From c8f9787b292b777ec529d6b9bf9f9aa5863175d8 Mon Sep 17 00:00:00 2001
From: "A.J. Stein" Initial publication. Minor This is a sample role. Any internal users of a leveraged authorization. Replace sample CSP information. CSP information must be present and associated with the "cloud-service-provider" role
- via prop
updates.responsible-party
.
- responsible-party
.
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
@@ -571,7 +567,7 @@For now, this is a required field. In the future we intend to pull this information directly from FedRAMP's records based on the "leveraged-system-identifier" property's value.
For now, this is a required field. In the future we intend to pull this information directly from FedRAMP's records @@ -804,17 +800,9 @@
admin user
-The user assembly is being reviewed for continued applicability @@ -825,61 +813,34 @@
admin user
-admin user
-admin user
-If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This is a leveraged system within which this system operates. @@ -973,7 +933,7 @@
Links to the vendor website describing the system are encouraged, but not required.
- +A service within the scope of the leveraged system's authorization boundary is considered an "authorized service". Any other service offered by the @@ -992,13 +952,12 @@ a "poam-item" link that references a corrisponding entry in this system's POA&M. - +
Both authorized and non-authorized leveraged services include:
"#11111111-2222-4000-8000-009000100001"
)
- "#11111111-2222-4000-8000-009000100001"
)
Although SSP Table 7.1 also requires data categoriation and hosting
@@ -1028,13 +987,15 @@
This is a service offered by a leveraged system and used by this system.
@@ -1049,8 +1010,7 @@
leveraged-authorization entry
Where relevant, this component should also have: Describe the service and what it is used for. If 'yes', describe the authentication method. If 'no', explain why no authentication is used. If 'not-applicable', attest explain why authentication is not applicable in the remarks. This is a service offered by a leveraged system and used by this system.
It is NOT explicitly listed on the FedRAMP marketplace as being included
in the scope of the leveraged system's ATO, thus is treated as a
@@ -1126,12 +1085,10 @@
"#11111111-2222-4000-8000-009000100001"
)
- "#11111111-2222-4000-8000-009000100001"
)
"#11111111-2222-4000-8000-009000100001"
)
- "#11111111-2222-4000-8000-009000100001"
)
@@ -1140,7 +1097,7 @@
tools are able to distinguish between authorized and non-authorized services
from the same leveraged provider.
Where relevant, this component should also have:
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for their system (such as in an OSCAL-based CRM).
Link(s) to the vendor's web site describing the service are encouraged, but not @@ -1175,34 +1132,22 @@
An external system to which this system shares an interconnection.
If 'yes', describe the authentication method.
-If 'no', explain why no authentication is used.
-If 'not-applicable', attest explain why authentication is not applicable in the remarks.
-Each interconnection to one or more remote systems must have:
While not required, each "system" component should have:
Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP properties/extensions for these roles, instead favor the core OSCAL responsible-roles constructs, and the NIST-standard roles of @@ -1252,52 +1198,51 @@
Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.)
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
Each interconnection to one or more remote systems must have:
Authentication methods must address both system-authentication as well as @@ -1345,7 +1299,7 @@
Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP properties/extensions for these roles, instead favor the core OSCAL responsible-roles constructs, and the NIST-standard roles of @@ -1354,20 +1308,20 @@
For an external system, the "implementation-point" property must always be present with a value of "external".
- - + +Each interconnection must be defined with both an "system" component and an "interconnection" component.
Must include all leveraged services and features from the leveraged authorization @@ -1398,7 +1352,7 @@
Describe the service and what it is used for.
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This can only be known if provided by the leveraged system. @@ -1426,55 +1380,61 @@
This is a service provided by an external system other than the leveraged system.
As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
Each external service used from a leveraged authorization must have:
-- a "system" component (CURRENTLY DEFERRED DUE TO A KNOWN ISSUE WITH THE "provided-by" link relationship).
-- a "service" component (this component).
+This component must always have:
-- The name of the service in the title - preferably exactly as it appears on the - vendor's web site
-- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
-- An "implementation-point" property with a value of "external".
-- A "provided-by" link with a URI fragment that points to the UUID of the above - "system" component.
- - Example: "#11111111-2222-4000-8000-009000100001"
-
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) constraints, - this property is blocked from proper use.
-- a status with a state value of "operational"
+Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 - information type identifiers.
-- A responsible-role with a role-id of "leveraged-authorization-users" and exactly - one or more party-uuid entries that indicates which users within this system may - interact with the leveraged systeme.
-- An "inherited-uuid" property if the leveraged system's owner provides a UUID for - their system (such as in an OSCAL-based CRM).
-Link(s) to the vendor's web site describing the service are encouraged, but not - required.
+The following fields from the Leveraged Authorization Table are handled in the leveraged-authorization assembly:
@@ -1484,143 +1444,277 @@ "system" component assembly:- Nature of Agreement, CSP Name
-An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
+An unauthorized service from an underlying leveraged authorization + must NOT have the "leveraged-authorization-uuid" property. The presence + or absence of this property is how the authorization status of a service is indicated.
This component represents any of the public API clients that may + access this systems'API service.
+When an API service is offered to a large community, this one component + bay be used to represent the collection of API clients that may connect + from that community. This must have:
+A service provided by an external system other than the leveraged system.
+A service offered by this system to external systems, such as an API. + As a result, communication crosses the boundary.
Describe the service and what it is used for.
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Either describe a risk associated with this service, or indicate there is no identified risk.
-If there is no risk, please explain your basis for that conclusion.
+Terms of Use
If there are one or more identified risks, describe any resulting impact.
-If there are one or more identified risks, describe any mitigating factors.
+Explain why authentication scans are not possible for this component. + Provide evidence if available, such as scanner tool or vendor links.
This is a service provided by an external system other than the leveraged system.
- - - -- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
- - - -As a result, the "leveraged-authorization-uuid" property is not applicable and must - NOT be used.
-All services require the "implementation-point" property. In this case, the property - value is set to "external.
-All external services would normally require a "provided-by" link; however, a known - bug in core OSCAL syntax prevents the use of this property at this time.
-If the leveraged system owner provides a UUID for their service (such as in an
- OSCAL-based CRM), it should be reflected in the inherited-uuid
- property.
This is a service provided by this system to external systems, such as an + offered API. The following is required:
+Because this is softare that exists within the boundary, it is also requires the following + in satisfaction of inventory/CM/ConMon requirements:
+None
+A CLI tool used from within this system's boundary to manage a + hypervisor, service, or other system outside this system's boundary, + resulting in communication that crosses the boundary.
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Either describe a risk associated with this CLI, or indicate there is no identified risk.
-If there is no risk, please explain your basis for that conclusion.
+Terms of Use
If there are one or more identified risks, describe any resulting impact.
+Explain why authentication scans are not possible for this component. + Provide evidence if available, such as scanner tool or vendor links.
When an internal CLI tool communicates with a system outside the boundary, + such as for management of the underlying leveraged system or interaction + with an external system, the following is required:
+Because this is softare that exists within the boundary, it is also requires the following + in satisfaction of inventory/CM/ConMon requirements:
+A CLI tool used by systems outside the authorization boundary to manage + or interact with this system..
+If there are one or more identified risks, describe any mitigating factors.
+If 'yes', describe the authentication method in the remarks.
+If 'no', explain why no authentication is used in the remarks.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Terms of Use
When a CLI tool outside the system communicates with this system, + such as for management of the user's hypervisor in this system, the + following is required:
+As this is impelemented external to the system boundary, information such as "scan-type" + and "allows-authenticated-scanning" are not applicable and should not be present.
+FUNCTION: Describe typical component function.
FUNCTION: Describe typical component function.
Email Service
+FUNCTION: Describe typical component function.
COMMENTS: Provide other comments as needed.
None
None
If 'yes', describe the authentication method.
-If 'no', explain why no authentication is used.
-If 'not-applicable', attest explain why authentication is not applicable in the remarks.
-None
The Access Control Policy governs how access is managed and approved.
-The Awareness and Training Policy governs how access is managed and approved.
-The Audit and Accountability governs how access is managed and approved.
-The Assessment, Authorization, and Monitoring Policy governs how access is managed - and approved.
-The Configuration Management Policy governs how access is managed and approved.
-The Contingency Planning Policy governs how access is managed and approved.
-The Identificaiton and Authentication Policy governs how access is managed and - approved.
-The Incident Response Policy governs how access is managed and approved.
-The Maintenance Policy governs how access is managed and approved.
-The Media Protection Policy governs how access is managed and approved.
-The Physical and Enviornmental Protection Policy governs how access is managed and - approved.
-The Planning Policy governs how access is managed and approved.
-The Program Management Policy governs how access is managed and approved.
-The Personnel Security Policy governs how access is managed and approved.
-The PII Processing and Transparency Policy governs how access is managed and - approved.
-The Risk Assessment Policy governs how access is managed and approved.
-The System and Services Acquisition Policy governs how access is managed and - approved.
+IPv4 Production Subnet.
The System and Communication Protection Policy governs how access is managed and - approved.
+IPv4 Management Subnet.
The System and Information Integrity Policy governs how access is managed and - approved.
+The Access Control and Identity Management Policy governs how + user identities and access rights are managed.
A policy component is required for each policy that governs the system.
+The title, description and status fields are required by core OSCAL. + The title field should reflect the actual title of the policy document.
+A "policy" link field must be present that identifies the back-matter + resource representing the attached policy.
+The document version and date are represented in the linked resource. Not here.
+At this time FedRAMP does not _require_ policy approver or + audience information in the SSP; however, both may be represented here + using the responsible-role field. If electing to include this information, + use the "approver" role ID to represent approvers. Any other role listed + is assumed to be audience.
+The Supply Chain Risk Management Policy governs how access is managed and - approved.
+The Awareness and Training Policy governs how access is managed and approved.
The Access Control Procedure governs how access is managed and approved.
The Awareness and Training Procedure governs how access is managed and approved.
The Audit and Accountability Procedure governs how access is managed and - approved.
-The Assessment, Authorization, and Monitoring Procedure governs how access is managed - and approved.
-The Configuration Management Procedure governs how access is managed and - approved.
-The Contingency Planning Procedure governs how access is managed and approved.
-The Identificaiton and Authentication Procedure governs how access is managed and - approved.
-The Incident Response Procedure governs how access is managed and approved.
-The Maintenance Procedure governs how access is managed and approved.
-The Media Protection Procedure governs how access is managed and approved.
-The Physical and Enviornmental Protection Procedure governs how access is managed and - approved.
-The Planning Procedure governs how access is managed and approved.
-The Program Management Procedure governs how access is managed and approved.
-The Personnel Security Procedure governs how access is managed and approved.
-The PII Processing and Transparency Procedure governs how access is managed and - approved.
-The Risk Assessment Procedure governs how access is managed and approved.
-The System and Services Acquisition Procedure governs how access is managed and - approved.
-The System and Communication Protection Procedure governs how access is managed and - approved.
-The System and Information Integrity Procedure governs how access is managed and - approved.
-The Supply Chain Risk Management Procedure governs how access is managed and - approved.
-IPv4 Production Subnet.
-IPv4 Management Subnet.
-Email Service
-If 'yes', describe the authentication method.
-If 'no', explain why no authentication is used.
-If 'not-applicable', attest explain why authentication is not applicable in the remarks.
-If no, explain why. If yes, omit remarks field.
@@ -2293,7 +2068,7 @@If no, explain why. If yes, omit remark.
Asset wasn't running at time of scan.
-Asset wasn't running at time of scan.
-Must be present in a FedRAMP SSP.
AC Policy document
+A single policy that addresses both the AC and IA families.
Table 12-1 Attachments: Policy Attachment
-May use rlink
with a relative path, or embedded as
- base64
.
-
Each policy must be attached as back-matter resources, and must include:
+Each policy must have a corrisponding "policy" component.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
-May use rlink
with a relative path, or embedded as
- base64
.
-
Procedures must be attached as back-matter resources, and must include:
+Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: User's Guide Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Rules of Behavior (ROB)
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Contingency Plan (CP) Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Configuration Management (CM) Plan Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Incident Response (IR) Plan Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
Table 12-1 Attachments: Continuous Monitoring Plan Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
The POA&M attachment may either be a legacy Excel workbook or OSCAL file. + The resource must have:
+A "version" property is optional.
+The appropriate media types for OSCAL content + are, "application/xml", "application/json" or "application/yaml".
+Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
FedRAMP Logo
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -8067,8 +7828,7 @@May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -8089,8 +7849,7 @@ system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000054"May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -8111,8 +7870,7 @@ system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000055"May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -8131,8 +7889,7 @@This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000056"
May use rlink
with a relative path, or embedded as
- base64
.
-
base64
.
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -8149,8 +7906,7 @@Federal Acquisition Supply Chain Security Act; Rule,85 Federal Register 54263 (September 1, 2020), pp 54263-54271.
Federal Acquisition Supply Chain Security Act; Rule,85 Federal Register 54263 (September 1, 2020), pp 54263-54271.
CSP-specific reference. Note the "type" property's class is "reference" - and the value is "citation".
-Separation of Duties Matrix
-May use rlink
with a relative path, or embedded as base64
.
-
Appendix A - FedRAMP SSP Rev5 Template
-This description field is required by OSCAL.
-FedRAMP does not require any specific information here.
-Describe how Part a is satisfied within the system.
-Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
-In this case, a link must be provided to the policy.
-FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
-The specified component is the system itself.
-Any control implementation response that can not be associated with another component is associated with the component representing the system.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Identity Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-There
-Describe the plan to complete the implementation.
-Describe how this policy currently satisfies part a.
-Describe the plan for addressing the missing policy elements.
-Identify what is currently missing from this policy.
-Describe how Part b-1 is satisfied.
-Describe how Part b-2 is satisfied.
-Describe the plan to complete the implementation.
-Describe any customer-configured requirements for satisfying this control.
-Describe how the control is satisfied within the system.
-Describe how AC-2, part a is satisfied within this system.
-This points to the This System
component, and is used any time a more specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
-Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
-Not associated with inheritance, thus associated this with the by-component for this system
.
-
For the portion of the control satisfied by the application component of this system, describe how the control is met.
-Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
-In the context of the application component in satisfaction of AC-2, part a.
-Leveraging system's responsibilities with respect to inheriting this capability from this application.
-In the context of the application component in satisfaction of AC-2, part a.
-The component-uuid above points to the this system
component.
Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.
-This can also be used to provide a summary, such as a holistic overview of how multiple components work together.
-While the this system
component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
-Optional description.
-Consumer-appropriate description of what may be inherited as provided by the leveraged system.
-In the context of this component in satisfaction of AC-2, part a.
-The provided-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
-Description of how the responsibility was satisfied.
-The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
-Tools should use this to ensure all identified customer responsibility
statements have a corresponding satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-Describe how Part a is satisfied.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-Describe how Part b-1 is satisfied.
-Describe how Part b-2 is satisfied.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-The organization coordinates contingency plan development with organizational elements responsible for related plans.
-The organization plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation.
-The organization identifies critical system assets supporting essential missions and business functions.
-The organization coordinates contingency plan testing with organizational elements responsible for related plans.
-The organization conducts an assessment of the alternate storage site at least annually to determine its availability and readiness for operation.
-The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
-The organization conducts an assessment of the alternate processing site at least annually to determine its availability and readiness for operation.
-The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
-The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).
-The organization identifies primary and alternate telecommunications services supporting the system and documents provider contingency plans and recovery time objectives to ensure the availability of telecommunication services.
-The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
-The organization conducts backups of user-level information contained in the system at least weekly.
-The organization provides a means to restore system functions without loading backups (e.g., through system reinstallation).
-The organization implements transaction recovery for systems that are transaction-based.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-The organization:
-The organization:
-a. Approves and monitors the use of system maintenance tools; and
-b. Controls maintenance tools through one or more of the following: removal, disabling, preventing unauthorized removal.
-The organization inspects the maintenance tools used by maintenance personnel for improper or unauthorized modifications.
-The organization checks media containing diagnostic and test programs for malicious code before the media are used in the system.
-The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:
-(a) Verifying that there is no organizational information contained on the equipment;
-(b) Sanitizing or destroying the equipment;
-(c) Retaining the equipment within the facility; or
-(d) Obtaining an exemption from the authorizing official explicitly authorizing removal of the equipment from the facility.
-The organization:
-a. Approves and monitors nonlocal maintenance and diagnostic activities;
-b. Documents and monitors maintenance and diagnostic activities;
-c. Requires that nonlocal maintenance and diagnostic activities be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or
-d. Removes the component to be serviced from the system prior to nonlocal maintenance or diagnostic services.
-The organization:
-a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
-b. Ensures that non-escorted personnel performing maintenance on the system possess the required access authorizations; and
-c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
-The organization:
-a. Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:
-b. Develops and implements alternate security safeguards in the event a system component cannot be sanitized, removed, or disconnected from the system.
-The organization performs maintenance on organization-defined system components within organization-defined time periods of failure.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how the control is satisfied within the system.
-DMARC is employed.
-SPF is employed.
-DKIM is employed.
-Describe the plan to complete the implementation.
-Describe how the control is satisfied within the system.
-For the portion of the control satisfied by the service provider, describe how the control is met.
-Describe how this policy component satisfies part a.
-Component approach. This links to a component representing the Policy.
-That component contains a link to the policy, so it does not have to be linked here too.
-Describe how this procedure component satisfies part a.
-Component approach. This links to a component representing the procedure.
-That component contains a link to the procedure, so it does not have to be linked here too.
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-Implementation description needed
-This description field is required by OSCAL.
+FedRAMP does not require any specific information here.
+ + +[Assignment: organization-defined personnel or roles]
+This focuses on roles the POLICY is disseminated to.
+[Assignment: organization-defined personnel or roles]
+This focuses on roles PROCEDURES are disseminated to.
+[Selection (one or more): Organization-level; Mission/business process-level; Systemlevel]
+This is a SELECT parameter. Use one "value" field for each selection.
+[Assignment: organization-defined official]
+[Assignment: organization-defined frequency]
+[Assignment:organization-defined events]
+[Assignment: organization-defined frequency]
+[Assignment:organization-defined events]
+Describe how Part a is satisfied within the system as a whole.
+FedRAMP prefers all policies and procedures be attached as a resource in the + back-matter. The link points to a resource.
+This is the "this-system" component, which represents the system as a whole.
+There are two reasons to provide a response here:
+Describe how this policy satisfies part a.
+This is the "policy" component, which represents the Access Control and + Identity Management Policy.
+Describe how this procedure satisfies part a.
+This is the "process-procedure" component, which represents the Access Control Process.
+Describe how Part b is satisfied within the system as a whole.
+Describe the plan to complete the implementation.
+This is the "this-system" component, which represents the system as a whole.
+There are two reasons to provide a response here:
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part b-1 is satisfied.
+Describe the plan to complete the implementation.
+Describe any customer-configured requirements for satisfying this control.
+Describe how AC-2, part a is satisfied within this system.
+This points to the "This System" component, and is used any time a more + specific component reference is not available.
+Leveraged system's statement of capabilities which may be inherited by a + leveraging systems to satisfy AC-2, part a.
+Leveraged system's statement of a leveraging system's responsibilities in + satisfaction of AC-2, part a.
+Not associated with inheritance, thus associated this with the + by-component for "this system".
+For the portion of the control satisfied by the application component of this + system, describe how the control is met.
+Consumer-appropriate description of what may be inherited from this + application component by a leveraging system.
+In the context of the application component in satisfaction of AC-2, part + a.
+Leveraging system's responsibilities with respect to inheriting this + capability from this application.
+In the context of the application component in satisfaction of AC-2, part + a.
+The component-uuid above points to the "this system" component.
+Any control response content that does not cleanly fit another system component + is placed here. This includes customer responsibility content.
+This can also be used to provide a summary, such as a holistic overview of how + multiple components work together.
+While the "this system" component is not explicitly required within every
+ statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, + describe what is inherited.
+Optional description.
+Consumer-appropriate description of what may be inherited as provided by the + leveraged system.
+In the context of this component in satisfaction of AC-2, part a.
+The provided-uuid
links this to the same statement in the
+ leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based + CRM (Inheritance and Responsibility Model).
+Description of how the responsibility was satisfied.
+The responsibility-uuid
links this to the same statement in the
+ leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based + CRM (Inheritance and Responsibility Model).
+Tools should use this to ensure all identified customer
+ responsibility
statements have a corresponding
+ satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
+Describe how AC-2, part a is satisfied within this system.
+This points to the "This System" component, and is used any time a more + specific component reference is not available.
+Describe how Part a is satisfied within the system.
+Legacy approach. If no policy component is defined, describe here how the + policy satisfies part a.
+In this case, a link must be provided to the policy.
+FedRAMP prefers all policies and procedures be attached as a resource in the + back-matter. The link points to a resource.
+The specified component is the system itself.
+Any control implementation response that can not be associated with another + component is associated with the component representing the system.
+Describe how this policy satisfies part a.
+Component approach. This links to a component representing the Identity + Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked + here too.
+Describe how this procedure satisfies part a.
+Component approach. This links to a component representing the Identity + Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked + here too.
+There
+Describe the plan to complete the implementation.
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part b-1 is satisfied.
+This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
Initial publication.
Minor prop
updates.
This is a sample role.
Any internal users of a leveraged authorization.
+Replace sample CSP information.
CSP information must be present and associated with the "cloud-service-provider" role
- via responsible-party
.
responsible-party
.
+
This example points to the FedRAMP Rev 5 Moderate baseline that is part of the official FedRAMP 3.0.0 release.
@@ -567,7 +571,7 @@For now, this is a required field. In the future we intend to pull this information directly from FedRAMP's records based on the "leveraged-system-identifier" property's value.
For now, this is a required field. In the future we intend to pull this information directly from FedRAMP's records @@ -800,9 +804,17 @@
admin user
+The user assembly is being reviewed for continued applicability @@ -813,34 +825,61 @@
admin user
+admin user
+admin user
+If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This is a leveraged system within which this system operates. @@ -933,7 +973,7 @@
Links to the vendor website describing the system are encouraged, but not required.
- +A service within the scope of the leveraged system's authorization boundary is considered an "authorized service". Any other service offered by the @@ -952,12 +992,13 @@ a "poam-item" link that references a corrisponding entry in this system's POA&M. - +
Both authorized and non-authorized leveraged services include:
"#11111111-2222-4000-8000-009000100001"
)"#11111111-2222-4000-8000-009000100001"
)
+
Although SSP Table 7.1 also requires data categoriation and hosting
@@ -987,15 +1028,13 @@
This is a service offered by a leveraged system and used by this system.
@@ -1010,7 +1049,8 @@
leveraged-authorization entry
Where relevant, this component should also have:"#11111111-2222-4000-8000-009000100001"
)"#11111111-2222-4000-8000-009000100001"
)
+
Describe the service and what it is used for.
If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This is a service offered by a leveraged system and used by this system. It is NOT explicitly listed on the FedRAMP marketplace as being included in the scope of the leveraged system's ATO, thus is treated as a @@ -1085,10 +1126,12 @@
"#11111111-2222-4000-8000-009000100001"
)"#11111111-2222-4000-8000-009000100001"
)
+
@@ -1097,7 +1140,7 @@
tools are able to distinguish between authorized and non-authorized services
from the same leveraged provider.
-
+
Where relevant, this component should also have:
- An "inherited-uuid" property if the leveraged system's owner provides a UUID for their system (such as in an OSCAL-based CRM).
Link(s) to the vendor's web site describing the service are encouraged, but not @@ -1132,22 +1175,40 @@
An external system to which this system shares an interconnection.
If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+Each interconnection to one or more remote systems must have:
While not required, each "system" component should have:
Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP properties/extensions for these roles, instead favor the core OSCAL responsible-roles constructs, and the NIST-standard roles of @@ -1198,51 +1258,52 @@
Describe the purpose of the external system/service; specifically, provide reasons for connectivity (e.g., system monitoring, system alerting, download updates, etc.)
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Describe the hosting of the interconnection itself (NOT the hosting of the remote system).
Each interconnection to one or more remote systems must have:
Authentication methods must address both system-authentication as well as @@ -1299,7 +1351,7 @@
Unlike prior FedRAMP OSCAL publications, avoid the use of FedRAMP properties/extensions for these roles, instead favor the core OSCAL responsible-roles constructs, and the NIST-standard roles of @@ -1308,20 +1360,20 @@
For an external system, the "implementation-point" property must always be present with a value of "external".
- - + +Each interconnection must be defined with both an "system" component and an "interconnection" component.
Must include all leveraged services and features from the leveraged authorization @@ -1352,7 +1404,7 @@
Describe the service and what it is used for.
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
This can only be known if provided by the leveraged system. @@ -1380,61 +1432,55 @@
This is a service provided by an external system other than the leveraged system.
As a result, the "leveraged-authorization-uuid" property is not applicable and must NOT be used.
Each external service used from a leveraged authorization must have:
-- a "system" component (CURRENTLY DEFERRED DUE TO A KNOWN ISSUE WITH THE "provided-by" link relationship).
+- a "service" component (this component).
This component must always have:
-- The name of the service in the title - preferably exactly as it appears on the + vendor's web site
+- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
+- An "implementation-point" property with a value of "external".
+- A "provided-by" link with a URI fragment that points to the UUID of the above + "system" component.
+ - Example: "#11111111-2222-4000-8000-009000100001"
+
- IMPORTANT: Due to a known error in core OSCAL (versions <=1.1.2) constraints, + this property is blocked from proper use.
+- a status with a state value of "operational"
Where relevant, this component should also have:
-- One or more "information-type" properties, where the allowed values are the 800-63 + information type identifiers.
+- A responsible-role with a role-id of "leveraged-authorization-users" and exactly + one or more party-uuid entries that indicates which users within this system may + interact with the leveraged systeme.
+- An "inherited-uuid" property if the leveraged system's owner provides a UUID for + their system (such as in an OSCAL-based CRM).
+Link(s) to the vendor's web site describing the service are encouraged, but not + required.
The following fields from the Leveraged Authorization Table are handled in the leveraged-authorization assembly:
@@ -1444,277 +1490,143 @@ "system" component assembly:- Nature of Agreement, CSP Name
-An unauthorized service from an underlying leveraged authorization - must NOT have the "leveraged-authorization-uuid" property. The presence - or absence of this property is how the authorization status of a service is indicated.
-This component represents any of the public API clients that may - access this systems'API service.
-When an API service is offered to a large community, this one component - bay be used to represent the collection of API clients that may connect - from that community. This must have:
-An unauthorized service from an underlying leveraged authorization must NOT have the "leveraged-authorization-uuid" property. The presence or absence of this property is how the authorization status of a service is indicated.
A service offered by this system to external systems, such as an API. - As a result, communication crosses the boundary.
+A service provided by an external system other than the leveraged system.
Describe the service and what it is used for.
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Terms of Use
+Either describe a risk associated with this service, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
If there are one or more identified risks, describe any resulting impact.
+Explain why authentication scans are not possible for this component. - Provide evidence if available, such as scanner tool or vendor links.
+If there are one or more identified risks, describe any mitigating factors.
This is a service provided by this system to external systems, such as an - offered API. The following is required:
-Because this is softare that exists within the boundary, it is also requires the following - in satisfaction of inventory/CM/ConMon requirements:
-This is a service provided by an external system other than the leveraged system.
+ + + +- A "risk" property/extension - using the remarks, either describe any risk or state there is no risk and provide a basis for that assertion.
+ + + +As a result, the "leveraged-authorization-uuid" property is not applicable and must + NOT be used.
+All services require the "implementation-point" property. In this case, the property + value is set to "external.
+All external services would normally require a "provided-by" link; however, a known + bug in core OSCAL syntax prevents the use of this property at this time.
+If the leveraged system owner provides a UUID for their service (such as in an
+ OSCAL-based CRM), it should be reflected in the inherited-uuid
+ property.
A CLI tool used from within this system's boundary to manage a - hypervisor, service, or other system outside this system's boundary, - resulting in communication that crosses the boundary.
+None
If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
If 'not-applicable', attest explain why authentication is not applicable in the remarks.
Terms of Use
+Either describe a risk associated with this CLI, or indicate there is no identified risk.
+If there is no risk, please explain your basis for that conclusion.
Explain why authentication scans are not possible for this component. - Provide evidence if available, such as scanner tool or vendor links.
+If there are one or more identified risks, describe any resulting impact.
When an internal CLI tool communicates with a system outside the boundary, - such as for management of the underlying leveraged system or interaction - with an external system, the following is required:
-Because this is softare that exists within the boundary, it is also requires the following - in satisfaction of inventory/CM/ConMon requirements:
-A CLI tool used by systems outside the authorization boundary to manage - or interact with this system..
-If 'yes', describe the authentication method in the remarks.
-If 'no', explain why no authentication is used in the remarks.
-If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+If there are one or more identified risks, describe any mitigating factors.
Terms of Use
+When a CLI tool outside the system communicates with this system, - such as for management of the user's hypervisor in this system, the - following is required:
-As this is impelemented external to the system boundary, information such as "scan-type" - and "allows-authenticated-scanning" are not applicable and should not be present.
-FUNCTION: Describe typical component function.
FUNCTION: Describe typical component function.
Email Service
-FUNCTION: Describe typical component function.
COMMENTS: Provide other comments as needed.
None
None
If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+None
IPv4 Production Subnet.
+The Access Control Policy governs how access is managed and approved.
IPv4 Management Subnet.
+The Awareness and Training Policy governs how access is managed and approved.
The Access Control and Identity Management Policy governs how - user identities and access rights are managed.
+The Audit and Accountability governs how access is managed and approved.
A policy component is required for each policy that governs the system.
-The title, description and status fields are required by core OSCAL. - The title field should reflect the actual title of the policy document.
-A "policy" link field must be present that identifies the back-matter - resource representing the attached policy.
-The document version and date are represented in the linked resource. Not here.
-At this time FedRAMP does not _require_ policy approver or - audience information in the SSP; however, both may be represented here - using the responsible-role field. If electing to include this information, - use the "approver" role ID to represent approvers. Any other role listed - is assumed to be audience.
-The Awareness and Training Policy governs how access is managed and approved.
+The Assessment, Authorization, and Monitoring Policy governs how access is managed + and approved.
+The Configuration Management Policy governs how access is managed and approved.
+The Contingency Planning Policy governs how access is managed and approved.
+The Identificaiton and Authentication Policy governs how access is managed and + approved.
+The Incident Response Policy governs how access is managed and approved.
+The Maintenance Policy governs how access is managed and approved.
+The Media Protection Policy governs how access is managed and approved.
+The Physical and Enviornmental Protection Policy governs how access is managed and + approved.
+The Planning Policy governs how access is managed and approved.
+The Program Management Policy governs how access is managed and approved.
+The Personnel Security Policy governs how access is managed and approved.
+The PII Processing and Transparency Policy governs how access is managed and + approved.
+The Risk Assessment Policy governs how access is managed and approved.
+The System and Services Acquisition Policy governs how access is managed and + approved.
+The System and Communication Protection Policy governs how access is managed and + approved.
+The System and Information Integrity Policy governs how access is managed and + approved.
+The Supply Chain Risk Management Policy governs how access is managed and + approved.
The Access Control Procedure governs how access is managed and approved.
The Awareness and Training Procedure governs how access is managed and approved.
The Audit and Accountability Procedure governs how access is managed and + approved.
+The Assessment, Authorization, and Monitoring Procedure governs how access is managed + and approved.
+The Configuration Management Procedure governs how access is managed and + approved.
+The Contingency Planning Procedure governs how access is managed and approved.
+The Identificaiton and Authentication Procedure governs how access is managed and + approved.
+The Incident Response Procedure governs how access is managed and approved.
+The Maintenance Procedure governs how access is managed and approved.
+The Media Protection Procedure governs how access is managed and approved.
+The Physical and Enviornmental Protection Procedure governs how access is managed and + approved.
+The Planning Procedure governs how access is managed and approved.
+The Program Management Procedure governs how access is managed and approved.
+The Personnel Security Procedure governs how access is managed and approved.
+The PII Processing and Transparency Procedure governs how access is managed and + approved.
+The Risk Assessment Procedure governs how access is managed and approved.
+The System and Services Acquisition Procedure governs how access is managed and + approved.
+The System and Communication Protection Procedure governs how access is managed and + approved.
+The System and Information Integrity Procedure governs how access is managed and + approved.
+The Supply Chain Risk Management Procedure governs how access is managed and + approved.
+IPv4 Production Subnet.
+IPv4 Management Subnet.
+Email Service
+If 'yes', describe the authentication method.
+If 'no', explain why no authentication is used.
+If 'not-applicable', attest explain why authentication is not applicable in the remarks.
+If no, explain why. If yes, omit remarks field.
@@ -2068,7 +2313,7 @@If no, explain why. If yes, omit remark.
Asset wasn't running at time of scan.
-Asset wasn't running at time of scan.
-Appendix A - FedRAMP SSP Rev5 Template
+This description field is required by OSCAL.
+FedRAMP does not require any specific information here.
+Describe how Part a is satisfied within the system.
+Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+In this case, a link must be provided to the policy.
+FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
+The specified component is the system itself.
+Any control implementation response that can not be associated with another component is associated with the component representing the system.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Identity Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+There
+Describe the plan to complete the implementation.
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part b-1 is satisfied.
+Describe how Part b-2 is satisfied.
+Describe the plan to complete the implementation.
+Describe any customer-configured requirements for satisfying this control.
+Describe how the control is satisfied within the system.
+Describe how AC-2, part a is satisfied within this system.
+This points to the This System
component, and is used any time a more specific component reference is not available.
Leveraged system's statement of capabilities which may be inherited by a leveraging systems to satisfy AC-2, part a.
+Leveraged system's statement of a leveraging system's responsibilities in satisfaction of AC-2, part a.
+Not associated with inheritance, thus associated this with the by-component for this system
.
+
For the portion of the control satisfied by the application component of this system, describe how the control is met.
+Consumer-appropriate description of what may be inherited from this application component by a leveraging system.
+In the context of the application component in satisfaction of AC-2, part a.
+Leveraging system's responsibilities with respect to inheriting this capability from this application.
+In the context of the application component in satisfaction of AC-2, part a.
+The component-uuid above points to the this system
component.
Any control response content that does not cleanly fit another system component is placed here. This includes customer responsibility content.
+This can also be used to provide a summary, such as a holistic overview of how multiple components work together.
+While the this system
component is not explicitly required within every statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, describe what is inherited.
+Optional description.
+Consumer-appropriate description of what may be inherited as provided by the leveraged system.
+In the context of this component in satisfaction of AC-2, part a.
+The provided-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+Description of how the responsibility was satisfied.
+The responsibility-uuid
links this to the same statement in the leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based CRM (Inheritance and Responsibility Model).
+Tools should use this to ensure all identified customer responsibility
statements have a corresponding satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+Describe how Part a is satisfied.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+Describe how Part b-1 is satisfied.
+Describe how Part b-2 is satisfied.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+The organization coordinates contingency plan development with organizational elements responsible for related plans.
+The organization plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation.
+The organization identifies critical system assets supporting essential missions and business functions.
+The organization coordinates contingency plan testing with organizational elements responsible for related plans.
+The organization conducts an assessment of the alternate storage site at least annually to determine its availability and readiness for operation.
+The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
+The organization conducts an assessment of the alternate processing site at least annually to determine its availability and readiness for operation.
+The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
+The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).
+The organization identifies primary and alternate telecommunications services supporting the system and documents provider contingency plans and recovery time objectives to ensure the availability of telecommunication services.
+The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
+The organization conducts backups of user-level information contained in the system at least weekly.
+The organization provides a means to restore system functions without loading backups (e.g., through system reinstallation).
+The organization implements transaction recovery for systems that are transaction-based.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+The organization:
+The organization:
+a. Approves and monitors the use of system maintenance tools; and
+b. Controls maintenance tools through one or more of the following: removal, disabling, preventing unauthorized removal.
+The organization inspects the maintenance tools used by maintenance personnel for improper or unauthorized modifications.
+The organization checks media containing diagnostic and test programs for malicious code before the media are used in the system.
+The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:
+(a) Verifying that there is no organizational information contained on the equipment;
+(b) Sanitizing or destroying the equipment;
+(c) Retaining the equipment within the facility; or
+(d) Obtaining an exemption from the authorizing official explicitly authorizing removal of the equipment from the facility.
+The organization:
+a. Approves and monitors nonlocal maintenance and diagnostic activities;
+b. Documents and monitors maintenance and diagnostic activities;
+c. Requires that nonlocal maintenance and diagnostic activities be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or
+d. Removes the component to be serviced from the system prior to nonlocal maintenance or diagnostic services.
+The organization:
+a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
+b. Ensures that non-escorted personnel performing maintenance on the system possess the required access authorizations; and
+c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
+The organization:
+a. Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:
+b. Develops and implements alternate security safeguards in the event a system component cannot be sanitized, removed, or disconnected from the system.
+The organization performs maintenance on organization-defined system components within organization-defined time periods of failure.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how the control is satisfied within the system.
+DMARC is employed.
+SPF is employed.
+DKIM is employed.
+Describe the plan to complete the implementation.
+Describe how the control is satisfied within the system.
+For the portion of the control satisfied by the service provider, describe how the control is met.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how this procedure component satisfies part a.
+Component approach. This links to a component representing the procedure.
+That component contains a link to the procedure, so it does not have to be linked here too.
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+Implementation description needed
+This description field is required by OSCAL.
-FedRAMP does not require any specific information here.
- - -[Assignment: organization-defined personnel or roles]
-This focuses on roles the POLICY is disseminated to.
-[Assignment: organization-defined personnel or roles]
-This focuses on roles PROCEDURES are disseminated to.
-[Selection (one or more): Organization-level; Mission/business process-level; Systemlevel]
-This is a SELECT parameter. Use one "value" field for each selection.
-[Assignment: organization-defined official]
-[Assignment: organization-defined frequency]
-[Assignment:organization-defined events]
-[Assignment: organization-defined frequency]
-[Assignment:organization-defined events]
-Describe how Part a is satisfied within the system as a whole.
-FedRAMP prefers all policies and procedures be attached as a resource in the - back-matter. The link points to a resource.
-This is the "this-system" component, which represents the system as a whole.
-There are two reasons to provide a response here:
-Describe how this policy satisfies part a.
-This is the "policy" component, which represents the Access Control and - Identity Management Policy.
-Describe how this procedure satisfies part a.
-This is the "process-procedure" component, which represents the Access Control Process.
-Describe how Part b is satisfied within the system as a whole.
-Describe the plan to complete the implementation.
-This is the "this-system" component, which represents the system as a whole.
-There are two reasons to provide a response here:
-Describe how this policy currently satisfies part a.
-Describe the plan for addressing the missing policy elements.
-Identify what is currently missing from this policy.
-Describe how Part b-1 is satisfied.
-Describe the plan to complete the implementation.
-Describe any customer-configured requirements for satisfying this control.
-Describe how AC-2, part a is satisfied within this system.
-This points to the "This System" component, and is used any time a more - specific component reference is not available.
-Leveraged system's statement of capabilities which may be inherited by a - leveraging systems to satisfy AC-2, part a.
-Leveraged system's statement of a leveraging system's responsibilities in - satisfaction of AC-2, part a.
-Not associated with inheritance, thus associated this with the - by-component for "this system".
-For the portion of the control satisfied by the application component of this - system, describe how the control is met.
-Consumer-appropriate description of what may be inherited from this - application component by a leveraging system.
-In the context of the application component in satisfaction of AC-2, part - a.
-Leveraging system's responsibilities with respect to inheriting this - capability from this application.
-In the context of the application component in satisfaction of AC-2, part - a.
-The component-uuid above points to the "this system" component.
-Any control response content that does not cleanly fit another system component - is placed here. This includes customer responsibility content.
-This can also be used to provide a summary, such as a holistic overview of how - multiple components work together.
-While the "this system" component is not explicitly required within every
- statement
, it will typically be present.
For the portion inherited from an underlying FedRAMP-authorized provider, - describe what is inherited.
-Optional description.
-Consumer-appropriate description of what may be inherited as provided by the - leveraged system.
-In the context of this component in satisfaction of AC-2, part a.
-The provided-uuid
links this to the same statement in the
- leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based - CRM (Inheritance and Responsibility Model).
-Description of how the responsibility was satisfied.
-The responsibility-uuid
links this to the same statement in the
- leveraged system's SSP.
It may be linked directly, but is more commonly provided via an OSCAL-based - CRM (Inheritance and Responsibility Model).
-Tools should use this to ensure all identified customer
- responsibility
statements have a corresponding
- satisfied
statement in the leveraging system's SSP.
Tool developers should be mindful that
-Describe how AC-2, part a is satisfied within this system.
-This points to the "This System" component, and is used any time a more - specific component reference is not available.
-Describe how Part a is satisfied within the system.
-Legacy approach. If no policy component is defined, describe here how the - policy satisfies part a.
-In this case, a link must be provided to the policy.
-FedRAMP prefers all policies and procedures be attached as a resource in the - back-matter. The link points to a resource.
-The specified component is the system itself.
-Any control implementation response that can not be associated with another - component is associated with the component representing the system.
-Describe how this policy satisfies part a.
-Component approach. This links to a component representing the Identity - Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked - here too.
-Describe how this procedure satisfies part a.
-Component approach. This links to a component representing the Identity - Management and Access Control Policy.
-That component contains a link to the policy, so it does not have to be linked - here too.
-There
-Describe the plan to complete the implementation.
-Describe how this policy currently satisfies part a.
-Describe the plan for addressing the missing policy elements.
-Identify what is currently missing from this policy.
-Describe how Part b-1 is satisfied.
-This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
This is the 'this-system' component.
Implementation description needed
+Implementation description needed
+Implementation description needed
+Must be present in a FedRAMP SSP.
A single policy that addresses both the AC and IA families.
+AC Policy document
Each policy must be attached as back-matter resources, and must include:
-Each policy must have a corrisponding "policy" component.
+Table 12-1 Attachments: Policy Attachment
+May use rlink
with a relative path, or embedded as
+ base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Policy Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Procedures must be attached as back-matter resources, and must include:
-Table 12-1 Attachments: Procedure Attachment
+May use rlink
with a relative path, or embedded as
+ base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: User's Guide Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Rules of Behavior (ROB)
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Contingency Plan (CP) Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Configuration Management (CM) Plan Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Incident Response (IR) Plan Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
Table 12-1 Attachments: Continuous Monitoring Plan Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
The POA&M attachment may either be a legacy Excel workbook or OSCAL file. - The resource must have:
-A "version" property is optional.
-The appropriate media types for OSCAL content - are, "application/xml", "application/json" or "application/yaml".
-Table 12-1 Attachments: Procedure Attachment
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
FedRAMP Logo
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -11338,7 +8087,8 @@May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -11359,7 +8109,8 @@ system-characteristics/authorization-boundary/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000054"May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -11380,7 +8131,8 @@ system-characteristics/network-architecture/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000055"May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -11399,7 +8151,8 @@This should be referenced in the system-characteristics/data-flow/diagram/link/@href flag using a value of "#11111111-2222-4000-8000-001000000056"
May use rlink
with a relative path, or embedded as
- base64
.
base64
.
+
FedRAMP prefers base64
for images and diagrams.
Images must be in sufficient resolution to read all detail when rendered in a browser via HTML5.
@@ -11416,7 +8169,8 @@Federal Acquisition Supply Chain Security Act; Rule,85 Federal Register 54263 (September 1, 2020), pp 54263-54271.
Federal Acquisition Supply Chain Security Act; Rule,85 Federal Register 54263 (September 1, 2020), pp 54263-54271.
CSP-specific reference. Note the "type" property's class is "reference" + and the value is "citation".
+Separation of Duties Matrix
+May use rlink
with a relative path, or embedded as base64
.
+