed and updated include: changes in organizational structure, new system or application deployments, changes in regulatory requirements, and major network infrastructure upgrades.
+
+
+ Every 2 years
+
+
+ The Configuration Management Officer
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ System Administrators, Network Engineers, and Database Managers
+
+
+ System Administrators, IT Managers, and Developers
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+ merger/acquisition, changes in leadership, new regulations, or major system updates
+
+
+ Annually
+
+
+ Example value for this parameter:"Events that would trigger a review and update of the contingency planning policy include: (1) changes to organizational structure or leadership, (2) significant changes to information systems or business processes, (3) a major security incident or breach, (4) a change in regulatory or compliance requirements, or (5) a significant change in the organization's risk profile.
+
+
+ Every 2 years
+
+
+ Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Contingency Planning Team, Information System Security Officer (ISSO), IT Director
+
+
+ Contingency Planning Team, IT Director, Senior Management
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+
+ Within 4 hours of a disaster declaration, the organization will resume mission and business functions.
+
+
+ all
+
+
+
+
+
The organization plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation.
The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).
The organization identifies primary and alternate telecommunications services supporting the system and documents provider contingency plans and recovery time objectives to ensure the availability of telecommunication services.
The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+
+ param-value xmlns="http://csrc.nist.gov/ns/oscal/1.0" param-id="cp-09.08_odp" All sensitive data is backed up daily to an encrypted external hard drive and stored offsite, with access limited to authorized personnel./param-value
+
+
+
+
+
The organization provides a means to restore system functions without loading backups (e.g., through system reinstallation).
+
+
+
+
+
+
+ merger or acquisition, change in organizational structure, or update to identity and access management system
+
+
+ Annually
+
+
+ Examples of events that would trigger a review and update of the current identification and authentication policy include: - Change in organizational structure or personnel - Introduction of new systems or applications - Change in user roles or access levels - Security incidents or breaches - Upgrade or modification to existing systems or applications - Changes in regulatory or legal requirements
+
+
+ Every 2 years
+
+
+ Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ System Administrators, Network Engineers, and Cybersecurity Team Members
+
+
+ System Administrators, Network Engineers, Security Team, and All New Hires
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+
+
+
+
+ Example events: merger or acquisition, new regulatory requirements, changes in organizational structure, introduction of new technology, etc.
+
+
+ Annually
+
+
+ The current incident response policy will be reviewed and updated in response to the following events: - Changes to relevant laws or regulations;- Significant changes to the organization's mission, goals, or objectives;- Significant changes to the organization's business or operational environment;- Identification of material weaknesses or deficiencies in the incident response process;- Occurrence of a major incident or crisis;- Changes to the incident response team membership or roles;- Completion of incident response plan testing and exercises;- Receipt of feedback from stakeholders or interest parties;- Discovery of new threats, vulnerabilities, or risks.
+
+
+ Every 2 years
+
+
+ CISO (Chief Information Security Officer) is designated as the official responsible for managing the incident response policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Incident Response Team, IT Operations Team, and Management Team.
+
+
+ Incident Response Team, IT Manager, Security Officer, Compliance Officer.
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Events such as changes to system hardware or software, changes to the organization's mission or business processes, or changes to relevant laws or regulations.
+
+
+ Every 12 months.
+
+
+ Here is an example value for this parameter:"change in organizational goals or objectives, changes in legislation or regulations, failure of a critical system or component, significant changes to information systems or infrastructure, emergence of new threats or vulnerabilities
+
+
+ Every 2 years
+
+
+ The Chief Information Security Officer (CISO) is designated as the official responsible for managing the maintenance policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Network Administrators, System Engineers, and IT Managers
+
+
+ System Administrators, Network Engineers, and Cybersecurity Team Leads
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+
+ Organizational maintenance records shall include: (i) date and time of maintenance activity, (ii) description of maintenance performed, (iii) identity of personnel performing maintenance, and (iv) maintenance activity results.
+
+
+ All sensitive data, including Personally Identifiable Information (PII), financial information, and confidential business data, must be removed from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement.
+
+
+ System Administrators, IT Managers, and Authorized Maintenance Personnel
+
+
+
+
+
The organization:
+
+
+ System Administrators, Security Administrators
+
+
+ at least annually
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
a. Approves and monitors nonlocal maintenance and diagnostic activities;
+
b. Documents and monitors maintenance and diagnostic activities;
+
c. Requires that nonlocal maintenance and diagnostic activities be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or
+
d. Removes the component to be serviced from the system prior to nonlocal maintenance or diagnostic services.
a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
+
b. Ensures that non-escorted personnel performing maintenance on the system possess the required access authorizations; and
+
c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+
+ Procurement of alternate firewall devices to be implemented in the event that the primary firewall cannot be sanitized or removed from the system.
+
+
+
+
+
The organization:
+
a. Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:
+
+
Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;
+
Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and
+
+
b. Develops and implements alternate security safeguards in the event a system component cannot be sanitized, removed, or disconnected from the system.
+
+
+
+
+
+
+ changes to media handling policies, incidents resulting in data breaches, or updates to relevant regulations
+
+
+ Annually
+
+
+ Changes in organizational policies, changes in regulatory requirements, changes in technology used for data storage and transmission, and changes in the threat landscape.
+
+
+ Every 24 months
+
+
+ The Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Chief Information Security Officer (CISO), Information System Security Officer (ISSO), and Media Protection Team
+
+
+ All employees, contractors, and third-party vendors who handle sensitive information or have access to organizational media.
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Examples of significant events that would trigger a review and update of physical and environmental protection procedures include: relocation of facilities, changes in organizational structure, new equipment or system deployments, natural disasters, or major security breaches.
+
+
+ Annually
+
+
+ The organization recognizes the following events that would require the current physical and environmental protection policy to be reviewed and updated: changes in regulatory requirements, incidents resulting in physical damage or data breaches, significant changes in the organization's physical infrastructure or operations, and changes in senior leadership or organizational structure.
+
+
+ every 2 years
+
+
+ Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Facility Security Officer, IT Manager, and Data Center Administrators
+
+
+ All personnel with access to company facilities or systems, including employees, contractors, and third-party vendors.
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ MERGER_ACQUISITION, CHANGE_IN_BUSINESS_PROCESS, NEW_REGULATORY_REQUIREMENT, SOFTWARE_UPGRADE, CHANGE_IN_ORGANIZATIONAL_STRUCTURE
+
+
+ Annually
+
+
+ Change in senior leadership, merger or acquisition, significant changes to business operations, introduction of new technologies, or changes to relevant laws and regulations.
+
+
+ Every 2 years
+
+
+ The Chief Information Security Officer (CISO) is designated as the official to oversee the planning policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Chief Information Security Officer (CISO), IT Director, System Administrators, and Data Owners
+
+
+ Chief Information Officer, IT Department, and System Administrators
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Modification to personnel access, changes to security policies, or updates to personnel roles and responsibilities.
+
+
+ Annual
+
+
+ Change in federal regulations, newly identified threats, major system changes, or changes in personnel roles or responsibilities.
+
+
+ Every 2 years
+
+
+ The Chief Security Officer (CSO) is designated as the official responsible for managing the personnel security policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ All personnel with access to classified information, including system administrators, developers, and quality assurance testers.
+
+
+ All employees, contractors, and third-party users with access to organizational systems and data.
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ merger or acquisition, changes in leadership, or major updates to critical systems or infrastructure
+
+
+ Annually
+
+
+ Merge or acquisition of another organization, changes to laws or regulations, significant changes to business operations or technology, identification of new threat sources or vulnerabilities, or changes to risk tolerance.
+
+
+ Every 2 years
+
+
+ The Chief Information Security Officer (CISO) is designated as the official responsible for managing the risk assessment policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Risk Assessment Team, Information System Security Officer, Chief Information Officer
+
+
+ Chief Information Security Officer (CISO), IT Director, and System Administrators
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Major software updates, changes in regulatory requirements, or alteration of system architecture.
+
+
+ Annually
+
+
+ merger/acquisition, changes in regulatory requirements, new technology adoption, major system upgrades, or changes in organizational mission/objectives.
+
+
+ Every 2.5 years
+
+
+ The Chief Information Officer (CIO) has been designated as the official responsible for managing the system and services acquisition policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ System Administrators, Information Security Officers, and Acquisition Team Leads.
+
+
+ System Administrators, Network Engineers, and IT Managers
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ events": ["merger or acquisition", "change in leadership", "new regulatory requirements", "system upgrade or migration", "security incident or breach"]
+
+
+ Annually
+
+
+ Examples of events that would trigger a review and update of the current system and communications protection policy include: (1) changes in business strategy or operations; (2) changes in the threat landscape or risk environment; (3) significant changes to the system or network architecture; (4) new regulatory or compliance requirements; or (5) discovery of a security incident or breach.
+
+
+ Every 2 years
+
+
+ Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business-process-level, system-level
+
+
+ System Administrators, Network Engineers, and Cybersecurity Team Members
+
+
+ System Administrators, Cybersecurity Team, and IT Managers
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Modification to system architecture, changes to user access, or updates to security software
+
+
+ Annually
+
+
+ Events that would require the current system and information integrity policy to be reviewed and updated include: changes to legal or regulatory requirements, changes to organizational policies or procedures, changes to system or network architecture, discovery of a security incident, or failure of a system or component.
+
+
+ Every 2 years
+
+
+ The Chief Information Officer (CIO) is designated as the official responsible for managing the system and information integrity policy and procedures.
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ System Administrators, Network Engineers, Cybersecurity Team, and Information System Owners.
+
+
+ System Administrators, Network Engineers, Incident Responders, and all personnel with privileged access.
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+
+
+
+
+ Merger or acquisition of a supplier company, change in ownership of a supplier company, or a significant change in a supplier's business practices.
+
+
+ Annually on January 1st
+
+
+ Events that trigger a review and update of the current supply chain risk management policy include: changes to organizational policies or procedures; changes to supplier relationships or contracts; occurrence of a supply chain risk event or incident; changes to relevant laws, regulations, or industry standards; and material changes to the organization's products or services.
+
+
+ Every 2 years
+
+
+ Chief Information Security Officer (CISO)
+
+
+ organization-level, mission/business process-level, system-level
+
+
+ Chief Information Security Officer (CISO), Procurement Officer, and IT Managers
+
+
+ System Administrators, Network Engineers, Procurement Officers, and Supply Chain Managers
+
+
+ 11111111-2222-4000-8000-004000000011
+
+
+
+
+
Describe how the control is satisfied within the system.
+
+
+ at least every 3 years
+
+
+ at least annually
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
For the portion of the control satisfied by the service provider, describe how the control is met.
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Interior points within the system where communications traffic is to be analyzed include all network switches, routers, and servers.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Authenticators must be at least 12 characters long, contain at least one uppercase letter, one lowercase letter, one number, and one special character.
+
+
+ Every 90 days.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example value: "Automated incident response tools, such as SIEM systems and incident response platforms, are utilized to streamline incident response processes and provide real-time incident response information to support personnel.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ IT Security Team, Compliance Officer, and System Administrators
+
+
+ High-risk: 30 days, Moderate-risk: 90 days, Low-risk: 180 days
+
+
+ Weekly, with a minimum of quarterly comprehensive scans, and randomly on a monthly basis to ensure adequate coverage.
+
+
+ Weekly vulnerability scans of all Internet-facing systems and quarterly vulnerability assessments of hosted applications.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The decision points in the system development life cycle when a criticality analysis is to be performed are defined as: (1) during the initiation phase, prior to allocating resources; (2) during the development phase, upon completion of system design; and (3) during the implementation phase, prior to deploying the system to production.
+
+
+ All externally-facing web applications, database servers, and email services.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ 15 minutes
+
+
+ initiating a device lock after of inactivity, requiring the user to initiate a device lock before leaving the system unattended
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Key generation, distribution, storage, access, and destruction requirements are defined in accordance with FIPS 140-2 and supplemented by NIST Special Publication 800-57.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ types of cryptography value AES for data at rest, RSA for digital signatures, and SHA-256 for data integrity.
+
+
+ cryptographic uses value All data transmitted over the network, authentication, and digital signatures.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ All contracts with cloud service providers include clauses that require the provider to notify us within 24 hours of a security incident, and to provide us with a detailed incident report within 72 hours.
+
+
+ standardized contract language,
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The system development life cycle at our organization is defined as: "The organization follows a iterative development methodology that includes the following stages: planning, requirements, design, implementation, testing, deployment, and maintenance. Each stage includes specific activities, reviews, and approvals to ensure that systems are developed in a secure and efficient manner.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Our organization's certificate policy is based on the X.509v3 standard, and is defined in the document 'Certificate Policy and Certification Practice Statement' (Version 1.2, dated 2022-01-01), which outlines the rules and practices for issuing, managing, and revoking public key certificates.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ ISSO, System Administrators, and IT Managers
+
+
+ actions value p When system documentation is unavailable, the system administrator will attempt to contact the documentation owner for retrieval or recreation. If documentation is nonexistent, the system administrator will create new documentation based on system analysis and testing, and obtain approval from the system owner.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Exceptions for remote activation are allowed for authorized IT personnel during non-business hours for the purpose of performing critical system maintenance.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example: The organization utilizes automated mechanisms such as Active Directory and scripts to manage system accounts, including automatic disabling and removal of inactive accounts.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Daily
+
+
+ as needed,
+
+
+ System Administrators, Incident Responders, and IT Managers
+
+
+ Security Operations Center (SOC) personnel receive real-time monitoring information from the SIEM system, including alerts, logs, and performance metrics.
+
+
+ The organization uses a combination of automated tools and manual reviews to identify unauthorized use of the system, including log analysis, network traffic monitoring, and periodic access reviews.
+
+
+ Monitor system logs for unusual activity, detect and respond to brute-force login attempts, and alert on suspicious network traffic patterns.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Isolate affected systems and networks, and activate incident response team to contain and eradicate the anomaly.
+
+
+ shut the system down, restart the system,
+
+
+ System Administrators, Information Security Officer, Chief Information Security Officer
+
+
+ Monthly
+
+
+ _system startup: initial boot sequence, system initialization, and login prompt; system restart: shutdown, reboot, and restart from hibernation or sleep mode_
+
+
+ , upon command by user with appropriate privilege,
+
+
+ privacy functions privacy functions to be verified for correct operation are defined; value The system's data encryption, access controls, and data anonymization functions are verified for correct operation.
+
+
+ security functions value The following security functions are defined for correct operation: authentication, authorization, data encryption, and access control.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example value: List of external organizations: Internet Engineering Task Force (IETF), Open Web Application Security Project (OWASP), SANS Internet Storm Center (ISC)
+
+
+ Network Operations Center (NOC), IT Department, Incident Response Team, and System Administrators
+
+
+ Chief Information Security Officer (CISO), IT Manager, System Administrators, and Cybersecurity Team Leads
+
+
+ , ,
+
+
+ US-CERT, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), Federal Bureau of Investigation (FBI)
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Privacy engineering principles are defined as fairness, transparency, and accountability, ensuring personal data is processed in a way that is respectful of individuals' autonomy and privacy, and that privacy risks are identified and mitigated throughout the system development lifecycle.
+
+
+ Systems security engineering principles are defined as ensuring confidentiality, integrity, and availability of data throughout the system development lifecycle.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Types of external systems prohibited from use are: Public Cloud Services, Personal Email Services, and Social Media Platforms.
+
+
+ The organization has asserted that the following controls are implemented on external systems: AC-20(1), AC-20(2), and AC-20(3), which are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems.
+
+
+ Terms and conditions for external connections require written agreements, including mutual nondisclosure agreements, that explicitly define the responsibilities and obligations of each party, and ensure compliance with organizational security policies and procedures.
+
+
+ establish , identify
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The organization uses a collaboration platform that provides automated access requests and approvals, as well as a data categorization tool that helps users determine the appropriate level of access for collaborators.
+
+
+ Defined circumstances include: mission partners requiring access to sensitive information for collaborative operations, foreign nationals requiring access to classified information for joint research projects, and emergency responders needing access to restricted information during crisis situations.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Establish a continuous monitoring program that includes regular security assessments, vulnerability scanning, and compliance monitoring of external systems where Federal information is processed or stored, with quarterly reporting to FedRAMP PMO.
+
+
+ FedRAMP Moderate Baseline controls are implemented for the external system.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ IT Change Advisory Board (CAB)
+
+
+ The organization's privacy representatives include the Chief Privacy Officer, the Data Protection Officer, and the System Security Officer.
+
+
+ Members of the IT Security Team, including the Chief Information Security Officer (CISO) and IT Security Analysts, who are responsible for reviewing and approving changes to the system.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Implementation of new firewall rules, updates to access control lists, and modifications to system configuration files.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Conduct quarterly red team exercises to simulate attempts by adversaries to compromise organizational systems, including phishing, social engineering, and network penetration testing, with the goal of identifying vulnerabilities and improving incident response capabilities.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Every 6 hours
+
+
+ System startup, system shutdown, user login, user logout, data transfer, or filesystem modifications
+
+
+ at startup, at ,
+
+
+ information value Data files stored on the Finance Server
+
+
+ Every 30 days.
+
+
+ Initial power-up, firmware updates, and reset to factory defaults.
+
+
+ at startup, at ,
+
+
+ firmware value The BIOS firmware and all firmware updates
+
+
+ Every 30 days
+
+
+ System initialization, system shutdown, and software updates
+
+
+ at startup, at ,
+
+
+ _all Windows 10 operating system files and Microsoft Office application files_
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The organization requires shared accounts for emergency response teams to access critical infrastructure systems during high-severity incidents, as justified by the Incident Response Policy (IRP-001) and approved by the Chief Information Security Officer (CISO).
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example value: The organization's security information and event management (SIEM) system is configured to automatically generate incident reports for all detected security events, including unauthorized access attempts, malware detections, and system crashes.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Implement access controls such as biometric authentication, smart cards, and PINs to restrict physical access to system distribution and transmission lines within the organizational facility.
+
+
+ All electrical substations, transmission towers, and distribution lines with voltage ratings of 100kV or higher.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ publicly accessible systems
+
+
+ locations where the system is to be restricted are defined; for example, data centers, server rooms, or other areas with sensitive information or equipment.
+
+
+ information processing, information or data, system services
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Every 90 days
+
+
+ Every 90 days
+
+
+ Annually
+
+
+ _example value:_ "Biometric scanners, proximity card readers, and keypad locks
+
+
+ All visitors to the server room must be escorted by authorized personnel at all times.
+
+
+ badge-reader system with 24/7 monitoring and secure doors
+
+
+ All exterior doors and gates, including the main entrance, emergency exit doors, and loading dock doors.
+
+
+ Biometric scanners and turnstiles at all entrances and exits
+
+
+ , guards
+
+
+ Main entrance at 123 Main St, emergency exit at rear of building, and loading dock entrance at alleyway.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Supply Chain Process and Controls Document v1.2, dated 2022-01-01
+
+
+ security and privacy plans, supply chain risk management plan,
+
+
+ The organization implements supply chain controls to protect against supply chain risks, including: (i) vendor risk assessments and due diligence; (ii) contractual requirements for vendors to implement security controls; (iii) vendor monitoring and oversight; and (iv) incident response planning to limit the harm or consequences from supply chain-related events.
+
+
+ Procurement Officer, Logistics Manager, and Chief Information Security Officer
+
+
+ system or system componentThe organization's public-facing web application.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Every 12 months
+
+
+ All company-owned servers, workstations, and network devices; all cloud-based services, including Amazon Web Services and Microsoft Azure; all outsourced IT services, including email and help desk support.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ controls value Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are implemented to prevent unauthorized code execution in system memory.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ All server and workstation assets within the organization's network.
+
+
+ Windows Defender Advanced Threat Protection (ATP), Linux Auditd, and Mac OS X Audit
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Ensure all tools and configurations comply with GDPR Article 25 (Data Protection by Design and by Default) and implement adequate measures to protect sensitive customer data.
+
+
+ FedRAMP Moderate baseline security requirements, including access controls, awareness and training, audit and accountability, security assessment and authorization, configuration management, contingency planning, incident response, maintenance, media protection, personnel security, physical and environmental protection, planning, program management, risk assessment, system and services acquisition, system and communications protection, and system and information integrity.
+
+
+ Annually
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Split tunneling is provisioned using a VPN with multi-factor authentication, encrypted traffic, and access controls that restrict user access to authorized networks and systems.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ 3-tiers of impact analysis, including organizational, system, and data level assessments
+
+
+ Enterprise-wide, including all critical assets and business processes
+
+
+ The decision points in the system development life cycle are defined as: 1) Conceptualization, 2) Requirements definition, 3) Design, 4) Implementation, 5) Testing, 6) Deployment, and 7) Maintenance.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ local, remote, network
+
+
+ All company-owned laptops, desktops, and mobile devices, as well as any personally-owned devices connecting to the company network, must be uniquely identified and authenticated before establishing a connection.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ controls Access to sensitive information is restricted to authorized personnel with a need-to-know; all documents and materials are labeled with classification markings and handling instructions.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ scripted-parameterparam-id cm-02.02_odp/param-idPuppet configuration management tool is used to maintain the baseline configuration of all system components./scripted-parameter
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ controls values value Upon return from travel, individuals must undergo a 14-day quarantine, and their devices must be scanned for malware and wiped clean before being allowed to connect to the organizational network.s
+
+
+ configurations value Laptop: Enable firewall, encrypt data, and update antivirus software; Mobile Device: Enable encryption and remote wipe
+
+
+ Laptops, mobile devices, and portable storage media.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ At least annually
+
+
+ Internal connections are terminated when a system or application is decommissioned, or when a security incident is detected.
+
+
+ ["Firewall", "Router", "Web Server", "Database Server"]
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The Chief Information Officer (CIO), Chief Information Security Officer (CISO), and Facility Managers.
+
+
+ John Doe, Incident Response Team Lead; Jane Smith, Incident Response Specialist; Bob Johnson, IT Manager.
+
+
+ Incident Response Team, IT Department, Facilities Management, Executive Management, and Security Team.
+
+
+ Incident Response Team Lead, Cyber Security Manager, Network Operations Center (NOC) Team
+
+
+ Chief Information Security Officer (CISO), IT Director, and members of the Incident Response Team (IRT)
+
+
+ Annually
+
+
+ Incident Response Team Lead, Information Systems Security Officer (ISSO), Chief Information Security Officer (CISO)
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Laptops, mobile devices, USB drives, and external hard drives.
+
+
+ Laptops, mobile devices, USB drives, and external hard drives.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Monthly
+
+
+ Chief Information Security Officer (CISO), System Owners, and Privacy Officers
+
+
+ Weekly
+
+
+ Information System Security Officer (ISSO), Information System Owner (ISO), Authorizing Official (AO)
+
+
+ The organization assesses control effectiveness at the following frequencies: annually, quarterly, and monthly.
+
+
+ Daily, weekly, monthly, quarterly, and annually.
+
+
+ CPU utilization, memory usage, disk usage, network bandwidth, and system response time.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example value: "Firewall rules, VPN access, and multi-factor authentication are defined for all alternate work sites.
+
+
+ alternate work sites include employee homes, coffee shops, and coworking spaces approved by management.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ system(s) or system components value The organization's public-facing web application, backend database, and network infrastructure
+
+
+ at least annually
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Data Center Room 101, near east and west exits, labeled as 'Emergency Power Shutoff' and protected by a locked cover.
+
+
+ Main electrical panels, generators, and critical system servers.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Actions include notification of the incident response team, isolation of affected systems, and restoration of systems and data from approved backups or sources; all actions are documented and reviewed by the incident response team leader.
+
+
+ Immediately notify the incident response team and disconnect the affected system from the network to prevent further unauthorized changes.
+
+
+ Upon detection of unauthorized changes to software, the following actions will be taken: 1) notify the Chief Information Security Officer (CISO) and system owners immediately; 2) isolate the affected system from the network; 3) conduct a thorough investigation to determine the scope and impact of the change; 4) restore the system to a known good state; and 5) document the incident and implement additional controls to prevent similar incidents in the future.
+
+
+ SI-07 information requiring integrity verification tools includes, but is not limited to, critical system files, executable code, and configuration files.
+
+
+ firmware value The firmware for the network devices requires the use of SHA-256 checksums to detect unauthorized changes.
+
+
+ Operating System software
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ controls value Physical access controls (e.g., locks, gates), Cryptographic controls (e.g., encryption), and Logical access controls (e.g., passwords, biometrics) are used to control system media outside of controlled areas.
+
+
+ 例: "Encryption, access controls, and physical locks are used to protect system media outside of controlled areas.
+
+
+ Hard drives, solid state drives, USB drives, CDs, DVDs, backup tapes, and mobile devices.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Data Center Room 301, Server Room 101, and Archives Room 202
+
+
+ Example value: "Server Room 101, Data Center 3, and Media Storage Closet 2
+
+
+ CDs, DVDs, USB drives, and external hard drives
+
+
+ Hard drives, solid-state drives, flash drives, magnetic tapes, CDs, DVDs, Blu-ray discs, and external hard drives.
+
+
+ CDs, DVDs, USB flash drives, and printed documents
+
+
+ Hard drives, solid state drives, USB drives, CDs, DVDs, and tapes.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Data Center Room 101 and Server Room 202
+
+
+ USB drives, CDs, and DVDs used for authorized workstations within restricted access areas
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ tests value Vulnerability scanning, penetration testing, and simulation exercises are used to test the effectiveness of the incident response capability for the system.
+
+
+ Annually
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Examples of restricted media include: USB flash drives, CD-ROMs, and floppy disks.
+
+
+ Here is an example value for this parameter:"MP-07 OD P.03: Laptops, Mobile Devices, and External Storage Devices
+
+
+ restrict
+
+
+ Flash drives, CDs, DVDs, and external hard drives are restricted from use on systems or system components without explicit authorization from the IT department.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ sanitization techniques and procedures sanitization techniques and procedures to be used for sanitization prior to release for reuse are defined; value The organization uses the following sanitization techniques: (i) overwriting, (ii) degaussing, and (iii) physical destruction, as outlined in NIST Special Publication 800-88.
+
+
+ Data sanitization techniques and procedures include: (1) overwrite sanitization using a minimum of three passes; (2) degaussing for magnetic media; and (3) physical destruction for all other media.
+
+
+ sanitization techniques and procedures: NIST 800-88 Guidelines for Media Sanitization; Degaussing and physically destroying all storage media prior to disposal.
+
+
+ All system media, including hard drives and solid-state drives, shall be sanitized prior to release for reuse using a National Institute of Standards and Technology (NIST)-approved method, such as overwrite or degaussing.
+
+
+ All system media, including hard drives, solid state drives, and external storage devices, must be sanitized using a NIST-approved method (e.g. DoD 5220.22-M) prior to release from organizational control.
+
+
+ All magnetic and solid-state media must be sanitized using NIST 800-88 guidelines prior to disposal.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Unexplained system crashes, unusual network traffic patterns, or alerts from security information and event management (SIEM) systems.
+
+
+ Every 90 days
+
+
+ at random, at , upon
+
+
+ systems or system components value All network devices, servers, and databases.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The organization defines and documents techniques and methods for disposing of data, documentation, tools, or system components, including but not limited to secure erase procedures, physical destruction, and responsible e-waste disposal.
+
+
+ Hard drives, outdated software, and sensitive documents stored in the archival room.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ at least annually and upon any change to user's level of access
+
+
+ At least annually
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Every 6 months.
+
+
+ Individuals are required to be rescreened under the following conditions: * When there is a change in their job duties or responsibilities that alters their level of access to sensitive information or systems. * When there is a change in their employment status, such as a promotion or transfer to a different department. * When they have been absent from work for an extended period of time (e.g., more than 6 months).
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ 24 hours
+
+
+ System Administrators, Information Security Officers, and Department Managers
+
+
+ 24 hours
+
+
+ Transfer of sensitive data to a new system administrator is initiated within 24 hours of role change; Reassignment of access privileges to a new team member is completed within 3 business days of role change.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The Chief Information Security Officer (CISO) and the System Administrators.
+
+
+ inappropriate or unusual activity is defined as multiple failed login attempts from a single IP address within a 1-hour time frame.
+
+
+ Every Sunday at 2 AM
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Upon audit logging process failure, restart the logging process and overwrite the oldest record when storage capacity is exceeded, and notify the IT department via email and SMS.
+
+
+ within 1 hour of audit logging process failure
+
+
+ Security Operations Center (SOC) team, IT Operations Manager, and Chief Information Security Officer (CISO)
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The organization defines events that trigger the change or refreshment of authenticators, including: password expiration every 60 days, account lockout after 3 unsuccessful login attempts, and reset of authenticators following a reported instance of phishing or unauthorized access.
+
+
+ 60 days for passwords, 90 days for smart cards, 1 year for biometric authenticators
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Annually and whenever there is a change in the threat environment.
+
+
+ daily for login attempts, real-time for privileged access, and on-change for system configuration modifications
+
+
+ Login attempts, Disk space usage, Network traffic, System crashes, Unauthorized access
+
+
+ Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, system events, administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, permission changes
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ value Retain audit logs for at least 1 year, with a minimum of 3 months online and 9 months offline
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Within 4 hours
+
+
+ Mission critical systems, including email and database servers, will be prioritized for restart in the event of a system failure to ensure continued operation of essential business functions.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Daily incremental backups with weekly full backups.
+
+
+ Daily incremental backups at 2am and weekly full backups every Sunday at 3am.
+
+
+ Daily incremental backups, weekly full backups on Sundays at 2:00 AM
+
+
+ system components value database servers, email servers, file servers, and virtual machines
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Within 4 hours and 2 hours, respectively, to ensure minimal disruption to business operations.
+
+
+ System operations for essential mission and business functions are defined as follows: 1) Data processing and storage, 2) Network infrastructure maintenance, and 3) Cybersecurity threat monitoring and response.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ tests value The organization conducts a tabletop exercise to test the contingency plan every 6 months, and a full-scale exercise every 12 months.
+
+
+ tests value The contingency plan will be tested every 6 months to ensure its effectiveness in restoring operations within 24 hours of an incident.
+
+
+ Annually
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ IT Department, HR Department, and Executive Management Team
+
+
+ John Smith (IT Director), Jane Doe (Network Administrator), and all members of the Incident Response Team
+
+
+ Annually
+
+
+ Chief Information Officer, Chief Information Security Officer, IT Department, and Emergency Response Team
+
+
+ John Doe (IT Director), Jane Smith (Chief Information Security Officer), Bob Johnson (Network Administrator)
+
+
+ Chief Information Officer (CIO), Chief Information Security Officer (CISO), IT Director
+
+
+ IT Manager, Chief Information Security Officer, Incident Response Team Lead
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Events necessitating review and update of contingency training include: changes to system components, updates to threat intelligence, changes in laws or regulations, and changes to business operations or processes.
+
+
+ at least annually
+
+
+ Annually
+
+
+ Within 6 months of assuming a contingency role or responsibility.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ All hard drives, solid state drives, and removable storage media used to store Federal data or system data classified as High or Moderate impact levels.
+
+
+ all sensitive user data and financial information transmitted over the internet
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Unexpected DNS queries, unauthorized access to sensitive data, or unusual network packet sizes
+
+
+ Every 15 minutes, with a minimum of 4 hours of log storage, to ensure timely detection and response to potential security incidents.
+
+
+ Examples of unusual or unauthorized activities or conditions to be monitored in inbound communications traffic include: * Unsolicited incoming messages from unknown sources; * Unusual protocols or packet structures; * Inbound traffic on unused or closed ports; * Traffic from countries or IP addresses known to be associated with cyber threats; * Traffic that exceeds predefined bandwidth or frequency thresholds.
+
+
+ Every 15 minutes during peak hours and every 60 minutes during non-peak hours.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Help Desk, incident response team, and system owners
+
+
+ disable network access by unauthorized components, isolate unauthorized components, notify
+
+
+ Every 24 hours.
+
+
+ Automated mechanisms include weekly scans by the firmware integrity tool to detect any unauthorized firmware changes.
+
+
+ Automated mechanisms include weekly sweeps using a commercial off-the-shelf (COTS) software inventory tool to detect and report on unauthorized software.
+
+
+ automated mechanismsp automated mechanisms used to detect the presence of unauthorized hardware within the system are defined; value Network-based intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) are used to detect unauthorized hardware.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Events requiring updated role-based training content include: changes to job responsibilities, updates to regulatory requirements, and notification of security incidents.
+
+
+ Annually
+
+
+ at least annually
+
+
+ roles and responsibilities value The following roles are defined for role-based privacy training: Chief Privacy Officer (CPO), Privacy Officer, System Administrators, and Data Analysts. Responsibilities include: CPO: overall program management; Privacy Officer: training development and delivery; System Administrators: technical support; Data Analysts: data validation and reporting.
+
+
+ CEO - oversees security training program, CISO - develops security training content, IT Manager - schedules security training sessions, Employees - participate in security training
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example value: "Changes to organizational policies, new phishing scams, and updates to regulatory requirements.
+
+
+ Annually
+
+
+ Security awareness training sessions, phishing simulation exercises, and regular security bulletin notifications are employed to increase the security and privacy awareness of system users.
+
+
+ The following events require privacy literacy training for system users: annual security awareness training, onboarding for new employees, and role changes that involve access to sensitive data.
+
+
+ Password reset, suspicious email reporting, and incident response
+
+
+ at least annually
+
+
+ At least every 6 months, with additional training provided as needed based on changes to the system or environment.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Employee roles, clearance levels, and user IDs for access to confidential data repositories.
+
+
+ Firewall rules, intrusion detection, and authentication modules integrated into the device's firmware to ensure secure access and protect against unauthorized access.
+
+
+ Example value: "Authentication, Authorization, and Accounting (AAA) services using multi-factor authentication and role-based access control.
+
+
+ _smart cards, Trusted Platform Modules (TPMs), and Hardware Security Modules (HSMs)_
+
+
+ System Administrators, Security Officers, and Audit Team Members
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Medium: system components and connections are described, including network diagrams and data flows.
+
+
+ The system design document, which includes architecture diagrams and component specifications, is available and up-to-date, and is stored in the company's document management system.
+
+
+ security-relevant external system interfaces, high-level design, low-level design, source code or hardware schematics,
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ FTP, Telnet, and Rlogin.
+
+
+ The following software applications are deemed unnecessary or non-secure and will be disabled or removed: Flash, Java, and Autorun.
+
+
+ Telnet, FTP, RDP on non-standard ports, and any other unencrypted or outdated protocols.
+
+
+ UDP 161, TCP 21, TCP 23.
+
+
+ Telnet, FTP, and TFTP.
+
+
+ Annually
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Company-wide software usage policy document, which outlines acceptable use of productivity software, prohibits personal use of company-issued devices, and requires all employees to sign an annual acknowledgment of understanding.
+
+
+ , rules authorizing the terms and conditions of software program usage
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ _example value_: "User acknowledges acceptance of terms and conditions, agrees to comply with organizational policies, and is warned about consequences of unauthorized access.
+
+
+ This system is for authorized use only. All activities are monitored and recorded. By accessing this system, you acknowledge that you have read and understood the terms of use and privacy policy.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Disable account for 30 minutes and require admin approval for reactivation
+
+
+ 3 minutes
+
+
+ 30 minutes
+
+
+ lock the account or node for , lock the account or node until released by an administrator, delay next logon prompt per , notify system administrator, take other
+
+
+ 30 minutes
+
+
+ 5
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ AC-04_odp_example: "All internal and external connections to the system require authentication and authorization, and data is encrypted in transit to ensure information flow control policies are enforced.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Acceptance criteria for vulnerability analysis evidence includes: (i) identification of all vulnerabilities with a CVSS score of 7.0 or higher, (ii) documentation of vulnerability mitigation strategies, and (iii) verification of remediation actions.
+
+
+ Acceptance criteria for threat modeling evidence: The produced evidence must demonstrate a clear and concise identification of potential threats, a thorough analysis of threat vectors, and a comprehensive risk assessment that aligns with the organization's risk management framework.
+
+
+ The organization conducts vulnerability analyses on all external-facing systems and applications, as well as on all systems and applications that process sensitive data, with a depth of analysis that includes reconnaissance, scanning, and penetration testing.
+
+
+ The breadth and depth of threat modeling to be conducted is defined as follows: Identify and analyze high-impact, high-likelihood threats to the system, focusing on critical components, data flows, and interfaces, with a minimum of 10 use cases and 20 potential vulnerabilities to be evaluated.
+
+
+ tools and methods value The organization employs OpenVAS for vulnerability scanning and Microsoft Threat Modeling Tool for threat modeling and analysis.
+
+
+ Confidentiality of customer data, operating in a public cloud environment, potential threat from nation-state actors, and a risk tolerance of $100,000 per incident.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Example value: "Employees working from home require remote access to the company's confidential database for project development.
+
+
+ System administrators require remote access to execute privileged commands for troubleshooting and maintenance of production systems.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Script-based configuration verification using PowerShell Desired State Configuration (DSC) to ensure consistency across all system components.
+
+
+ Puppet, Ansible, or Microsoft System Center Configuration Manager (SCCM) are used to define and apply configuration settings.
+
+
+ automated mechanisms value Puppet or Ansible scripts are used to define and manage configuration settings for all systems.
+
+
+ All production servers, network devices, and databases.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ benchmarks the benchmarks for taking corrective actions are defined; value The following metrics are used to measure the effectiveness of corrective actions: Mean Time To Detect (MTTD), Mean Time To Respond (MTTR), and Mean Time To Resolve (MTTR).
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ supply chain risk management activities value The organization's supply chain risk management activities include: (i) Supplier risk assessments; (ii) Contract language updates; and (iii) Ongoing monitoring and reporting.
+
+
+ The supply chain risk management team consists of: - John Doe, Supply Chain Risk Manager, responsible for overall strategy and management of supply chain risks;- Jane Smith, Supply Chain Risk Analyst, responsible for identifying, assessing, and mitigating supply chain risks;- Bob Johnson, IT Security Specialist, responsible for ensuring the security of supply chain information systems;- Procurement Team, responsible for ensuring that supply chain contracts include provisions for supply chain risk management.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Upon change of IT system design or architecture, upon installation of new software or hardware, upon change of organizational policies or procedures, or upon identification of a security incident or vulnerability.
+
+
+ At least annually and when a significant change occurs.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Public, Sensitive, Confidential, Top Secret
+
+
+ Network segmentation using VLANs, firewalls, and access control lists (ACLs) to separate sensitive information flows from non-sensitive information flows.
+
+
+ mechanisms and/or techniques value VLANs, Subnets, and Access Control Lists (ACLs)
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Every 30 days
+
+
+ information deemed necessary to achieve effective system component accountability is defined; value System logs, network traffic records, and user access history are defined as necessary information for effective system component accountability.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ deviations to standard operating procedures require approval from the Chief Operations Officer, and must be documented with justification and risk assessment, with approval granted only in exceptional circumstances.
+
+
+ All production servers, network devices, and databases requiring configuration changes or updates.
+
+
+ common secure configurations value The organization's secure configuration guidelines require all Windows 10 laptops to have BitLocker encryption enabled, Windows Defender set to scan for malware daily, and the firewall configured to only allow incoming HTTPS traffic.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Changes to system software or firmware, modifications to network architecture, or updates to system interfaces that affect system functionality or security.
+
+
+ Quarterly.
+
+
+ , when
+
+
+ The Change Management Committee, chaired by the IT Director, is responsible for coordinating and overseeing change control activities.
+
+
+ At least 3 years after the change has been approved and implemented.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ methods of validation and verification value p The organization uses government-issued ID cards, biometric authentication, and knowledge-based authentication to validate and verify identity evidence. Specifically, the following methods are used: (i) government-issued ID cards are verified against a trusted database; (ii) biometric authentication uses fingerprint recognition with a minimum acceptable match probability of 0.99; and (iii) knowledge-based authentication uses a minimum of three questions with a minimum acceptable answer accuracy of 80%.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ information value The location of classified data and sensitive intellectual property is defined as follows: p Data centers in Reston, VA and San Jose, CA; backup storage facilities in Chicago, IL and Dallas, TX.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Daily
+
+
+ methods used to enforce software installation policies are defined as: whitelisting, blacklisting, and digital signatures.
+
+
+ Only authorized personnel are permitted to install software on company devices, and all software installations must be approved by the IT department in advance.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ controls by type of denial-of-service event controls to achieve the denial-of-service objective by type of denial-of-service event are defined; value list id="dos-controls"item Flow-based attacks (e.g., TCP SYN flood)/itemitem Vulnerability-based attacks (e.g., buffer overflow)/itemitem Application-based attacks (e.g., HTTP GET flood)/item /list
+
+
+ protect against
+
+
+ ICMP (ping) flood, SYN flood, slowloris, buffer overflow attack, volume attack, teardrop attack, smurf attack, and ping of death.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ The conditions of the JAB/AO in the FedRAMP Repository include ensuring the system meets all FedRAMP moderate impact level security requirements, as defined in the FedRAMP Security Assessment Framework.
+
+
+ value ACME Corporation's Enterprise Resource Planning System
+
+
+ Coalfire, Schellman & Co.
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Daily
+
+
+ , prior to a new scan, when new vulnerabilities are identified and reported
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ mobile devices value All Company-owned and personal mobile devices used for business purposes, including smartphones and laptops.
+
+
+ full-device encryption
+
+
+
+
+
+
+
+ 11111111-0000-4000-9000-000000000001
+
+
+
+
+
+
+
+
+ Restrictions on the use of organization-controlled portable storage devices include: only authorized personnel are allowed to use organization-controlled portable storage devices on external systems; portable storage devices must be encrypted and password-protected; and portable storage devices must be scanned for malware before being connected to an external system.
+
+
+
+
+
This should be referenced in the
+system-characteristics/authorization-boundary/diagram/link/@href flag using a value
+of "#11111111-2222-4000-8000-001000000054"
+
+ May use
+ rlink
+ with a relative path, or embedded as
+ base64
+ .
+
+
FedRAMP prefers base64 for images and diagrams.
+
Images must be in sufficient resolution to read all detail when rendered in a browser
+via HTML5.
+
+
+
+ Network Diagram
+
+
The primary network diagram.
+
+
+
+
+ 00000000
+
+
Section 8.1, Figure 8-2 Network Diagram (graphic)
+
This should be referenced in the
+system-characteristics/network-architecture/diagram/link/@href flag using a value of
+"#11111111-2222-4000-8000-001000000055"
+
+ May use
+ rlink
+ with a relative path, or embedded as
+ base64
+ .
+
+
FedRAMP prefers base64 for images and diagrams.
+
Images must be in sufficient resolution to read all detail when rendered in a browser
+via HTML5.
+
+
+
+ Data Flow Diagram
+
+
The primary data flow diagram.
+
+
+
+ 00000000
+
+
Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
+
This should be referenced in the system-characteristics/data-flow/diagram/link/@href
+flag using a value of "#11111111-2222-4000-8000-001000000056"
+
+ May use
+ rlink
+ with a relative path, or embedded as
+ base64
+ .
+
+
FedRAMP prefers base64 for images and diagrams.
+
Images must be in sufficient resolution to read all detail when rendered in a browser
+via HTML5.
CSP-specific citation. Note the "type" property's class is "law"
+and the value is "citation".
+
+
+
+ CSP Acronyms
+
+
+
+
CSP-specific citation. Note the "type" property's class is "acronyms"
+and the value is "citation".
+
+
+
+ CSP Reference
+
+
+
+
CSP-specific reference. Note the "type" property's class is "reference"
+and the value is "citation".
+
+
+
+ Separation of Duties Matrix
+
+
Separation of Duties Matrix
+
+
+
+
+
+ 00000000
+
+
+ May use
+ rlink
+ with a relative path, or embedded as
+ base64
+ .
+
+
+
+
+
\ No newline at end of file
diff --git a/src/validations/constraints/content/ssp-poam-link-has-resource-fragment-INVALID.xml b/src/validations/constraints/content/ssp-poam-link-has-resource-fragment-INVALID.xml
new file mode 100644
index 000000000..4369ec4b7
--- /dev/null
+++ b/src/validations/constraints/content/ssp-poam-link-has-resource-fragment-INVALID.xml
@@ -0,0 +1,132 @@
+
+
+
+
+ This System
+
+
This component represents the entire authorization boundary,
+ as depicted in the system authorization boundary diagram.
+
FedRAMP requires exactly one "this-system" component, which is used
+ in control implementation responses and interconnections.
+
+
+
+
A FedRAMP SSP must always have exactly one "this-system" component
+ that represents the whole system.
+
It does not need system details, as those exist elsewhere in this SSP.
The "provider" role is required for the component representing
+ a leveraged system. It must reference exactly one party
+ (via party-uuid), which points to a party of type "organization"
+ representing the organization that owns the leveraged system.
+
+
+
+
+
+
+
+
This is a leveraged system within which this system operates.
+ It is explicitly listed on the FedRAMP marketplace with a status of
+ "FedRAMP Authorized".
+
Requirements
+
Each leveraged system must be expressed as a "system" component, and must have:
+
+
the name of the system in the title - exactly as it appears in the FedRAMP
+ Marketplace
+
a "leveraged authorization-uuid" core property that links this component to the
+ leveraged-authorization entry
+
an "implementation-point" core property with a value of "external"
+
A "nature-of-agreement" property/extension with an appropriate allowed value. If the value is
+ "other", use the proeprty's remarks to descibe the agreement.
+
an "authentication-method" property/extension with a value of "yes", "no" or
+ "not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+ llowed values are the 800-63
+ information type identifiers.
+
A "provider" responsible-role with exactly one party-uuid entry
+ that indicates which organization is the provider of this leveraged system.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+ users. This must have one or more "privilege-uuid" property/extensions. Each references
+ a user assembly entry.
+
+
+
Where relevant, this component should also have:
+
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+ their system (such as in an OSCAL-based CRM).
+
+
+
Links to the vendor website describing the system are encouraged, but not required.
+
Services
+
A service within the scope of the leveraged system's authorization boundary
+ is considered an "authorized service". Any other service offered by the
+ leveraged system is considered a "non-authorized service"
+
Represent each authorized or non-authorized leveraged services using a
+ "service" component. Both authorized and non-authorized service components
+ are represented the same in OSCAL with the following exceptions:
+
+
The component for an authorized servcie includes a
+ "leveraged-authorization-uuid" property. This
+ property must be excluded from the component of a
+ non-authorized leveraged service.
+
The component for a non-authorized service must include
+ a "still-supported" property/extension.
+
The component for a non-authorized service must have
+ a "poam-item" link that references a corrisponding entry in this system's
+ POA&M.
+
+
Both authorized and non-authorized leveraged services include:
+
+
+ a "provided-by" link with a URI fragment that points
+ to the "system" component representing the leveraged system.
+ (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
the name of the service in the title (for authorized services this should be
+ exactly as it appears in the FedRAMP Marketplace
+
an "implementation-point" core property with a value of "external"
+
an "authentication-method" property/extension with a value of "yes", "no" or
+ "not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+ llowed values are the 800-63
+ information type identifiers.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+ users. This must have one or more "privilege-uuid" property/extensions. Each references
+ a user assembly entry.
+
+
Although SSP Table 7.1 also requires data categoriation and hosting
+ environment information about non-authorized leveraged services,
+ these datails are derived from other content in this SSP.
+
+
+
+
\ No newline at end of file
diff --git a/src/validations/constraints/content/ssp-poam-link-references-valid-resource-INVALID.xml b/src/validations/constraints/content/ssp-poam-link-references-valid-resource-INVALID.xml
new file mode 100644
index 000000000..137d01491
--- /dev/null
+++ b/src/validations/constraints/content/ssp-poam-link-references-valid-resource-INVALID.xml
@@ -0,0 +1,403 @@
+
+
+
+
+
+
+ AwesomeCloud Commercial(IaaS)
+
+
+
+
For now, this is a required field. In the future we intend
+ to pull this information directly from FedRAMP's records
+ based on the "leveraged-system-identifier" property's value.
+
+
+
+
+
For now, this is a required field. In the future we intend
+ to pull this information directly from FedRAMP's records
+ based on the "leveraged-system-identifier" property's value.
Use one leveraged-authorization assembly for each underlying authorized
+ cloud system or general support system (GSS).
+
For each leveraged authorization there must also be a "system" component.
+ The corrisponding "system" component must include a
+ "leveraged-authorization-uuid" property
+ that links it to this leveraged authorization.
The user assembly is being reviewed for continued applicability
+ under FedRAMP's adoption of Rev 5.
+
Currently, FedRAMP will only process user content if it includes the
+ FedRAMP "separation-of-duties-matrix" property/extension. All other user
+ entries will be ignored by validation rules, but may be displayed by tools.
The "provider" role is required for the component representing
+ a leveraged system. It must reference exactly one party
+ (via party-uuid), which points to a party of type "organization"
+ representing the organization that owns the leveraged system.
+
+
+
+
+
+
+
+
This is a leveraged system within which this system operates.
+ It is explicitly listed on the FedRAMP marketplace with a status of
+ "FedRAMP Authorized".
+
Requirements
+
Each leveraged system must be expressed as a "system" component, and must have:
+
+
the name of the system in the title - exactly as it appears in the FedRAMP
+ Marketplace
+
a "leveraged authorization-uuid" core property that links this component to the
+ leveraged-authorization entry
+
an "implementation-point" core property with a value of "external"
+
A "nature-of-agreement" property/extension with an appropriate allowed value. If the value is
+ "other", use the proeprty's remarks to descibe the agreement.
+
an "authentication-method" property/extension with a value of "yes", "no" or
+ "not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+ llowed values are the 800-63
+ information type identifiers.
+
A "provider" responsible-role with exactly one party-uuid entry
+ that indicates which organization is the provider of this leveraged system.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+ users. This must have one or more "privilege-uuid" property/extensions. Each references
+ a user assembly entry.
+
+
+
Where relevant, this component should also have:
+
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+ their system (such as in an OSCAL-based CRM).
+
+
+
Links to the vendor website describing the system are encouraged, but not required.
+
Services
+
A service within the scope of the leveraged system's authorization boundary
+ is considered an "authorized service". Any other service offered by the
+ leveraged system is considered a "non-authorized service"
+
Represent each authorized or non-authorized leveraged services using a
+ "service" component. Both authorized and non-authorized service components
+ are represented the same in OSCAL with the following exceptions:
+
+
The component for an authorized servcie includes a
+ "leveraged-authorization-uuid" property. This
+ property must be excluded from the component of a
+ non-authorized leveraged service.
+
The component for a non-authorized service must include
+ a "still-supported" property/extension.
+
The component for a non-authorized service must have
+ a "poam-item" link that references a corrisponding entry in this system's
+ POA&M.
+
+
Both authorized and non-authorized leveraged services include:
+
+
+ a "provided-by" link with a URI fragment that points
+ to the "system" component representing the leveraged system.
+ (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
the name of the service in the title (for authorized services this should be
+ exactly as it appears in the FedRAMP Marketplace
+
an "implementation-point" core property with a value of "external"
+
an "authentication-method" property/extension with a value of "yes", "no" or
+ "not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+ llowed values are the 800-63
+ information type identifiers.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+ users. This must have one or more "privilege-uuid" property/extensions. Each references
+ a user assembly entry.
+
+
Although SSP Table 7.1 also requires data categoriation and hosting
+ environment information about non-authorized leveraged services,
+ these datails are derived from other content in this SSP.
+
+
+
+
+ Service A
+
+
An authorized service provided by the Awesome Cloud leveraged authorization.
+
Describe the service and what it is used for.
+
+
+
+
+
+
+
+
+
+
+
+
+
This is a service offered by a leveraged system and used by this system.
+ It is explicitly listed on the FedRAMP marketplace as being included in the
+ scope of this leveraged system's ATO, thus is considered an "Authorized Service.
+
+
Each leveraged service must be expressed as a "service" component, and must have:
+
+
the name of the service in the title - exactly as it appears in the FedRAMP
+ Marketplace
+
a "leveraged authorization-uuid" property that links this component to the
+ leveraged-authorization entry
+
an "implementation-point" property with a value of "external"; and
+
+ a "provided-by" link with a URI fragment that points to the
+ "system" component representing the leveraged system. (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
+
+
Where relevant, this component should also have:
+
+
One or more "information-type" properties, where the allowed values are the 800-63
+ information type identifiers.
+
At least one responsible-role that indicates the authorized userswith a role-id of "leveraged-authorization-users" and exactly
+ one or more party-uuid entries that indicates which users within this system may
+ interact with the leveraged systeme.
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+ their system (such as in an OSCAL-based CRM).
+
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+ required.
+
The following fields from the Leveraged Authorization Table are handled in the
+ leveraged-authorization assembly:
+
+
Package ID, Authorization Type, Impact Level
+
+
+
The following fields from the Leveraged Authorization Table are handled in the
+ "system" component representing the leveraged system as a whole:
+
- Nature of Agreement, CSP Name
+
+
+
+
+
+
+ Service B
+
+
An non-authorized service provided by the Awesome Cloud leveraged authorization.
+
Describe the service and what it is used for.
+
+
+
+
+
+
+
+
+
If 'yes', describe the authentication method.
+
If 'no', explain why no authentication is used.
+
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This is a service offered by a leveraged system and used by this system.
+ It is NOT explicitly listed on the FedRAMP marketplace as being included
+ in the scope of the leveraged system's ATO, thus is treated as a
+ non-authorized, leveraged service.
+
+
Each non-authorized leveraged service must be expressed as a "service" component, and must have:
+
+
the name of the service in the title - exactly as it appears in the FedRAMP
+ Marketplace
+
an "implementation-point" property with a value of "external"; and
+
one or two "direction" prperty/extensions
+
One or more "information-type" property/extensions, where the allowed values are the 800-63
+ information type identifiers, and the cited types are included full list of system information types.
+
exactly one "poam-item" link, with an href value that references the
+ POA&M and a resource-fragment that represents the
+ POAM&M ID (legacy) in a Excel workbook or poam-item-uuid (preferred)
+ in an OSCAL-based POA&M.
+
+ a "provided-by" link with a URI fragment that points to the
+ "system" component representing the leveraged system. (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
+
+
+
The "leveraged-authorization-uuid" property must NOT be present, as this is how
+ tools are able to distinguish between authorized and non-authorized services
+ from the same leveraged provider.
+
+
Where relevant, this component should also have:
+
+
At least one responsible-role that indicates the authorized userswith a role-id of "leveraged-authorization-users" and exactly
+ one or more party-uuid entries that indicates which users within this system may
+ interact with the leveraged systeme.
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+ their system (such as in an OSCAL-based CRM).
+
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+ required.
+
The following fields from the Leveraged Authorization Table are handled in the
+ leveraged-authorization assembly:
+
+
Package ID, Authorization Type, Impact Level
+
+
+
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+ their system (such as in an OSCAL-based CRM).
+
Link(s) to the vendor's web site describing the service are encouraged, but not
+ required.
+
+
The following fields from the Leveraged Authorization Table are handled in the
+ leveraged-authorization assembly:
+
- Package ID, Authorization Type, Impact Level
+
+
The following fields from the Leveraged Authorization Table are handled in the
+ "system" component assembly:
+
- Nature of Agreement, CSP Name
+
+
An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+
+
+
+
+
+
\ No newline at end of file
diff --git a/src/validations/constraints/content/ssp-poam-resource-has-oscal-link-INVALID.xml b/src/validations/constraints/content/ssp-poam-resource-has-oscal-link-INVALID.xml
new file mode 100644
index 000000000..9e6bec172
--- /dev/null
+++ b/src/validations/constraints/content/ssp-poam-resource-has-oscal-link-INVALID.xml
@@ -0,0 +1,132 @@
+
+
+
+
+ This System
+
+
This component represents the entire authorization boundary,
+ as depicted in the system authorization boundary diagram.
+
FedRAMP requires exactly one "this-system" component, which is used
+ in control implementation responses and interconnections.
+
+
+
+
A FedRAMP SSP must always have exactly one "this-system" component
+ that represents the whole system.
+
It does not need system details, as those exist elsewhere in this SSP.
The "provider" role is required for the component representing
+ a leveraged system. It must reference exactly one party
+ (via party-uuid), which points to a party of type "organization"
+ representing the organization that owns the leveraged system.
+
+
+
+
+
+
+
+
This is a leveraged system within which this system operates.
+ It is explicitly listed on the FedRAMP marketplace with a status of
+ "FedRAMP Authorized".
+
Requirements
+
Each leveraged system must be expressed as a "system" component, and must have:
+
+
the name of the system in the title - exactly as it appears in the FedRAMP
+ Marketplace
+
a "leveraged authorization-uuid" core property that links this component to the
+ leveraged-authorization entry
+
an "implementation-point" core property with a value of "external"
+
A "nature-of-agreement" property/extension with an appropriate allowed value. If the value is
+ "other", use the proeprty's remarks to descibe the agreement.
+
an "authentication-method" property/extension with a value of "yes", "no" or
+ "not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+ llowed values are the 800-63
+ information type identifiers.
+
A "provider" responsible-role with exactly one party-uuid entry
+ that indicates which organization is the provider of this leveraged system.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+ users. This must have one or more "privilege-uuid" property/extensions. Each references
+ a user assembly entry.
+
+
+
Where relevant, this component should also have:
+
+
An "inherited-uuid" property if the leveraged system's owner provides a UUID for
+ their system (such as in an OSCAL-based CRM).
+
+
+
Links to the vendor website describing the system are encouraged, but not required.
+
Services
+
A service within the scope of the leveraged system's authorization boundary
+ is considered an "authorized service". Any other service offered by the
+ leveraged system is considered a "non-authorized service"
+
Represent each authorized or non-authorized leveraged services using a
+ "service" component. Both authorized and non-authorized service components
+ are represented the same in OSCAL with the following exceptions:
+
+
The component for an authorized servcie includes a
+ "leveraged-authorization-uuid" property. This
+ property must be excluded from the component of a
+ non-authorized leveraged service.
+
The component for a non-authorized service must include
+ a "still-supported" property/extension.
+
The component for a non-authorized service must have
+ a "poam-item" link that references a corrisponding entry in this system's
+ POA&M.
+
+
Both authorized and non-authorized leveraged services include:
+
+
+ a "provided-by" link with a URI fragment that points
+ to the "system" component representing the leveraged system.
+ (Example:
+ "#11111111-2222-4000-8000-009000100001"
+ )
+
+
the name of the service in the title (for authorized services this should be
+ exactly as it appears in the FedRAMP Marketplace
+
an "implementation-point" core property with a value of "external"
+
an "authentication-method" property/extension with a value of "yes", "no" or
+ "not-applicable" with commentary in the remarks.
+
One or more "information-type" property/extensions, where the a
+ llowed values are the 800-63
+ information type identifiers.
+
a status with a state value of "operational"
+
At least one responsible-role (other than "provider") that indicates any authorized
+ users. This must have one or more "privilege-uuid" property/extensions. Each references
+ a user assembly entry.
+
+
Although SSP Table 7.1 also requires data categoriation and hosting
+ environment information about non-authorized leveraged services,
+ these datails are derived from other content in this SSP.
+
+
+
+
\ No newline at end of file
diff --git a/src/validations/constraints/fedramp-external-allowed-values.xml b/src/validations/constraints/fedramp-external-allowed-values.xml
index 762dc6eac..7aab670da 100644
--- a/src/validations/constraints/fedramp-external-allowed-values.xml
+++ b/src/validations/constraints/fedramp-external-allowed-values.xml
@@ -24,12 +24,6 @@
-
- FedRAMP Data Sensitivity Classification
- Identifies the FedRAMP data sensitivity classification of the document.
- Controlled Unclassified Information
-
-
Attachment TypeIdentifies the type of attachment.
@@ -145,14 +139,7 @@
Identifies the FedRAMP version of the document.FedRAMP Version
-
-
- Information Type
- The class of an information type property categorizes the direction of the data flow relative to the system described in the SSP.
-
- An incoming data flow to the system for this information type
- An outgoing data flow from the system for this information type
-
+
Information Type
@@ -395,6 +382,12 @@
A service-level agreement between the CSP and the organization that owns the leveraged system.
+
+ FedRAMP Data Sensitivity Classification
+ Identifies the FedRAMP data sensitivity classification of the document.
+ Controlled Unclassified Information
+
+
Privilege LevelThe privilege level of the user.
diff --git a/src/validations/constraints/fedramp-external-constraints.xml b/src/validations/constraints/fedramp-external-constraints.xml
index d03778f96..a88ac6877 100644
--- a/src/validations/constraints/fedramp-external-constraints.xml
+++ b/src/validations/constraints/fedramp-external-constraints.xml
@@ -61,23 +61,30 @@
-
-
+
+
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+ Index of POAM Items
+ Index of all POAM items in the referenced POAM document
+
+ Statements implimented in SSPThis index includes all statements defined in a FedRAMP SSP
-
- Response Points Must Be Set
-
-
- All Response points defined in the baseline MUST have corresponding statements values in the SSP. Missing statement: ({@id}).
-
+
Parameters Implemented in SSPThis index includes all parameters in a FedRAMP SSP.
@@ -88,12 +95,7 @@
This index includes all parameters defined in the resolved profile catalog, imported by a FedRAMP SSP.
-
- Required Parameters Must Be Set
-
-
- A FedRAMP SSP must define all parameters for all controls from the imported baseline. The following parameters are defined in the baseline, but not properly set in the SSP: ({@id}).
-
+
No Aggregate Parameters in SSP
@@ -114,12 +116,35 @@
A FedRAMP SSP MUST have each component describing leveraged systems, interconnections, or authorized services identify a "provider" role that references one responsible party.
+
+ Additional Controls Implemented Not in Baseline
+ A FedRAMP SSP MUST NOT include extraneous controls outside of the FedRAMP baseline.
+
+
+ A FedRAMP SSP MUST NOT include extraneous controls outside of the FedRAMP baseline. Extraneous control: ({@control-id}).
+
+
+ Required Parameters Must Be Set
+
+
+ A FedRAMP SSP must define all parameters for all controls from the imported baseline. The following parameters are defined in the baseline, but not properly set in the SSP: ({@id}).
+
+
+
+
+ Response Points Must Be Set
+
+
+ All Response points defined in the baseline MUST have corresponding statements values in the SSP. Missing statement: ({@id}).
+
+
Import Profile has available documentA FedRAMP SSP MUST import a profile or catalog with a valid file or HTTP(S) address.
-
+
+ Import Profile resolves to Fedramp contentA FedRAMP SSP MUST import a profile or catalog of security controls to reference implemented requirements against those control(s).
@@ -127,36 +152,68 @@
A FedRAMP SSP MUST use a valid FedRAMP catalog to reference security controls. It MUST NOT reference controls from a non-FedRAMP catalog.
+
+ Incomplete Implemented Requirements
+ A FedRAMP SSP MUST contain an implemented requirement for each imported control.
+
+
+ A FedRAMP SSP MUST contain an implemented requirement for each imported control. Missing: ({@id}).
+
+
Leveraged Authorization Has Valid Impact LevelA FedRAMP SSP MUST define the appropriate FIPS-199 impact level (low, moderate, or high) for each leveraged authorization.
+
+ Component Has Implementation Point
+
+ A FedRAMP SSP with service components and CLI software components performing cross-boundary network communication MUST indicate exactly one time if the point of implementation is internal or external to the system.
+ Non-Provider Responsible Role References UserA FedRAMP SSP MUST have each component describing leveraged systems, interconnections, or authorized services reference at least one user with an authorized privilege and function performed via the "privilege-uuid" property.
+
+
+ Component Has POAM Link
+ Each interconnection, service, or software connecting to external systems must have exactly one POAM item link.
+
+ Each interconnection, service, or software connecting to external systems MUST have exactly one POAM item link.
+
+
+ POAM Item Exists
+ The referenced POAM item must exist within the correct POAM document.
+
+
+ The POAM item referenced by resource-fragment ({@resource-fragment}) MUST exist within the POAM document.
+
+
+ POAM Link Has Resource Fragment
+ Each POAM link must include a non-empty resource fragment.
+
+ Each POAM link MUST include a non-empty resource fragment identifier.
+
+
+ POAM Link References Valid Resource
+ Each POAM link must reference the system's POAM resource by UUID.
+
+ Each POAM link MUST reference the system's POAM resource using its UUID ({substring-after(@href, '#')}) should be ({ $poam-resource/@uuid}).
+
+
+ SSP Has POAM Link
+ Each SSP MUST have a link to a valid OSCAL POAM
+
+ Each FEDRAMP SSP MUST have a link to a valid OSCAL POAM.
+
+
-
- Incomplete Implemented Requirements
- A FedRAMP SSP MUST contain an implemented requirement for each imported control.
-
-
- A FedRAMP SSP MUST contain an implemented requirement for each imported control. Missing: ({@id}).
-
-
- Additional Controls Implemented Not in Baseline
- A FedRAMP SSP MUST NOT include extraneous controls outside of the FedRAMP baseline.
-
-
- A FedRAMP SSP MUST NOT include extraneous controls outside of the FedRAMP baseline. Extraneous control: ({@control-id}).
-
@@ -189,6 +246,12 @@
A FedRAMP SSP MUST have a Contingency Plan attached.
+
+ Has POAM Resource
+ The back-matter must contain a POAM resource.
+
+ The SSP back-matter MUST contain a POAM resource.
+ Has Rules Of Behavior
@@ -224,7 +287,7 @@
Despite the flexibility of NIST's upstream OSCAL models, FedRAMP only accepts OSCAL-based SSPs with the reference in one of those locations, see missing-response-components for more details about this requirement.
A constraint violation with this warning indicates a given SSP uses one of the valid locations for all NIST use cases, but not the only FedRAMP required location.
-
+
By-Component Reference for Implemented Requirements Missing
@@ -579,6 +642,11 @@
Each authentication method in a FedRAMP SSP MUST have a remarks field.
+
+ Component Has Used-By Link
+
+ A FedRAMP SSP's component MUST identify which other components use it via network communication. Component "{ @uuid }" exposes ports for other components to connect, but does not identify which components use it.
+ System Implementation Has Inventory Items
@@ -609,16 +677,6 @@
All network components in a FedRAMP SSP system implementation MUST define at least one interconnection security property.
-
- Component Has Implementation Point
-
- A FedRAMP SSP with service components and CLI software components performing cross-boundary network communication MUST indicate exactly one time if the point of implementation is internal or external to the system.
-
-
- Component Has Used-By Link
-
- A FedRAMP SSP's component MUST identify which other components use it via network communication. Component "{ @uuid }" exposes ports for other components to connect, but does not identify which components use it.
- Unique Asset IdentifierEnsure each inventory item has a unique asset-id property.
@@ -739,5 +797,4 @@
-
diff --git a/src/validations/constraints/unit-tests/has-poam-resource-FAIL.yaml b/src/validations/constraints/unit-tests/has-poam-resource-FAIL.yaml
new file mode 100644
index 000000000..54c63ae69
--- /dev/null
+++ b/src/validations/constraints/unit-tests/has-poam-resource-FAIL.yaml
@@ -0,0 +1,7 @@
+test-case:
+ name: Negative Test for has-poam-resource
+ description: This test case validates the behavior of constraint has-poam-resource
+ content: ../content/ssp-has-poam-resource-INVALID.xml
+ expectations:
+ - constraint-id: has-poam-resource
+ result: fail
diff --git a/src/validations/constraints/unit-tests/has-poam-resource-PASS.yaml b/src/validations/constraints/unit-tests/has-poam-resource-PASS.yaml
new file mode 100644
index 000000000..bf2688845
--- /dev/null
+++ b/src/validations/constraints/unit-tests/has-poam-resource-PASS.yaml
@@ -0,0 +1,7 @@
+test-case:
+ name: Positive Test for has-poam-resource
+ description: This test case validates the behavior of constraint has-poam-resource
+ content: ../../../content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+ expectations:
+ - constraint-id: has-poam-resource
+ result: pass
diff --git a/src/validations/constraints/unit-tests/import-profile-resolves-to-fedramp-content-FAIL.yaml b/src/validations/constraints/unit-tests/import-profile-resolves-to-fedramp-content-FAIL.yaml
index 1df8a5efa..1c5fc5326 100644
--- a/src/validations/constraints/unit-tests/import-profile-resolves-to-fedramp-content-FAIL.yaml
+++ b/src/validations/constraints/unit-tests/import-profile-resolves-to-fedramp-content-FAIL.yaml
@@ -3,7 +3,8 @@ test-case:
description: >-
This test case validates the behavior of constraint
import-profile-resolves-to-fedramp-content
- content: ../content/ssp-import-profile-resolves-to-fedramp-content-INVALID.xml
+ content:
+ - ../content/ssp-import-profile-has-available-document-INVALID.xml
expectations:
- constraint-id: import-profile-resolves-to-fedramp-content
result: fail
diff --git a/src/validations/constraints/unit-tests/network-component-has-implementation-point-FAIL.yaml b/src/validations/constraints/unit-tests/network-component-has-implementation-point-FAIL.yaml
index b14db64a5..961205e8f 100644
--- a/src/validations/constraints/unit-tests/network-component-has-implementation-point-FAIL.yaml
+++ b/src/validations/constraints/unit-tests/network-component-has-implementation-point-FAIL.yaml
@@ -8,6 +8,4 @@ test-case:
- ../content/ssp-network-component-has-implementation-point-INVALID-2.xml
expectations:
- constraint-id: network-component-has-implementation-point
- fail_count:
- type: "exact"
- value: 2
\ No newline at end of file
+ result: fail
diff --git a/src/validations/constraints/unit-tests/ssp-component-has-poam-link-FAIL.yaml b/src/validations/constraints/unit-tests/ssp-component-has-poam-link-FAIL.yaml
new file mode 100644
index 000000000..4a94dfce0
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-component-has-poam-link-FAIL.yaml
@@ -0,0 +1,7 @@
+test-case:
+ name: Negative Test for component-has-poam-link
+ description: This test case validates the behavior of constraint component-has-poam-link
+ content: ../content/ssp-component-has-poam-link-INVALID.xml
+ expectations:
+ - constraint-id: ssp-component-has-poam-link
+ result: fail
diff --git a/src/validations/constraints/unit-tests/ssp-component-has-poam-link-PASS.yaml b/src/validations/constraints/unit-tests/ssp-component-has-poam-link-PASS.yaml
new file mode 100644
index 000000000..88d51e6a0
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-component-has-poam-link-PASS.yaml
@@ -0,0 +1,7 @@
+test-case:
+ name: Positive Test for component-has-poam-link
+ description: This test case validates the behavior of constraint component-has-poam-link
+ content: ../../../content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+ expectations:
+ - constraint-id: ssp-component-has-poam-link
+ result: pass
diff --git a/src/validations/constraints/unit-tests/ssp-poam-item-exists-FAIL.yaml b/src/validations/constraints/unit-tests/ssp-poam-item-exists-FAIL.yaml
new file mode 100644
index 000000000..8e31adabc
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-item-exists-FAIL.yaml
@@ -0,0 +1,7 @@
+test-case:
+ name: Negative Test for poam-item-exists
+ description: This test case validates the behavior of constraint poam-item-exists
+ content: ../content/ssp-poam-item-exists-INVALID.xml
+ expectations:
+ - constraint-id: ssp-poam-item-exists
+ result: fail
diff --git a/src/validations/constraints/unit-tests/ssp-poam-item-exists-PASS.yaml b/src/validations/constraints/unit-tests/ssp-poam-item-exists-PASS.yaml
new file mode 100644
index 000000000..3c8ce2044
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-item-exists-PASS.yaml
@@ -0,0 +1,7 @@
+test-case:
+ name: Positive Test for poam-item-exists
+ description: This test case validates the behavior of constraint poam-item-exists
+ content: ../../../content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+ expectations:
+ - constraint-id: ssp-poam-item-exists
+ result: pass
diff --git a/src/validations/constraints/unit-tests/ssp-poam-link-has-resource-fragment-FAIL.yaml b/src/validations/constraints/unit-tests/ssp-poam-link-has-resource-fragment-FAIL.yaml
new file mode 100644
index 000000000..01627b838
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-link-has-resource-fragment-FAIL.yaml
@@ -0,0 +1,9 @@
+test-case:
+ name: Negative Test for poam-link-has-resource-fragment
+ description: >-
+ This test case validates the behavior of constraint
+ poam-link-has-resource-fragment
+ content: ../content/ssp-poam-link-has-resource-fragment-INVALID.xml
+ expectations:
+ - constraint-id: ssp-poam-link-has-resource-fragment
+ result: fail
diff --git a/src/validations/constraints/unit-tests/ssp-poam-link-has-resource-fragment-PASS.yaml b/src/validations/constraints/unit-tests/ssp-poam-link-has-resource-fragment-PASS.yaml
new file mode 100644
index 000000000..4434fcec9
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-link-has-resource-fragment-PASS.yaml
@@ -0,0 +1,9 @@
+test-case:
+ name: Positive Test for poam-link-has-resource-fragment
+ description: >-
+ This test case validates the behavior of constraint
+ poam-link-has-resource-fragment
+ content: ../../../content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+ expectations:
+ - constraint-id: ssp-poam-link-has-resource-fragment
+ result: pass
diff --git a/src/validations/constraints/unit-tests/ssp-poam-link-references-valid-resource-FAIL.yaml b/src/validations/constraints/unit-tests/ssp-poam-link-references-valid-resource-FAIL.yaml
new file mode 100644
index 000000000..15972fdfe
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-link-references-valid-resource-FAIL.yaml
@@ -0,0 +1,9 @@
+test-case:
+ name: Negative Test for poam-link-references-valid-resource
+ description: >-
+ This test case validates the behavior of constraint
+ poam-link-references-valid-resource
+ content: ../content/ssp-poam-link-references-valid-resource-INVALID.xml
+ expectations:
+ - constraint-id: ssp-poam-link-references-valid-resource
+ result: fail
diff --git a/src/validations/constraints/unit-tests/ssp-poam-link-references-valid-resource-PASS.yaml b/src/validations/constraints/unit-tests/ssp-poam-link-references-valid-resource-PASS.yaml
new file mode 100644
index 000000000..820e97b84
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-link-references-valid-resource-PASS.yaml
@@ -0,0 +1,9 @@
+test-case:
+ name: Positive Test for poam-link-references-valid-resource
+ description: >-
+ This test case validates the behavior of constraint
+ poam-link-references-valid-resource
+ content: ../../../content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+ expectations:
+ - constraint-id: ssp-poam-link-references-valid-resource
+ result: pass
diff --git a/src/validations/constraints/unit-tests/ssp-poam-resource-has-oscal-link-FAIL.yaml b/src/validations/constraints/unit-tests/ssp-poam-resource-has-oscal-link-FAIL.yaml
new file mode 100644
index 000000000..4c5fa014e
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-resource-has-oscal-link-FAIL.yaml
@@ -0,0 +1,9 @@
+test-case:
+ name: Negative Test for poam-resource-has-oscal-link
+ description: >-
+ This test case validates the behavior of constraint
+ poam-resource-has-oscal-link
+ content: ../content/ssp-poam-resource-has-oscal-link-INVALID.xml
+ expectations:
+ - constraint-id: ssp-poam-resource-has-oscal-link
+ result: fail
diff --git a/src/validations/constraints/unit-tests/ssp-poam-resource-has-oscal-link-PASS.yaml b/src/validations/constraints/unit-tests/ssp-poam-resource-has-oscal-link-PASS.yaml
new file mode 100644
index 000000000..7646c82d0
--- /dev/null
+++ b/src/validations/constraints/unit-tests/ssp-poam-resource-has-oscal-link-PASS.yaml
@@ -0,0 +1,9 @@
+test-case:
+ name: Positive Test for poam-resource-has-oscal-link
+ description: >-
+ This test case validates the behavior of constraint
+ poam-resource-has-oscal-link
+ content: ../../../content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml
+ expectations:
+ - constraint-id: ssp-poam-resource-has-oscal-link
+ result: pass
diff --git a/src/validations/styleguides/fedramp-constraint-style.xml b/src/validations/styleguides/fedramp-constraint-style.xml
index 0fe0080b7..5afd3f66c 100644
--- a/src/validations/styleguides/fedramp-constraint-style.xml
+++ b/src/validations/styleguides/fedramp-constraint-style.xml
@@ -9,22 +9,30 @@
-
-
-
+
+
+
+
+
+
+
+
+ Single Metapath Target Must Be Unique
+
+ A context element with a single metapath MUST NOT have the same target as another context with a single metapath.
+
+ Constraints Have a Help URL PropertyA FedRAMP constraint MUST define a valid help URL.
-
-
+
+ Constraints Have a Unique ID
- A FedRAMP constraint MUST have an id.
+ A FedRAMP constraint MUST have a unique id. ID "{@id}" is used multiple times.Constraints Have IDs with Lower Case Letters, Numbers, and Dashes
@@ -51,7 +59,7 @@
A FedRAMP constraint MUST include a formal name.
-
-
+
+
\ No newline at end of file