From a5ae41360b1ebab7f7f6b7eb0bca55312133994a Mon Sep 17 00:00:00 2001
From: Brian Ruf Initial publication. Minor The FedRAMP PMO resides within GSA and supports agencies and cloud service providers through the FedRAMP authorization process and maintains a secure repository of FedRAMP authorizations to enable reuse of security packages. The organization that prepared this SSP. If developed in-house, this is the CSP itself. The organization for which this SSP was prepared. Typically the CSP. The individual or individuals accountable for the accuracy of this SSP. The individual within the CSP who is ultimately accountable for everything related to this system. The individual or individuals who must grant this system an authorization to operate. The individual representing the authorizing official. The highest level manager who responsible for system operation on behalf of the System Owner. The individual or individuals leading the technical operation of the system. A general point of contact for the system, designated by the system owner. The individual accountable for the security posture of the system on behalf of the system owner. The individual responsible for the privacy threshold analysis and if necessary the privacy impact assessment. The point of contact for an interconnection on behalf of this system. Remove this role if there are no ICAs. The point of contact for an interconnection on behalf of this external system to which this system connects. Remove this role if there are no ICAs. Responsible for signing an interconnection security agreement on behalf of this system. Remove this role if there are no ICAs. Responsible for signing an interconnection security agreement on behalf of the external system to which this system connects. Remove this role if there are no ICAs. Any consultants involved with developing or maintaining this content. Represents any customers of this system as may be necessary for assigning customer responsibility. This is a sample role. This is a sample role. There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location. There must be one location for each data center. There must be at least two data center locations. For a data center, briefly summarize the components at this location. All data centers must have a "type" property with a value of "data-center". The type property must also have a class of "primary" or "alternate". There must be one location for each data center. There must be at least two data center locations. For a data center, briefly summarize the components at this location. All data centers must have a "type" property with a value of "data-center". The type property must also have a class of "primary" or "alternate". Replace sample CSP information. CSP information must be present and associated with the "cloud-service-provider" role via This party entry must be present in a FedRAMP SSP. The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies. This party entry must be present in a FedRAMP SSP. The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies. Generic placeholder for any external organization. Generic placeholder for an authorizing agency. Underlying service provider. Leveraged Authorization. Exactly one Exactly one One or more Exactly one One or more Exactly one Exactly one Exactly one Exactly one Exactly one Exactly one Exactly one This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and High baselines. Guidance for OSCAL-based FedRAMP Tailored Low Impact - Software as a Service (LI-SaaS) content has not yet been developed. This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release. Must adjust accordingly for applicable baseline and revision. [Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above] offering using a multi-tenant [insert based on the Deployment Model above] cloud computing environment. It is available to [Insert scope of customers in accordance with instructions above (for example, the public, federal, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors etc.)]. NOTE: Additional description, including the purpose and functions of this system may be added here. This includes any narrative text usually included in section 9.1 of the SSP. NOTE: The description is expected to be at least 32 words in length. Remarks are required if service model is "other". Optional otherwise. Remarks are required if deployment model is "hybrid-cloud" or "other". Optional otherwise. A description of the information. Required if the base and selected values do not match. Required if the base and selected values do not match. Required if the base and selected values do not match. Remarks are optional if status/state is "operational". Remarks are required otherwise. A holistic, top-level explanation of the FedRAMP authorization boundary. A diagram-specific explanation. A holistic, top-level explanation of the network architecture. A diagram-specific explanation. A holistic, top-level explanation of the system's data flows. A diagram-specific explanation. Use one leveraged-authorization assembly for each underlying system. In the legacy world, these may be general support systems. The link fields are optional, but preferred when known. Often, a leveraging system's SSP author will not have access to the leveraged system's SSP, but should have access to the leveraged system's CRM. The entire system as depicted in the system authorization boundary Email is employed Provide a description and any pertinent note regarding the use of this CM. For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.) Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process). Provide a description and any pertinent note regarding the use of this CM. For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process). If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the Must include all leveraged services and features from the leveraged authorization here. If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the Must include all leveraged services and features from the leveraged authorization here. Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.). If "other", remarks are required. Optional otherwise. Optional notes about this interconnection FUNCTION: Describe typical component function. COMMENTS: Provide other comments as needed. FUNCTION: Describe typical component function. COMMENTS: Provide other comments as needed. None None None Vendor appliance. No admin-level access. [EXAMPLE]component representing a collection of policies in appendix A. Links to the components, attached as a [EXAMPLE]component representing a collection of procedures in appendix A. Links to the components, attached as a Describe the service Section 10.2, Table 10-1. Ports, Protocols and Services
+ SERVICES ARE NOW COMPONENTS WITH type='service'
+ Briefly describe the interconnection. If "other", remarks are required. Optional otherwise. Optional notes about this interconnection IPv4 Production Subnet. IPv4 Management Subnet. Email Service Legacy Example (No implemented-component). If no, explain why. If yes, omit remarks field. If no, explain why. If yes, omit remarks field. Optional, longer, formatted description. This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above. COMMENTS: Additional information about this item. Component Inventory Example If no, explain why. If yes, omit remark. COMMENTS: If needed, provide additional information about this inventory item. None. None. None. None. Asset wasn't running at time of scan. None. None. Asset wasn't running at time of scan. Email-Service Appendix A - FedRAMP SSP Rev5 Template This description field is required by OSCAL. FedRAMP does not require any specific information here. Describe how Part a is satisfied within the system. Legacy approach. If no policy component is defined, describe here how the policy satisfies part a. In this case, a link must be provided to the policy. FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource. The specified component is the system itself. Any control implementation response that can not be associated with another component is associated with the component representing the system. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Identity Management and Access Control Policy. That component contains a link to the policy, so it does not have to be linked here too. There Describe the plan to complete the implementation. Describe how this policy currently satisfies part a. Describe the plan for addressing the missing policy elements. Identify what is currently missing from this policy. Describe how Part b-1 is satisfied. Describe how Part b-2 is satisfied. Describe the plan to complete the implementation. Describe any customer-configured requirements for satisfying this control. Describe how the control is satisfied within the system. Describe how AC-2, part a is satisfied within this system. This points to the "This System" component, and is used any time a more specific component reference is not available. Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a. Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a. Not associated with inheritance, thus associated this with the by-component for "this system". For the portion of the control satisfied by the application component of this system, describe how the control is met. Consumer-appropriate description of what may be inherited from this application component by a leveraging system. In the context of the application component in satisfaction of AC-2, part a. Leveraging system's responsibilities with respect to inheriting this capability from this application. In the context of the application component in satisfaction of AC-2, part a. The component-uuid above points to the "this system" component. Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content. This can also be used to provide a summary, such as a holistic overview of how multiple components work together. While the "this system" component is not explicitly required within every For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited. Optional description. Consumer-appropriate description of what may be inherited as provided by the leveraged system. In the context of this component in satisfaction of AC-2, part a. The It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model). Description of how the responsibility was satisfied. The It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model). Tools should use this to ensure all identified customer Tool developers should be mindful that Describe the plan to complete the implementation. Describe how the control is satisfied within the system. Describe how Part a is satisfied. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. Describe how Part b-1 is satisfied. Describe how Part b-2 is satisfied. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. For the portion of the control satisfied by the service provider, describe how the control is met. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how the control is satisfied within the system. DMARC is employed. SPF is employed. DKIM is employed. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be linked here too. This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SSP (rev 4 or rev 5) this OSCAL document is for. SSP Signature FedRAMP is formulating guidelines for handling digital/electronic signatures in OSCAL, and welcome feedback on solutions. For now, FedRAMP recommends one of the following: If your organization prefers another approach, please seek prior approval from the FedRAMP PMO. Must be present in a FedRAMP SAP. Must be present in a FedRAMP SSP. AC Policy document Table 12-1 Attachments: Policy Attachment May use AT Policy document Table 12-1 Attachments: Policy Attachment May use AU Policy document Table 12-1 Attachments: Policy Attachment May use CA Policy document Table 12-1 Attachments: Policy Attachment May use CM Policy document Table 12-1 Attachments: Policy Attachment May use CP Policy document Table 12-1 Attachments: Policy Attachment May use IA Policy document Table 12-1 Attachments: Policy Attachment May use IR Policy document Table 12-1 Attachments: Policy Attachment May use MA Policy document Table 12-1 Attachments: Policy Attachment May use MP Policy document Table 12-1 Attachments: Policy Attachment May use PE Policy document Table 12-1 Attachments: Policy Attachment May use PL Policy document Table 12-1 Attachments: Policy Attachment May use PS Policy document Table 12-1 Attachments: Policy Attachment May use RA Policy document Table 12-1 Attachments: Policy Attachment May use SA Policy document Table 12-1 Attachments: Policy Attachment May use SC Policy document Table 12-1 Attachments: Policy Attachment May use SI Policy document Table 12-1 Attachments: Policy Attachment May use SR Policy document Table 12-1 Attachments: Policy Attachment May use AC Procedure document Table 12-1 Attachments: Procedure Attachment May use AT Procedure document Table 12-1 Attachments: Procedure Attachment May use AU Procedure document Table 12-1 Attachments: Procedure Attachment May use CA Procedure document Table 12-1 Attachments: Procedure Attachment May use CM Procedure document Table 12-1 Attachments: Procedure Attachment May use CP Procedure document Table 12-1 Attachments: Procedure Attachment May use IA Procedure document Table 12-1 Attachments: Procedure Attachment May use IR Procedure document Table 12-1 Attachments: Procedure Attachment May use MA Procedure document Table 12-1 Attachments: Procedure Attachment May use MP Procedure document Table 12-1 Attachments: Procedure Attachment May use PE Procedure document Table 12-1 Attachments: Procedure Attachment May use PL Procedure document Table 12-1 Attachments: Procedure Attachment May use PS Procedure document Table 12-1 Attachments: Procedure Attachment May use RA Procedure document Table 12-1 Attachments: Procedure Attachment May use SA Procedure document Table 12-1 Attachments: Procedure Attachment May use SC Procedure document Table 12-1 Attachments: Procedure Attachment May use SI Procedure document Table 12-1 Attachments: Procedure Attachment May use SR Procedure document Table 12-1 Attachments: Procedure Attachment May use User's Guide Table 12-1 Attachments: User's Guide Attachment May use Rules of Behavior Table 12-1 Attachments: Rules of Behavior (ROB) May use Contingency Plan (CP) Table 12-1 Attachments: Contingency Plan (CP) Attachment May use Configuration Management (CM) Plan Table 12-1 Attachments: Configuration Management (CM) Plan Attachment May use Incident Response (IR) Plan Table 12-1 Attachments: Incident Response (IR) Plan Attachment May use Continuous Monitoring Plan Table 12-1 Attachments: Continuous Monitoring Plan Attachment May use Supply Chain Risk Management Plan Table 12-1 Attachments: Procedure Attachment May use FedRAMP Logo Must be present in a FedRAMP SSP. CSP Logo May use FedRAMP prefers Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5. 3PAO Logo May use FedRAMP prefers Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5. The primary authorization boundary diagram. Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic) This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000054" May use FedRAMP prefers Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5. The primary network diagram. Section 8.1, Figure 8-2 Network Diagram (graphic) This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000055" May use FedRAMP prefers Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5. The primary data flow diagram. Section 8.1, Figure 8-3 Data Flow Diagram (graphic) This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000056" May use FedRAMP prefers Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5. Separation of Duties Matrix May use Replace sample CSP information. CSP information must be present and associated with the "cloud-service-provider" role via Exactly one Exactly one This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and High baselines. Guidance for OSCAL-based FedRAMP Tailored Low Impact - Software as a Service (LI-SaaS) content has not yet been developed. This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release. Must adjust accordingly for applicable baseline and revision. If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the Must include all leveraged services and features from the leveraged authorization here. Legacy Example (No implemented-component). Component Inventory Example None. None. None. None. None. None. Email-Service Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a. Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a. Not associated with inheritance, thus associated this with the by-component for "this system". Leveraging system's responsibilities with respect to inheriting this capability from this application. In the context of the application component in satisfaction of AC-2, part a. This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SSP (rev 4 or rev 5) this OSCAL document is for. Initial publication. Minor This is a sample role. There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location. The type property must also have a class of "primary" or "alternate". The type property must also have a class of "primary" or "alternate". Replace sample CSP information. CSP information must be present and associated with the "cloud-service-provider" role via The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies. This party entry must be present in a FedRAMP SSP. The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies. Generic placeholder for any external organization. Generic placeholder for an authorizing agency. Underlying service provider. Leveraged Authorization. Exactly one Exactly one One or more Exactly one One or more Exactly one Exactly one Exactly one Exactly one Exactly one Exactly one A description of the information. A holistic, top-level explanation of the FedRAMP authorization boundary. A diagram-specific explanation. A holistic, top-level explanation of the network architecture. A diagram-specific explanation. A holistic, top-level explanation of the system's data flows. A diagram-specific explanation. Describe the features used from Service A. This service must be explicitly listed for this CSO on the FedRAMP Marketplace. Describe the features used from Service B. This service must be explicitly listed for this CSO on the FedRAMP Marketplace. If 'yes', describe the user authentication method. If 'no', explain why no user authentication is used. If 'not-applicable', attest that no users access the leveraged system. Use one leveraged-authorization assembly for each underlying system. In the legacy world, these may be general support systems. The entire system as depicted in the system authorization boundary Provide a description and any pertinent note regarding the use of this CM. Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process). Provide a description and any pertinent note regarding the use of this CM. For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process). If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the Must include all leveraged services and features from the leveraged authorization here. If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the Must include all leveraged services and features from the leveraged authorization here. If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the Must include all leveraged services and features from the leveraged authorization here. Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.). If "other", remarks are required. Optional otherwise. Optional notes about this interconnection FUNCTION: Describe typical component function. COMMENTS: Provide other comments as needed. FUNCTION: Describe typical component function. COMMENTS: Provide other comments as needed. None None None [EXAMPLE]component representing a collection of policies in appendix A. Links to the components, attached as a [EXAMPLE]component representing a collection of procedures in appendix A. Links to the components, attached as a Describe the serviceprop
updates.responsible-party
.inherited-uuid
property.inherited-uuid
property.resource
in back-matter
.resource
in back-matter
.statement
, it will typically be present.provided-uuid
links this to the same statement in the leveraged system's SSP.responsibility-uuid
links this to the same statement in the leveraged system's SSP.responsibility
statements have a corresponding satisfied
statement in the leveraging system's SSP.
+
+ rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.rlink
with a relative path, or embedded as base64
.base64
for images and diagrams.rlink
with a relative path, or embedded as base64
.base64
for images and diagrams.rlink
with a relative path, or embedded as base64
.base64
for images and diagrams.rlink
with a relative path, or embedded as base64
.base64
for images and diagrams.rlink
with a relative path, or embedded as base64
.base64
for images and diagrams.rlink
with a relative path, or embedded as base64
.responsible-party
.inherited-uuid
property.inherited-uuid
property.prop
updates.responsible-party
.inherited-uuid
property.inherited-uuid
property.inherited-uuid
property.resource
in back-matter
.resource
in back-matter
.
Briefly describe the interconnection.
If "other", remarks are required. Optional otherwise.
Optional notes about this interconnection
IPv4 Production Subnet.
@@ -1099,7 +1145,7 @@IPv4 Management Subnet.
@@ -1110,19 +1156,19 @@Email Service
Legacy Example (No implemented-component).
If no, explain why. If yes, omit remarks field.
@@ -1164,14 +1210,14 @@Optional, longer, formatted description.
This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
COMMENTS: Additional information about this item.
Component Inventory Example
If no, explain why. If yes, omit remark.
-COMMENTS: If needed, provide additional information about this inventory item.
None.
None.
None.
None.
Asset wasn't running at time of scan.
-None.
None.
Asset wasn't running at time of scan.
-Email-Service
This description field is required by OSCAL.
FedRAMP does not require any specific information here.
-Describe how Part a is satisfied within the system.
Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
In this case, a link must be provided to the policy.
FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
The specified component is the system itself.
Any control implementation response that can not be associated with another component is associated with the component representing the system.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Identity Management and Access Control Policy.
@@ -1376,23 +1422,23 @@There
Describe the plan to complete the implementation.
Describe how this policy currently satisfies part a.
Describe the plan for addressing the missing policy elements.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe the plan to complete the implementation.
Describe any customer-configured requirements for satisfying this control.
Describe how the control is satisfied within the system.
Describe how AC-2, part a is satisfied within this system.
This points to the "This System" component, and is used any time a more specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
Not associated with inheritance, thus associated this with the by-component for "this system".
For the portion of the control satisfied by the application component of this system, describe how the control is met.
Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
In the context of the application component in satisfaction of AC-2, part a.
Leveraging system's responsibilities with respect to inheriting this capability from this application.
In the context of the application component in satisfaction of AC-2, part a.
While the "this system" component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
Optional description.
Consumer-appropriate description of what may be inherited as provided by the leveraged system.
@@ -1527,7 +1573,7 @@It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
Description of how the responsibility was satisfied.
The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
Describe how Part a is satisfied.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1589,36 +1635,36 @@Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1655,38 +1701,38 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1722,36 +1768,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1787,34 +1833,34 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1850,36 +1896,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1915,36 +1961,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1980,36 +2026,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2045,36 +2091,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2110,36 +2156,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2175,36 +2221,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2240,36 +2286,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2305,36 +2351,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2370,36 +2416,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2435,36 +2481,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2500,36 +2546,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2565,31 +2611,31 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
DMARC is employed.
@@ -2608,21 +2654,21 @@Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2663,11 +2709,11 @@SSP Signature
AC Policy document
@@ -2722,7 +2768,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Policy document
@@ -2738,7 +2784,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Policy document
@@ -2754,7 +2800,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Policy document
@@ -2770,7 +2816,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Policy document
@@ -2786,7 +2832,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Policy document
@@ -2803,7 +2849,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Policy document
@@ -2819,7 +2865,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Policy document
@@ -2835,7 +2881,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Policy document
@@ -2851,7 +2897,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Policy document
@@ -2867,7 +2913,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Policy document
@@ -2883,7 +2929,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Policy document
@@ -2899,7 +2945,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Policy document
@@ -2915,7 +2961,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Policy document
@@ -2931,7 +2977,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Policy document
@@ -2947,7 +2993,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Policy document
@@ -2963,7 +3009,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Policy document
@@ -2979,7 +3025,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Policy document
@@ -2996,7 +3042,7 @@AC Procedure document
@@ -3012,7 +3058,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Procedure document
@@ -3028,7 +3074,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Procedure document
@@ -3044,7 +3090,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Procedure document
@@ -3060,7 +3106,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Procedure document
@@ -3076,7 +3122,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Procedure document
@@ -3092,7 +3138,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Procedure document
@@ -3108,7 +3154,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Procedure document
@@ -3124,7 +3170,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Procedure document
@@ -3140,7 +3186,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Procedure document
@@ -3156,7 +3202,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Procedure document
@@ -3172,7 +3218,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Procedure document
@@ -3188,7 +3234,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Procedure document
@@ -3204,7 +3250,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Procedure document
@@ -3220,7 +3266,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Procedure document
@@ -3236,7 +3282,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Procedure document
@@ -3252,7 +3298,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Procedure document
@@ -3268,7 +3314,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Procedure document
@@ -3285,7 +3331,7 @@User's Guide
@@ -3303,7 +3349,7 @@ -Rules of Behavior
@@ -3320,7 +3366,7 @@Contingency Plan (CP)
@@ -3337,7 +3383,7 @@Configuration Management (CM) Plan
@@ -3354,7 +3400,7 @@Incident Response (IR) Plan
@@ -3375,7 +3421,7 @@ -Continuous Monitoring Plan
@@ -3405,7 +3451,7 @@Supply Chain Risk Management Plan
@@ -3435,7 +3481,7 @@ -FedRAMP Logo
Must be present in a FedRAMP SSP.
CSP Logo
@@ -3471,7 +3517,7 @@Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
3PAO Logo
@@ -3485,7 +3531,7 @@The primary authorization boundary diagram.
@@ -3494,13 +3540,13 @@Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
-This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000054"
+This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000054"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary network diagram.
@@ -3510,13 +3556,13 @@Section 8.1, Figure 8-2 Network Diagram (graphic)
-This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000055"
+This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000055"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary data flow diagram.
@@ -3525,19 +3571,19 @@Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
-This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000056"
+This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000056"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
Separation of Duties Matrix
Initial publication.
Minor prop
updates.
Represents any customers of this system as may be necessary for assigning customer responsibility.
+The provider of a leveraged system, external service, API, CLI.
+This is a sample role.
Any internal users of a leveraged authorization.
+An internal approving authority.
+There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.
The type property must also have a class of "primary" or "alternate".
The type property must also have a class of "primary" or "alternate".
Replace sample CSP information.
CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.
This party entry must be present in a FedRAMP SSP.
The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.
Generic placeholder for any external organization.
Generic placeholder for an authorizing agency.
Underlying service provider. Leveraged Authorization.
Exactly one
+Zero or more
Exactly one
One or more
Exactly one
One or more
Exactly one
Exactly one
Exactly one
Exactly one
Exactly one
-Exactly one
This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and High baselines.
-Guidance for OSCAL-based FedRAMP Tailored Low Impact - Software as a Service (LI-SaaS) content has not yet been developed.
-A description of the information.
@@ -586,11 +614,11 @@A holistic, top-level explanation of the FedRAMP authorization boundary.
A diagram-specific explanation.
A holistic, top-level explanation of the network architecture.
-A diagram-specific explanation.
A holistic, top-level explanation of the system's data flows.
-A diagram-specific explanation.
Describe the features used from Service A.
-This service must be explicitly listed for this CSO on the FedRAMP Marketplace.
-Describe the features used from Service B.
-This service must be explicitly listed for this CSO on the FedRAMP Marketplace.
-If 'yes', describe the user authentication method.
@@ -657,169 +669,154 @@If 'not-applicable', attest that no users access the leveraged system.
Use one leveraged-authorization assembly for each underlying system. In the legacy world, these may be general support systems.
-The link fields are optional, but preferred when known. Often, a leveraging system's SSP author will not have access to the leveraged system's SSP, but should have access to the leveraged system's CRM.
+Use one leveraged-authorization assembly for each underlying authorized cloud system or general support system (GSS).
The user content is currently being investigated as it may no longer be necessary under FedRAMP's adoption of Rev 5.
+The entire system as depicted in the system authorization boundary
-Email is employed
+FedRAMP requires exactly one "this-system" component.
+This is used in SSP control responses.
When applicable, components must specify services, ports, and protocols.
+All components that use or implement encryption must reference a "validation" component.
+Provide a description and any pertinent note regarding the use of this CM.
-For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
-Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
For a leveraged authoriation, describe the information being transferred.
+System development information
+System and network monitoring information
+For a leveraged authorization, this property must always be present to link this component to the leveraged authorization.
+For a leveraged system, this property must always be present with a value of "external".
+Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
+Provide a description and any pertinent note regarding the use of this CM.
-For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+This is a service provided by the leveraged system.
+It is explicitly listed on the FedRAMP marketplace as being an authorized service.
+As a result, this service includes both the "provided-by" link and the "leveraged-authorization-uuid" property.
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
This is a service provided by the leveraged system.
+It is NOT explicitly listed on the FedRAMP marketplace as being an authorized service.
+As a result, this service still includes the "provided-by" link, but omits the "leveraged-authorization-uuid" property.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
If "other", remarks are required. Optional otherwise.
Optional notes about this interconnection
Provide a description and any pertinent note regarding the use of this CM.
+For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
+Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+Provide a description and any pertinent note regarding the use of this CM.
+For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+FUNCTION: Describe typical component function.
+COMMENTS: Provide other comments as needed.
+FUNCTION: Describe typical component function.
@@ -948,16 +1008,18 @@COMMENTS: Provide other comments as needed.
FUNCTION: Describe typical component function.
@@ -970,16 +1032,16 @@COMMENTS: Provide other comments as needed.
None
@@ -990,7 +1052,7 @@None
@@ -1001,7 +1063,7 @@None
@@ -1019,123 +1081,332 @@[EXAMPLE]component representing a collection of policies in appendix A.
-The Access Control Policy governs how access is managed and approved.
+Links to the components, attached as a resource
in back-matter
.
[EXAMPLE]component representing a collection of procedures in appendix A.
-The Awareness and Training Policy governs how access is managed and approved.
+Links to the components, attached as a resource
in back-matter
.
The Audit and Accountability governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Policy governs how access is managed and approved.
+The Configuration Management Policy governs how access is managed and approved.
+The Contingency Planning Policy governs how access is managed and approved.
+The Identificaiton and Authentication Policy governs how access is managed and approved.
+The Incident Response Policy governs how access is managed and approved.
+The Maintenance Policy governs how access is managed and approved.
+The Media Protection Policy governs how access is managed and approved.
+The Physical and Enviornmental Protection Policy governs how access is managed and approved.
+The Planning Policy governs how access is managed and approved.
+The Program Management Policy governs how access is managed and approved.
+The Personnel Security Policy governs how access is managed and approved.
+The PII Processing and Transparency Policy governs how access is managed and approved.
+The Risk Assessment Policy governs how access is managed and approved.
+The System and Services Acquisition Policy governs how access is managed and approved.
+The System and Communication Protection Policy governs how access is managed and approved.
+The System and Information Integrity Policy governs how access is managed and approved.
+The Supply Chain Risk Management Policy governs how access is managed and approved.
+Describe the service
+The Access Control Procedure governs how access is managed and approved.
Section 10.2, Table 10-1. Ports, Protocols and Services
-- SERVICES ARE NOW COMPONENTS WITH type='service' -
-Briefly describe the interconnection.
+The Awareness and Training Procedure governs how access is managed and approved.
If "other", remarks are required. Optional otherwise.
-The Audit and Accountability Procedure governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Procedure governs how access is managed and approved.
+The Configuration Management Procedure governs how access is managed and approved.
+The Contingency Planning Procedure governs how access is managed and approved.
+The Identificaiton and Authentication Procedure governs how access is managed and approved.
+The Incident Response Procedure governs how access is managed and approved.
+The Maintenance Procedure governs how access is managed and approved.
+The Media Protection Procedure governs how access is managed and approved.
+The Physical and Enviornmental Protection Procedure governs how access is managed and approved.
+The Planning Procedure governs how access is managed and approved.
+The Program Management Procedure governs how access is managed and approved.
+The Personnel Security Procedure governs how access is managed and approved.
+The PII Processing and Transparency Procedure governs how access is managed and approved.
+The Risk Assessment Procedure governs how access is managed and approved.
+The System and Services Acquisition Procedure governs how access is managed and approved.
+The System and Communication Protection Procedure governs how access is managed and approved.
+The System and Information Integrity Procedure governs how access is managed and approved.
+The Supply Chain Risk Management Procedure governs how access is managed and approved.
+Optional notes about this interconnection
-IPv4 Production Subnet.
@@ -1145,7 +1416,7 @@IPv4 Management Subnet.
@@ -1156,19 +1427,19 @@Email Service
Legacy Example (No implemented-component).
Optional, longer, formatted description.
- +This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
COMMENTS: Additional information about this item.
Component Inventory Example
COMMENTS: If needed, provide additional information about this inventory item.
None.
None.
None.
None.
Asset wasn't running at time of scan.
-None.
None.
Asset wasn't running at time of scan.
-Email-Service
This description field is required by OSCAL.
FedRAMP does not require any specific information here.
-Describe how Part a is satisfied within the system.
Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
In this case, a link must be provided to the policy.
FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
The specified component is the system itself.
Any control implementation response that can not be associated with another component is associated with the component representing the system.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Identity Management and Access Control Policy.
@@ -1422,8 +1693,8 @@There
Describe how this policy currently satisfies part a.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe how the control is satisfied within the system.
Describe how AC-2, part a is satisfied within this system.
This points to the "This System" component, and is used any time a more specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
Not associated with inheritance, thus associated this with the by-component for "this system".
For the portion of the control satisfied by the application component of this system, describe how the control is met.
Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
In the context of the application component in satisfaction of AC-2, part a.
Leveraging system's responsibilities with respect to inheriting this capability from this application.
In the context of the application component in satisfaction of AC-2, part a.
While the "this system" component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
Optional description.
Consumer-appropriate description of what may be inherited as provided by the leveraged system.
@@ -1573,7 +1844,7 @@It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
Description of how the responsibility was satisfied.
The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
Describe how the control is satisfied within the system.
Describe how Part a is satisfied.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1635,22 +1906,22 @@Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1701,24 +1972,24 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1768,22 +2039,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1833,22 +2104,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1896,22 +2167,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1961,22 +2232,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2026,22 +2297,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2091,22 +2362,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2156,22 +2427,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2221,22 +2492,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2286,22 +2557,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2351,22 +2622,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2416,22 +2687,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2481,22 +2752,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2546,22 +2817,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2611,31 +2882,31 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
DMARC is employed.
@@ -2654,7 +2925,7 @@Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2709,7 +2980,7 @@SSP Signature
AC Policy document
@@ -2768,7 +3039,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Policy document
@@ -2784,7 +3055,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Policy document
@@ -2800,7 +3071,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Policy document
@@ -2816,7 +3087,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Policy document
@@ -2832,7 +3103,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Policy document
@@ -2849,7 +3120,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Policy document
@@ -2865,7 +3136,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Policy document
@@ -2881,7 +3152,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Policy document
@@ -2897,7 +3168,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Policy document
@@ -2913,7 +3184,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Policy document
@@ -2929,7 +3200,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Policy document
@@ -2945,7 +3216,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Policy document
@@ -2961,7 +3232,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Policy document
@@ -2977,7 +3248,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Policy document
@@ -2993,7 +3264,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Policy document
@@ -3009,7 +3280,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Policy document
@@ -3025,7 +3296,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Policy document
@@ -3042,7 +3313,7 @@AC Procedure document
@@ -3058,7 +3329,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Procedure document
@@ -3074,7 +3345,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Procedure document
@@ -3090,7 +3361,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Procedure document
@@ -3106,7 +3377,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Procedure document
@@ -3122,7 +3393,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Procedure document
@@ -3138,7 +3409,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Procedure document
@@ -3154,7 +3425,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Procedure document
@@ -3170,7 +3441,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Procedure document
@@ -3186,7 +3457,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Procedure document
@@ -3202,7 +3473,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Procedure document
@@ -3218,7 +3489,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Procedure document
@@ -3234,7 +3505,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Procedure document
@@ -3250,7 +3521,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Procedure document
@@ -3266,7 +3537,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Procedure document
@@ -3282,7 +3553,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Procedure document
@@ -3298,7 +3569,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Procedure document
@@ -3314,7 +3585,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Procedure document
@@ -3331,7 +3602,7 @@User's Guide
@@ -3349,7 +3620,7 @@ -Rules of Behavior
@@ -3366,7 +3637,7 @@Contingency Plan (CP)
@@ -3383,7 +3654,7 @@Configuration Management (CM) Plan
@@ -3400,7 +3671,7 @@Incident Response (IR) Plan
@@ -3421,7 +3692,7 @@ -Continuous Monitoring Plan
@@ -3451,7 +3722,7 @@Supply Chain Risk Management Plan
@@ -3481,7 +3752,7 @@ -FedRAMP Logo
@@ -3504,7 +3775,7 @@Must be present in a FedRAMP SSP.
CSP Logo
@@ -3517,7 +3788,7 @@Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
3PAO Logo
@@ -3531,7 +3802,7 @@The primary authorization boundary diagram.
@@ -3540,13 +3811,13 @@Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
-This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000054"
+This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000054"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary network diagram.
@@ -3556,13 +3827,13 @@Section 8.1, Figure 8-2 Network Diagram (graphic)
-This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000055"
+This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000055"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary data flow diagram.
@@ -3571,14 +3842,14 @@Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
-This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000056"
+This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000056"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
Separation of Duties Matrix
From 7bdcf523336b64a6897e80bba482ffd4b2be9432 Mon Sep 17 00:00:00 2001 From: Brian RufIf the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
+For a leveraged authoriation, describe the information being transferred.
+Describe the information being transferred in the @value field.
System development information
@@ -756,66 +757,72 @@Must have a "system" component for each FedRAMP Authorized System leveraged by this system as an underlying service provider.
+An authorized service provided by Awesome Cloud
+Describe the service and what it is used for.
This is a service provided by the leveraged system.
-It is explicitly listed on the FedRAMP marketplace as being an authorized service.
-As a result, this service includes both the "provided-by" link and the "leveraged-authorization-uuid" property.
+The service is explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO.
+As a result, this service includes the "leveraged-authorization-uuid" property.
+All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+A non-authorized service provided by an authorized, leveraged system.
+Describe the service and what it is used for.
This is a service provided by the leveraged system.
-It is NOT explicitly listed on the FedRAMP marketplace as being an authorized service.
-As a result, this service still includes the "provided-by" link, but omits the "leveraged-authorization-uuid" property.
+It is NOT explicitly listed on the FedRAMP marketplace as being within the scope of leveraged system's ATO.
+As a result, the "leveraged-authorization-uuid" property must NOT be used.
+All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
+All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+A service provided by an external system other than the leveraged system.
+Describe the service and what it is used for.
This is a service provided by an external system other than the leveraged system.
+As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
+All services require the "implementation-point" property. In this case, the property value is set to "external.
+All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
-A service that exists within the authorization boundary.
+Describe the service and what it is used for.
+Any internal users of a leveraged authorization.
The owner of an external system.
+The highest level manager who responsible for an external system's operation on behalf of the System Owner.
+The individual or individuals leading the technical operation of an external system.
+This is a service provided by the leveraged system.
The service is explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO.
@@ -822,6 +852,62 @@Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
+Describe the information being transferred in the @value field.
+System development information
+System and network monitoring information
+For a leveraged system, this property must always be present with a value of "external".
+Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
+Each interconnection must be defined with both an "system" component and an "interconnection" component.
+Must include all leveraged services and features from the leveraged authorization here.
+None
+Initial publication.
Minor prop
updates.
The FedRAMP PMO resides within GSA and supports agencies and cloud service providers through the FedRAMP authorization process and maintains a secure repository of FedRAMP authorizations to enable reuse of security packages.
+The FedRAMP PMO resides within GSA and supports agencies and cloud service providers + through the FedRAMP authorization process and maintains a secure repository of + FedRAMP authorizations to enable reuse of security packages.
The organization that prepared this SSP. If developed in-house, this is the CSP itself.
+The organization that prepared this SSP. If developed in-house, this is the CSP + itself.
The individual within the CSP who is ultimately accountable for everything related to this system.
+The individual within the CSP who is ultimately accountable for everything related to + this system.
The individual or individuals who must grant this system an authorization to operate.
+The individual or individuals who must grant this system an authorization to + operate.
The highest level manager who responsible for system operation on behalf of the System Owner.
+The highest level manager who responsible for system operation on behalf of the + System Owner.
The individual accountable for the security posture of the system on behalf of the system owner.
+The individual accountable for the security posture of the system on behalf of the + system owner.
The individual responsible for the privacy threshold analysis and if necessary the privacy impact assessment.
+The individual responsible for the privacy threshold analysis and if necessary the + privacy impact assessment.
The point of contact for an interconnection on behalf of this external system to which this system connects.
+The point of contact for an interconnection on behalf of this external system to + which this system connects.
Remove this role if there are no ICAs.
@@ -135,7 +147,8 @@Responsible for signing an interconnection security agreement on behalf of this system.
+Responsible for signing an interconnection security agreement on behalf of this + system.
Remove this role if there are no ICAs.
@@ -144,7 +157,8 @@Responsible for signing an interconnection security agreement on behalf of the external system to which this system connects.
+Responsible for signing an interconnection security agreement on behalf of the + external system to which this system connects.
Remove this role if there are no ICAs.
@@ -159,7 +173,8 @@Represents any customers of this system as may be necessary for assigning customer responsibility.
+Represents any customers of this system as may be necessary for assigning customer + responsibility.
The highest level manager who responsible for an external system's operation on behalf of the System Owner.
+The highest level manager who responsible for an external system's operation on + behalf of the System Owner.
The individual or individuals leading the technical operation of an external system.
+The individual or individuals leading the technical operation of an external + system.
There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.
+There must be one location identifying the CSP's primary business address, such as + the CSP's HQ, or the address of the system owner's primary business location.
Replace sample CSP information.
-CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
CSP information must be present and associated with the "cloud-service-provider" role
+ via responsible-party
.
This party entry must be present in a FedRAMP SSP.
-The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.
+The uuid may be different; however, the uuid must be associated with the + "fedramp-pmo" role in the responsible-party assemblies.
This party entry must be present in a FedRAMP SSP.
-The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.
+The uuid may be different; however, the uuid must be associated with the + "fedramp-jab" role in the responsible-party assemblies.
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
+This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official + FedRAMP 3.0.0 release.
Must adjust accordingly for applicable baseline and revision.
[Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above] offering using a multi-tenant [insert based on the Deployment Model above] cloud computing environment. It is available to [Insert scope of customers in accordance with instructions above (for example, the public, federal, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors etc.)].
-NOTE: Additional description, including the purpose and functions of this system may be added here. This includes any narrative text usually included in section 9.1 of the SSP.
+[Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above] + offering using a multi-tenant [insert based on the Deployment Model above] cloud + computing environment. It is available to [Insert scope of customers in accordance with + instructions above (for example, the public, federal, state, local, and tribal + governments, as well as research institutions, federal contractors, government + contractors etc.)].
+NOTE: Additional description, including the purpose and functions of this system may be + added here. This includes any narrative text usually included in section 9.1 of the + SSP.
NOTE: The description is expected to be at least 32 words in length.
Remarks are required if deployment model is "hybrid-cloud" or "other". Optional otherwise.
+Remarks are required if deployment model is "hybrid-cloud" or "other". Optional + otherwise.
Use one leveraged-authorization assembly for each underlying authorized cloud system or general support system (GSS).
+Use one leveraged-authorization assembly for each underlying authorized cloud system + or general support system (GSS).
The user content is currently being investigated as it may no longer be necessary under FedRAMP's adoption of Rev 5.
+The user content is currently being investigated as it may no longer be necessary + under FedRAMP's adoption of Rev 5.
The entire system as depicted in the system authorization boundary
FedRAMP requires exactly one "this-system" component.
-This is used in SSP control responses.
+This is used in SSP control responses and may be used in interconnection + linkages.
When applicable, components must specify services, ports, and protocols.
-All components that use or implement encryption must reference a "validation" component.
+All components that use or implement encryption must reference a "validation" + component.
If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+Briefly describe the leveraged system.
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
-Describe the information being transferred in the @value field.
-System development information
-System and network monitoring information
-For a leveraged authorization, this property must always be present to link this component to the leveraged authorization.
-For a leveraged system, this property must always be present with a value of "external".
-Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
-Must have a "system" component for each FedRAMP Authorized System leveraged by this system as an underlying service provider.
+Each leveraged authorization must have:
+a "leveraged-authorization" entry.
+a "system" component (this component).
+ +This component must always have:
+- The name of the leveraged system in the title - exactly as it appears in the + FedRAMP Marketplace
+- A "leveraged authorization-uuid" property that links this component to the + leveraged-authorization entry.
+- An "implementation-point" property with a value of "external".
+- A responsible-role with a role-id of "provider" and exactly one party-uuid entry + that indicates which organization is the provider of this leveraged system.
+- A "nature-of-agreement" property with an appropriate allowed value. If the value is + "other", use the proeprty's remarks to descibe the agreement.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- C.3.5.1 is System development information
+- C.3.5.8 is System and network monitoring information
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+ +Create a separate "service" component for each service used from the leveraged + system.
+- If the service is included in the ATO scope and listed on the FedRAMP marketplace, + use the "leveraged-authorization-uuid" property in the "service" component to link it + directly to the leveraged authorization.
+- If the service is not included in the ATO scope or not listed on the FedRAMP + marketplace, the "leveraged-authorization-uuid" property must be omitted from the + "service" component.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorizationo assembly:
+- Package ID, Authorization Type, Impact Level
An authorized service provided by Awesome Cloud
+An authorized service provided by the Awesome Cloud leveraged authorization.
Describe the service and what it is used for.
This is a service provided by the leveraged system.
-The service is explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO.
-As a result, this service includes the "leveraged-authorization-uuid" property.
-All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
-If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
+This service is explicitly listed on the FedRAMP marketplace as being included in the + scope of this leveraged system's ATO.
+ +Each service used from a leveraged authorization must have:
+- a "leveraged-authorization" entry.
+- a "system" component linked to the leveraged-authorization entry.
+- a "service" component (this component).
+ +This component must always have:
+- The name of the service in the title - exactly as it appears in the FedRAMP + Marketplace
+- A "leveraged authorization-uuid" property that links this component to the + leveraged-authorization entry.
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- Package ID, Authorization Type, Impact Level
+ +The following fields from the Leveraged Authorization Table are handled in the + "system" component assembly:
+- Nature of Agreement, CSP Name
A non-authorized service provided by an authorized, leveraged system.
+An non-authorized service provided by the Awesome Cloud leveraged authorization.
Describe the service and what it is used for.
This is a service provided by the leveraged system.
-It is NOT explicitly listed on the FedRAMP marketplace as being within the scope of leveraged system's ATO.
-As a result, the "leveraged-authorization-uuid" property must NOT be used.
-All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
-All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
This service is provided by the leveraged system; however, it is NOT explicitly + listed on the FedRAMP marketplace as being included in the scope of this leveraged + system's ATO.
+As a result, the "leveraged-authorization-uuid" property must NOT be present.
+ +Each NON-authorized service used from a leveraged authorization must have:
+- a "leveraged-authorization" entry.
+- a "system" component linked to the leveraged-authorization entry.
+- a "service" component (this component).
+ +This component must always have:
+- The name of the service in the title - preferably exactly as it appears on the + vendor's web site
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- Package ID, Authorization Type, Impact Level
+ +The following fields from the Leveraged Authorization Table are handled in the + "system" component assembly:
+- Nature of Agreement, CSP Name
+ +An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
A service provided by an external system other than the leveraged system.
-Describe the service and what it is used for.
-This is a service provided by an external system other than the leveraged system.
-As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
-All services require the "implementation-point" property. In this case, the property value is set to "external.
-All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
+Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, + etc
Describe the information being transferred in the @value field.
For a leveraged system, this property must always be present with a value of "external".
+For a leveraged system, this property must always be present with a value of + "external".
Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
+Include this property if available, such as through an OSCAL-based CRM, component + definition, or direct access to the leveraged system's SSP.
Each interconnection must be defined with both an "system" component and an "interconnection" component.
-Must include all leveraged services and features from the leveraged authorization here.
+For each external system with which this system connects:
+Must have a "system" component (this component).
+Must have an "interconnection" component that connects this component with the + "this-system" component.
+If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Must include all leveraged services and features from the leveraged authorization + here.
+For an external system, the "implementation-point" property must always be present + with a value of "external".
+ + +Each interconnection must be defined with both an "system" component and an + "interconnection" component.
+Must include all leveraged services and features from the leveraged authorization + here.
If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Must include all leveraged services and features from the leveraged authorization + here.
Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.).
+Describe the purpose of the external system/service; specifically, provide reasons + for connectivity (e.g., system monitoring, system alerting, download updates, + etc.).
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, + etc
+Describe the information being transferred in the @value field.
+System development information
+System and network monitoring information
+For a leveraged system, this property must always be present with a value of + "external".
+Include this property if available, such as through an OSCAL-based CRM, component + definition, or direct access to the leveraged system's SSP.
+For each external system with which this system connects:
+Must have a "system" component (this component).
+Must have an "interconnection" component that connects this component with the + "this-system" component.
+If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Must include all leveraged services and features from the leveraged authorization + here.
+For an external system, the "implementation-point" property must always be present + with a value of "external".
+ + +Each interconnection must be defined with both an "system" component and an + "interconnection" component.
+Must include all leveraged services and features from the leveraged authorization + here.
+A service provided by an external system other than the leveraged system.
+Describe the service and what it is used for.
+This is a service provided by an external system other than the leveraged system.
+As a result, the "leveraged-authorization-uuid" property is not applicable and must + NOT be used.
+ +Each external service used from a leveraged authorization must have:
+- a "system" component (CURRENTLY DEFERRED DUE TO A KNOWN ISSUE WITH THE "provided-by" link relationship).
+- a "service" component (this component).
+ +This component must always have:
+- The name of the service in the title - preferably exactly as it appears on the + vendor's web site
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) constraints, + this property is blocked from proper use.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- Package ID, Authorization Type, Impact Level
+ +The following fields from the Leveraged Authorization Table are handled in the + "system" component assembly:
+- Nature of Agreement, CSP Name
+ +An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+ + +All services require the "implementation-point" property. In this case, the property + value is set to "external.
+All external services would normally require a "provided-by" link; however, a known + bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Link(s) to the vendor's web site describing the service are encouraged, but not + required..
+ + +A service provided by an external system other than the leveraged system.
+Describe the service and what it is used for.
+This is a service provided by an external system other than the leveraged system.
+As a result, the "leveraged-authorization-uuid" property is not applicable and must + NOT be used.
+All services require the "implementation-point" property. In this case, the property + value is set to "external.
+All external services would normally require a "provided-by" link; however, a known + bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
None
A service that exists within the authorization boundary.
@@ -1032,7 +1345,7 @@Provide a description and any pertinent note regarding the use of this CM.
-For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
-Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+For data-at-rest modules, describe type of encryption implemented (e.g., full disk, + file, record-level, etc.)
+Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS + compliance (e.g., Module in Process).
Provide a description and any pertinent note regarding the use of this CM.
-For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS + compliance (e.g., Module in Process).
FUNCTION: Describe typical component function.
@@ -1103,8 +1423,8 @@COMMENTS: Provide other comments as needed.
FUNCTION: Describe typical component function.
@@ -1148,7 +1468,7 @@COMMENTS: Provide other comments as needed.
None
@@ -1159,7 +1479,7 @@None
@@ -1170,14 +1490,15 @@None
The Assessment, Authorization, and Monitoring Policy governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Policy governs how access is managed + and approved.
The Identificaiton and Authentication Policy governs how access is managed and approved.
+The Identificaiton and Authentication Policy governs how access is managed and + approved.
The Physical and Enviornmental Protection Policy governs how access is managed and approved.
+The Physical and Enviornmental Protection Policy governs how access is managed and + approved.
The PII Processing and Transparency Policy governs how access is managed and approved.
+The PII Processing and Transparency Policy governs how access is managed and + approved.
The System and Services Acquisition Policy governs how access is managed and approved.
+The System and Services Acquisition Policy governs how access is managed and + approved.
The System and Communication Protection Policy governs how access is managed and approved.
+The System and Communication Protection Policy governs how access is managed and + approved.
The System and Information Integrity Policy governs how access is managed and approved.
+The System and Information Integrity Policy governs how access is managed and + approved.
The Supply Chain Risk Management Policy governs how access is managed and approved.
+The Supply Chain Risk Management Policy governs how access is managed and + approved.
The Audit and Accountability Procedure governs how access is managed and approved.
+The Audit and Accountability Procedure governs how access is managed and + approved.
The Assessment, Authorization, and Monitoring Procedure governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Procedure governs how access is managed + and approved.
The Configuration Management Procedure governs how access is managed and approved.
+The Configuration Management Procedure governs how access is managed and + approved.
The Identificaiton and Authentication Procedure governs how access is managed and approved.
+The Identificaiton and Authentication Procedure governs how access is managed and + approved.
The Physical and Enviornmental Protection Procedure governs how access is managed and approved.
+The Physical and Enviornmental Protection Procedure governs how access is managed and + approved.
The PII Processing and Transparency Procedure governs how access is managed and approved.
+The PII Processing and Transparency Procedure governs how access is managed and + approved.
The System and Services Acquisition Procedure governs how access is managed and approved.
+The System and Services Acquisition Procedure governs how access is managed and + approved.
The System and Communication Protection Procedure governs how access is managed and approved.
+The System and Communication Protection Procedure governs how access is managed and + approved.
The System and Information Integrity Procedure governs how access is managed and approved.
+The System and Information Integrity Procedure governs how access is managed and + approved.
The Supply Chain Risk Management Procedure governs how access is managed and approved.
+The Supply Chain Risk Management Procedure governs how access is managed and + approved.
Email Service
@@ -1597,7 +1936,9 @@This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
+This links to a FIPS 140-2 validated software component that is used by this + inventory item. This type of linkage to a validation through the component is + preferable to the link[rel='validation'] example above.
Asset wasn't running at time of scan.
Asset wasn't running at time of scan.
-Describe how Part a is satisfied within the system.
-Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+Legacy approach. If no policy component is defined, describe here how the + policy satisfies part a.
In this case, a link must be provided to the policy.
-FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
+FedRAMP prefers all policies and procedures be attached as a resource in the + back-matter. The link points to a resource.
The specified component is the system itself.
-Any control implementation response that can not be associated with another component is associated with the component representing the system.
+Any control implementation response that can not be associated with another + component is associated with the component representing the system.
Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Identity Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+Component approach. This links to a component representing the Identity + Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked + here too.
There
Describe the plan to complete the implementation.
Describe how this policy currently satisfies part a.
Describe the plan for addressing the missing policy elements.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe any customer-configured requirements for satisfying this control.
Describe how the control is satisfied within the system.
Describe how AC-2, part a is satisfied within this system.
-This points to the "This System" component, and is used any time a more specific component reference is not available.
+This points to the "This System" component, and is used any time a more + specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
+Leveraged system's statement of capabilities which may be inherited by a + leveraging systems to satisfy AC-2, part a.
Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
-Not associated with inheritance, thus associated this with the by-component for "this system".
+Leveraged system's statement of a leveraging system's responsibilities in + satisfaction of AC-2, part a.
+Not associated with inheritance, thus associated this with the + by-component for "this system".
For the portion of the control satisfied by the application component of this system, describe how the control is met.
+For the portion of the control satisfied by the application component of this + system, describe how the control is met.
Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
-In the context of the application component in satisfaction of AC-2, part a.
+Consumer-appropriate description of what may be inherited from this + application component by a leveraging system.
+In the context of the application component in satisfaction of AC-2, part + a.
Leveraging system's responsibilities with respect to inheriting this capability from this application.
-In the context of the application component in satisfaction of AC-2, part a.
+Leveraging system's responsibilities with respect to inheriting this + capability from this application.
+In the context of the application component in satisfaction of AC-2, part + a.
The component-uuid above points to the "this system" component.
-Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.
-This can also be used to provide a summary, such as a holistic overview of how multiple components work together.
-While the "this system" component is not explicitly required within every statement
, it will typically be present.
Any control response content that does not cleanly fit another system component + is placed here. This includes customer responsibility content.
+This can also be used to provide a summary, such as a holistic overview of how + multiple components work together.
+While the "this system" component is not explicitly required within every
+ statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
+For the portion inherited from an underlying FedRAMP-authorized provider, + describe what is inherited.
Optional description.
-Consumer-appropriate description of what may be inherited as provided by the leveraged system.
+Consumer-appropriate description of what may be inherited as provided by the + leveraged system.
In the context of this component in satisfaction of AC-2, part a.
-The provided-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+The provided-uuid
links this to the same statement in the
+ leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based + CRM (Inheritance and Responsibility Model).
Description of how the responsibility was satisfied.
-The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
-Tools should use this to ensure all identified customer responsibility
statements have a corresponding satisfied
statement in the leveraging system's SSP.
The responsibility-uuid
links this to the same statement in the
+ leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based + CRM (Inheritance and Responsibility Model).
+Tools should use this to ensure all identified customer
+ responsibility
statements have a corresponding
+ satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
Describe how the control is satisfied within the system.
Describe how Part a is satisfied.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
DMARC is employed.
@@ -3046,7 +3610,8 @@Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
FedRAMP is formulating guidelines for handling digital/electronic signatures in OSCAL, and welcome feedback on solutions.
+FedRAMP is formulating guidelines for handling digital/electronic signatures in + OSCAL, and welcome feedback on solutions.
For now, FedRAMP recommends one of the following:
If your organization prefers another approach, please seek prior approval from the FedRAMP PMO.
+If your organization prefers another approach, please seek prior approval from the + FedRAMP PMO.
Must be present in a FedRAMP SAP.
Must be present in a FedRAMP SSP.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: User's Guide Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Rules of Behavior (ROB)
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Contingency Plan (CP) Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Configuration Management (CM) Plan Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Incident Response (IR) Plan Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Continuous Monitoring Plan Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
-This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000054"
-May use rlink
with a relative path, or embedded as base64
.
This should be referenced in the + system-characteristics/authorization-boundary/diagram/link/@href flag using a value + of "#11111111-2222-4000-8000-001000000054"
+May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
Section 8.1, Figure 8-2 Network Diagram (graphic)
-This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000055"
-May use rlink
with a relative path, or embedded as base64
.
This should be referenced in the + system-characteristics/network-architecture/diagram/link/@href flag using a value of + "#11111111-2222-4000-8000-001000000055"
+May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
-This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000056"
-May use rlink
with a relative path, or embedded as base64
.
This should be referenced in the system-characteristics/data-flow/diagram/link/@href + flag using a value of "#11111111-2222-4000-8000-001000000056"
+May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
The user content is currently being investigated as it may no longer be necessary - under FedRAMP's adoption of Rev 5.
+The user assembly is being reviewed for continued applicability under FedRAMP's adoption of Rev 5.
Describe the service and what it is used for.
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+- The name of the service in the title - preferably exactly as it appears on the vendor's web site
- An "implementation-point" property with a value of "external".
+- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
- A "provided-by" link with a URI fragment that points to the UUID of the above "system" component.
- Example: "#11111111-2222-4000-8000-009000100001"
System and network monitoring information
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+For a leveraged system, this property must always be present with a value of @@ -994,6 +1024,9 @@
For an external system, the "implementation-point" property must always be present with a value of "external".
-Each interconnection must be defined with both an "system" component and an "interconnection" component.
Must include all leveraged services and features from the leveraged authorization here.
+ +The risk associated with an external system must be quantified within the context of an interconnection, service, or cli, thus risk, impact, and mitigation properties are applied to those component types.
If the leveraged system owner provides a UUID for their system (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
Must include all leveraged services and features from the leveraged authorization - here.
-Describe the purpose of the external system/service; specifically, provide reasons - for connectivity (e.g., system monitoring, system alerting, download updates, - etc.).
+ for connectivity (e.g., system monitoring, system alerting, download updates, etc.)If "other", remarks are required. Optional otherwise.
Either describe a risk associated with this interconnection, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+Optional notes about this interconnection
Describe the service and what it is used for.
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+This component must always have:
- The name of the service in the title - preferably exactly as it appears on the vendor's web site
+- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
- An "implementation-point" property with a value of "external".
- A "provided-by" link with a URI fragment that points to the UUID of the above "system" component.
@@ -1271,21 +1292,6 @@- Nature of Agreement, CSP Name
An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
- - -All services require the "implementation-point" property. In this case, the property - value is set to "external.
-All external services would normally require a "provided-by" link; however, a known - bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
Link(s) to the vendor's web site describing the service are encouraged, but not - required..
- -Describe the service and what it is used for.
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+This is a service provided by an external system other than the leveraged system.
+ + + +- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
+ + +As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
All services require the "implementation-point" property. In this case, the property @@ -1310,6 +1340,10 @@
If the leveraged system owner provides a UUID for their service (such as in an
OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Either describe a risk associated with this CLI, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+This service is explicitly listed on the FedRAMP marketplace as being included in the @@ -897,10 +897,11 @@
An non-authorized service provided by the Awesome Cloud leveraged authorization.
Describe the service and what it is used for.
-Either describe a risk associated with this service, or indicate there is no identified risk.
@@ -917,8 +918,8 @@If there are one or more identified risks, describe any mitigating factors.
This service is provided by the leveraged system; however, it is NOT explicitly
listed on the FedRAMP marketplace as being included in the scope of this leveraged
@@ -969,21 +970,10 @@
An external system to which this system shares an interconnection. Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract,
- etc Describe the information being transferred in the @value field. System development information If "other", remarks are required. Optional otherwise. Optional notes about this interconnection Describe the service and what it is used for. A service provided by an external system other than the leveraged system. Describe the service and what it is used for. Either describe a risk associated with this service, or indicate there is no identified risk. This is a service provided by an external system other than the leveraged system. None
If 'yes', describe the user authentication method.
-If 'no', explain why no user authentication is used.
-If 'not-applicable', attest that no users access the leveraged system.
+For now, this is a required field. In the future we intend + to pull this information directly from FedRAMP's records + based on the "leveraged-system-identifier" property's value.
For now, this is a required field. In the future we intend + to pull this information directly from FedRAMP's records + based on the "leveraged-system-identifier" property's value.
+The user assembly is being reviewed for continued applicability under FedRAMP's adoption of Rev 5.
When applicable, components must specify services, ports, and protocols.
-All components that use or implement encryption must reference a "validation" - component.
+A FedRAMP SSP must always have exactly one component that represents the whole system. + It should be the only component with the "this-system" component type.
If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
+The "provider" role is required for the component representing + a leveraged system. It must reference exactly one party + (via party-uuid), which points to a party of type "organization" + representing the organization that owns the leveraged system.
+Each leveraged authorization must have:
-a "leveraged-authorization" entry.
-a "system" component (this component).
- -This component must always have:
-- The name of the leveraged system in the title - exactly as it appears in the - FedRAMP Marketplace
-- A "leveraged authorization-uuid" property that links this component to the - leveraged-authorization entry.
-- An "implementation-point" property with a value of "external".
-- A responsible-role with a role-id of "provider" and exactly one party-uuid entry - that indicates which organization is the provider of this leveraged system.
-- A "nature-of-agreement" property with an appropriate allowed value. If the value is - "other", use the proeprty's remarks to descibe the agreement.
-- a status with a state value of "operational"
+This is a leveraged system within which this system operates. + It is explicitly listed on the FedRAMP marketplace with a status of + "FedRAMP Authorized".
+Each leveraged system must be expressed as a "system" component, and must have:
+"#11111111-2222-4000-8000-009000100001"
)Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- C.3.5.1 is System development information
-- C.3.5.8 is System and network monitoring information
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly - one or more party-uuid entries that indicates which users within this system may - interact with the leveraged systeme.
-- An "inherited-uuid" property if the leveraged system's owner provides a UUID for - their system (such as in an OSCAL-based CRM).
- -Create a separate "service" component for each service used from the leveraged - system.
-- If the service is included in the ATO scope and listed on the FedRAMP marketplace, - use the "leveraged-authorization-uuid" property in the "service" component to link it - directly to the leveraged authorization.
-- If the service is not included in the ATO scope or not listed on the FedRAMP - marketplace, the "leveraged-authorization-uuid" property must be omitted from the - "service" component.
+The following fields from the Leveraged Authorization Table are handled in the - leveraged-authorizationo assembly:
-- Package ID, Authorization Type, Impact Level
+Links to the vendor website describing the system are encouraged, but not required.
+A service within the scope of the leveraged system's authorization boundary + is considered an "authorized service". Any other service offered by the + leveraged system is considered a "non-authorized service"
+Represent each authorized or non-authorized services using a "service" component. + Both authorized and non-authorized service components are represented the same + in OSCAL with the following exceptions:
+The components for both authorized and non-authorized services
+ must include a "provided-by" link with a URI fragment that points
+ to the "system" component representing the leveraged system.
+ (Example: "#11111111-2222-4000-8000-009000100001"
)
This service is explicitly listed on the FedRAMP marketplace as being included in the - scope of this leveraged system's ATO.
- -Each service used from a leveraged authorization must have:
-- a "leveraged-authorization" entry.
-- a "system" component linked to the leveraged-authorization entry.
-- a "service" component (this component).
+This is a service offered by a leveraged system and used by this system. + It is explicitly listed on the FedRAMP marketplace as being included in the + scope of this leveraged system's ATO, thus is considered an "Authorized Service.
-This component must always have:
-- The name of the service in the title - exactly as it appears in the FedRAMP - Marketplace
-- A "leveraged authorization-uuid" property that links this component to the - leveraged-authorization entry.
-- An "implementation-point" property with a value of "external".
-- A "provided-by" link with a URI fragment that points to the UUID of the above - "system" component.
- - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
-- a status with a state value of "operational"
+Each leveraged service must be expressed as a "service" component, and must have:
+"#11111111-2222-4000-8000-009000100001"
)Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly +
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for - their system (such as in an OSCAL-based CRM).
+ interact with the leveraged systeme.Link(s) to the vendor's web site describing the service are encouraged, but not required.
-The following fields from the Leveraged Authorization Table are handled in the leveraged-authorization assembly:
-- Package ID, Authorization Type, Impact Level
+The following fields from the Leveraged Authorization Table are handled in the - "system" component assembly:
+ "system" component representing the leveraged system as a whole:- Nature of Agreement, CSP Name
If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+This service is provided by the leveraged system; however, it is NOT explicitly - listed on the FedRAMP marketplace as being included in the scope of this leveraged - system's ATO.
-As a result, the "leveraged-authorization-uuid" property must NOT be present.
+This is a service offered by a leveraged system and used by this system. + It is NOT explicitly listed on the FedRAMP marketplace as being included + in the scope of this leveraged system's ATO, thus is treated as a + non-authorized, leveraged service.
-Each NON-authorized service used from a leveraged authorization must have:
-- a "leveraged-authorization" entry.
-- a "system" component linked to the leveraged-authorization entry.
-- a "service" component (this component).
+Each leveraged service must be expressed as a "service" component, and must have:
+"#11111111-2222-4000-8000-009000100001"
)The "leveraged-authorization-uuid" property must NOT be present, as this is how + tools are able to distinguish between authorized and non-authorized services + from the same leveraged provider.
This component must always have:
-- The name of the service in the title - preferably exactly as it appears on the - vendor's web site
-- An "implementation-point" property with a value of "external".
-- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
-- A "provided-by" link with a URI fragment that points to the UUID of the above - "system" component.
- - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
-- a status with a state value of "operational"
- +Where relevant, this component should also have:
- One or more "information-type" properties, where the allowed values are the 800-63 information type identifiers.
@@ -1008,15 +1095,30 @@Include this property if available, such as through an OSCAL-based CRM, component - definition, or direct access to the leveraged system's SSP.
+This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+Include this property if available, such as through an OSCAL-based CRM, component - definition, or direct access to the leveraged system's SSP.
+This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+If there are one or more identified risks, describe any mitigating factors.
This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
+If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+Either describe a risk associated with this service, or indicate there is no identified risk.
@@ -1354,7 +1483,13 @@If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+Initial publication.
+Minor prop
updates.
The FedRAMP PMO resides within GSA and supports agencies and cloud service providers through the FedRAMP authorization process and maintains a secure repository of FedRAMP authorizations to enable reuse of security packages.
+The organization that prepared this SSP. If developed in-house, this is the CSP itself.
+The organization for which this SSP was prepared. Typically the CSP.
+The individual or individuals accountable for the accuracy of this SSP.
+The individual within the CSP who is ultimately accountable for everything related to this system.
+The individual or individuals who must grant this system an authorization to operate.
+The individual representing the authorizing official.
+The highest level manager who responsible for system operation on behalf of the System Owner.
+The individual or individuals leading the technical operation of the system.
+A general point of contact for the system, designated by the system owner.
+The individual accountable for the security posture of the system on behalf of the system owner.
+The individual responsible for the privacy threshold analysis and if necessary the privacy impact assessment.
+The point of contact for an interconnection on behalf of this system.
+Remove this role if there are no ICAs.
+The point of contact for an interconnection on behalf of this external system to which this system connects.
+Remove this role if there are no ICAs.
+Responsible for signing an interconnection security agreement on behalf of this system.
+Remove this role if there are no ICAs.
+Responsible for signing an interconnection security agreement on behalf of the external system to which this system connects.
+Remove this role if there are no ICAs.
+Any consultants involved with developing or maintaining this content.
+Represents any customers of this system as may be necessary for assigning customer responsibility.
+This is a sample role.
+This is a sample role.
+There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.
+There must be one location for each data center.
+There must be at least two data center locations.
+For a data center, briefly summarize the components at this location.
+All data centers must have a "type" property with a value of "data-center".
+The type property must also have a class of "primary" or "alternate".
+There must be one location for each data center.
+There must be at least two data center locations.
+For a data center, briefly summarize the components at this location.
+All data centers must have a "type" property with a value of "data-center".
+The type property must also have a class of "primary" or "alternate".
+Replace sample CSP information.
+CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
This party entry must be present in a FedRAMP SSP.
+The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.
+This party entry must be present in a FedRAMP SSP.
+The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.
+Generic placeholder for any external organization.
+Generic placeholder for an authorizing agency.
+Underlying service provider. Leveraged Authorization.
+Exactly one
+Exactly one
+One or more
+Exactly one
+One or more
+Exactly one
+Exactly one
+Exactly one
+Exactly one
+Exactly one
+Exactly one
+Exactly one
+This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and High baselines.
+Guidance for OSCAL-based FedRAMP Tailored Low Impact - Software as a Service (LI-SaaS) content has not yet been developed.
+This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
+Must adjust accordingly for applicable baseline and revision.
+[Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above] offering using a multi-tenant [insert based on the Deployment Model above] cloud computing environment. It is available to [Insert scope of customers in accordance with instructions above (for example, the public, federal, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors etc.)].
+NOTE: Additional description, including the purpose and functions of this system may be added here. This includes any narrative text usually included in section 9.1 of the SSP.
+NOTE: The description is expected to be at least 32 words in length.
+Remarks are required if service model is "other". Optional otherwise.
+Remarks are required if deployment model is "hybrid-cloud" or "other". Optional otherwise.
+A description of the information.
+Required if the base and selected values do not match.
+Required if the base and selected values do not match.
+Required if the base and selected values do not match.
+Remarks are optional if status/state is "operational".
+Remarks are required otherwise.
+A holistic, top-level explanation of the FedRAMP authorization boundary.
+A diagram-specific explanation.
+A holistic, top-level explanation of the network architecture.
+A diagram-specific explanation.
+A holistic, top-level explanation of the system's data flows.
+A diagram-specific explanation.
+Use one leveraged-authorization assembly for each underlying system. In the legacy world, these may be general support systems.
+The link fields are optional, but preferred when known. Often, a leveraging system's SSP author will not have access to the leveraged system's SSP, but should have access to the leveraged system's CRM.
+The entire system as depicted in the system authorization boundary
+Email is employed
+Provide a description and any pertinent note regarding the use of this CM.
+For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
+Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+Provide a description and any pertinent note regarding the use of this CM.
+For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.).
+If "other", remarks are required. Optional otherwise.
+Optional notes about this interconnection
+FUNCTION: Describe typical component function.
+COMMENTS: Provide other comments as needed.
+FUNCTION: Describe typical component function.
+COMMENTS: Provide other comments as needed.
+None
+None
+None
+Vendor appliance. No admin-level access.
+[EXAMPLE]component representing a collection of policies in appendix A.
+Links to the components, attached as a resource
in back-matter
.
[EXAMPLE]component representing a collection of procedures in appendix A.
+Links to the components, attached as a resource
in back-matter
.
Describe the service
+Section 10.2, Table 10-1. Ports, Protocols and Services
++ SERVICES ARE NOW COMPONENTS WITH type='service' +
+Briefly describe the interconnection.
+If "other", remarks are required. Optional otherwise.
+Optional notes about this interconnection
+IPv4 Production Subnet.
+IPv4 Management Subnet.
+Email Service
+Legacy Example (No implemented-component).
+If no, explain why. If yes, omit remarks field.
+If no, explain why. If yes, omit remarks field.
+Optional, longer, formatted description.
+This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
+COMMENTS: Additional information about this item.
+Component Inventory Example
+If no, explain why. If yes, omit remark.
+COMMENTS: If needed, provide additional information about this inventory item.
+None.
+None.
+None.
+None.
+Asset wasn't running at time of scan.
+None.
+None.
+Asset wasn't running at time of scan.
+Email-Service
+Appendix A - FedRAMP SSP Rev5 Template
+This description field is required by OSCAL.
+FedRAMP does not require any specific information here.
+Describe how Part a is satisfied within the system.
+Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+In this case, a link must be provided to the policy.
+FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
+The specified component is the system itself.
+Any control implementation response that can not be associated with another component is associated with the component representing the system.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Identity Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+There
+Describe the plan to complete the implementation.
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part b-1 is satisfied.
+Describe how Part b-2 is satisfied.
+Describe the plan to complete the implementation.
+Describe any customer-configured requirements for satisfying this control.
+Describe how the control is satisfied within the system.
+Describe how AC-2, part a is satisfied within this system.
+This points to the "This System" component, and is used any time a more specific component reference is not available.
+Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
+Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
+Not associated with inheritance, thus associated this with the by-component for "this system".
+For the portion of the control satisfied by the application component of this system, describe how the control is met.
+Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
+In the context of the application component in satisfaction of AC-2, part a.
+Leveraging system's responsibilities with respect to inheriting this capability from this application.
+In the context of the application component in satisfaction of AC-2, part a.
+The component-uuid above points to the "this system" component.
+Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.
+This can also be used to provide a summary, such as a holistic overview of how multiple components work together.
+While the "this system" component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
+Optional description.
+Consumer-appropriate description of what may be inherited as provided by the leveraged system.
+In the context of this component in satisfaction of AC-2, part a.
+The provided-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+Description of how the responsibility was satisfied.
+The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+Tools should use this to ensure all identified customer responsibility
statements have a corresponding satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+Describe how Part a is satisfied.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+Describe how Part b-1 is satisfied.
+Describe how Part b-2 is satisfied.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how the control is satisfied within the system.
+DMARC is employed.
+SPF is employed.
+DKIM is employed.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SSP (rev 4 or rev 5) this OSCAL document is for.
+SSP Signature
+FedRAMP is formulating guidelines for handling digital/electronic signatures in OSCAL, and welcome feedback on solutions.
+For now, FedRAMP recommends one of the following:
+If your organization prefers another approach, please seek prior approval from the FedRAMP PMO.
+Must be present in a FedRAMP SAP.
+Must be present in a FedRAMP SSP.
+AC Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
AT Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
AU Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
CA Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
CM Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
CP Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
IA Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
IR Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
MA Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
MP Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
PE Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
PL Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
PS Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
RA Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
SA Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
SC Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
SI Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
SR Policy document
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as base64
.
AC Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
AT Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
AU Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
CA Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
CM Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
CP Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
IA Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
IR Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
MA Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
MP Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
PE Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
PL Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
PS Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
RA Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
SA Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
SC Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
SI Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
SR Procedure document
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
User's Guide
+Table 12-1 Attachments: User's Guide Attachment
+May use rlink
with a relative path, or embedded as base64
.
Rules of Behavior
+Table 12-1 Attachments: Rules of Behavior (ROB)
+May use rlink
with a relative path, or embedded as base64
.
Contingency Plan (CP)
+Table 12-1 Attachments: Contingency Plan (CP) Attachment
+May use rlink
with a relative path, or embedded as base64
.
Configuration Management (CM) Plan
+Table 12-1 Attachments: Configuration Management (CM) Plan Attachment
+May use rlink
with a relative path, or embedded as base64
.
Incident Response (IR) Plan
+Table 12-1 Attachments: Incident Response (IR) Plan Attachment
+May use rlink
with a relative path, or embedded as base64
.
Continuous Monitoring Plan
+Table 12-1 Attachments: Continuous Monitoring Plan Attachment
+May use rlink
with a relative path, or embedded as base64
.
Supply Chain Risk Management Plan
+Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as base64
.
FedRAMP Logo
+Must be present in a FedRAMP SSP.
+CSP Logo
+May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+3PAO Logo
+May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+The primary authorization boundary diagram.
+Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
+This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000054"
+May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+The primary network diagram.
+Section 8.1, Figure 8-2 Network Diagram (graphic)
+This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000055"
+May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+The primary data flow diagram.
+Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
+This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000056"
+May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Separation of Duties Matrix
+May use rlink
with a relative path, or embedded as base64
.
Replace sample CSP information.
CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
Exactly one
Exactly one
-This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and High baselines.
Guidance for OSCAL-based FedRAMP Tailored Low Impact - Software as a Service (LI-SaaS) content has not yet been developed.
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
Must adjust accordingly for applicable baseline and revision.
@@ -776,7 +771,7 @@ -If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
Legacy Example (No implemented-component).
Component Inventory Example
None.
None.
None.
None.
None.
None.
Email-Service
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
-Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
Not associated with inheritance, thus associated this with the by-component for "this system".
@@ -1502,7 +1497,7 @@Leveraging system's responsibilities with respect to inheriting this capability from this application.
In the context of the application component in satisfaction of AC-2, part a.
@@ -2667,17 +2662,6 @@This "resolution resource" is used by FedRAMP as a local, authoritative indicator of what version SSP (rev 4 or rev 5) this OSCAL document is for.
-Initial publication.
Minor prop
updates.
This is a sample role.
There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.
The type property must also have a class of "primary" or "alternate".
The type property must also have a class of "primary" or "alternate".
Replace sample CSP information.
CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.
This party entry must be present in a FedRAMP SSP.
The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.
Generic placeholder for any external organization.
Generic placeholder for an authorizing agency.
Underlying service provider. Leveraged Authorization.
Exactly one
Exactly one
One or more
Exactly one
One or more
Exactly one
Exactly one
Exactly one
Exactly one
Exactly one
Exactly one
A description of the information.
@@ -586,11 +586,11 @@A holistic, top-level explanation of the FedRAMP authorization boundary.
A diagram-specific explanation.
A holistic, top-level explanation of the network architecture.
-A diagram-specific explanation.
A holistic, top-level explanation of the system's data flows.
-A diagram-specific explanation.
Describe the features used from Service A.
+This service must be explicitly listed for this CSO on the FedRAMP Marketplace.
+Describe the features used from Service B.
+This service must be explicitly listed for this CSO on the FedRAMP Marketplace.
+If 'yes', describe the user authentication method.
+If 'no', explain why no user authentication is used.
+If 'not-applicable', attest that no users access the leveraged system.
+Use one leveraged-authorization assembly for each underlying system. In the legacy world, these may be general support systems.
@@ -650,12 +668,12 @@The entire system as depicted in the system authorization boundary
@@ -730,7 +748,7 @@ -Provide a description and any pertinent note regarding the use of this CM.
@@ -738,9 +756,9 @@Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
Provide a description and any pertinent note regarding the use of this CM.
For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.).
If "other", remarks are required. Optional otherwise.
Optional notes about this interconnection
@@ -891,78 +937,78 @@ -FUNCTION: Describe typical component function.
COMMENTS: Provide other comments as needed.
FUNCTION: Describe typical component function.
COMMENTS: Provide other comments as needed.
None
None
None
[EXAMPLE]component representing a collection of policies in appendix A.
Links to the components, attached as a resource
in back-matter
.
[EXAMPLE]component representing a collection of procedures in appendix A.
Links to the components, attached as a resource
in back-matter
.
Describe the service
Briefly describe the interconnection.
If "other", remarks are required. Optional otherwise.
Optional notes about this interconnection
IPv4 Production Subnet.
@@ -1099,7 +1145,7 @@IPv4 Management Subnet.
@@ -1110,19 +1156,19 @@Email Service
Legacy Example (No implemented-component).
If no, explain why. If yes, omit remarks field.
@@ -1164,14 +1210,14 @@Optional, longer, formatted description.
This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
COMMENTS: Additional information about this item.
Component Inventory Example
If no, explain why. If yes, omit remark.
COMMENTS: If needed, provide additional information about this inventory item.
None.
None.
None.
None.
Asset wasn't running at time of scan.
None.
None.
Asset wasn't running at time of scan.
-Email-Service
This description field is required by OSCAL.
FedRAMP does not require any specific information here.
-Describe how Part a is satisfied within the system.
Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
In this case, a link must be provided to the policy.
FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
The specified component is the system itself.
Any control implementation response that can not be associated with another component is associated with the component representing the system.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Identity Management and Access Control Policy.
@@ -1376,23 +1422,23 @@There
Describe the plan to complete the implementation.
Describe how this policy currently satisfies part a.
Describe the plan for addressing the missing policy elements.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe the plan to complete the implementation.
Describe any customer-configured requirements for satisfying this control.
Describe how the control is satisfied within the system.
Describe how AC-2, part a is satisfied within this system.
This points to the "This System" component, and is used any time a more specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
Not associated with inheritance, thus associated this with the by-component for "this system".
For the portion of the control satisfied by the application component of this system, describe how the control is met.
Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
In the context of the application component in satisfaction of AC-2, part a.
Leveraging system's responsibilities with respect to inheriting this capability from this application.
In the context of the application component in satisfaction of AC-2, part a.
While the "this system" component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
Optional description.
Consumer-appropriate description of what may be inherited as provided by the leveraged system.
@@ -1527,7 +1573,7 @@It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
Description of how the responsibility was satisfied.
The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
Describe how Part a is satisfied.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1589,36 +1635,36 @@Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1655,38 +1701,38 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1722,36 +1768,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1787,34 +1833,34 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1850,36 +1896,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1915,36 +1961,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1980,36 +2026,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2045,36 +2091,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2110,36 +2156,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2175,36 +2221,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2240,36 +2286,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2305,36 +2351,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2370,36 +2416,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2435,36 +2481,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2500,36 +2546,36 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2565,31 +2611,31 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
DMARC is employed.
@@ -2608,21 +2654,21 @@Describe the plan to complete the implementation.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2663,11 +2709,11 @@SSP Signature
AC Policy document
@@ -2722,7 +2768,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Policy document
@@ -2738,7 +2784,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Policy document
@@ -2754,7 +2800,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Policy document
@@ -2770,7 +2816,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Policy document
@@ -2786,7 +2832,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Policy document
@@ -2803,7 +2849,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Policy document
@@ -2819,7 +2865,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Policy document
@@ -2835,7 +2881,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Policy document
@@ -2851,7 +2897,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Policy document
@@ -2867,7 +2913,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Policy document
@@ -2883,7 +2929,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Policy document
@@ -2899,7 +2945,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Policy document
@@ -2915,7 +2961,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Policy document
@@ -2931,7 +2977,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Policy document
@@ -2947,7 +2993,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Policy document
@@ -2963,7 +3009,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Policy document
@@ -2979,7 +3025,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Policy document
@@ -2996,7 +3042,7 @@AC Procedure document
@@ -3012,7 +3058,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Procedure document
@@ -3028,7 +3074,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Procedure document
@@ -3044,7 +3090,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Procedure document
@@ -3060,7 +3106,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Procedure document
@@ -3076,7 +3122,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Procedure document
@@ -3092,7 +3138,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Procedure document
@@ -3108,7 +3154,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Procedure document
@@ -3124,7 +3170,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Procedure document
@@ -3140,7 +3186,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Procedure document
@@ -3156,7 +3202,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Procedure document
@@ -3172,7 +3218,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Procedure document
@@ -3188,7 +3234,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Procedure document
@@ -3204,7 +3250,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Procedure document
@@ -3220,7 +3266,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Procedure document
@@ -3236,7 +3282,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Procedure document
@@ -3252,7 +3298,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Procedure document
@@ -3268,7 +3314,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Procedure document
@@ -3285,7 +3331,7 @@User's Guide
@@ -3303,7 +3349,7 @@ -Rules of Behavior
@@ -3320,7 +3366,7 @@Contingency Plan (CP)
@@ -3337,7 +3383,7 @@Configuration Management (CM) Plan
@@ -3354,7 +3400,7 @@Incident Response (IR) Plan
@@ -3375,7 +3421,7 @@ -Continuous Monitoring Plan
@@ -3405,7 +3451,7 @@Supply Chain Risk Management Plan
@@ -3435,7 +3481,7 @@ -FedRAMP Logo
Must be present in a FedRAMP SSP.
CSP Logo
@@ -3471,7 +3517,7 @@Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
3PAO Logo
@@ -3485,7 +3531,7 @@The primary authorization boundary diagram.
@@ -3494,13 +3540,13 @@Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
-This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000054"
+This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000054"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary network diagram.
@@ -3510,13 +3556,13 @@Section 8.1, Figure 8-2 Network Diagram (graphic)
-This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000055"
+This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000055"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary data flow diagram.
@@ -3525,19 +3571,19 @@Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
-This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#00000000-0000-4000-8001-c00100000056"
+This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000056"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
Separation of Duties Matrix
Initial publication.
Minor prop
updates.
Represents any customers of this system as may be necessary for assigning customer responsibility.
+The provider of a leveraged system, external service, API, CLI.
+This is a sample role.
Any internal users of a leveraged authorization.
+An internal approving authority.
+There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.
The type property must also have a class of "primary" or "alternate".
The type property must also have a class of "primary" or "alternate".
Replace sample CSP information.
CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.
This party entry must be present in a FedRAMP SSP.
The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.
Generic placeholder for any external organization.
Generic placeholder for an authorizing agency.
Underlying service provider. Leveraged Authorization.
Exactly one
+Zero or more
Exactly one
One or more
Exactly one
One or more
Exactly one
Exactly one
Exactly one
Exactly one
Exactly one
-Exactly one
This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and High baselines.
-Guidance for OSCAL-based FedRAMP Tailored Low Impact - Software as a Service (LI-SaaS) content has not yet been developed.
-A description of the information.
@@ -586,11 +614,11 @@A holistic, top-level explanation of the FedRAMP authorization boundary.
A diagram-specific explanation.
A holistic, top-level explanation of the network architecture.
-A diagram-specific explanation.
A holistic, top-level explanation of the system's data flows.
-A diagram-specific explanation.
Describe the features used from Service A.
-This service must be explicitly listed for this CSO on the FedRAMP Marketplace.
-Describe the features used from Service B.
-This service must be explicitly listed for this CSO on the FedRAMP Marketplace.
-If 'yes', describe the user authentication method.
@@ -657,169 +669,154 @@If 'not-applicable', attest that no users access the leveraged system.
Use one leveraged-authorization assembly for each underlying system. In the legacy world, these may be general support systems.
-The link fields are optional, but preferred when known. Often, a leveraging system's SSP author will not have access to the leveraged system's SSP, but should have access to the leveraged system's CRM.
+Use one leveraged-authorization assembly for each underlying authorized cloud system or general support system (GSS).
The user content is currently being investigated as it may no longer be necessary under FedRAMP's adoption of Rev 5.
+The entire system as depicted in the system authorization boundary
-Email is employed
+FedRAMP requires exactly one "this-system" component.
+This is used in SSP control responses.
When applicable, components must specify services, ports, and protocols.
+All components that use or implement encryption must reference a "validation" component.
+Provide a description and any pertinent note regarding the use of this CM.
-For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
-Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
For a leveraged authoriation, describe the information being transferred.
+System development information
+System and network monitoring information
+For a leveraged authorization, this property must always be present to link this component to the leveraged authorization.
+For a leveraged system, this property must always be present with a value of "external".
+Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
+Provide a description and any pertinent note regarding the use of this CM.
-For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+This is a service provided by the leveraged system.
+It is explicitly listed on the FedRAMP marketplace as being an authorized service.
+As a result, this service includes both the "provided-by" link and the "leveraged-authorization-uuid" property.
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
This is a service provided by the leveraged system.
+It is NOT explicitly listed on the FedRAMP marketplace as being an authorized service.
+As a result, this service still includes the "provided-by" link, but omits the "leveraged-authorization-uuid" property.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
If "other", remarks are required. Optional otherwise.
Optional notes about this interconnection
Provide a description and any pertinent note regarding the use of this CM.
+For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
+Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+Provide a description and any pertinent note regarding the use of this CM.
+For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+FUNCTION: Describe typical component function.
+COMMENTS: Provide other comments as needed.
+FUNCTION: Describe typical component function.
@@ -948,16 +1008,18 @@COMMENTS: Provide other comments as needed.
FUNCTION: Describe typical component function.
@@ -970,16 +1032,16 @@COMMENTS: Provide other comments as needed.
None
@@ -990,7 +1052,7 @@None
@@ -1001,7 +1063,7 @@None
@@ -1019,123 +1081,332 @@[EXAMPLE]component representing a collection of policies in appendix A.
-The Access Control Policy governs how access is managed and approved.
+Links to the components, attached as a resource
in back-matter
.
[EXAMPLE]component representing a collection of procedures in appendix A.
-The Awareness and Training Policy governs how access is managed and approved.
+Links to the components, attached as a resource
in back-matter
.
The Audit and Accountability governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Policy governs how access is managed and approved.
+The Configuration Management Policy governs how access is managed and approved.
+The Contingency Planning Policy governs how access is managed and approved.
+The Identificaiton and Authentication Policy governs how access is managed and approved.
+The Incident Response Policy governs how access is managed and approved.
+The Maintenance Policy governs how access is managed and approved.
+The Media Protection Policy governs how access is managed and approved.
+The Physical and Enviornmental Protection Policy governs how access is managed and approved.
+The Planning Policy governs how access is managed and approved.
+The Program Management Policy governs how access is managed and approved.
+The Personnel Security Policy governs how access is managed and approved.
+The PII Processing and Transparency Policy governs how access is managed and approved.
+The Risk Assessment Policy governs how access is managed and approved.
+The System and Services Acquisition Policy governs how access is managed and approved.
+The System and Communication Protection Policy governs how access is managed and approved.
+The System and Information Integrity Policy governs how access is managed and approved.
+The Supply Chain Risk Management Policy governs how access is managed and approved.
+Describe the service
+The Access Control Procedure governs how access is managed and approved.
Section 10.2, Table 10-1. Ports, Protocols and Services
-- SERVICES ARE NOW COMPONENTS WITH type='service' -
-Briefly describe the interconnection.
+The Awareness and Training Procedure governs how access is managed and approved.
If "other", remarks are required. Optional otherwise.
-The Audit and Accountability Procedure governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Procedure governs how access is managed and approved.
+The Configuration Management Procedure governs how access is managed and approved.
+The Contingency Planning Procedure governs how access is managed and approved.
+The Identificaiton and Authentication Procedure governs how access is managed and approved.
+The Incident Response Procedure governs how access is managed and approved.
+The Maintenance Procedure governs how access is managed and approved.
+The Media Protection Procedure governs how access is managed and approved.
+The Physical and Enviornmental Protection Procedure governs how access is managed and approved.
+The Planning Procedure governs how access is managed and approved.
+The Program Management Procedure governs how access is managed and approved.
+The Personnel Security Procedure governs how access is managed and approved.
+The PII Processing and Transparency Procedure governs how access is managed and approved.
+The Risk Assessment Procedure governs how access is managed and approved.
+The System and Services Acquisition Procedure governs how access is managed and approved.
+The System and Communication Protection Procedure governs how access is managed and approved.
+The System and Information Integrity Procedure governs how access is managed and approved.
+The Supply Chain Risk Management Procedure governs how access is managed and approved.
+Optional notes about this interconnection
-IPv4 Production Subnet.
@@ -1145,7 +1416,7 @@IPv4 Management Subnet.
@@ -1156,19 +1427,19 @@Email Service
Legacy Example (No implemented-component).
Optional, longer, formatted description.
- +This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
COMMENTS: Additional information about this item.
Component Inventory Example
COMMENTS: If needed, provide additional information about this inventory item.
None.
None.
None.
None.
Asset wasn't running at time of scan.
-None.
None.
Asset wasn't running at time of scan.
-Email-Service
This description field is required by OSCAL.
FedRAMP does not require any specific information here.
-Describe how Part a is satisfied within the system.
Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
In this case, a link must be provided to the policy.
FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
The specified component is the system itself.
Any control implementation response that can not be associated with another component is associated with the component representing the system.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Identity Management and Access Control Policy.
@@ -1422,8 +1693,8 @@There
Describe how this policy currently satisfies part a.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe how the control is satisfied within the system.
Describe how AC-2, part a is satisfied within this system.
This points to the "This System" component, and is used any time a more specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
Not associated with inheritance, thus associated this with the by-component for "this system".
For the portion of the control satisfied by the application component of this system, describe how the control is met.
Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
In the context of the application component in satisfaction of AC-2, part a.
Leveraging system's responsibilities with respect to inheriting this capability from this application.
In the context of the application component in satisfaction of AC-2, part a.
While the "this system" component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
Optional description.
Consumer-appropriate description of what may be inherited as provided by the leveraged system.
@@ -1573,7 +1844,7 @@It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
Description of how the responsibility was satisfied.
The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
Describe how the control is satisfied within the system.
Describe how Part a is satisfied.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1635,22 +1906,22 @@Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1701,24 +1972,24 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1768,22 +2039,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1833,22 +2104,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1896,22 +2167,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -1961,22 +2232,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2026,22 +2297,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2091,22 +2362,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2156,22 +2427,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2221,22 +2492,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2286,22 +2557,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2351,22 +2622,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2416,22 +2687,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2481,22 +2752,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2546,22 +2817,22 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2611,31 +2882,31 @@For the portion of the control satisfied by the service provider, describe how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how the control is satisfied within the system.
DMARC is employed.
@@ -2654,7 +2925,7 @@Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
That component contains a link to the policy, so it does not have to be linked here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
@@ -2709,7 +2980,7 @@SSP Signature
AC Policy document
@@ -2768,7 +3039,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Policy document
@@ -2784,7 +3055,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Policy document
@@ -2800,7 +3071,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Policy document
@@ -2816,7 +3087,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Policy document
@@ -2832,7 +3103,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Policy document
@@ -2849,7 +3120,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Policy document
@@ -2865,7 +3136,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Policy document
@@ -2881,7 +3152,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Policy document
@@ -2897,7 +3168,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Policy document
@@ -2913,7 +3184,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Policy document
@@ -2929,7 +3200,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Policy document
@@ -2945,7 +3216,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Policy document
@@ -2961,7 +3232,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Policy document
@@ -2977,7 +3248,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Policy document
@@ -2993,7 +3264,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Policy document
@@ -3009,7 +3280,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Policy document
@@ -3025,7 +3296,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Policy document
@@ -3042,7 +3313,7 @@AC Procedure document
@@ -3058,7 +3329,7 @@May use rlink
with a relative path, or embedded as base64
.
AT Procedure document
@@ -3074,7 +3345,7 @@May use rlink
with a relative path, or embedded as base64
.
AU Procedure document
@@ -3090,7 +3361,7 @@May use rlink
with a relative path, or embedded as base64
.
CA Procedure document
@@ -3106,7 +3377,7 @@May use rlink
with a relative path, or embedded as base64
.
CM Procedure document
@@ -3122,7 +3393,7 @@May use rlink
with a relative path, or embedded as base64
.
CP Procedure document
@@ -3138,7 +3409,7 @@May use rlink
with a relative path, or embedded as base64
.
IA Procedure document
@@ -3154,7 +3425,7 @@May use rlink
with a relative path, or embedded as base64
.
IR Procedure document
@@ -3170,7 +3441,7 @@May use rlink
with a relative path, or embedded as base64
.
MA Procedure document
@@ -3186,7 +3457,7 @@May use rlink
with a relative path, or embedded as base64
.
MP Procedure document
@@ -3202,7 +3473,7 @@May use rlink
with a relative path, or embedded as base64
.
PE Procedure document
@@ -3218,7 +3489,7 @@May use rlink
with a relative path, or embedded as base64
.
PL Procedure document
@@ -3234,7 +3505,7 @@May use rlink
with a relative path, or embedded as base64
.
PS Procedure document
@@ -3250,7 +3521,7 @@May use rlink
with a relative path, or embedded as base64
.
RA Procedure document
@@ -3266,7 +3537,7 @@May use rlink
with a relative path, or embedded as base64
.
SA Procedure document
@@ -3282,7 +3553,7 @@May use rlink
with a relative path, or embedded as base64
.
SC Procedure document
@@ -3298,7 +3569,7 @@May use rlink
with a relative path, or embedded as base64
.
SI Procedure document
@@ -3314,7 +3585,7 @@May use rlink
with a relative path, or embedded as base64
.
SR Procedure document
@@ -3331,7 +3602,7 @@User's Guide
@@ -3349,7 +3620,7 @@ -Rules of Behavior
@@ -3366,7 +3637,7 @@Contingency Plan (CP)
@@ -3383,7 +3654,7 @@Configuration Management (CM) Plan
@@ -3400,7 +3671,7 @@Incident Response (IR) Plan
@@ -3421,7 +3692,7 @@ -Continuous Monitoring Plan
@@ -3451,7 +3722,7 @@Supply Chain Risk Management Plan
@@ -3481,7 +3752,7 @@ -FedRAMP Logo
@@ -3504,7 +3775,7 @@Must be present in a FedRAMP SSP.
CSP Logo
@@ -3517,7 +3788,7 @@Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
3PAO Logo
@@ -3531,7 +3802,7 @@The primary authorization boundary diagram.
@@ -3540,13 +3811,13 @@Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
-This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000054"
+This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000054"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary network diagram.
@@ -3556,13 +3827,13 @@Section 8.1, Figure 8-2 Network Diagram (graphic)
-This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000055"
+This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000055"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
The primary data flow diagram.
@@ -3571,14 +3842,14 @@Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
-This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-c00100000056"
+This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000056"
May use rlink
with a relative path, or embedded as base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
Separation of Duties Matrix
From 21582e329177809823fd5ba439169e045d5c5dfb Mon Sep 17 00:00:00 2001 From: Brian RufIf the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
+For a leveraged authoriation, describe the information being transferred.
+Describe the information being transferred in the @value field.
System development information
@@ -756,66 +757,72 @@Must have a "system" component for each FedRAMP Authorized System leveraged by this system as an underlying service provider.
+An authorized service provided by Awesome Cloud
+Describe the service and what it is used for.
This is a service provided by the leveraged system.
-It is explicitly listed on the FedRAMP marketplace as being an authorized service.
-As a result, this service includes both the "provided-by" link and the "leveraged-authorization-uuid" property.
+The service is explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO.
+As a result, this service includes the "leveraged-authorization-uuid" property.
+All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+A non-authorized service provided by an authorized, leveraged system.
+Describe the service and what it is used for.
This is a service provided by the leveraged system.
-It is NOT explicitly listed on the FedRAMP marketplace as being an authorized service.
-As a result, this service still includes the "provided-by" link, but omits the "leveraged-authorization-uuid" property.
+It is NOT explicitly listed on the FedRAMP marketplace as being within the scope of leveraged system's ATO.
+As a result, the "leveraged-authorization-uuid" property must NOT be used.
+All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
+All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+A service provided by an external system other than the leveraged system.
+Describe the service and what it is used for.
This is a service provided by an external system other than the leveraged system.
+As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
+All services require the "implementation-point" property. In this case, the property value is set to "external.
+All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
-A service that exists within the authorization boundary.
+Describe the service and what it is used for.
+Any internal users of a leveraged authorization.
The owner of an external system.
+The highest level manager who responsible for an external system's operation on behalf of the System Owner.
+The individual or individuals leading the technical operation of an external system.
+This is a service provided by the leveraged system.
The service is explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO.
@@ -822,6 +852,62 @@Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
+Describe the information being transferred in the @value field.
+System development information
+System and network monitoring information
+For a leveraged system, this property must always be present with a value of "external".
+Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
+Each interconnection must be defined with both an "system" component and an "interconnection" component.
+Must include all leveraged services and features from the leveraged authorization here.
+None
+Initial publication.
Minor prop
updates.
The FedRAMP PMO resides within GSA and supports agencies and cloud service providers through the FedRAMP authorization process and maintains a secure repository of FedRAMP authorizations to enable reuse of security packages.
+The FedRAMP PMO resides within GSA and supports agencies and cloud service providers + through the FedRAMP authorization process and maintains a secure repository of + FedRAMP authorizations to enable reuse of security packages.
The organization that prepared this SSP. If developed in-house, this is the CSP itself.
+The organization that prepared this SSP. If developed in-house, this is the CSP + itself.
The individual within the CSP who is ultimately accountable for everything related to this system.
+The individual within the CSP who is ultimately accountable for everything related to + this system.
The individual or individuals who must grant this system an authorization to operate.
+The individual or individuals who must grant this system an authorization to + operate.
The highest level manager who responsible for system operation on behalf of the System Owner.
+The highest level manager who responsible for system operation on behalf of the + System Owner.
The individual accountable for the security posture of the system on behalf of the system owner.
+The individual accountable for the security posture of the system on behalf of the + system owner.
The individual responsible for the privacy threshold analysis and if necessary the privacy impact assessment.
+The individual responsible for the privacy threshold analysis and if necessary the + privacy impact assessment.
The point of contact for an interconnection on behalf of this external system to which this system connects.
+The point of contact for an interconnection on behalf of this external system to + which this system connects.
Remove this role if there are no ICAs.
@@ -135,7 +147,8 @@Responsible for signing an interconnection security agreement on behalf of this system.
+Responsible for signing an interconnection security agreement on behalf of this + system.
Remove this role if there are no ICAs.
@@ -144,7 +157,8 @@Responsible for signing an interconnection security agreement on behalf of the external system to which this system connects.
+Responsible for signing an interconnection security agreement on behalf of the + external system to which this system connects.
Remove this role if there are no ICAs.
@@ -159,7 +173,8 @@Represents any customers of this system as may be necessary for assigning customer responsibility.
+Represents any customers of this system as may be necessary for assigning customer + responsibility.
The highest level manager who responsible for an external system's operation on behalf of the System Owner.
+The highest level manager who responsible for an external system's operation on + behalf of the System Owner.
The individual or individuals leading the technical operation of an external system.
+The individual or individuals leading the technical operation of an external + system.
There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.
+There must be one location identifying the CSP's primary business address, such as + the CSP's HQ, or the address of the system owner's primary business location.
Replace sample CSP information.
-CSP information must be present and associated with the "cloud-service-provider" role via responsible-party
.
CSP information must be present and associated with the "cloud-service-provider" role
+ via responsible-party
.
This party entry must be present in a FedRAMP SSP.
-The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.
+The uuid may be different; however, the uuid must be associated with the + "fedramp-pmo" role in the responsible-party assemblies.
This party entry must be present in a FedRAMP SSP.
-The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.
+The uuid may be different; however, the uuid must be associated with the + "fedramp-jab" role in the responsible-party assemblies.
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
+This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official + FedRAMP 3.0.0 release.
Must adjust accordingly for applicable baseline and revision.
[Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above] offering using a multi-tenant [insert based on the Deployment Model above] cloud computing environment. It is available to [Insert scope of customers in accordance with instructions above (for example, the public, federal, state, local, and tribal governments, as well as research institutions, federal contractors, government contractors etc.)].
-NOTE: Additional description, including the purpose and functions of this system may be added here. This includes any narrative text usually included in section 9.1 of the SSP.
+[Insert CSO Name] is delivered as [a/an] [insert based on the Service Model above] + offering using a multi-tenant [insert based on the Deployment Model above] cloud + computing environment. It is available to [Insert scope of customers in accordance with + instructions above (for example, the public, federal, state, local, and tribal + governments, as well as research institutions, federal contractors, government + contractors etc.)].
+NOTE: Additional description, including the purpose and functions of this system may be + added here. This includes any narrative text usually included in section 9.1 of the + SSP.
NOTE: The description is expected to be at least 32 words in length.
Remarks are required if deployment model is "hybrid-cloud" or "other". Optional otherwise.
+Remarks are required if deployment model is "hybrid-cloud" or "other". Optional + otherwise.
Use one leveraged-authorization assembly for each underlying authorized cloud system or general support system (GSS).
+Use one leveraged-authorization assembly for each underlying authorized cloud system + or general support system (GSS).
The user content is currently being investigated as it may no longer be necessary under FedRAMP's adoption of Rev 5.
+The user content is currently being investigated as it may no longer be necessary + under FedRAMP's adoption of Rev 5.
The entire system as depicted in the system authorization boundary
FedRAMP requires exactly one "this-system" component.
-This is used in SSP control responses.
+This is used in SSP control responses and may be used in interconnection + linkages.
When applicable, components must specify services, ports, and protocols.
-All components that use or implement encryption must reference a "validation" component.
+All components that use or implement encryption must reference a "validation" + component.
If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+Briefly describe the leveraged system.
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
-Describe the information being transferred in the @value field.
-System development information
-System and network monitoring information
-For a leveraged authorization, this property must always be present to link this component to the leveraged authorization.
-For a leveraged system, this property must always be present with a value of "external".
-Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
-Must have a "system" component for each FedRAMP Authorized System leveraged by this system as an underlying service provider.
+Each leveraged authorization must have:
+a "leveraged-authorization" entry.
+a "system" component (this component).
+ +This component must always have:
+- The name of the leveraged system in the title - exactly as it appears in the + FedRAMP Marketplace
+- A "leveraged authorization-uuid" property that links this component to the + leveraged-authorization entry.
+- An "implementation-point" property with a value of "external".
+- A responsible-role with a role-id of "provider" and exactly one party-uuid entry + that indicates which organization is the provider of this leveraged system.
+- A "nature-of-agreement" property with an appropriate allowed value. If the value is + "other", use the proeprty's remarks to descibe the agreement.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- C.3.5.1 is System development information
+- C.3.5.8 is System and network monitoring information
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+ +Create a separate "service" component for each service used from the leveraged + system.
+- If the service is included in the ATO scope and listed on the FedRAMP marketplace, + use the "leveraged-authorization-uuid" property in the "service" component to link it + directly to the leveraged authorization.
+- If the service is not included in the ATO scope or not listed on the FedRAMP + marketplace, the "leveraged-authorization-uuid" property must be omitted from the + "service" component.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorizationo assembly:
+- Package ID, Authorization Type, Impact Level
An authorized service provided by Awesome Cloud
+An authorized service provided by the Awesome Cloud leveraged authorization.
Describe the service and what it is used for.
This is a service provided by the leveraged system.
-The service is explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO.
-As a result, this service includes the "leveraged-authorization-uuid" property.
-All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
-If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
+This service is explicitly listed on the FedRAMP marketplace as being included in the + scope of this leveraged system's ATO.
+ +Each service used from a leveraged authorization must have:
+- a "leveraged-authorization" entry.
+- a "system" component linked to the leveraged-authorization entry.
+- a "service" component (this component).
+ +This component must always have:
+- The name of the service in the title - exactly as it appears in the FedRAMP + Marketplace
+- A "leveraged authorization-uuid" property that links this component to the + leveraged-authorization entry.
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- Package ID, Authorization Type, Impact Level
+ +The following fields from the Leveraged Authorization Table are handled in the + "system" component assembly:
+- Nature of Agreement, CSP Name
A non-authorized service provided by an authorized, leveraged system.
+An non-authorized service provided by the Awesome Cloud leveraged authorization.
Describe the service and what it is used for.
This is a service provided by the leveraged system.
-It is NOT explicitly listed on the FedRAMP marketplace as being within the scope of leveraged system's ATO.
-As a result, the "leveraged-authorization-uuid" property must NOT be used.
-All services require the "implementation-point" property. With a leveraged service, this property value is set to "external.
-All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
This service is provided by the leveraged system; however, it is NOT explicitly + listed on the FedRAMP marketplace as being included in the scope of this leveraged + system's ATO.
+As a result, the "leveraged-authorization-uuid" property must NOT be present.
+ +Each NON-authorized service used from a leveraged authorization must have:
+- a "leveraged-authorization" entry.
+- a "system" component linked to the leveraged-authorization entry.
+- a "service" component (this component).
+ +This component must always have:
+- The name of the service in the title - preferably exactly as it appears on the + vendor's web site
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- Package ID, Authorization Type, Impact Level
+ +The following fields from the Leveraged Authorization Table are handled in the + "system" component assembly:
+- Nature of Agreement, CSP Name
+ +An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
A service provided by an external system other than the leveraged system.
-Describe the service and what it is used for.
-This is a service provided by an external system other than the leveraged system.
-As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
-All services require the "implementation-point" property. In this case, the property value is set to "external.
-All external services would normally require a "provided-by" link; however, a known bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, etc
+Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, + etc
Describe the information being transferred in the @value field.
For a leveraged system, this property must always be present with a value of "external".
+For a leveraged system, this property must always be present with a value of + "external".
Include this property if available, such as through an OSCAL-based CRM, component definition, or direct access to the leveraged system's SSP.
+Include this property if available, such as through an OSCAL-based CRM, component + definition, or direct access to the leveraged system's SSP.
Each interconnection must be defined with both an "system" component and an "interconnection" component.
-Must include all leveraged services and features from the leveraged authorization here.
+For each external system with which this system connects:
+Must have a "system" component (this component).
+Must have an "interconnection" component that connects this component with the + "this-system" component.
+If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Must include all leveraged services and features from the leveraged authorization + here.
+For an external system, the "implementation-point" property must always be present + with a value of "external".
+ + +Each interconnection must be defined with both an "system" component and an + "interconnection" component.
+Must include all leveraged services and features from the leveraged authorization + here.
If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Must include all leveraged services and features from the leveraged authorization here.
+If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Must include all leveraged services and features from the leveraged authorization + here.
Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.).
+Describe the purpose of the external system/service; specifically, provide reasons + for connectivity (e.g., system monitoring, system alerting, download updates, + etc.).
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, + etc
+Describe the information being transferred in the @value field.
+System development information
+System and network monitoring information
+For a leveraged system, this property must always be present with a value of + "external".
+Include this property if available, such as through an OSCAL-based CRM, component + definition, or direct access to the leveraged system's SSP.
+For each external system with which this system connects:
+Must have a "system" component (this component).
+Must have an "interconnection" component that connects this component with the + "this-system" component.
+If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Must include all leveraged services and features from the leveraged authorization + here.
+For an external system, the "implementation-point" property must always be present + with a value of "external".
+ + +Each interconnection must be defined with both an "system" component and an + "interconnection" component.
+Must include all leveraged services and features from the leveraged authorization + here.
+A service provided by an external system other than the leveraged system.
+Describe the service and what it is used for.
+This is a service provided by an external system other than the leveraged system.
+As a result, the "leveraged-authorization-uuid" property is not applicable and must + NOT be used.
+ +Each external service used from a leveraged authorization must have:
+- a "system" component (CURRENTLY DEFERRED DUE TO A KNOWN ISSUE WITH THE "provided-by" link relationship).
+- a "service" component (this component).
+ +This component must always have:
+- The name of the service in the title - preferably exactly as it appears on the + vendor's web site
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) constraints, + this property is blocked from proper use.
+- a status with a state value of "operational"
+ +Where relevant, this component should also have:
+- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+ +The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- Package ID, Authorization Type, Impact Level
+ +The following fields from the Leveraged Authorization Table are handled in the + "system" component assembly:
+- Nature of Agreement, CSP Name
+ +An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+ + +All services require the "implementation-point" property. In this case, the property + value is set to "external.
+All external services would normally require a "provided-by" link; however, a known + bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
Link(s) to the vendor's web site describing the service are encouraged, but not + required..
+ + +A service provided by an external system other than the leveraged system.
+Describe the service and what it is used for.
+This is a service provided by an external system other than the leveraged system.
+As a result, the "leveraged-authorization-uuid" property is not applicable and must + NOT be used.
+All services require the "implementation-point" property. In this case, the property + value is set to "external.
+All external services would normally require a "provided-by" link; however, a known + bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
None
A service that exists within the authorization boundary.
@@ -1032,7 +1345,7 @@Provide a description and any pertinent note regarding the use of this CM.
-For data-at-rest modules, describe type of encryption implemented (e.g., full disk, file, record-level, etc.)
-Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+For data-at-rest modules, describe type of encryption implemented (e.g., full disk, + file, record-level, etc.)
+Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS + compliance (e.g., Module in Process).
Provide a description and any pertinent note regarding the use of this CM.
-For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
+For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS + compliance (e.g., Module in Process).
FUNCTION: Describe typical component function.
@@ -1103,8 +1423,8 @@COMMENTS: Provide other comments as needed.
FUNCTION: Describe typical component function.
@@ -1148,7 +1468,7 @@COMMENTS: Provide other comments as needed.
None
@@ -1159,7 +1479,7 @@None
@@ -1170,14 +1490,15 @@None
The Assessment, Authorization, and Monitoring Policy governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Policy governs how access is managed + and approved.
The Identificaiton and Authentication Policy governs how access is managed and approved.
+The Identificaiton and Authentication Policy governs how access is managed and + approved.
The Physical and Enviornmental Protection Policy governs how access is managed and approved.
+The Physical and Enviornmental Protection Policy governs how access is managed and + approved.
The PII Processing and Transparency Policy governs how access is managed and approved.
+The PII Processing and Transparency Policy governs how access is managed and + approved.
The System and Services Acquisition Policy governs how access is managed and approved.
+The System and Services Acquisition Policy governs how access is managed and + approved.
The System and Communication Protection Policy governs how access is managed and approved.
+The System and Communication Protection Policy governs how access is managed and + approved.
The System and Information Integrity Policy governs how access is managed and approved.
+The System and Information Integrity Policy governs how access is managed and + approved.
The Supply Chain Risk Management Policy governs how access is managed and approved.
+The Supply Chain Risk Management Policy governs how access is managed and + approved.
The Audit and Accountability Procedure governs how access is managed and approved.
+The Audit and Accountability Procedure governs how access is managed and + approved.
The Assessment, Authorization, and Monitoring Procedure governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Procedure governs how access is managed + and approved.
The Configuration Management Procedure governs how access is managed and approved.
+The Configuration Management Procedure governs how access is managed and + approved.
The Identificaiton and Authentication Procedure governs how access is managed and approved.
+The Identificaiton and Authentication Procedure governs how access is managed and + approved.
The Physical and Enviornmental Protection Procedure governs how access is managed and approved.
+The Physical and Enviornmental Protection Procedure governs how access is managed and + approved.
The PII Processing and Transparency Procedure governs how access is managed and approved.
+The PII Processing and Transparency Procedure governs how access is managed and + approved.
The System and Services Acquisition Procedure governs how access is managed and approved.
+The System and Services Acquisition Procedure governs how access is managed and + approved.
The System and Communication Protection Procedure governs how access is managed and approved.
+The System and Communication Protection Procedure governs how access is managed and + approved.
The System and Information Integrity Procedure governs how access is managed and approved.
+The System and Information Integrity Procedure governs how access is managed and + approved.
The Supply Chain Risk Management Procedure governs how access is managed and approved.
+The Supply Chain Risk Management Procedure governs how access is managed and + approved.
Email Service
@@ -1597,7 +1936,9 @@This links to a FIPS 140-2 validated software component that is used by this inventory item. This type of linkage to a validation through the component is preferable to the link[rel='validation'] example above.
+This links to a FIPS 140-2 validated software component that is used by this + inventory item. This type of linkage to a validation through the component is + preferable to the link[rel='validation'] example above.
Asset wasn't running at time of scan.
-Asset wasn't running at time of scan.
-Describe how Part a is satisfied within the system.
-Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+Legacy approach. If no policy component is defined, describe here how the + policy satisfies part a.
In this case, a link must be provided to the policy.
-FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
+FedRAMP prefers all policies and procedures be attached as a resource in the + back-matter. The link points to a resource.
The specified component is the system itself.
-Any control implementation response that can not be associated with another component is associated with the component representing the system.
+Any control implementation response that can not be associated with another + component is associated with the component representing the system.
Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Identity Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+Component approach. This links to a component representing the Identity + Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked + here too.
There
Describe the plan to complete the implementation.
Describe how this policy currently satisfies part a.
Describe the plan for addressing the missing policy elements.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe any customer-configured requirements for satisfying this control.
Describe how the control is satisfied within the system.
Describe how AC-2, part a is satisfied within this system.
-This points to the "This System" component, and is used any time a more specific component reference is not available.
+This points to the "This System" component, and is used any time a more + specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
+Leveraged system's statement of capabilities which may be inherited by a + leveraging systems to satisfy AC-2, part a.
Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
-Not associated with inheritance, thus associated this with the by-component for "this system".
+Leveraged system's statement of a leveraging system's responsibilities in + satisfaction of AC-2, part a.
+Not associated with inheritance, thus associated this with the + by-component for "this system".
For the portion of the control satisfied by the application component of this system, describe how the control is met.
+For the portion of the control satisfied by the application component of this + system, describe how the control is met.
Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
-In the context of the application component in satisfaction of AC-2, part a.
+Consumer-appropriate description of what may be inherited from this + application component by a leveraging system.
+In the context of the application component in satisfaction of AC-2, part + a.
Leveraging system's responsibilities with respect to inheriting this capability from this application.
-In the context of the application component in satisfaction of AC-2, part a.
+Leveraging system's responsibilities with respect to inheriting this + capability from this application.
+In the context of the application component in satisfaction of AC-2, part + a.
The component-uuid above points to the "this system" component.
-Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.
-This can also be used to provide a summary, such as a holistic overview of how multiple components work together.
-While the "this system" component is not explicitly required within every statement
, it will typically be present.
Any control response content that does not cleanly fit another system component + is placed here. This includes customer responsibility content.
+This can also be used to provide a summary, such as a holistic overview of how + multiple components work together.
+While the "this system" component is not explicitly required within every
+ statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
+For the portion inherited from an underlying FedRAMP-authorized provider, + describe what is inherited.
Optional description.
-Consumer-appropriate description of what may be inherited as provided by the leveraged system.
+Consumer-appropriate description of what may be inherited as provided by the + leveraged system.
In the context of this component in satisfaction of AC-2, part a.
-The provided-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+The provided-uuid
links this to the same statement in the
+ leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based + CRM (Inheritance and Responsibility Model).
Description of how the responsibility was satisfied.
-The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
-Tools should use this to ensure all identified customer responsibility
statements have a corresponding satisfied
statement in the leveraging system's SSP.
The responsibility-uuid
links this to the same statement in the
+ leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based + CRM (Inheritance and Responsibility Model).
+Tools should use this to ensure all identified customer
+ responsibility
statements have a corresponding
+ satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
Describe how the control is satisfied within the system.
Describe how Part a is satisfied.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
Describe how Part b-1 is satisfied.
Describe how Part b-2 is satisfied.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how the control is satisfied within the system.
DMARC is employed.
@@ -3046,7 +3610,8 @@Describe how the control is satisfied within the system.
For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe + how the control is met.
Describe how this policy component satisfies part a.
Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
+That component contains a link to the policy, so it does not have to be linked + here too.
Describe how this procedure component satisfies part a.
Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
+That component contains a link to the procedure, so it does not have to be + linked here too.
FedRAMP is formulating guidelines for handling digital/electronic signatures in OSCAL, and welcome feedback on solutions.
+FedRAMP is formulating guidelines for handling digital/electronic signatures in + OSCAL, and welcome feedback on solutions.
For now, FedRAMP recommends one of the following:
If your organization prefers another approach, please seek prior approval from the FedRAMP PMO.
+If your organization prefers another approach, please seek prior approval from the + FedRAMP PMO.
Must be present in a FedRAMP SAP.
Must be present in a FedRAMP SSP.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: User's Guide Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Rules of Behavior (ROB)
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Contingency Plan (CP) Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Configuration Management (CM) Plan Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Incident Response (IR) Plan Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Continuous Monitoring Plan Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic)
-This should be referenced in the system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000054"
-May use rlink
with a relative path, or embedded as base64
.
This should be referenced in the + system-characteristics/authorization-boundary/diagram/link/@href flag using a value + of "#11111111-2222-4000-8000-001000000054"
+May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
Section 8.1, Figure 8-2 Network Diagram (graphic)
-This should be referenced in the system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000055"
-May use rlink
with a relative path, or embedded as base64
.
This should be referenced in the + system-characteristics/network-architecture/diagram/link/@href flag using a value of + "#11111111-2222-4000-8000-001000000055"
+May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
Section 8.1, Figure 8-3 Data Flow Diagram (graphic)
-This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000056"
-May use rlink
with a relative path, or embedded as base64
.
This should be referenced in the system-characteristics/data-flow/diagram/link/@href + flag using a value of "#11111111-2222-4000-8000-001000000056"
+May use rlink
with a relative path, or embedded as
+ base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
+Images must be in sufficient resolution to read all detail when rendered in a browser + via HTML5.
May use rlink
with a relative path, or embedded as base64
.
May use rlink
with a relative path, or embedded as
+ base64
.
The user content is currently being investigated as it may no longer be necessary - under FedRAMP's adoption of Rev 5.
+The user assembly is being reviewed for continued applicability under FedRAMP's adoption of Rev 5.
Describe the service and what it is used for.
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+- The name of the service in the title - preferably exactly as it appears on the vendor's web site
- An "implementation-point" property with a value of "external".
+- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
- A "provided-by" link with a URI fragment that points to the UUID of the above "system" component.
- Example: "#11111111-2222-4000-8000-009000100001"
System and network monitoring information
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+For a leveraged system, this property must always be present with a value of @@ -994,6 +1024,9 @@
For an external system, the "implementation-point" property must always be present with a value of "external".
-Each interconnection must be defined with both an "system" component and an "interconnection" component.
Must include all leveraged services and features from the leveraged authorization here.
+ +The risk associated with an external system must be quantified within the context of an interconnection, service, or cli, thus risk, impact, and mitigation properties are applied to those component types.
If the leveraged system owner provides a UUID for their system (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
Must include all leveraged services and features from the leveraged authorization - here.
-Describe the purpose of the external system/service; specifically, provide reasons - for connectivity (e.g., system monitoring, system alerting, download updates, - etc.).
+ for connectivity (e.g., system monitoring, system alerting, download updates, etc.)If "other", remarks are required. Optional otherwise.
Either describe a risk associated with this interconnection, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+Optional notes about this interconnection
Describe the service and what it is used for.
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+This component must always have:
- The name of the service in the title - preferably exactly as it appears on the vendor's web site
+- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
- An "implementation-point" property with a value of "external".
- A "provided-by" link with a URI fragment that points to the UUID of the above "system" component.
@@ -1271,21 +1292,6 @@- Nature of Agreement, CSP Name
An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
- - -All services require the "implementation-point" property. In this case, the property - value is set to "external.
-All external services would normally require a "provided-by" link; however, a known - bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
Link(s) to the vendor's web site describing the service are encouraged, but not - required..
- -Describe the service and what it is used for.
Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+This is a service provided by an external system other than the leveraged system.
+ + + +- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
+ + +As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
All services require the "implementation-point" property. In this case, the property @@ -1310,6 +1340,10 @@
If the leveraged system owner provides a UUID for their service (such as in an
OSCAL-based CRM), it should be reflected in the inherited-uuid
property.
Either describe a risk associated with this CLI, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
+If there are one or more identified risks, describe any resulting impact.
+If there are one or more identified risks, describe any mitigating factors.
+This service is explicitly listed on the FedRAMP marketplace as being included in the @@ -897,10 +897,11 @@
An non-authorized service provided by the Awesome Cloud leveraged authorization.
Describe the service and what it is used for.
-Either describe a risk associated with this service, or indicate there is no identified risk.
@@ -917,8 +918,8 @@If there are one or more identified risks, describe any mitigating factors.
This service is provided by the leveraged system; however, it is NOT explicitly
listed on the FedRAMP marketplace as being included in the scope of this leveraged
@@ -969,21 +970,10 @@
An external system to which this system shares an interconnection. Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract,
- etc Describe the information being transferred in the @value field. System development information If "other", remarks are required. Optional otherwise. Optional notes about this interconnection Describe the service and what it is used for. A service provided by an external system other than the leveraged system. Describe the service and what it is used for. Either describe a risk associated with this service, or indicate there is no identified risk. This is a service provided by an external system other than the leveraged system. None
If 'yes', describe the user authentication method.
-If 'no', explain why no user authentication is used.
-If 'not-applicable', attest that no users access the leveraged system.
+For now, this is a required field. In the future we intend + to pull this information directly from FedRAMP's records + based on the "leveraged-system-identifier" property's value.
For now, this is a required field. In the future we intend + to pull this information directly from FedRAMP's records + based on the "leveraged-system-identifier" property's value.
+The user assembly is being reviewed for continued applicability under FedRAMP's adoption of Rev 5.
When applicable, components must specify services, ports, and protocols.
-All components that use or implement encryption must reference a "validation" - component.
+A FedRAMP SSP must always have exactly one component that represents the whole system. + It should be the only component with the "this-system" component type.
If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
+The "provider" role is required for the component representing + a leveraged system. It must reference exactly one party + (via party-uuid), which points to a party of type "organization" + representing the organization that owns the leveraged system.
+Each leveraged authorization must have:
-a "leveraged-authorization" entry.
-a "system" component (this component).
- -This component must always have:
-- The name of the leveraged system in the title - exactly as it appears in the - FedRAMP Marketplace
-- A "leveraged authorization-uuid" property that links this component to the - leveraged-authorization entry.
-- An "implementation-point" property with a value of "external".
-- A responsible-role with a role-id of "provider" and exactly one party-uuid entry - that indicates which organization is the provider of this leveraged system.
-- A "nature-of-agreement" property with an appropriate allowed value. If the value is - "other", use the proeprty's remarks to descibe the agreement.
-- a status with a state value of "operational"
+This is a leveraged system within which this system operates. + It is explicitly listed on the FedRAMP marketplace with a status of + "FedRAMP Authorized".
+Each leveraged system must be expressed as a "system" component, and must have:
+"#11111111-2222-4000-8000-009000100001"
)Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- C.3.5.1 is System development information
-- C.3.5.8 is System and network monitoring information
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly - one or more party-uuid entries that indicates which users within this system may - interact with the leveraged systeme.
-- An "inherited-uuid" property if the leveraged system's owner provides a UUID for - their system (such as in an OSCAL-based CRM).
- -Create a separate "service" component for each service used from the leveraged - system.
-- If the service is included in the ATO scope and listed on the FedRAMP marketplace, - use the "leveraged-authorization-uuid" property in the "service" component to link it - directly to the leveraged authorization.
-- If the service is not included in the ATO scope or not listed on the FedRAMP - marketplace, the "leveraged-authorization-uuid" property must be omitted from the - "service" component.
+The following fields from the Leveraged Authorization Table are handled in the - leveraged-authorizationo assembly:
-- Package ID, Authorization Type, Impact Level
+Links to the vendor website describing the system are encouraged, but not required.
+A service within the scope of the leveraged system's authorization boundary + is considered an "authorized service". Any other service offered by the + leveraged system is considered a "non-authorized service"
+Represent each authorized or non-authorized services using a "service" component. + Both authorized and non-authorized service components are represented the same + in OSCAL with the following exceptions:
+The components for both authorized and non-authorized services
+ must include a "provided-by" link with a URI fragment that points
+ to the "system" component representing the leveraged system.
+ (Example: "#11111111-2222-4000-8000-009000100001"
)
This service is explicitly listed on the FedRAMP marketplace as being included in the - scope of this leveraged system's ATO.
- -Each service used from a leveraged authorization must have:
-- a "leveraged-authorization" entry.
-- a "system" component linked to the leveraged-authorization entry.
-- a "service" component (this component).
+This is a service offered by a leveraged system and used by this system. + It is explicitly listed on the FedRAMP marketplace as being included in the + scope of this leveraged system's ATO, thus is considered an "Authorized Service.
-This component must always have:
-- The name of the service in the title - exactly as it appears in the FedRAMP - Marketplace
-- A "leveraged authorization-uuid" property that links this component to the - leveraged-authorization entry.
-- An "implementation-point" property with a value of "external".
-- A "provided-by" link with a URI fragment that points to the UUID of the above - "system" component.
- - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
-- a status with a state value of "operational"
+Each leveraged service must be expressed as a "service" component, and must have:
+"#11111111-2222-4000-8000-009000100001"
)Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly +
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for - their system (such as in an OSCAL-based CRM).
+ interact with the leveraged systeme.Link(s) to the vendor's web site describing the service are encouraged, but not required.
-The following fields from the Leveraged Authorization Table are handled in the leveraged-authorization assembly:
-- Package ID, Authorization Type, Impact Level
+The following fields from the Leveraged Authorization Table are handled in the - "system" component assembly:
+ "system" component representing the leveraged system as a whole:- Nature of Agreement, CSP Name
If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+This service is provided by the leveraged system; however, it is NOT explicitly - listed on the FedRAMP marketplace as being included in the scope of this leveraged - system's ATO.
-As a result, the "leveraged-authorization-uuid" property must NOT be present.
+This is a service offered by a leveraged system and used by this system. + It is NOT explicitly listed on the FedRAMP marketplace as being included + in the scope of this leveraged system's ATO, thus is treated as a + non-authorized, leveraged service.
-Each NON-authorized service used from a leveraged authorization must have:
-- a "leveraged-authorization" entry.
-- a "system" component linked to the leveraged-authorization entry.
-- a "service" component (this component).
+Each leveraged service must be expressed as a "service" component, and must have:
+"#11111111-2222-4000-8000-009000100001"
)The "leveraged-authorization-uuid" property must NOT be present, as this is how + tools are able to distinguish between authorized and non-authorized services + from the same leveraged provider.
This component must always have:
-- The name of the service in the title - preferably exactly as it appears on the - vendor's web site
-- An "implementation-point" property with a value of "external".
-- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
-- A "provided-by" link with a URI fragment that points to the UUID of the above - "system" component.
- - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) an error will incorrectly be raised for this link.
-- a status with a state value of "operational"
- +Where relevant, this component should also have:
- One or more "information-type" properties, where the allowed values are the 800-63 information type identifiers.
@@ -1008,15 +1095,30 @@Include this property if available, such as through an OSCAL-based CRM, component - definition, or direct access to the leveraged system's SSP.
+This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+Include this property if available, such as through an OSCAL-based CRM, component - definition, or direct access to the leveraged system's SSP.
+This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+If there are one or more identified risks, describe any mitigating factors.
This can only be known if provided by the leveraged system. + such as via an OSCAL-based CRM, component definition, + or as a result to the leveraged system's OSCAL-based SSP.
+If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+Either describe a risk associated with this service, or indicate there is no identified risk.
@@ -1354,7 +1483,13 @@If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
From 1c341d7e63e8be70608afb9934ceeabfc7ddda08 Mon Sep 17 00:00:00 2001 From: Brian RufSystem development information
-System and network monitoring information
-Either describe a risk associated with this service, or indicate there is no identified risk.
-If there is no risk, please explain your basis for that conclusion.
-If there are one or more identified risks, describe any resulting impact.
-If there are one or more identified risks, describe any mitigating factors.
-For a leveraged system, this property must always be present with a value of - "external".
-This can only be known if provided by the leveraged system. - such as via an OSCAL-based CRM, component definition, - or as a result to the leveraged system's OSCAL-based SSP.
-Optional notes about this interconnection
+This is an interconnection between this system and one or more + external systems.
+There must be a separate "system" component for each external system + linked by this interconnection. (Typically only one, but could be more.)
+There must be one "used-by" link for each external "system" component + connected by this interconnection. The href is a URI fragment with the + UUID of the "system" component.
+There must be at least one
Specify the type of agreement (e.g., EULA, SLA, App License Agreement, Contract, - etc
-Describe the information being transferred in the @value field.
-System development information
-System and network monitoring information
-For a leveraged system, this property must always be present with a value of - "external".
-This can only be known if provided by the leveraged system. - such as via an OSCAL-based CRM, component definition, - or as a result to the leveraged system's OSCAL-based SSP.
-The Access Control Procedure governs how access is managed and approved.
@@ -1876,7 +1801,7 @@The Awareness and Training Procedure governs how access is managed and approved.
@@ -1884,7 +1809,7 @@The Audit and Accountability Procedure governs how access is managed and
@@ -1893,7 +1818,7 @@
The Assessment, Authorization, and Monitoring Procedure governs how access is managed
@@ -1902,7 +1827,7 @@
The Configuration Management Procedure governs how access is managed and
@@ -1911,7 +1836,7 @@
The Contingency Planning Procedure governs how access is managed and approved.
@@ -1919,7 +1844,7 @@The Identificaiton and Authentication Procedure governs how access is managed and
@@ -1928,7 +1853,7 @@
The Incident Response Procedure governs how access is managed and approved.
@@ -1936,7 +1861,7 @@The Maintenance Procedure governs how access is managed and approved.
@@ -1944,7 +1869,7 @@The Media Protection Procedure governs how access is managed and approved.
@@ -1952,7 +1877,7 @@The Physical and Enviornmental Protection Procedure governs how access is managed and
@@ -1961,7 +1886,7 @@
The Planning Procedure governs how access is managed and approved.
@@ -1969,7 +1894,7 @@The Program Management Procedure governs how access is managed and approved.
@@ -1977,7 +1902,7 @@The Personnel Security Procedure governs how access is managed and approved.
@@ -1985,7 +1910,7 @@The PII Processing and Transparency Procedure governs how access is managed and
@@ -1994,7 +1919,7 @@
The Risk Assessment Procedure governs how access is managed and approved.
@@ -2002,7 +1927,7 @@The System and Services Acquisition Procedure governs how access is managed and
@@ -2011,7 +1936,7 @@
The System and Communication Protection Procedure governs how access is managed and
@@ -2020,7 +1945,7 @@
The System and Information Integrity Procedure governs how access is managed and
@@ -2029,7 +1954,7 @@
The Supply Chain Risk Management Procedure governs how access is managed and
@@ -3851,14 +3776,14 @@
SSP Signature FedRAMP is formulating guidelines for handling digital/electronic signatures in
+ The FedRAMP PMO is formulating guidelines for handling digital/electronic signatures in
OSCAL, and welcome feedback on solutions. For now, FedRAMP recommends one of the following: For now, the PMO recommends one of the following: Separation of Duties Matrix
base64
.
An external system to which this system shares an interconnection.
For each external system with which this system connects:
-Must have a "system" component (this component).
-Must have an "interconnection" component that connects this component with the - "this-system" component.
-If the leveraged system owner provides a UUID for their system (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
Must include all leveraged services and features from the leveraged authorization - here.
-For an external system, the "implementation-point" property must always be present - with a value of "external".
- -Each interconnection must be defined with both an "system" component and an - "interconnection" component.
-Must include all leveraged services and features from the leveraged authorization - here.
+Each interconnection to one or more remote systems must have:
+Each "system" component must have:
+The risk associated with an external system must be quantified within the context of an interconnection, service, or cli, thus risk, impact, and mitigation properties are applied to those component types.
+While not required, each "system" component should have:
+Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP + properties/extensions for these roles, instead favor the core OSCAL + responsible-roles constructs, and the NIST-standard roles of + "authorizing-official", "system-owner", "system-poc-management + and "system-poc-technical"
If 'yes', describe the authentication method in the remarks.
@@ -1129,20 +1134,21 @@Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
+If "other", remarks are required. Optional otherwise.
-This is an interconnection between this system and one or more - external systems.
-There must be a separate "system" component for each external system - linked by this interconnection. (Typically only one, but could be more.)
-There must be one "used-by" link for each external "system" component - connected by this interconnection. The href is a URI fragment with the - UUID of the "system" component.
-There must be at least one
+Each interconnection to one or more remote systems must have:
+Each "interconnection" component must have:
+Authentication methods must address both system-authentication as well as + user authentication mechanisms.
+Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
+If the interconnection travels across the public Internet, the provider may be the cloud hosting provider or the Internet provider
+ +While not required, each "interconnection" component should have:
+Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP + properties/extensions for these roles, instead favor the core OSCAL + responsible-roles constructs, and the NIST-standard roles of + "system-poc-management" and "system-poc-technical". With an interconnection, + the system POC roles reference parties that represent the connection provider.
SSP Signature
Separation of Duties Matrix
-May use rlink
with a relative path, or embedded as
- base64
.
A description of the information.
+Required if the base and selected values do not match.
+Required if the base and selected values do not match.
+Required if the base and selected values do not match.
+A description of the information.
+Required if the base and selected values do not match.
+Required if the base and selected values do not match.
+Required if the base and selected values do not match.
+Use one leveraged-authorization assembly for each underlying authorized cloud system - or general support system (GSS).
+Use one leveraged-authorization assembly for each underlying authorized + cloud system or general support system (GSS).
+For each leveraged authorization there must also be a "system" component. + The corrisponding "system" component must include a + "leveraged-authorization-uuid" property + that links it to this leveraged authorization.
The user assembly is being reviewed for continued applicability under FedRAMP's adoption of Rev 5.
+The user assembly is being reviewed for continued applicability + under FedRAMP's adoption of Rev 5.
+Currently, FedRAMP will only process user content if it includes the + FedRAMP "separation-of-duties-matrix" property/extension. All other user + entries will be ignored by validation rules, but may be displayed by tools.
The entire system as depicted in the system authorization boundary
-FedRAMP requires exactly one "this-system" component.
-This is used in SSP control responses and may be used in interconnection - linkages.
+This component represents the entire authorization boundary, + as depicted in the system authorization boundary diagram.
+FedRAMP requires exactly one "this-system" component, which is used + in control implementation responses and interconnections.
A FedRAMP SSP must always have exactly one component that represents the whole system. - It should be the only component with the "this-system" component type.
+A FedRAMP SSP must always have exactly one "this-system" component + that represents the whole system.
+It does not need system details, as those exist elsewhere in this SSP.
This can only be known if provided by the leveraged system. - such as via an OSCAL-based CRM, component definition, - or as a result to the leveraged system's OSCAL-based SSP.
-"#11111111-2222-4000-8000-009000100001"
)Where relevant, this component should also have:
Links to the vendor website describing the system are encouraged, but not required.
+A service within the scope of the leveraged system's authorization boundary is considered an "authorized service". Any other service offered by the leveraged system is considered a "non-authorized service"
-Represent each authorized or non-authorized services using a "service" component. - Both authorized and non-authorized service components are represented the same - in OSCAL with the following exceptions:
+Represent each authorized or non-authorized leveraged services using a + "service" component. Both authorized and non-authorized service components + are represented the same in OSCAL with the following exceptions:
The components for both authorized and non-authorized services - must include a "provided-by" link with a URI fragment that points + +
Both authorized and non-authorized leveraged services include:
+"#11111111-2222-4000-8000-009000100001"
)
+ (Example: "#11111111-2222-4000-8000-009000100001"
)Although SSP Table 7.1 also requires data categoriation and hosting + environment information about non-authorized leveraged services, + these datails are derived from other content in this SSP.
Either describe a risk associated with this service, or indicate there is no identified risk.
-If there is no risk, please explain your basis for that conclusion.
-If there are one or more identified risks, describe any resulting impact.
-If there are one or more identified risks, describe any mitigating factors.
-This is a service offered by a leveraged system and used by this system. It is NOT explicitly listed on the FedRAMP marketplace as being included - in the scope of this leveraged system's ATO, thus is treated as a + in the scope of the leveraged system's ATO, thus is treated as a non-authorized, leveraged service.
-Each leveraged service must be expressed as a "service" component, and must have:
+Each non-authorized leveraged service must be expressed as a "service" component, and must have:
"#11111111-2222-4000-8000-009000100001"
)The "leveraged-authorization-uuid" property must NOT be present, as this is how tools are able to distinguish between authorized and non-authorized services from the same leveraged provider.
-This component must always have:
- +Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly - one or more party-uuid entries that indicates which users within this system may - interact with the leveraged systeme.
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
+The following fields from the Leveraged Authorization Table are handled in the + leveraged-authorization assembly:
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for their system (such as in an OSCAL-based CRM).
Link(s) to the vendor's web site describing the service are encouraged, but not
@@ -1150,26 +1230,14 @@
Either describe a risk associated with this interconnection, or indicate there is no identified risk. If there is no risk, please explain your basis for that conclusion. If there are one or more identified risks, describe any resulting impact. If there are one or more identified risks, describe any mitigating factors. The primary authorization boundary diagram. The user assembly is being reviewed for continued applicability
under FedRAMP's adoption of Rev 5. SSP Signature Required if the base and selected values do not match. Required if the base and selected values do not match. Required if the base and selected values do not match. SSP Signature The FedRAMP PMO is formulating guidelines for handling digital/electronic signatures in
@@ -3902,21 +3902,21 @@
Must be present in a FedRAMP SAP. Must be present in a FedRAMP SSP. AC Policy document AT Policy document Table 12-1 Attachments: Policy Attachment AU Policy document Table 12-1 Attachments: Policy Attachment CA Policy document Table 12-1 Attachments: Policy Attachment CM Policy document Table 12-1 Attachments: Policy Attachment CP Policy document IA Policy document Table 12-1 Attachments: Policy Attachment IR Policy document Table 12-1 Attachments: Policy Attachment MA Policy document Table 12-1 Attachments: Policy Attachment MP Policy document Table 12-1 Attachments: Policy Attachment PE Policy document Table 12-1 Attachments: Policy Attachment PL Policy document Table 12-1 Attachments: Policy Attachment PS Policy document Table 12-1 Attachments: Policy Attachment RA Policy document Table 12-1 Attachments: Policy Attachment SA Policy document Table 12-1 Attachments: Policy Attachment SC Policy document Table 12-1 Attachments: Policy Attachment SI Policy document Table 12-1 Attachments: Policy Attachment SR Policy document Table 12-1 Attachments: Policy Attachment AC Procedure document Table 12-1 Attachments: Procedure Attachment AT Procedure document Table 12-1 Attachments: Procedure Attachment AU Procedure document Table 12-1 Attachments: Procedure Attachment CA Procedure document Table 12-1 Attachments: Procedure Attachment CM Procedure document Table 12-1 Attachments: Procedure Attachment CP Procedure document Table 12-1 Attachments: Procedure Attachment IA Procedure document Table 12-1 Attachments: Procedure Attachment IR Procedure document Table 12-1 Attachments: Procedure Attachment MA Procedure document Table 12-1 Attachments: Procedure Attachment MP Procedure document Table 12-1 Attachments: Procedure Attachment PE Procedure document Table 12-1 Attachments: Procedure Attachment PL Procedure document Table 12-1 Attachments: Procedure Attachment PS Procedure document Table 12-1 Attachments: Procedure Attachment RA Procedure document Table 12-1 Attachments: Procedure Attachment SA Procedure document Table 12-1 Attachments: Procedure Attachment SC Procedure document Table 12-1 Attachments: Procedure Attachment SI Procedure document Table 12-1 Attachments: Procedure Attachment SR Procedure document Table 12-1 Attachments: Procedure Attachment Table 12-1 Attachments: User's Guide Attachment Table 12-1 Attachments: Rules of Behavior (ROB) Table 12-1 Attachments: Contingency Plan (CP) Attachment Table 12-1 Attachments: Configuration Management (CM) Plan Attachment Table 12-1 Attachments: Incident Response (IR) Plan Attachment Table 12-1 Attachments: Continuous Monitoring Plan Attachment Supply Chain Risk Management Plan Table 12-1 Attachments: Procedure Attachment CSP Logo May use 3PAO Logo May use The primary authorization boundary diagram. Section 8.1, Figure 8-1 Authorization Boundary Diagram (graphic) The primary network diagram. Section 8.1, Figure 8-2 Network Diagram (graphic) The primary data flow diagram. Section 8.1, Figure 8-3 Data Flow Diagram (graphic) CSP-specific citation. Note the "type" property's class is "law"
+ and the value is "citation". CSP-specific citation. Note the "type" property's class is "acronyms"
+ and the value is "citation". Each interconnection to one or more remote systems must have: While not required, each "system" component should have: Either describe a risk associated with this service, or indicate there is no identified risk. If there is no risk, please explain your basis for that conclusion. If there are one or more identified risks, describe any resulting impact. If there are one or more identified risks, describe any mitigating factors. This can only be known if provided by the leveraged system.
@@ -1395,8 +1386,11 @@
This is a service provided by an external system other than the leveraged system. Email Service Must be present in a FedRAMP SSP. Must be present in a FedRAMP SSP. A CSP-specific law citation The "type" property must be present and contain the value "law". This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official
FedRAMP 3.0.0 release. Describe how Part a is satisfied within the system. Legacy approach. If no policy component is defined, describe here how the
- policy satisfies part a. In this case, a link must be provided to the policy. FedRAMP prefers all policies and procedures be attached as a resource in the
- back-matter. The link points to a resource. The specified component is the system itself. Any control implementation response that can not be associated with another
- component is associated with the component representing the system. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Identity
- Management and Access Control Policy. That component contains a link to the policy, so it does not have to be linked
- here too. There Describe the plan to complete the implementation. Describe how this policy currently satisfies part a. Describe the plan for addressing the missing policy elements. Identify what is currently missing from this policy. Describe how Part b-1 is satisfied. Describe how Part b-2 is satisfied. Describe the plan to complete the implementation. Describe any customer-configured requirements for satisfying this control. Describe how the control is satisfied within the system. Describe how AC-2, part a is satisfied within this system. This points to the "This System" component, and is used any time a more
- specific component reference is not available. Leveraged system's statement of capabilities which may be inherited by a
- leveraging systems to satisfy AC-2, part a. Leveraged system's statement of a leveraging system's responsibilities in
- satisfaction of AC-2, part a. Not associated with inheritance, thus associated this with the
- by-component for "this system". For the portion of the control satisfied by the application component of this
- system, describe how the control is met. Consumer-appropriate description of what may be inherited from this
- application component by a leveraging system. In the context of the application component in satisfaction of AC-2, part
- a. Leveraging system's responsibilities with respect to inheriting this
- capability from this application. In the context of the application component in satisfaction of AC-2, part
- a. The component-uuid above points to the "this system" component. Any control response content that does not cleanly fit another system component
- is placed here. This includes customer responsibility content. This can also be used to provide a summary, such as a holistic overview of how
- multiple components work together. While the "this system" component is not explicitly required within every
- For the portion inherited from an underlying FedRAMP-authorized provider,
- describe what is inherited. Optional description. Consumer-appropriate description of what may be inherited as provided by the
- leveraged system. In the context of this component in satisfaction of AC-2, part a. The It may be linked directly, but is more commonly provided via an OSCAL-based
- CRM (Inheritance and Responsibility Model). Description of how the responsibility was satisfied. The It may be linked directly, but is more commonly provided via an OSCAL-based
- CRM (Inheritance and Responsibility Model). Tools should use this to ensure all identified customer
- Tool developers should be mindful that Describe the plan to complete the implementation. Describe how the control is satisfied within the system. Describe how Part a is satisfied. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. Describe how Part b-1 is satisfied. Describe how Part b-2 is satisfied. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how Part a is satisfied within the system. Legacy approach. If no policy component is defined, describe here how the
+ policy satisfies part a. In this case, a link must be provided to the policy. FedRAMP prefers all policies and procedures be attached as a resource in the
+ back-matter. The link points to a resource. The specified component is the system itself. Any control implementation response that can not be associated with another
+ component is associated with the component representing the system. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. Describe how this policy satisfies part a. Component approach. This links to a component representing the Identity
+ Management and Access Control Policy. That component contains a link to the policy, so it does not have to be linked
here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe the plan to complete the implementation. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. Describe how this procedure satisfies part a. Component approach. This links to a component representing the Identity
+ Management and Access Control Policy. That component contains a link to the policy, so it does not have to be linked
here too. Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion of the control satisfied by the service provider, describe
- how the control is met. There Describe the plan to complete the implementation. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how this policy currently satisfies part a. Describe the plan for addressing the missing policy elements. Identify what is currently missing from this policy. Describe how the control is satisfied within the system. DMARC is employed. SPF is employed. DKIM is employed. Describe how Part b-1 is satisfied. Describe the plan to complete the implementation. Describe any customer-configured requirements for satisfying this control. Describe how the control is satisfied within the system. For the portion of the control satisfied by the service provider, describe
- how the control is met. Describe how AC-2, part a is satisfied within this system. This points to the "This System" component, and is used any time a more
+ specific component reference is not available. Leveraged system's statement of capabilities which may be inherited by a
+ leveraging systems to satisfy AC-2, part a. Leveraged system's statement of a leveraging system's responsibilities in
+ satisfaction of AC-2, part a. Not associated with inheritance, thus associated this with the
+ by-component for "this system". Describe how this policy component satisfies part a. Component approach. This links to a component representing the Policy. That component contains a link to the policy, so it does not have to be linked
- here too. For the portion of the control satisfied by the application component of this
+ system, describe how the control is met. Consumer-appropriate description of what may be inherited from this
+ application component by a leveraging system. In the context of the application component in satisfaction of AC-2, part
+ a. Leveraging system's responsibilities with respect to inheriting this
+ capability from this application. In the context of the application component in satisfaction of AC-2, part
+ a. The component-uuid above points to the "this system" component. Any control response content that does not cleanly fit another system component
+ is placed here. This includes customer responsibility content. This can also be used to provide a summary, such as a holistic overview of how
+ multiple components work together. While the "this system" component is not explicitly required within every
+ Describe how this procedure component satisfies part a. Component approach. This links to a component representing the procedure. That component contains a link to the procedure, so it does not have to be
- linked here too. For the portion inherited from an underlying FedRAMP-authorized provider,
+ describe what is inherited. Optional description. Consumer-appropriate description of what may be inherited as provided by the
+ leveraged system. In the context of this component in satisfaction of AC-2, part a. The It may be linked directly, but is more commonly provided via an OSCAL-based
+ CRM (Inheritance and Responsibility Model). Description of how the responsibility was satisfied. The It may be linked directly, but is more commonly provided via an OSCAL-based
+ CRM (Inheritance and Responsibility Model). Tools should use this to ensure all identified customer
+ Tool developers should be mindful that AC Policy document A single policy that addresses both the AC and IA families. Table 12-1 Attachments: Policy Attachment May use Each policy must be attached as back-matter resources, and must include: Each policy must have a corrisponding "policy" component. Table 12-1 Attachments: Procedure Attachment May use Procedures must be attached as back-matter resources, and must include: The POA&M attachment may either be a legacy Excel workbook or OSCAL file.
+ The resource must have: A "version" property is optional. The appropriate media types for OSCAL content
+ are, "application/xml", "application/json" or "application/yaml". FedRAMP Logorlink
with a relative path, or embedded as
@@ -4744,7 +4744,7 @@
rlink
with a relative path, or embedded as
@@ -4761,7 +4761,7 @@
Federal Acquisition Supply Chain Security Act; Rule,
85 Federal Register 54263 (September 1, 2020), pp 54263-54271.
@@ -1177,6 +1181,9 @@
statement
, it will typically be present.provided-uuid
links this to the same statement in the
- leveraged system's SSP.responsibility-uuid
links this to the same statement in the
- leveraged system's SSP.responsibility
statements have a corresponding
- satisfied
statement in the leveraging system's SSP.statement
, it will typically be present.provided-uuid
links this to the same statement in the
+ leveraged system's SSP.responsibility-uuid
links this to the same statement in the
+ leveraged system's SSP.responsibility
statements have a corresponding
+ satisfied
statement in the leveraging system's SSP.rlink
with a relative path, or embedded as
- base64
.
+
+ rlink
with a relative path, or embedded as
- base64
.
+
+
+
Email Service
+The Access Control Policy governs how access is managed and approved.
-The Awareness and Training Policy governs how access is managed and approved.
-The Audit and Accountability governs how access is managed and approved.
-The Assessment, Authorization, and Monitoring Policy governs how access is managed - and approved.
-The Configuration Management Policy governs how access is managed and approved.
-The Contingency Planning Policy governs how access is managed and approved.
-The Identificaiton and Authentication Policy governs how access is managed and - approved.
-The Incident Response Policy governs how access is managed and approved.
-The Maintenance Policy governs how access is managed and approved.
-The Media Protection Policy governs how access is managed and approved.
-The Physical and Enviornmental Protection Policy governs how access is managed and - approved.
-The Planning Policy governs how access is managed and approved.
-The Program Management Policy governs how access is managed and approved.
-The Personnel Security Policy governs how access is managed and approved.
-The PII Processing and Transparency Policy governs how access is managed and - approved.
-The Risk Assessment Policy governs how access is managed and approved.
-The System and Services Acquisition Policy governs how access is managed and - approved.
+IPv4 Production Subnet.
The System and Communication Protection Policy governs how access is managed and - approved.
+IPv4 Management Subnet.
The System and Information Integrity Policy governs how access is managed and - approved.
+The Access Control and Identity Management Policy governs how + user identities and access rights are managed.
A policy component is required for each policy that governs the system.
+The title, description and status fields are required by core OSCAL. + The title field should reflect the actual title of the policy document.
+A "policy" link field must be present that identifies the back-matter + resource representing the attached policy.
+The document version and date are represented in the linked resource. Not here.
+At this time FedRAMP does not _require_ policy approver or + audience information in the SSP; however, both may be represented here + using the responsible-role field. If electing to include this information, + use the "approver" role ID to represent approvers. Any other role listed + is assumed to be audience.
+The Supply Chain Risk Management Policy governs how access is managed and - approved.
+The Awareness and Training Policy governs how access is managed and approved.
The Access Control Procedure governs how access is managed and approved.
The Audit and Accountability Procedure governs how access is managed and - approved.
-The Assessment, Authorization, and Monitoring Procedure governs how access is managed - and approved.
-The Configuration Management Procedure governs how access is managed and - approved.
-The Contingency Planning Procedure governs how access is managed and approved.
-The Identificaiton and Authentication Procedure governs how access is managed and - approved.
-The Incident Response Procedure governs how access is managed and approved.
-The Maintenance Procedure governs how access is managed and approved.
-The Media Protection Procedure governs how access is managed and approved.
-The Physical and Enviornmental Protection Procedure governs how access is managed and - approved.
-The Planning Procedure governs how access is managed and approved.
-The Program Management Procedure governs how access is managed and approved.
-The Personnel Security Procedure governs how access is managed and approved.
-The PII Processing and Transparency Procedure governs how access is managed and - approved.
-The Risk Assessment Procedure governs how access is managed and approved.
-The System and Services Acquisition Procedure governs how access is managed and - approved.
-The System and Communication Protection Procedure governs how access is managed and - approved.
-The System and Information Integrity Procedure governs how access is managed and - approved.
-The Supply Chain Risk Management Procedure governs how access is managed and - approved.
-IPv4 Production Subnet.
-IPv4 Management Subnet.
-Email Service
-This is a sample role.
Any internal users of a leveraged authorization.
-This is a service offered by a leveraged system and used by this system. It is NOT explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO, thus is treated as a @@ -1085,9 +1077,8 @@
"#11111111-2222-4000-8000-009000100001"
)Each interconnection to one or more remote systems must have:
Each interconnection to one or more remote systems must have:
Authentication methods must address both system-authentication as well as @@ -1353,7 +1350,7 @@
Describe the service and what it is used for.
This is a service provided by an external system other than the leveraged system.
As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
Each external service used from a leveraged authorization must have:
-- a "system" component (CURRENTLY DEFERRED DUE TO A KNOWN ISSUE WITH THE "provided-by" link relationship).
-- a "service" component (this component).
+This component must always have:
-- The name of the service in the title - preferably exactly as it appears on the - vendor's web site
-- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
-- An "implementation-point" property with a value of "external".
-- A "provided-by" link with a URI fragment that points to the UUID of the above - "system" component.
- - Example: "#11111111-2222-4000-8000-009000100001"
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) constraints, - this property is blocked from proper use.
-- a status with a state value of "operational"
+Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly - one or more party-uuid entries that indicates which users within this system may - interact with the leveraged systeme.
-- An "inherited-uuid" property if the leveraged system's owner provides a UUID for - their system (such as in an OSCAL-based CRM).
-Link(s) to the vendor's web site describing the service are encouraged, but not - required.
+The following fields from the Leveraged Authorization Table are handled in the leveraged-authorization assembly:
@@ -1427,7 +1432,9 @@ "system" component assembly:- Nature of Agreement, CSP Name
-An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+An unauthorized service from an underlying leveraged authorization + must NOT have the "leveraged-authorization-uuid" property. The presence + or absence of this property is how the authorization status of a service is indicated.
A service provided by an external system other than the leveraged system.
+A service offered by this system to external systems, such as an API. + As a result, communication crosses the boundary.
Describe the service and what it is used for.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
-Either describe a risk associated with this service, or indicate there is no identified risk.
-If there is no risk, please explain your basis for that conclusion.
-If there are one or more identified risks, describe any resulting impact.
-If there are one or more identified risks, describe any mitigating factors.
-This is a service provided by an external system other than the leveraged system.
- + +This is a service provided by this system to external systems, such as an offered API.
- -- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
- - - -As a result, the "leveraged-authorization-uuid" property is not applicable and must - NOT be used.
All services require the "implementation-point" property. In this case, the property - value is set to "external.
-All external services would normally require a "provided-by" link; however, a known - bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
None
+A CLI tool used to manage a hypervisor, service or system outside + this system's boundary, resulting in communication that crosses + the boundary.
+This may also be a CLI tool that others use from outside the boundary + to manage or interact with this system.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
-Either describe a risk associated with this CLI, or indicate there is no identified risk.
-If there is no risk, please explain your basis for that conclusion.
-If there are one or more identified risks, describe any resulting impact.
-If there are one or more identified risks, describe any mitigating factors.
-Describe how Part a is satisfied within the system.
+Legacy approach. If no policy component is defined, describe here how the + policy satisfies part a.
+In this case, a link must be provided to the policy.
+FedRAMP prefers all policies and procedures be attached as a resource in the + back-matter. The link points to a resource.
+The specified component is the system itself.
+Any control implementation response that can not be associated with another + component is associated with the component representing the system.
+Describe how this policy satisfies part a.
+Component approach. This links to a component representing the Identity + Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked + here too.
+Describe how this procedure satisfies part a.
+Component approach. This links to a component representing the Identity + Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked + here too.
+There
+Describe the plan to complete the implementation.
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part b-1 is satisfied.
+This is a service offered by a leveraged system and used by this system. @@ -1034,8 +1037,10 @@
If 'yes', describe the authentication method in the remarks.
@@ -1460,6 +1478,12 @@If 'yes', describe the authentication method in the remarks.
@@ -1507,6 +1532,10 @@The Access Control and Identity Management Policy governs how user identities and access rights are managed.
- +A policy component is required for each policy that governs the system.
@@ -1765,7 +1794,7 @@The Awareness and Training Policy governs how access is managed and approved.
The Access Control Procedure governs how access is managed and approved.
The Awareness and Training Procedure governs how access is managed and approved.
This description field is required by OSCAL.
FedRAMP does not require any specific information here.
-[Assignment: organization-defined personnel or roles]
+This focuses on roles the POLICY is disseminated to.
+[Assignment: organization-defined personnel or roles]
+This focuses on roles PROCEDURES are disseminated to.
+[Selection (one or more): Organization-level; Mission/business process-level; Systemlevel]
+This is a SELECT parameter. Use one "value" field for each selection.
+[Assignment: organization-defined official]
+[Assignment: organization-defined frequency]
+[Assignment:organization-defined events]
+[Assignment: organization-defined frequency]
+[Assignment:organization-defined events]
+Describe how Part a is satisfied within the system.
-Legacy approach. If no policy component is defined, describe here how the - policy satisfies part a.
-In this case, a link must be provided to the policy.
+Describe how Part a is satisfied within the system as a whole.
FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
The specified component is the system itself.
-Any control implementation response that can not be associated with another - component is associated with the component representing the system.
+This is the "this-system" component, which represents the system as a whole.
+There are two reasons to provide a response here:
+Describe how this policy satisfies part a.
-Component approach. This links to a component representing the Identity - Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked - here too.
+Describe how this policy satisfies part a.
This is the "policy" component, which represents the Access Control and + Identity Management Policy.
+Describe how this procedure satisfies part a.
-Component approach. This links to a component representing the Identity - Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked - here too.
+Describe how this procedure satisfies part a.
This is the "process-procedure" component, which represents the Access Control Process.
+There
+Describe how Part b is satisfied within the system as a whole.
Describe the plan to complete the implementation.
+This is the "this-system" component, which represents the system as a whole.
+There are two reasons to provide a response here:
+Describe how this policy currently satisfies part a.
Describe how Part b-1 is satisfied.
Describe any customer-configured requirements for satisfying this control.
Describe how the control is satisfied within the system.
-FedRAMP Logo
Describe how AC-2, part a is satisfied within this system.
This points to the "This System" component, and is used any time a more @@ -2255,7 +2255,7 @@
For the portion of the control satisfied by the application component of this system, describe how the control is met.
@@ -2296,7 +2296,7 @@For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
@@ -2331,7 +2331,7 @@Describe how Part a is satisfied within the system.
Legacy approach. If no policy component is defined, describe here how the @@ -2361,7 +2361,7 @@
Describe how this policy satisfies part a.
Component approach. This links to a component representing the Identity
@@ -2372,7 +2372,7 @@
Describe how this procedure satisfies part a.
Component approach. This links to a component representing the Identity
@@ -2383,9 +2383,9 @@
There
Describe how this policy currently satisfies part a.
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
@@ -874,16 +874,16 @@If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Describe the service and what it is used for.
If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.)
-If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
Describe the service and what it is used for.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This can only be known if provided by the leveraged system.
@@ -1456,27 +1451,72 @@
+
+ This component represents any of the public API clients that may
+ access this systems'API service. When an API service is offered to a large community, this one component
+ bay be used to represent the collection of API clients that may connect
+ from that community. This must have: A service offered by this system to external systems, such as an API.
As a result, communication crosses the boundary. Describe the service and what it is used for. If 'yes', describe the authentication method in the remarks. If 'no', explain why no authentication is used in the remarks. If 'not-applicable', attest explain why authentication is not applicable in the remarks. Terms of Use Explain why authentication scans are not possible for this component.
+ Provide evidence if available, such as scanner tool or vendor links. This is a service provided by this system to external systems, such as an offered API. All services require the "implementation-point" property. In this case, the property
- value is set to "internal. This is a service provided by this system to external systems, such as an
+ offered API. The following is required: Because this is softare that exists within the boundary, it is also requires the following
+ in satisfaction of inventory/CM/ConMon requirements: A CLI tool used to manage a hypervisor, service or system outside
- this system's boundary, resulting in communication that crosses
- the boundary. This may also be a CLI tool that others use from outside the boundary
- to manage or interact with this system. A CLI tool used from within this system's boundary to manage a
+ hypervisor, service, or other system outside this system's boundary,
+ resulting in communication that crosses the boundary. If 'yes', describe the authentication method in the remarks. If 'no', explain why no authentication is used in the remarks. If 'not-applicable', attest explain why authentication is not applicable in the remarks. Terms of Use Explain why authentication scans are not possible for this component.
+ Provide evidence if available, such as scanner tool or vendor links. When an internal CLI tool communicates with a system outside the boundary,
+ such as for management of the underlying leveraged system or interaction
+ with an external system, the following is required: Because this is softare that exists within the boundary, it is also requires the following
+ in satisfaction of inventory/CM/ConMon requirements: A CLI tool used by systems outside the authorization boundary to manage
+ or interact with this system.. If 'yes', describe the authentication method in the remarks. If 'no', explain why no authentication is used in the remarks. If 'not-applicable', attest explain why authentication is not applicable in the remarks. Terms of Use When a CLI tool outside the system communicates with this system,
+ such as for management of the user's hypervisor in this system, the
+ following is required: As this is impelemented external to the system boundary, information such as "scan-type"
+ and "allows-authenticated-scanning" are not applicable and should not be present.
+
+
-
+
+
+
+
+
+
-
+
+
+
+
+
+
+
+
+
+
FUNCTION: Describe typical component function.
@@ -1696,7 +1862,7 @@COMMENTS: Provide other comments as needed.
None
@@ -1707,7 +1873,7 @@None
@@ -1723,7 +1889,7 @@None
@@ -2029,12 +2195,7 @@ >Appendix A - FedRAMP SSP Rev5 Template
From b94a79b7f57028f970c59a655b990da746e4795c Mon Sep 17 00:00:00 2001 From: Brian RufAppendix A - FedRAMP SSP Rev5 Template
This description field is required by OSCAL.
FedRAMP does not require any specific information here.
+ +FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
This is the "this-system" component, which represents the system as a whole.
There are two reasons to provide a response here:
@@ -2491,6 +2492,16 @@ +Describe how AC-2, part a is satisfied within this system.
+This points to the "This System" component, and is used any time a more + specific component reference is not available.
+This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
Exactly one
+hello
The Access Control and Identity Management Policy governs how + user identities and access rights are managed.
+A policy component is required for each policy that governs the system.
+The title, description and status fields are required by core OSCAL. + The title field should reflect the actual title of the policy document.
+For system-specific policies, the "implementation-point" property must be + present and set to "internal".
+For corproate policies, the "implementation-point" property must be + present and set to "external" with its class set to "corporate".
+For any policy that is niether system-specific, nor corporate, the + "implementation-point" property must be present and set to "external", + with a class set to anything other than "corporate" or no class + attribute at all.
+An "attachment" link field must be present that identifies the back-matter + resource representing the attached policy.
+The document version and date are represented in the linked resource. Not here.
+At this time FedRAMP does not _require_ policy approver or + audience information in the SSP; however, both may be represented here + using the responsible-role field. If electing to include this information, + use the "approver" role ID to represent approvers. Any other role listed + is assumed to be audience.
+The Awareness and Training Policy governs how access is managed and approved.
+The Access Control Procedure governs how access is managed and approved.
+A "process-procedure" component is required for each process or procedure + that governs the system.
+The title, description and status fields are required by core OSCAL. + The title field should reflect the actual title of the document.
+For system-specific processes or procedures, the "implementation-point" property must be + present and set to "internal".
+For corproate processes or procedures, the "implementation-point" property must be + present and set to "external" with its class set to "corporate".
+For any processes or procedures that is niether system-specific, nor corporate, the + "implementation-point" property must be present and set to "external", + with a class set to anything other than "corporate" or no class + attribute at all.
+An "attachment" link field must be present that identifies the back-matter + resource representing the attached policy.
+The document version and date are represented in the linked resource. Not here.
+At this time FedRAMP does not _require_ policy approver or + audience information in the SSP; however, both may be represented here + using the responsible-role field. If electing to include this information, + use the "approver" role ID to represent approvers. Any other role listed + is assumed to be audience.
+The Awareness and Training Procedure governs how access is managed and approved.
+The Access Control and Identity Management Policy governs how - user identities and access rights are managed.
-A policy component is required for each policy that governs the system.
-The title, description and status fields are required by core OSCAL. - The title field should reflect the actual title of the policy document.
-A "policy" link field must be present that identifies the back-matter - resource representing the attached policy.
-The document version and date are represented in the linked resource. Not here.
-At this time FedRAMP does not _require_ policy approver or - audience information in the SSP; however, both may be represented here - using the responsible-role field. If electing to include this information, - use the "approver" role ID to represent approvers. Any other role listed - is assumed to be audience.
-The Awareness and Training Policy governs how access is managed and approved.
-The Access Control Procedure governs how access is managed and approved.
-The Awareness and Training Procedure governs how access is managed and approved.
-Legacy Example (No implemented-component).
@@ -2492,7 +2544,7 @@ -This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
"#11111111-2222-4000-8000-009000100001"
)The "leveraged-authorization-uuid" property must NOT be present, as this is how
@@ -1237,9 +1236,15 @@
Describe the service and what it is used for.
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
@@ -1726,6 +1732,7 @@This is a corporate policy used for the system.
The Access Control and Identity Management Policy governs how user identities and access rights are managed.
An encryptred communication between the web server and the database server
A service that exists within the authorization boundary.
-Describe the service and what it is used for.
+None
For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
None
+A service that exists within the authorization boundary.
+Describe the service and what it is used for.
+This is a container image used to create container instances within the system.
+If no, explain why. If yes, omit remarks field.
@@ -2406,20 +2467,6 @@Describe the plan to complete the implementation.
-Describe any customer-configured requirements for satisfying this control.
-Describe how AC-2, part a is satisfied within this system.
This points to the "This System" component, and is used any time a more specific component reference is not available.
@@ -2450,8 +2492,8 @@Leveraged system's statement of capabilities which may be inherited by a - leveraging systems to satisfy AC-2, part a.
+This system's statement of capabilities which may be inherited by a + customer's leveraging systems toward satisfaction of AC-2, part a.
Any content for the customer responsibility matrix must be included within export
.
provided
is a statement about what
An encryptred communication between the web server and the database server
An encryptred communication between the web server and + the database server for the purpose of performing SQL queries.
+Any notes about this connection to appear in Table Q.
+None
Provide a description and any pertinent note regarding the use of this CM.
For data-at-rest modules, describe type of encryption implemented (e.g., full disk, @@ -1860,36 +1868,50 @@
Lastly, provide any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
If the same FIPS-validated cryptographic module is deployed + in two or more different components, each deployment SHOULD + have its own "validation" component entry, such as if the same + module is embedded in a software product and an operating system.
+The "asst-type" property is value is "cryptographic-module", + and the class must be present with one of the following values:
+Note that if the value is "other", additional detail must be + provided in the property's remarks field.
+Provide a description and any pertinent note regarding the use of this CM.
For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS compliance (e.g., Module in Process).
Usage statement
+None
+This is a web server that communicates with a database via + an encrypted connection
Usage statement
+This is a web server that communicates with a database via + an encrypted connection
+Provide a description and any pertinent note regarding the use of this CM.
+For example, any supporting notes on FIPS status (e.g. historical) or lack of FIPS + compliance (e.g., Module in Process).
+Usage statement
+Email Service
FUNCTION: Describe typical component function.
COMMENTS: Provide other comments as needed.
+This links to a FIPS 140-2 validated software component that is used by this
inventory item. This type of linkage to a validation through the component is
@@ -2209,7 +2258,7 @@
Asset wasn't running at time of scan. Asset wasn't running at time of scan.
None
Vendor appliance. No admin-level access.
If no, explain why. If yes, omit remarks field.
-Terms of Use
Explain why authentication scans are not possible for this component. @@ -1612,7 +1609,6 @@
The POA&M attachment may either be a legacy Excel workbook or OSCAL file. The resource must have:
@@ -3580,6 +3576,7 @@A "version" property is optional.
The appropriate media types for OSCAL content are, "application/xml", "application/json" or "application/yaml".
+FedRAMP does not accept base64 POA&M contenta at this time.