diff --git a/features/fedramp_extensions.feature b/features/fedramp_extensions.feature index d26a83dc5..d1c13e1f5 100644 --- a/features/fedramp_extensions.feature +++ b/features/fedramp_extensions.feature @@ -48,6 +48,7 @@ Examples: | deployment-model | | external-system-nature-of-agreement | | fedramp-citations-has-correct-link | + | extraneous-implemented-requirements | | fedramp-version | | fully-operational-date-is-valid | | fully-operational-date-type | @@ -101,6 +102,7 @@ Examples: | has-user-guide | | import-profile-has-available-document | | import-profile-resolves-to-fedramp-content | + | incomplete-implemented-requirements | | information-type-800-60-v2r1 | | information-type-has-availability-impact | | information-type-has-confidentiality-impact | @@ -213,6 +215,8 @@ Examples: | external-system-nature-of-agreement-PASS.yaml | | fedramp-citations-has-correct-link-FAIL.yaml | | fedramp-citations-has-correct-link-PASS.yaml | + | extraneous-implemented-requirements-FAIL.yaml | + | extraneous-implemented-requirements-PASS.yaml | | fedramp-version-FAIL.yaml | | fedramp-version-PASS.yaml | | fully-operational-date-is-valid-FAIL.yaml | @@ -319,6 +323,8 @@ Examples: | import-profile-has-available-document-PASS.yaml | | import-profile-resolves-to-fedramp-content-FAIL.yaml | | import-profile-resolves-to-fedramp-content-PASS.yaml | + | incomplete-implemented-requirements-FAIL.yaml | + | incomplete-implemented-requirements-PASS.yaml | | information-type-has-availability-impact-FAIL.yaml | | information-type-has-availability-impact-PASS.yaml | | information-type-has-confidentiality-impact-FAIL.yaml | diff --git a/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml b/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml index 540e9136b..bb7c74f04 100644 --- a/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml +++ b/src/content/rev5/examples/ssp/xml/fedramp-ssp-example.oscal.xml @@ -2419,1442 +2419,4754 @@ a nominal example and does not pass FedRAMP schematron validations due to many controls being omitted. SSP authors must add implmentations for all required controls. --> - - -

Appendix A - FedRAMP SSP Rev5 Template

-

This description field is required by OSCAL.

-

FedRAMP does not require any specific information here.

-
- - - - - - - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - + + +

Appendix A - FedRAMP SSP Rev5 Template

+

This description field is required by OSCAL.

+

FedRAMP does not require any specific information here.

+
+ + + + + + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + + + + +

Describe how Part a is satisfied within the system.

+

Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.

+

In this case, a link must be provided to the policy.

+

FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.

+
+ + + + +

The specified component is the system itself.

+

Any control implementation response that can not be associated with another component is associated with the component representing the system.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Identity Management and Access Control Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+ +
+
+ + + +

There

+
+ + + +

Describe the plan to complete the implementation.

+
+
+
+ + +

Describe how this policy currently satisfies part a.

+
+ + +

Describe the plan for addressing the missing policy elements.

+
+
+ + +

Identify what is currently missing from this policy.

+
+
+
+
+ + + +

Describe how Part b-1 is satisfied.

+
+ +
+
+ + + +

Describe how Part b-2 is satisfied.

+
+ +
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + +

Describe any customer-configured requirements for satisfying this control.

+
+
+ + 11111111-2222-4000-8000-004000000010 + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + [SAMPLE]privileged, non-privileged + + + [SAMPLE]all + + + [SAMPLE]The Access Control Procedure + + + at least annually + +
+
+ + + +

Describe how AC-2, part a is satisfied within this system.

+

This points to the This System component, and is used any time a more specific component reference is not available.

+
+ + + +

Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.

+
+
+ + +

Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.

+

Not associated with inheritance, thus associated this with the by-component for this system. +

+
+ + 11111111-2222-4000-8000-004000000001 + +
+
+
+ + +

For the portion of the control satisfied by the application component of this system, describe how the control is met.

+
+ + + +

Consumer-appropriate description of what may be inherited from this application component by a leveraging system.

+

In the context of the application component in satisfaction of AC-2, part a.

+
+ + 11111111-2222-4000-8000-004000000005 + +
+ + +

Leveraging system's responsibilities with respect to inheriting this capability from this application.

+

In the context of the application component in satisfaction of AC-2, part a.

+
+ + 11111111-2222-4000-8000-004000000005 + +
+
+ +

The component-uuid above points to the this system component.

+

Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.

+

This can also be used to provide a summary, such as a holistic overview of how multiple components work together.

+

While the this system component is not explicitly required within every statement, it will typically be present.

+
+
+ + +

For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.

+
+ + +

Optional description.

+

Consumer-appropriate description of what may be inherited as provided by the leveraged system.

+

In the context of this component in satisfaction of AC-2, part a.

+

The provided-uuid links this to the same statement in the leveraged system's SSP.

+

It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).

+
+
+ + +

Description of how the responsibility was satisfied.

+

The responsibility-uuid links this to the same statement in the leveraged system's SSP.

+

It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).

+

Tools should use this to ensure all identified customer responsibility statements have a corresponding satisfied statement in the leveraging system's SSP.

+

Tool developers should be mindful that

+
+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

Describe how Part a is satisfied.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

Describe how Part b-1 is satisfied.

+
+
+
+ + + +

Describe how Part b-2 is satisfied.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+ +
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+ +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+ +
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + + + + +

The organization coordinates contingency plan development with organizational elements responsible for related plans.

+
+ +
+
+
+ + + + + + + +

The organization plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation.

+
+ + within 24 hours + + +
+
+
+ + + + + + + +

The organization identifies critical system assets supporting essential missions and business functions.

+
+ +
+
+
+ + + + + + + +

The organization coordinates contingency plan testing with organizational elements responsible for related plans.

+
+ +
+
+
+ + + + + + + +

The organization conducts an assessment of the alternate storage site at least annually to determine its availability and readiness for operation.

+
+ +
+
+
+ + + + + + + +

The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.

+
+ +
+
+
+ + + + + + + +

The organization conducts an assessment of the alternate processing site at least annually to determine its availability and readiness for operation.

+
+ +
+
+
+ + + + + + + +

The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.

+
+ +
+
+
+ + + + + + + +

The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).

+
+ +
+
+
+ + + + + + + +

The organization identifies primary and alternate telecommunications services supporting the system and documents provider contingency plans and recovery time objectives to ensure the availability of telecommunication services.

+
+ +
+
+
+ + + + + + + +

The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.

+
+ +
+
+
+ + + + + + + +

The organization conducts backups of user-level information contained in the system at least weekly.

+
+ +
+
+
+ + + + + + + +

The organization provides a means to restore system functions without loading backups (e.g., through system reinstallation).

+
+ +
+
+
+ + + + + + + +

The organization implements transaction recovery for systems that are transaction-based.

+
+ +
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + + + + +

The organization:

+
+ + System Administrators, Security Administrators + + + at least annually + + +
+
+
+ + + + + + + +

The organization:

+

a. Approves and monitors the use of system maintenance tools; and

+

b. Controls maintenance tools through one or more of the following: removal, disabling, preventing unauthorized removal.

+
+ +
+
+
+ + + + + + + +

The organization inspects the maintenance tools used by maintenance personnel for improper or unauthorized modifications.

+
+ +
+
+
+ + + + + + + +

The organization checks media containing diagnostic and test programs for malicious code before the media are used in the system.

+
+ +
+
+
+ + + + + + + +

The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:

+

(a) Verifying that there is no organizational information contained on the equipment;

+

(b) Sanitizing or destroying the equipment;

+

(c) Retaining the equipment within the facility; or

+

(d) Obtaining an exemption from the authorizing official explicitly authorizing removal of the equipment from the facility.

+
+ +
+
+
+ + + + + + + +

The organization:

+

a. Approves and monitors nonlocal maintenance and diagnostic activities;

+

b. Documents and monitors maintenance and diagnostic activities;

+

c. Requires that nonlocal maintenance and diagnostic activities be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or

+

d. Removes the component to be serviced from the system prior to nonlocal maintenance or diagnostic services.

+
+ + System Administrators, Security Administrators + + +
+
+
+ + + + + + + +

The organization:

+

a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;

+

b. Ensures that non-escorted personnel performing maintenance on the system possess the required access authorizations; and

+

c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.

+
+ +
+
+
+ + + + + + + +

The organization:

+

a. Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:

+
    +
  1. +

    Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;

    +
  2. +
  3. +

    Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and

    +
  4. +
+

b. Develops and implements alternate security safeguards in the event a system component cannot be sanitized, removed, or disconnected from the system.

+
+ +
+
+
+ + + + + + + +

The organization performs maintenance on organization-defined system components within organization-defined time periods of failure.

+
+ + all system components + + + within 24 hours of failure + + +
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + organization-defined personnel or roles + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+
+
+ + + + + 11111111-2222-4000-8000-004000000018 + + + + +

Describe how the control is satisfied within the system.

+

DMARC is employed.

+

SPF is employed.

+

DKIM is employed.

+
+ + organization-defined personnel or roles + + + [specify frequency] + + + [specify frequency] + +
+
+
+ + + + +

Describe the plan to complete the implementation.

+
+
+ + + + + 11111111-2222-4000-8000-004000000011 + + + + +

Describe how the control is satisfied within the system.

+
+ + to include chief privacy and ISSO and/or similar role or designees + + + at least every 3 years + + + at least annually + +
+
+ + + +

For the portion of the control satisfied by the service provider, describe how the control is met.

+
+
+ + +

Describe how this policy component satisfies part a.

+

Component approach. This links to a component representing the Policy.

+

That component contains a link to the policy, so it does not have to be linked here too.

+
+
+ + +

Describe how this procedure component satisfies part a.

+

Component approach. This links to a component representing the procedure.

+

That component contains a link to the procedure, so it does not have to be linked here too.

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
- - - -

Describe how Part a is satisfied within the system.

-

Legacy approach. If no policy component is defined, describe here how the - policy satisfies part a.

-

In this case, a link must be provided to the policy.

-

FedRAMP prefers all policies and procedures be attached as a resource in the - back-matter. The link points to a resource.

-
- - - - -

The specified component is the system itself.

-

Any control implementation response that can not be associated with another - component is associated with the component representing the system.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Identity - Management and Access Control Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
- -
-
- - - -

There

-
- - - -

Describe the plan to complete the implementation.

-
-
-
- - -

Describe how this policy currently satisfies part a.

-
- - -

Describe the plan for addressing the missing policy elements.

-
-
- - -

Identify what is currently missing from this policy.

-
-
-
-
- - - -

Describe how Part b-1 is satisfied.

-
- -
-
- - - -

Describe how Part b-2 is satisfied.

-
- -
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - -

Describe any customer-configured requirements for satisfying this control.

-
-
- - 11111111-2222-4000-8000-004000000010 - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - [SAMPLE]privileged, non-privileged - - - [SAMPLE]all - - - [SAMPLE]The Access Control Procedure - - - at least annually - -
-
- - - -

Describe how AC-2, part a is satisfied within this system.

-

This points to the "This System" component, and is used any time a more - specific component reference is not available.

-
- - - -

Leveraged system's statement of capabilities which may be inherited by a - leveraging systems to satisfy AC-2, part a.

-
-
- - -

Leveraged system's statement of a leveraging system's responsibilities in - satisfaction of AC-2, part a.

-

Not associated with inheritance, thus associated this with the - by-component for "this system".

-
- - 11111111-2222-4000-8000-004000000001 - -
-
-
- - -

For the portion of the control satisfied by the application component of this - system, describe how the control is met.

-
- - - -

Consumer-appropriate description of what may be inherited from this - application component by a leveraging system.

-

In the context of the application component in satisfaction of AC-2, part - a.

-
- - 11111111-2222-4000-8000-004000000005 - -
- - -

Leveraging system's responsibilities with respect to inheriting this - capability from this application.

-

In the context of the application component in satisfaction of AC-2, part - a.

-
- - 11111111-2222-4000-8000-004000000005 - -
-
- -

The component-uuid above points to the "this system" component.

-

Any control response content that does not cleanly fit another system component - is placed here. This includes customer responsibility content.

-

This can also be used to provide a summary, such as a holistic overview of how - multiple components work together.

-

While the "this system" component is not explicitly required within every - statement, it will typically be present.

-
-
- - -

For the portion inherited from an underlying FedRAMP-authorized provider, - describe what is inherited.

-
- - -

Optional description.

-

Consumer-appropriate description of what may be inherited as provided by the - leveraged system.

-

In the context of this component in satisfaction of AC-2, part a.

-

The provided-uuid links this to the same statement in the - leveraged system's SSP.

-

It may be linked directly, but is more commonly provided via an OSCAL-based - CRM (Inheritance and Responsibility Model).

-
-
- - -

Description of how the responsibility was satisfied.

-

The responsibility-uuid links this to the same statement in the - leveraged system's SSP.

-

It may be linked directly, but is more commonly provided via an OSCAL-based - CRM (Inheritance and Responsibility Model).

-

Tools should use this to ensure all identified customer - responsibility statements have a corresponding - satisfied statement in the leveraging system's SSP.

-

Tool developers should be mindful that

-
-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

Describe how Part a is satisfied.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

Describe how Part b-1 is satisfied.

-
-
-
- - - -

Describe how Part b-2 is satisfied.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
- -
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
- -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
- -
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - organization-defined personnel or roles - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
-
-
- - - - - - - 11111111-2222-4000-8000-004000000018 - - - - -

Describe how the control is satisfied within the system.

-

DMARC is employed.

-

SPF is employed.

-

DKIM is employed.

-
- - organization-defined personnel or roles - - - [specify frequency] - - - [specify frequency] - -
-
-
- - - - -

Describe the plan to complete the implementation.

-
-
- - - - - 11111111-2222-4000-8000-004000000011 - - - - -

Describe how the control is satisfied within the system.

-
- - to include chief privacy and ISSO and/or similar role or designees - - - at least every 3 years - - - at least annually - -
-
- - - -

For the portion of the control satisfied by the service provider, describe - how the control is met.

-
-
- - -

Describe how this policy component satisfies part a.

-

Component approach. This links to a component representing the Policy.

-

That component contains a link to the policy, so it does not have to be linked - here too.

-
-
- - -

Describe how this procedure component satisfies part a.

-

Component approach. This links to a component representing the procedure.

-

That component contains a link to the procedure, so it does not have to be - linked here too.

-
-
-
-
-
- + + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + + + + + +

Implementation description needed

+
+
+
+
+ + diff --git a/src/validations/constraints/fedramp-external-constraints.xml b/src/validations/constraints/fedramp-external-constraints.xml index def1811ce..9ccf39bf8 100644 --- a/src/validations/constraints/fedramp-external-constraints.xml +++ b/src/validations/constraints/fedramp-external-constraints.xml @@ -1,5 +1,6 @@ - + @@ -39,7 +40,7 @@

This appears in FedRAMP profiles and resolved profile catalogs.

For control statements, it signals to the CSP which statements require a response in the SSP.

For control objectives, it signals to the assessor which control objectives must appear in the assessment results, which aligns with the FedRAMP test case workbook.

- + @@ -57,20 +58,24 @@ else if (system-characteristics/security-sensitivity-level = 'fips-199-moderate') then ('fips-199-moderate', 'fips-199-high') else ('fips-199-low', 'fips-199-moderate', 'fips-199-high')"/> - + - + + + + + Component Has Authentication Method A FedRAMP SSP MUST include at least one authentication method for each leveraged system. - + Component Has Non-Provider Responsible Role A FedRAMP SSP MUST have each component describing leveraged systems, interconnections, or authorized services identify at least one responsible role other than "provider". - + Component Has Provider Responsible Role A FedRAMP SSP MUST have each component describing leveraged systems, interconnections, or authorized services identify a "provider" role that references one responsible party. @@ -107,13 +112,34 @@ Leveraged Authorization Has Valid Impact Level A FedRAMP SSP MUST define the appropriate FIPS-199 impact level (low, moderate, or high) for each leveraged authorization. - + Non-Provider Responsible Role References User A FedRAMP SSP MUST have each component describing leveraged systems, interconnections, or authorized services reference at least one user with an authorized privilege and function performed via the "privilege-uuid" property. - + + + + + + + + + Incomplete Implemented Requirements + A FedRAMP SSP MUST contain an implemented requirement for each imported control. + + + A FedRAMP SSP MUST contain an implemented requirement for each imported control. Missing: ({@id}). + + + Additional Controls Implemented Not in Baseline + A FedRAMP SSP MUST NOT include extraneous controls outside of the FedRAMP baseline. + + + A FedRAMP SSP MUST NOT include extraneous controls outside of the FedRAMP baseline. Extraneous control: ({@control-id}). + + @@ -187,32 +213,32 @@ Data Center Alternate - + There MUST be one or more alternate data center(s). Data Center Count - + There MUST be at least two (2) data centers listed. Data Center Has Country Code - + Each data center address MUST contain a country code. Data Center Primary - + There MUST be a single primary data center. Data Center In United States - + Each data center MUST have an address that is within the United States. - Index of parties of type "person". - This index is a list of the UUIDs of all of the parties that are type "person" in the document. + Index of parties of type "person". + This index is a list of the UUIDs of all of the parties that are type "person" in the document. @@ -300,7 +326,7 @@ A FedRAMP SSP information type confidentiality, integrity, or availability impact MUST specify the selected impact. - + Fully Operational Date Is Valid A system MUST be fully implemented prior to submitting the SSP to FedRAMP. @@ -309,7 +335,7 @@ Fully Operational Date Type A FedRAMP SSP MUST specify the system's fully operational data as a "full-date" per RFC3339 with the addition of a timezone. - + Has Authenticator Assurance Level @@ -515,20 +541,20 @@ - + Authentication Method Has Remarks Each authentication method in a FedRAMP SSP MUST have a remarks field. - + System Implementation Has Inventory Items A FedRAMP SSP system implementation section MUST have at least two inventory items. - + - Inter-Boundary Component Has Direction - - In an inter-boundary communication component, a FedRAMP SSP MUST have at least one direction property, with no more than one incoming and no more than one outgoing direction. + Inter-Boundary Component Has Direction + + In an inter-boundary communication component, a FedRAMP SSP MUST have at least one direction property, with no more than one incoming and no more than one outgoing direction. Leveraged Authorization Has Authorization Type @@ -544,7 +570,7 @@ Leveraged Authorization Has System Identifier A FedRAMP SSP MUST define exactly one system identifier for each leveraged authorization entry. - + Network Component Has Connection Security Property @@ -586,7 +612,8 @@ A FedRAMP document's metadata MUST define a valid FedRAMP version.

All documents in a digital authorization package for FedRAMP must specify the version that identifies which FedRAMP policies, guidance, and technical specifications its authors used during the creation and maintenance of the package.

-

FedRAMP maintains an official list of the versions on the fedramp-automation releases page. Unless noted otherwise, a valid version is a published tag name.

+

FedRAMP maintains an official list of the versions on the fedramp-automation releases page. Unless noted otherwise, a valid version is a published tag name. +

@@ -597,10 +624,10 @@ FedRAMP data sensitivity classification identifier. - A FedRAMP document MUST have a marking that defines its data classification. + A FedRAMP document MUST have a marking that defines its data classification.
- +