The individual within the CSP who is ultimately accountable for everything related to this system.
+The individual or individuals who must grant this system an authorization to operate.
+The individual representing the authorizing official.
+The highest level manager who responsible for system operation on behalf of the System Owner.
+The individual or individuals leading the technical operation of the system.
+A general point of contact for the system, designated by the system owner.
+The individual accountable for the security posture of the system on behalf of the system owner.
+This SSP is an example for demonstration purposes.
The individual within the CSP who is ultimately accountable for everything related to + this system.
+The individual or individuals who must grant this system an authorization to operate.
+The individual representing the authorizing official.
+The highest level manager who responsible for system operation on behalf of the System + Owner.
+The individual or individuals leading the technical operation of the system.
+A general point of contact for the system, designated by the system owner.
+The individual accountable for the security posture of the system on behalf of the system + owner.
+This SSP is an example for demonstration purposes.
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
+This is an enhanced example system for demonstration purposes, incorporating more + FedRAMP-specific elements.
Contains sensitive financial data related to organizational operations.
@@ -94,29 +166,30 @@The authorization boundary includes all components within the main data center and the disaster recovery site.
+The authorization boundary includes all components within the main data center and the + disaster recovery site.
Main application server hosting the core system functionality.
This is the primary application server for the system.
Secure connection to an external API for data enrichment.
This connection is used for secure data exchange with external systems.
Primary database server
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
This appears in FedRAMP profiles and resolved profile catalogs.
-For control statements, it signals to the CSP which statements require a response in the SSP.
-For control objectives, it signals to the assessor which control objectives must appear in the assessment results, which aligns with the FedRAMP test case workbook.
-For control statements, it signals to the CSP which statements require a response + in the SSP.
+For control objectives, it signals to the assessor which control objectives must + appear in the assessment results, which aligns with the FedRAMP test case + workbook.
+ +For roles 'system-owner', 'authorizing-official-poc', 'system-poc-management', 'system-poc-technical', 'system-poc-other', and 'information-system-security-officer', the responsible-role party must be a party of type 'person'.
+