├── docx └── .gitkeep ├── .gitignore ├── .github ├── disregard-timestamp-changes.sh └── workflows │ ├── ci.yml │ └── build.yml ├── Makefile ├── README.md └── xml ├── rhel-7-fedramp-Low.xml └── rhel-8-fedramp-Low.xml /docx/.gitkeep: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | /docx/*.docx 2 | -------------------------------------------------------------------------------- /.github/disregard-timestamp-changes.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | 3 | set -o errexit 4 | set -o nounset 5 | set -x 6 | 7 | for format in xml json; do 8 | cd $format 9 | for f in `ls`; do 10 | if ! git ls-files --error-unmatch $f; then 11 | git add $f 12 | fi 13 | if [ "x$format" == "xxml" ] && ! git diff $f|grep -v last-modified.*last-modified | grep -v ' uuid="' | grep '^+\s'; then 14 | git checkout $f; 15 | fi 16 | if [ "x$format" == "xjson" ] && ! git diff $f|grep -v '"last-modified": ".*",$' | grep -v '"uuid": "' | grep '^+\s'; then 17 | git checkout $f; 18 | fi 19 | done 20 | cd .. 21 | done 22 | -------------------------------------------------------------------------------- /Makefile: -------------------------------------------------------------------------------- 1 | oscal: xml json 2 | all: oscal docx 3 | 4 | 5 | xml: gocomply_fedramp 6 | gocomply_fedramp --debug opencontrol --format xml https://github.com/ComplianceAsCode/redhat xml/ 7 | 8 | json: gocomply_fedramp 9 | gocomply_fedramp --debug opencontrol --format json https://github.com/ComplianceAsCode/redhat json/ 10 | 11 | docx: gocomply_fedramp $(shell ls -d xml/* | sed -e 's/xml/docx/g') 12 | 13 | docx/%.docx: xml/%.xml 14 | gocomply_fedramp convert $< $@ 15 | 16 | gocomply_fedramp: 17 | ifeq ("$(wildcard $(GOPATH)/bin/gocomply_fedramp)","") 18 | go get -u -v github.com/gocomply/fedramp/cli/gocomply_fedramp 19 | endif 20 | 21 | .PHONY: gocomply_fedramp oscal xml json 22 | -------------------------------------------------------------------------------- /.github/workflows/ci.yml: -------------------------------------------------------------------------------- 1 | name: CI 2 | on: 3 | pull_request: 4 | branches: [ master ] 5 | jobs: 6 | report: 7 | runs-on: ubuntu-latest 8 | steps: 9 | - name: Install Go 10 | uses: actions/setup-go@v1 11 | with: 12 | go-version: 1.13 13 | - name: Install dependencies 14 | uses: mstksg/get-package@master 15 | with: 16 | apt-get: libxml2-utils 17 | - uses: actions/checkout@v2 18 | - name: Get fedramp tool 19 | run: | 20 | go get -u -v github.com/gocomply/fedramp/cli/gocomply_fedramp 21 | - name: Convert opencontrol 22 | run: | 23 | export PATH="$HOME/go/bin:$PATH" 24 | make oscal 25 | - name: Disregard timestamp-only changes 26 | run: | 27 | .github/disregard-timestamp-changes.sh 28 | -------------------------------------------------------------------------------- /.github/workflows/build.yml: -------------------------------------------------------------------------------- 1 | name: Build 2 | on: 3 | push: 4 | branches: [ master ] 5 | schedule: 6 | - cron: "0 0 * * *" 7 | jobs: 8 | report: 9 | runs-on: ubuntu-latest 10 | steps: 11 | - name: Install Go 12 | uses: actions/setup-go@v1 13 | with: 14 | go-version: 1.13 15 | - name: Install dependencies 16 | uses: mstksg/get-package@master 17 | with: 18 | apt-get: libxml2-utils 19 | - uses: actions/checkout@v2 20 | - name: Get fedramp tool 21 | run: | 22 | go get -u -v github.com/gocomply/fedramp/cli/gocomply_fedramp 23 | - name: Convert opencontrol 24 | run: | 25 | export PATH="$HOME/go/bin:$PATH" 26 | make oscal 27 | - name: Disregard timestamp-only changes 28 | run: | 29 | .github/disregard-timestamp-changes.sh 30 | - name: Push to master 31 | uses: mikeal/publish-to-github-action@master 32 | env: 33 | GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} 34 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # OSCAL content 2 | 3 | At this point of time, this repository contains OSCAL formatted SSPs (System Security Plans) generated 4 | automatically out of [opencontrol data](https://github.com/ComplianceAsCode/redhat). 5 | 6 | This repository is on periodical refresh. ![Build](https://github.com/ComplianceAsCode/oscal/workflows/Build/badge.svg) 7 | 8 | ### Developer information. 9 | 10 | [gocomply_fedramp](https://github.com/gocomply/fedramp) tool was used to generate files available here. 11 | 12 | Commands to install `gocomply_fedramp` tool: 13 | 14 | $ get -u -v github.com/gocomply/fedramp/cli/gocomply_fedramp 15 | 16 | Command to re-generate OSCAL files: 17 | 18 | $ gocomply_fedramp opencontrol https://github.com/ComplianceAsCode/redhat xml/ 19 | 20 | ### How to use these files? 21 | 22 | It is possible to generate latest FedRAMP SSP document in `.docx` form using `gocomply_fedramp` tool. 23 | 24 | $ gocomply_fedramp convert ./xml/coreos-4-fedramp-Low.xml FedRAMP-Low-openshift.docx 25 | 26 | To generate all FedRAMP docx guides, one for each oscal file available run: 27 | 28 | $ make docx 29 | -------------------------------------------------------------------------------- /xml/rhel-7-fedramp-Low.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 2020-07-01T00:00:00.00-04:00 5 | 2023-03-02T01:19:03.38+00:00 6 | 0.0.1 7 | 1.0.0-milestone3 8 | 9 | 10 | 2019-06-01T00:00:00.00-04:00 11 | 1.0 12 | 1.0-Milestone3 13 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 14 | 15 |

Initial publication.

16 |
17 |
18 | 19 | 2020-06-01T00:00:00.00-04:00 20 | 2.0 21 | 1.0-Milestone3 22 | csp 23 | 24 |

Updated for annual assessment.

25 |
26 |
27 |
28 | Controlled Unclassified Information 29 | 30 | Prepared By 31 | The organization that prepared this SSP. If developed in-house, this is the CSP itself. 32 | 33 | 34 | Prepared For 35 | The organization for which this SSP was prepared. Typically the CSP. 36 | 37 | 38 | System Security Plan Approval 39 | The individual or individuals accountable for the accuracy of this SSP. 40 | 41 | 42 | Cloud Service Provider 43 | CSP 44 | 45 | 46 | Information System Owner 47 | The individual within the CSP who is ultimately accountable for everything related to this system. 48 | 49 | 50 | Authorizing Official 51 | The individual or individuals who must grant this system an authorization to operate. 52 | 53 | 54 | Authorizing Official's Point of Contact 55 | The individual representing the authorizing official. 56 | 57 | 58 | Information System Management Point of Contact (POC) 59 | The highest level manager who responsible for system operation on behalf of the System Owner. 60 | 61 | 62 | Information System Technical Point of Contact 63 | The individual or individuals leading the technical operation of the system. 64 | 65 | 66 | General Point of Contact (POC) 67 | A general point of contact for the system, designated by the system owner. 68 | 69 | 70 | System Information System Security Officer (or Equivalent) 71 | The individual accountable for the security posture of the system on behalf of the system owner. 72 | 73 | 74 | Privacy Official's Point of Contact 75 | The individual responsible for the privacy threshold analysis and if necessary the privacy impact assessment. 76 | 77 | 78 | Owner of an inventory item within the system. 79 | 80 | 81 | Administrative responsibility an inventory item within the system. 82 | 83 | 84 | ICA POC (Local) 85 | The point of contact for an interconnection on behalf of this system. 86 | 87 |

Remove this role if there are no ICAs.

88 |
89 |
90 | 91 | ICA POC (Remote) 92 | The point of contact for an interconnection on behalf of this external system to which this system connects. 93 | 94 |

Remove this role if there are no ICAs.

95 |
96 |
97 | 98 | ICA Signatory (Local) 99 | Responsible for signing an interconnection security agreement on behalf of this system. 100 | 101 |

Remove this role if there are no ICAs.

102 |
103 |
104 | 105 | ICA Signatory (Remote) 106 | Responsible for signing an interconnection security agreement on behalf of the external system to which this system connects. 107 | 108 |

Remove this role if there are no ICAs.

109 |
110 |
111 | 112 | Consultant 113 | Any consultants involved with developing or maintaining this content. 114 | 115 | 116 | [SAMPLE]Unix Administrator 117 | This is a sample role. 118 | 119 | 120 | [SAMPLE]Client Administrator 121 | This is a sample role. 122 | 123 | 124 | [SAMPLE]Program Director 125 | This is a sample role. 126 | 127 | 128 | Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) 129 | FedRAMP PMO 130 | 131 | 132 | Federal Risk and Authorization Management Program (FedRAMP) Joint Authorization Board (JAB) 133 | FedRAMP JAB 134 | 135 | 136 | CSP HQ 137 |
138 | Suite 0000 139 | 1234 Some Street 140 | Haven 141 | ME 142 | 00000 143 |
144 | 145 |

There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.

146 |
147 |
148 | 149 | Primary Data Center 150 |
151 | 2222 Main Street 152 | Anywhere 153 | -- 154 | 00000-0000 155 |
156 | data-center 157 | primary-data-center 158 | 159 |

There must be one location for each data center.

160 |

There must be at least two data centers.

161 |

For a data center, briefly summarize the components at this location.

162 |

All data centers must have a conformity tag of "data-center".

163 |

A primary data center must also have a conformity tag of "primary-data-center".

164 |
165 |
166 | 167 | Secondary Data Center 168 |
169 | 3333 Small Road 170 | Anywhere 171 | -- 172 | 00000-0000 173 |
174 | data-center 175 | alternate-data-center 176 | 177 |

There must be one location for each data center.

178 |

There must be at least two data centers.

179 |

For a data center, briefly summarize the components at this location.

180 |

All data centers must have a conformity tag of "data-center"

181 |

An alternate or backup data center must also have a conformity tag of "alternate-data-center".

182 |
183 |
184 | 185 | Cloud Service Provider (CSP) Name 186 | CSP Acronym/Short Name 187 | 27b78960-59ef-4619-82b0-ae20b9c709ac 188 | 189 |

Replace sample CSP information.

190 |
191 |
192 | 193 | Federal Risk and Authorization Management Program: Program Management Office 194 | FedRAMP PMO 195 | 196 |
197 | 1800 F St. NW 198 | Washington 199 | DC 200 | US 201 |
202 | info@fedramp.gov 203 | 204 |

This party entry must be present in a FedRAMP SSP.

205 |

The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.

206 |
207 |
208 | 209 | Federal Risk and Authorization Management Program: Joint Authorization Board 210 | FedRAMP JAB 211 | 212 |

This party entry must be present in a FedRAMP SSP.

213 |

The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.

214 |
215 |
216 | 217 | External Organization 218 | External 219 | 220 |

Generic placeholder for any external organization.

221 |
222 |
223 | 224 | Agency Name 225 | A.N. 226 | 227 |

Generic placeholder for an authorizing agency.

228 |
229 |
230 | 231 | Name of Consulting Org 232 | NOCO 233 | 234 |
235 | 3333 Corporate Way 236 | Washington 237 | DC 238 | US 239 |
240 | poc@consulting.sample 241 |
242 | 243 | [SAMPLE]Remote System Org Name 244 | 245 | 246 | [SAMPLE]ICA POC's Name 247 | Individual's Title 248 | person@ica.org.example 249 | 202-555-1212 250 | 80361ec4-bfce-4b5c-85c8-313d6ebd220b 251 | 252 | 253 | [SAMPLE]Example IaaS Provider 254 | E.I.P. 255 | 256 |

Underlying service provider. Leveraged Authorization.

257 |
258 |
259 | 260 | [SAMPLE]Person Name 1 261 | Individual's Title 262 |
263 | Mailstop A-1 264 |
265 | name@org.domain 266 | 202-000-0001 267 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 268 | 27b78960-59ef-4619-82b0-ae20b9c709ac 269 |
270 | 271 | [SAMPLE]Person Name 2 272 | Individual's Title 273 |
274 | Address Line 275 | City 276 | ST 277 | 00000 278 | US 279 |
280 | name@org.domain 281 | 202-000-0002 282 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 283 |
284 | 285 | [SAMPLE]Person Name 3 286 | Individual's Title 287 |
288 | Address Line 289 | City 290 | ST 291 | 00000 292 | US 293 |
294 | name@org.domain 295 | 202-000-0003 296 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 297 |
298 | 299 | [SAMPLE]Person Name 4 300 | Individual's Title 301 |
302 | Address Line 303 | City 304 | ST 305 | 00000 306 | US 307 |
308 | name@org.domain 309 | 202-000-0004 310 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 311 |
312 | 313 | [SAMPLE]Person Name 5 314 | Individual's Title 315 |
316 | Address Line 317 | City 318 | ST 319 | 00000 320 | US 321 |
322 | name@org.domain 323 | 202-000-0005 324 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 325 |
326 | 327 | [SAMPLE]Person Name 6 328 | Individual's Title 329 |
330 | Address Line 331 | City 332 | ST 333 | 00000 334 | US 335 |
336 | name@org.domain 337 | 202-000-0006 338 | 78992555-4a99-4eaa-868c-f2c249679dd3 339 |
340 | 341 | [SAMPLE]Person Name 7 342 | Individual's Title 343 |
344 | Address Line 345 | City 346 | ST 347 | 00000 348 | US 349 |
350 | name@org.domain 351 | 202-000-0007 352 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 353 |
354 | 355 | [SAMPLE] IT Department 356 | 357 | 358 | [SAMPLE]Security Team 359 | 360 | 361 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 362 | 363 |

Exactly one

364 |
365 |
366 | 367 | 3360e343-9860-4bda-9dfc-ff427c3dfab6 368 | 369 |

Exactly one

370 |
371 |
372 | 373 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 374 | 375 | 376 | 3360e343-9860-4bda-9dfc-ff427c3dfab6 377 | 36b8d6c0-3b25-42cc-b529-cf4066145cdd 378 | 379 |

One or more

380 |
381 |
382 | 383 | 3360e343-9860-4bda-9dfc-ff427c3dfab6 384 | 385 |

Exactly one

386 |
387 |
388 | 389 | 49017ec3-9f51-4dbd-9253-858c2b1295fd 390 | 4fded5fd-7a65-47ea-bd76-df57c46e27d1 391 | 392 |

One or more

393 |
394 |
395 | 396 | 0cec09d9-20c6-470b-9ffc-85763375880b 397 | 398 |

Exactly one

399 |
400 |
401 | 402 | f75e21f6-43d8-46ab-890d-7f2eebc5a830 403 | 404 |

Exactly one

405 |
406 |
407 | 408 | 132953a9-640c-46f7-9de9-3fa15ec99361 409 | 410 |

Exactly one

411 |
412 |
413 | 414 | 4fded5fd-7a65-47ea-bd76-df57c46e27d1 415 | 416 |

Exactly one

417 |
418 |
419 | 420 | db234cb7-1776-425c-9ac4-b067c1723011 421 | 422 |

Exactly one

423 |
424 |
425 | 426 | 77e0e2c8-2560-4fe9-ac78-c3ff4ffc9f6d 427 | 428 |

Exactly one

429 |
430 |
431 | 432 | 49017ec3-9f51-4dbd-9253-858c2b1295fd 433 | 434 |

Exactly one

435 |
436 |
437 | 438 |

This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and 439 | High baselines.

440 |

Guidance for OSCAL-based FedRAMP Tailored content has not yet been developed.

441 |
442 |
443 | 444 | 445 | F00000000 446 | Red Hat Enterprise Linux 7.x 447 | rhel-7 448 |

Automatically generated OSCAL SSP from OpenControl guidance for Red Hat Enterprise Linux 7.x

449 | low 450 | 451 | 452 | Information Type Name 453 |

This item is useless nevertheless required.

454 | 455 | fips-199-moderate 456 | 457 | 458 | fips-199-moderate 459 | 460 | 461 | fips-199-moderate 462 | 463 |
464 |
465 | 466 | fips-199-moderate 467 | fips-199-moderate 468 | fips-199-moderate 469 | 470 | 471 | 472 |

A holistic, top-level explanation of the FedRAMP authorization boundary.

473 |
474 |
475 | 476 | 477 | generator 478 | 479 | 480 | This system 481 |

The entire system as depicted in the system authorization boundary

482 | 483 |
484 |
485 | 486 |

FedRAMP SSP Template Section 13

487 | 488 | 489 | 490 | 491 |

Describe how is the software component satisfying the control.

492 |

This control reflects organizational procedure/policy and is not 493 | applicable to component-level configuration. 494 |

495 |
496 |
497 | 498 | 499 |

Describe how is the software component satisfying the control.

500 |

This control reflects organizational procedure/policy and is not 501 | applicable to component-level configuration. 502 |

503 |
504 |
505 |
506 | 507 | 508 | 509 | 510 |

Describe how is the software component satisfying the control.

511 |

This control reflects organizational procedure/policy and is not 512 | applicable to component-level configuration. 513 |

514 |
515 |
516 | 517 | 518 |

Describe how is the software component satisfying the control.

519 |

This control reflects organizational procedure/policy and is not 520 | applicable to component-level configuration. 521 |

522 |
523 |
524 | 525 | 526 |

Describe how is the software component satisfying the control.

527 |

This control reflects organizational procedure/policy and is not 528 | applicable to component-level configuration. 529 |

530 |
531 |
532 |
533 | 534 | 535 | 536 | 537 |

Describe how is the software component satisfying the control.

538 |

This control reflects organizational procedure/policy and is not 539 | applicable to component-level configuration. 540 |

541 |
542 |
543 | 544 | 545 |

Describe how is the software component satisfying the control.

546 |

This control reflects organizational procedure/policy and is not 547 | applicable to component-level configuration. 548 |

549 |
550 |
551 | 552 | 553 |

Describe how is the software component satisfying the control.

554 |

This control reflects organizational procedure/policy and is not 555 | applicable to component-level configuration. 556 |

557 |
558 |
559 |
560 | 561 | 562 | 563 | 564 |

Describe how is the software component satisfying the control.

565 |

This control reflects organizational procedure/policy and is not 566 | applicable to component-level configuration. 567 |

568 |
569 |
570 | 571 | 572 |

Describe how is the software component satisfying the control.

573 |

This control reflects organizational procedure/policy and is not 574 | applicable to component-level configuration. 575 |

576 |
577 |
578 |
579 | 580 | 581 | 582 | 583 |

Describe how is the software component satisfying the control.

584 |

This control reflects organizational procedures/policies, and is not 585 | applicable to the configuration of Red Hat Enterprise Linux. 586 |

587 |
588 |
589 | 590 | 591 |

Describe how is the software component satisfying the control.

592 |

This control reflects organizational procedures/policies, and is not 593 | applicable to the configuration of Red Hat Enterprise Linux. 594 |

595 |
596 |
597 | 598 | 599 |

Describe how is the software component satisfying the control.

600 |

This control reflects organizational procedures/policies, and is not 601 | applicable to the configuration of Red Hat Enterprise Linux. 602 |

603 |
604 |
605 | 606 | 607 |

Describe how is the software component satisfying the control.

608 |

This control reflects organizational procedures/policies, and is not 609 | applicable to the configuration of Red Hat Enterprise Linux. 610 |

611 |
612 |
613 | 614 | 615 |

Describe how is the software component satisfying the control.

616 |

This control reflects organizational procedures/policies, and is not 617 | applicable to the configuration of Red Hat Enterprise Linux. 618 |

619 |
620 |
621 | 622 | 623 |

Describe how is the software component satisfying the control.

624 |

This control reflects organizational procedures/policies, and is not 625 | applicable to the configuration of Red Hat Enterprise Linux. 626 |

627 |
628 |
629 |
630 | 631 | 632 | 633 | 634 |

Describe how is the software component satisfying the control.

635 |

This control reflects organizational procedures/policies, and is not 636 | applicable to the configuration of Red Hat Enterprise Linux. 637 |

638 |
639 |
640 | 641 | 642 |

Describe how is the software component satisfying the control.

643 |

This control reflects organizational procedures/policies, and is not 644 | applicable to the configuration of Red Hat Enterprise Linux. 645 |

646 |
647 |
648 | 649 | 650 |

Describe how is the software component satisfying the control.

651 |

This control reflects organizational procedures/policies, and is not 652 | applicable to the configuration of Red Hat Enterprise Linux. 653 |

654 |
655 |
656 |
657 | 658 | 659 | 660 | 661 |

Describe how is the software component satisfying the control.

662 |

This control reflects organizational procedures/policies, and is not 663 | applicable to the configuration of Red Hat Enterprise Linux. 664 |

665 |
666 |
667 | 668 | 669 |

Describe how is the software component satisfying the control.

670 |

This control reflects organizational procedures/policies, and is not 671 | applicable to the configuration of Red Hat Enterprise Linux. 672 |

673 |
674 |
675 | 676 | 677 |

Describe how is the software component satisfying the control.

678 |

This control reflects organizational procedures/policies, and is not 679 | applicable to the configuration of Red Hat Enterprise Linux. 680 |

681 |
682 |
683 |
684 | 685 | 686 | 687 | 688 |

Describe how is the software component satisfying the control.

689 |

This control reflects organizational procedure/policies and is not 690 | applicable to Red Hat Enterprise Linux configuration. 691 |

692 |
693 |
694 |
695 | 696 | 697 | 698 | 699 |

Describe how is the software component satisfying the control.

700 |

This control reflects organizational procedures/policies, and is not 701 | applicable to the configuration of Red Hat Enterprise Linux. 702 |

703 |
704 |
705 | 706 | 707 |

Describe how is the software component satisfying the control.

708 |

This control reflects organizational procedures/policies, and is not 709 | applicable to the configuration of Red Hat Enterprise Linux. 710 |

711 |
712 |
713 |
714 | 715 | 716 | 717 | 718 |

Describe how is the software component satisfying the control.

719 |

This control reflects organizational procedures/policies, and is not 720 | applicable to the configuration of Red Hat Enterprise Linux. 721 |

722 |
723 |
724 |
725 | 726 | 727 | 728 | 729 |

Describe how is the software component satisfying the control.

730 |

This control reflects organizational procedures/policies, and is not 731 | applicable to the configuration of Red Hat Enterprise Linux. 732 |

733 |
734 |
735 | 736 | 737 |

Describe how is the software component satisfying the control.

738 |

This control reflects organizational procedures/policies, and is not 739 | applicable to the configuration of Red Hat Enterprise Linux. 740 |

741 |
742 |
743 | 744 | 745 |

Describe how is the software component satisfying the control.

746 |

This control reflects organizational procedures/policies, and is not 747 | applicable to the configuration of Red Hat Enterprise Linux. 748 |

749 |
750 |
751 | 752 | 753 |

Describe how is the software component satisfying the control.

754 |

This control reflects organizational procedures/policies, and is not 755 | applicable to the configuration of Red Hat Enterprise Linux. 756 |

757 |
758 |
759 | 760 | 761 |

Describe how is the software component satisfying the control.

762 |

This control reflects organizational procedures/policies, and is not 763 | applicable to the configuration of Red Hat Enterprise Linux. 764 |

765 |
766 |
767 | 768 | 769 |

Describe how is the software component satisfying the control.

770 |

This control reflects organizational procedures/policies, and is not 771 | applicable to the configuration of Red Hat Enterprise Linux. 772 |

773 |
774 |
775 | 776 | 777 |

Describe how is the software component satisfying the control.

778 |

This control reflects organizational procedures/policies, and is not 779 | applicable to the configuration of Red Hat Enterprise Linux. 780 |

781 |
782 |
783 | 784 | 785 |

Describe how is the software component satisfying the control.

786 |

This control reflects organizational procedures/policies, and is not 787 | applicable to the configuration of Red Hat Enterprise Linux. 788 |

789 |
790 |
791 | 792 | 793 |

Describe how is the software component satisfying the control.

794 |

This control reflects organizational procedures/policies, and is not 795 | applicable to the configuration of Red Hat Enterprise Linux. 796 |

797 |
798 |
799 | 800 | 801 |

Describe how is the software component satisfying the control.

802 |

This control reflects organizational procedures/policies, and is not 803 | applicable to the configuration of Red Hat Enterprise Linux. 804 |

805 |
806 |
807 | 808 | 809 |

Describe how is the software component satisfying the control.

810 |

This control reflects organizational procedures/policies, and is not 811 | applicable to the configuration of Red Hat Enterprise Linux. 812 |

813 |
814 |
815 | 816 | 817 |

Describe how is the software component satisfying the control.

818 |

This control reflects organizational procedures/policies, and is not 819 | applicable to the configuration of Red Hat Enterprise Linux. 820 |

821 |
822 |
823 | 824 | 825 |

Describe how is the software component satisfying the control.

826 |

This control reflects organizational procedures/policies, and is not 827 | applicable to the configuration of Red Hat Enterprise Linux. 828 |

829 |
830 |
831 | 832 | 833 |

Describe how is the software component satisfying the control.

834 |

This control reflects organizational procedures/policies, and is not 835 | applicable to the configuration of Red Hat Enterprise Linux. 836 |

837 |
838 |
839 |
840 | 841 | 842 | 843 | 844 |

Describe how is the software component satisfying the control.

845 |

Development, documentation, and dissemination of a physical 846 | and environmental protection policy reflects organizational 847 | procedure/policy and is not applicable to component-level 848 | configuration. 849 |

850 |
851 |
852 | 853 | 854 |

Describe how is the software component satisfying the control.

855 |

Organizational review and updates to the physical and 856 | environmental protection policy reflects organizational 857 | procedure/policy and is not applicable to component-level 858 | configuration. 859 |

860 |
861 |
862 |
863 | 864 | 865 | 866 | 867 |

Describe how is the software component satisfying the control.

868 |

Development, approval, and maintenance of a list 869 | of individuals with authorized access to the facility 870 | where the information system resides reflects organizational 871 | procedure/policy and is not applicable to component-level 872 | configuration. 873 |

874 |
875 |
876 | 877 | 878 |

Describe how is the software component satisfying the control.

879 |

Issuing authorization credentials for facility access 880 | reflects organizational procedure/policy and is not 881 | applicable to component-level configuration. 882 |

883 |
884 |
885 | 886 | 887 |

Describe how is the software component satisfying the control.

888 |

Reviewing the access list detailing authorized facility 889 | access by individuals at an organization-defined frequency 890 | reflects organizational procedure/policy and is not 891 | applicable to component-level configuration. 892 |

893 |
894 |
895 | 896 | 897 |

Describe how is the software component satisfying the control.

898 |

Removal of individuals from the facility access list when access 899 | is no longer required reflects organizational procedure/policy 900 | and is not applicable to component-level configuration. 901 |

902 |
903 |
904 |
905 | 906 | 907 | 908 | 909 |

Describe how is the software component satisfying the control.

910 |

Enforcing physical access authorizations at organization-defined 911 | entry/exit points to the facility where the information system resides 912 | reflects organizational procedure/policy and is not applicable to 913 | component-level configuration. 914 |

915 |
916 |
917 | 918 | 919 |

Describe how is the software component satisfying the control.

920 |

Maintaining physical access audit logs for organization-defined 921 | entry/exit points reflects organizational procedure/policy and 922 | is not applicable to component-level configuration. 923 |

924 |
925 |
926 | 927 | 928 |

Describe how is the software component satisfying the control.

929 |

Providing organization-defined security safeguards to control access 930 | to areas within the facility officially designated as publicly 931 | accessible reflects organizational procedure/policy and 932 | is not applicable to component-level configuration. 933 |

934 |
935 |
936 | 937 | 938 |

Describe how is the software component satisfying the control.

939 |

Escorting visitors and monitoring visitor activity during 940 | organization-defined circumstances requiring visitor escorts 941 | and monitoring reflects organizational procedure/policy and 942 | is not applicable to component-level configuration. 943 |

944 |
945 |
946 | 947 | 948 |

Describe how is the software component satisfying the control.

949 |

Securing keys, combinations, and other physical access devices 950 | reflects organizational procedure/policy and 951 | is not applicable to component-level configuration. 952 |

953 |
954 |
955 | 956 | 957 |

Describe how is the software component satisfying the control.

958 |

Inventory of organization-defined physical access devices 959 | at an organization-defined frequency reflects organizational 960 | procedure/policy and is not applicable to component-level 961 | configuration. 962 |

963 |
964 |
965 | 966 | 967 |

Describe how is the software component satisfying the control.

968 |

Changing combinations and keys at an organization-defined frequency 969 | and/or when keys are lost, combinations are compromised, or individuals 970 | are transferred or terminated, reflects organizational procedure/policy 971 | and is not applicable to component-level configuration. 972 |

973 |
974 |
975 |
976 | 977 | 978 | 979 | 980 |

Describe how is the software component satisfying the control.

981 |

Monitoring physical access to the facility where the information 982 | system resides to detect and respond to physical security incidents 983 | reflects organizational procedure/policy and is outside the scope 984 | of component-level configuration. 985 |

986 |
987 |
988 | 989 | 990 |

Describe how is the software component satisfying the control.

991 |

Reviewing physical access logs at an organization-defined 992 | frequency and upon occurence of organization-defined events 993 | or potential indications of events, reflects organizational 994 | procedure/policy and is not applicable to component-level 995 | configuration. 996 |

997 |
998 |
999 | 1000 | 1001 |

Describe how is the software component satisfying the control.

1002 |

Coordinating results of reviews and investigations with 1003 | the organizational incident response capability reflects 1004 | organizational procedure/policy and is not applicable to 1005 | component-level configuration. 1006 |

1007 |
1008 |
1009 |
1010 | 1011 | 1012 | 1013 | 1014 |

Describe how is the software component satisfying the control.

1015 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1016 |

1017 |
1018 |
1019 | 1020 | 1021 |

Describe how is the software component satisfying the control.

1022 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1023 |

1024 |
1025 |
1026 |
1027 | 1028 | 1029 | 1030 | 1031 |

Describe how is the software component satisfying the control.

1032 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1033 |

1034 |
1035 |
1036 |
1037 | 1038 | 1039 | 1040 | 1041 |

Describe how is the software component satisfying the control.

1042 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1043 |

1044 |
1045 |
1046 |
1047 | 1048 | 1049 | 1050 | 1051 |

Describe how is the software component satisfying the control.

1052 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1053 |

1054 |
1055 |
1056 | 1057 | 1058 |

Describe how is the software component satisfying the control.

1059 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1060 |

1061 |
1062 |
1063 |
1064 | 1065 | 1066 | 1067 | 1068 |

Describe how is the software component satisfying the control.

1069 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1070 |

1071 |
1072 |
1073 |
1074 | 1075 | 1076 | 1077 | 1078 |

Describe how is the software component satisfying the control.

1079 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1080 |

1081 |
1082 |
1083 |
1084 | 1085 | 1086 | 1087 | 1088 |

Describe how is the software component satisfying the control.

1089 |

This control reflects organizational procedures/policies, and is not 1090 | applicable to the configuration of Red Hat Enterprise Linux. 1091 |

1092 |
1093 |
1094 | 1095 | 1096 |

Describe how is the software component satisfying the control.

1097 |

This control reflects organizational procedures/policies, and is not 1098 | applicable to the configuration of Red Hat Enterprise Linux. 1099 |

1100 |
1101 |
1102 |
1103 | 1104 | 1105 | 1106 | 1107 |

Describe how is the software component satisfying the control.

1108 |

This control reflects organizational procedures/policies, and is not 1109 | applicable to the configuration of Red Hat Enterprise Linux. 1110 |

1111 |
1112 |
1113 | 1114 | 1115 |

Describe how is the software component satisfying the control.

1116 |

This control reflects organizational procedures/policies, and is not 1117 | applicable to the configuration of Red Hat Enterprise Linux. 1118 |

1119 |
1120 |
1121 | 1122 | 1123 |

Describe how is the software component satisfying the control.

1124 |

This control reflects organizational procedures/policies, and is not 1125 | applicable to the configuration of Red Hat Enterprise Linux. 1126 |

1127 |
1128 |
1129 | 1130 | 1131 |

Describe how is the software component satisfying the control.

1132 |

This control reflects organizational procedures/policies, and is not 1133 | applicable to the configuration of Red Hat Enterprise Linux. 1134 |

1135 |
1136 |
1137 | 1138 | 1139 |

Describe how is the software component satisfying the control.

1140 |

This control reflects organizational procedures/policies, and is not 1141 | applicable to the configuration of Red Hat Enterprise Linux. 1142 |

1143 |
1144 |
1145 |
1146 | 1147 | 1148 | 1149 | 1150 |

Describe how is the software component satisfying the control.

1151 |

This control reflects organizational procedures/policies, and is not 1152 | applicable to the configuration of Red Hat Enterprise Linux. 1153 |

1154 |
1155 |
1156 | 1157 | 1158 |

Describe how is the software component satisfying the control.

1159 |

This control reflects organizational procedures/policies, and is not 1160 | applicable to the configuration of Red Hat Enterprise Linux. 1161 |

1162 |
1163 |
1164 | 1165 | 1166 |

Describe how is the software component satisfying the control.

1167 |

This control reflects organizational procedures/policies, and is not 1168 | applicable to the configuration of Red Hat Enterprise Linux. 1169 |

1170 |
1171 |
1172 | 1173 | 1174 |

Describe how is the software component satisfying the control.

1175 |

This control reflects organizational procedures/policies, and is not 1176 | applicable to the configuration of Red Hat Enterprise Linux. 1177 |

1178 |
1179 |
1180 |
1181 | 1182 | 1183 | 1184 | 1185 |

Describe how is the software component satisfying the control.

1186 |

Organizational development, documentation, and dissemination of 1187 | a personnel security policy to organization-defined personnel 1188 | is outside the scope of Red Hat Enterprise Linux configuration. 1189 |

1190 |
1191 |
1192 | 1193 | 1194 |

Describe how is the software component satisfying the control.

1195 |

Organizational development, documentation, and dissemination of 1196 | a personnel security policy to organization-defined personnel 1197 | is outside the scope of Red Hat Enterprise Linux configuration. 1198 |

1199 |
1200 |
1201 | 1202 | 1203 |

Describe how is the software component satisfying the control.

1204 |

Organizational development, documentation, and dissemination of 1205 | a personnel security policy to organization-defined personnel 1206 | is outside the scope of Red Hat Enterprise Linux configuration. 1207 |

1208 |
1209 |
1210 | 1211 | 1212 |

Describe how is the software component satisfying the control.

1213 |

Organizational reviews and updates to the personnel security policy 1214 | and personnel security procedures at an organization-defined frequency 1215 | is outside the scope of Red Hat Enterprise Linux configuration. 1216 |

1217 |
1218 |
1219 | 1220 | 1221 |

Describe how is the software component satisfying the control.

1222 |

Organizational development, documentation, and dissemination of 1223 | a personnel security policy to organization-defined personnel 1224 | is outside the scope of Red Hat Enterprise Linux configuration. 1225 |

1226 |
1227 |
1228 | 1229 | 1230 |

Describe how is the software component satisfying the control.

1231 |

Organizational development, documentation, and dissemination of 1232 | a personnel security policy to organization-defined personnel 1233 | is outside the scope of Red Hat Enterprise Linux configuration. 1234 |

1235 |
1236 |
1237 |
1238 | 1239 | 1240 | 1241 | 1242 |

Describe how is the software component satisfying the control.

1243 |

Organizational assignment of a risk designation to all organizational 1244 | positions is outside the scope of Red Hat Enterprise Linux configuration. 1245 |

1246 |
1247 |
1248 | 1249 | 1250 |

Describe how is the software component satisfying the control.

1251 |

Organizational establishment of screening criteria for individuals 1252 | filling those positions is outside the scope of Red Hat Enterprise Linux 1253 | configuration. 1254 |

1255 |
1256 |
1257 | 1258 | 1259 |

Describe how is the software component satisfying the control.

1260 |

Organizational review and updating of position risk 1261 | designations at an organization-defined frequency is outside the scope 1262 | of Red Hat Enterprise Linux configuration. 1263 |

1264 |
1265 |
1266 |
1267 | 1268 | 1269 | 1270 | 1271 |

Describe how is the software component satisfying the control.

1272 |

Organizational screening of individuals prior to authorizing access 1273 | to the information system is outside the scope of Red Hat Enterprise Linux 1274 | configuration. 1275 |

1276 |
1277 |
1278 | 1279 | 1280 |

Describe how is the software component satisfying the control.

1281 |

Organizational processes to rescreen individuals according to 1282 | organization-defined conditions requiring rescreening and, 1283 | where rescreening is so indicated, the frequency of such 1284 | rescreening, is outside the scope of Red Hat Enterprise Linux 1285 | configuration. 1286 |

1287 |
1288 |
1289 |
1290 | 1291 | 1292 | 1293 | 1294 |

Describe how is the software component satisfying the control.

1295 |

Organizational processes ensuring that, upon termination of individual 1296 | employment, information system access is disabled within an 1297 | organization-defined time period, are outside the scope of 1298 | Red Hat Enterprise Linux configuration. 1299 |

1300 |
1301 |
1302 | 1303 | 1304 |

Describe how is the software component satisfying the control.

1305 |

Organizational processes ensuring that, upon termination of individual 1306 | employment, any authenticators/credentials associated with the individual 1307 | are terminated/revoked, are outside the scope of 1308 | Red Hat Enterprise Linux configuration. 1309 |

1310 |
1311 |
1312 | 1313 | 1314 |

Describe how is the software component satisfying the control.

1315 |

Organizational processes ensuring that, upon termination of individual 1316 | employment, exit interviews are conducted that include a discussion of 1317 | organization-defined information security topics, are outside the scope 1318 | of Red Hat Enterprise Linux configuration. 1319 |

1320 |
1321 |
1322 | 1323 | 1324 |

Describe how is the software component satisfying the control.

1325 |

Organizational processes ensuring that, upon termination of individual 1326 | employment, all security-related organizational information 1327 | system-related property is retrieved, are outside the scope 1328 | of Red Hat Enterprise Linux configuration. 1329 |

1330 |
1331 |
1332 | 1333 | 1334 |

Describe how is the software component satisfying the control.

1335 |

Organizational processes ensuring that, upon termination of individual 1336 | employment, the organization retains access to organizational 1337 | information systems formerly controlled by the terminated individual, 1338 | are outside the scope of Red Hat Enterprise Linux configuration. 1339 |

1340 |
1341 |
1342 | 1343 | 1344 |

Describe how is the software component satisfying the control.

1345 |

Organizational processes ensuring that, upon termination of individual 1346 | employment, the organization notifies organization-defined personnel 1347 | or roles within an organization-defined time period, are outside 1348 | the scope of Red Hat Enterprise Linux configuration. 1349 |

1350 |
1351 |
1352 |
1353 | 1354 | 1355 | 1356 | 1357 |

Describe how is the software component satisfying the control.

1358 |

Organizational processes to review and confirm ongoing operational 1359 | need for current logical and physical access authorizations to 1360 | information systems/facilities when individuals are reassigned or 1361 | transferred to other positions within the organization are 1362 | outside the scope of Red Hat Enterprise Linux configuration. 1363 |

1364 |
1365 |
1366 | 1367 | 1368 |

Describe how is the software component satisfying the control.

1369 |

Organizational processes to initiate organization-defined transfer 1370 | or reassignment actions within organization-defined time period 1371 | following the formal transfer action are outside the scope of 1372 | Red Hat Enterprise Linux configuration. 1373 |

1374 |
1375 |
1376 | 1377 | 1378 |

Describe how is the software component satisfying the control.

1379 |

Organizational processes to modify access authorizations as needed to 1380 | correspond with any changes in oeprational need due to reassignment 1381 | or transfer are outside the scope of Red Hat Enterprise Linux configuration. 1382 |

1383 |
1384 |
1385 | 1386 | 1387 |

Describe how is the software component satisfying the control.

1388 |

Organizational notifications of organization-defined personnel 1389 | or roles within an organization-defined time period are outside 1390 | the scope of Red Hat Enterprise Linux configuration. 1391 |

1392 |
1393 |
1394 |
1395 | 1396 | 1397 | 1398 | 1399 |

Describe how is the software component satisfying the control.

1400 |

Organizational process to develop and document access agreements for 1401 | organizational information systems are outside the scope of 1402 | Red Hat Enterprise Linux configuration. 1403 |

1404 |
1405 |
1406 | 1407 | 1408 |

Describe how is the software component satisfying the control.

1409 |

Organizational reviews and updates to the access agreements at an 1410 | organization-defined frequency are outside the scope of 1411 | Red Hat Enterprise Linux configuration. 1412 |

1413 |
1414 |
1415 | 1416 | 1417 |

Describe how is the software component satisfying the control.

1418 |

Organizational processes that ensure individuals requiring access to 1419 | organizational information and information systems sign and re-sign 1420 | access agreements are outside the scope of Red Hat Enterprise Linux configuration. 1421 |

1422 |
1423 |
1424 | 1425 | 1426 |

Describe how is the software component satisfying the control.

1427 |

Organizational processes that ensure individuals requiring access to 1428 | organizational information and information systems sign and re-sign 1429 | access agreements are outside the scope of Red Hat Enterprise Linux configuration. 1430 |

1431 |
1432 |
1433 | 1434 | 1435 |

Describe how is the software component satisfying the control.

1436 |

Organizational processes that ensure individuals requiring access to 1437 | organizational information and information systems sign and re-sign 1438 | access agreements are outside the scope of Red Hat Enterprise Linux configuration. 1439 |

1440 |
1441 |
1442 |
1443 | 1444 | 1445 | 1446 | 1447 |

Describe how is the software component satisfying the control.

1448 |

Organizational processes to establish security requirements including 1449 | security roles and responsibilities for third-party providers are 1450 | outside the scope of Red Hat Enterprise Linux configuration. 1451 |

1452 |
1453 |
1454 | 1455 | 1456 |

Describe how is the software component satisfying the control.

1457 |

Organizational processes requiring third-party providers to comply 1458 | with personnel security polocies and procedures established by 1459 | the organization are outside the scope of Red Hat Enterprise Linux configuration. 1460 |

1461 |
1462 |
1463 | 1464 | 1465 |

Describe how is the software component satisfying the control.

1466 |

Organizational processes to document presonnel security requirements 1467 | are outside the scope of Red Hat Enterprise Linux configuration. 1468 |

1469 |
1470 |
1471 | 1472 | 1473 |

Describe how is the software component satisfying the control.

1474 |

Organizational processes to require third-party providers to notify 1475 | organization-defined personnel or roles of any personnel transfers or 1476 | terminations of third-party personnel who possess organizational 1477 | credentials and/or badges, or who have information system privileges 1478 | within an organization-defined time period, are outside the 1479 | scope of Red Hat Enterprise Linux configuration. 1480 |

1481 |
1482 |
1483 | 1484 | 1485 |

Describe how is the software component satisfying the control.

1486 |

Organizational monitoring of provider compliance is outside 1487 | the scope of Red Hat Enterprise Linux configuration. 1488 |

1489 |
1490 |
1491 |
1492 | 1493 | 1494 | 1495 | 1496 |

Describe how is the software component satisfying the control.

1497 |

Organizational employment of a formal sanctions process for individuals 1498 | failing to comply with established information security policies 1499 | and procedures is outside the scope of Red Hat Enterprise Linux configuration. 1500 |

1501 |
1502 |
1503 | 1504 | 1505 |

Describe how is the software component satisfying the control.

1506 |

Organizational notification of organization-defined personnel 1507 | or roles within an organization-defined time period when a formal 1508 | employee santions process is initiated, identifying the individual 1509 | sanctioned and the reason for the sanction. 1510 |

1511 |
1512 |
1513 |
1514 |
1515 | 1516 | 1517 | FedRAMP Applicable Laws and Regulations 1518 | fedramp-citations 1519 | 1520 | 1521 | 1522 | FedRAMP Master Acronym and Glossary 1523 | fedramp-acronyms 1524 | 1525 | 1526 | 1527 | [SAMPLE]Name or Title of Document 1528 | law 1529 | Publication Date 1530 | Identification Number 1531 | 1532 | 1533 | 1534 | [SAMPLE]Privacy-Related Law Citation 1535 | law 1536 | pii 1537 | Publication Date 1538 | Identification Number 1539 | 1540 | 1541 | 1542 | [SAMPLE]Regulation Citation 1543 | regulation 1544 | Publication Date 1545 | Identification Number 1546 | 1547 | 1548 | 1549 | [SAMPLE]Interconnection Security Agreement Title 1550 | Document Date 1551 | Document Version 1552 | 1553 | 1554 | CSP Logo 1555 | prepared-for-logo 1556 | csp-logo 1557 | 1558 | 00000000 1559 | 1560 | 1561 | Preparer Logo 1562 | prepared-by-logo 1563 | 1564 | 00000000 1565 | 1566 | 1567 | FedRAMP Logo 1568 | fedramp-logo 1569 | 1570 | 1571 | 1572 | 3PAO Logo 1573 | 3pao-logo 1574 | 1575 | 00000000 1576 | 1577 | 1578 | The primary authorization boundary diagram. 1579 | 1580 | 00000000 1581 | 1582 |

Section 9.2, Figure 9-1 Authorization Boundary Diagram (graphic)

1583 |

This should be referenced in the 1584 | system-characteristics/authorization-boundary/diagram/link/@href flag using a value 1585 | of "#d2eb3c18-6754-4e3a-a933-03d289e3fad5"

1586 |
1587 |
1588 | 1589 | The primary network diagram. 1590 | 1591 | 00000000 1592 | 1593 |

Section 9.4, Figure 9-2 Network Diagram (graphic)

1594 |

This should be referenced in the 1595 | system-characteristics/network-architecture/diagram/link/@href flag using a value 1596 | of "#61081e81-850b-43c1-bf43-1ecbddcb9e7f"

1597 |
1598 |
1599 | 1600 | The primary data flow diagram. 1601 | 1602 | 00000000 1603 | 1604 |

Section 10, Figure 10-1 Data Flow Diagram (graphic)

1605 |

This should be referenced in the 1606 | system-characteristics/data-flow/diagram/link/@href flag using a value 1607 | of "#ac5d7535-f3b8-45d3-bf3b-735c82c64547"

1608 |
1609 |
1610 | 1611 | Policy Title 1612 | Policy document 1613 | policy 1614 | Document Date 1615 | Document Version 1616 | 1617 | 00000000 1618 | 1619 |

Table 15-1 Attachments: Policy Attachment

1620 |
1621 |
1622 | 1623 | Policy Title 1624 | Policy document 1625 | policy 1626 | Document Date 1627 | Document Version 1628 | 1629 | 00000000 1630 | 1631 |

Table 15-1 Attachments: Policy Attachment

1632 |
1633 |
1634 | 1635 | Procedure Title 1636 | Procedure document 1637 | procedure 1638 | Document Date 1639 | Document Version 1640 | 1641 | 00000000 1642 | 1643 |

Table 15-1 Attachments: Procedure Attachment

1644 |
1645 |
1646 | 1647 | Procedure Title 1648 | Procedure document 1649 | procedure 1650 | Document Date 1651 | Document Version 1652 | 1653 | 00000000 1654 | 1655 |

Table 15-1 Attachments: Procedure Attachment

1656 |
1657 |
1658 | 1659 | User's Guide 1660 | User's Guide 1661 | user-guide 1662 | guide 1663 | Document Date 1664 | Document Version 1665 | 1666 | 00000000 1667 | 1668 |

Table 15-1 Attachments: User's Guide Attachment

1669 |
1670 |
1671 | 1672 | Privacy Impact Assessment 1673 | privacy-impact-assessment 1674 | Document Date 1675 | Document Version 1676 | 1677 | 00000000 1678 | 1679 |

Table 15-1 Attachments: Privacy Impact Assessment

1680 |
1681 |
1682 | 1683 | Document Title 1684 | Rules of Behavior 1685 | rules-of-behavior 1686 | rob 1687 | Document Date 1688 | Document Version 1689 | 1690 | 00000000 1691 | 1692 |

Table 15-1 Attachments: Rules of Behavior (ROB)

1693 |
1694 |
1695 | 1696 | Document Title 1697 | Contingency Plan (CP) 1698 | plan 1699 | Document Date 1700 | Document Version 1701 | 1702 | 00000000 1703 | 1704 |

Table 15-1 Attachments: Contingency Plan (CP) Attachment

1705 |
1706 |
1707 | 1708 | Document Title 1709 | Configuration Management (CM) Plan 1710 | plan 1711 | Document Date 1712 | Document Version 1713 | 1714 | 00000000 1715 | 1716 |

Table 15-1 Attachments: Configuration Management (CM) Plan Attachment

1717 |
1718 |
1719 | 1720 | Document Title 1721 | Incident Response (IR) Plan 1722 | plan 1723 | Document Date 1724 | Document Version 1725 | 1726 | 00000000 1727 | 1728 |

Table 15-1 Attachments: Incident Response (IR) Plan Attachment

1729 |
1730 |
1731 | 1732 | Separation of Duties Matrix 1733 | Separation of Duties Matrix 1734 | Document Date 1735 | Document Version 1736 | 1737 | 00000000 1738 | 1739 |

Table 15-1 Attachments: Separation of Duties Matrix Attachment

1740 |
1741 |
1742 | 1743 | FedRAMP High Baseline 1744 | 1745 | 1746 |

Pointer to High baseline content in OSCAL.

1747 |
1748 |
1749 | 1750 | FedRAMP Moderate Baseline 1751 | 1752 | 1753 |

Pointer to Moderate baseline content in OSCAL.

1754 |
1755 |
1756 | 1757 | FedRAMP Low Baseline 1758 | 1759 | 1760 |

Pointer to Low baseline content in OSCAL.

1761 |
1762 |
1763 |
1764 |
-------------------------------------------------------------------------------- /xml/rhel-8-fedramp-Low.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 2020-07-01T00:00:00.00-04:00 5 | 2023-03-02T01:19:03.51+00:00 6 | 0.0.1 7 | 1.0.0-milestone3 8 | 9 | 10 | 2019-06-01T00:00:00.00-04:00 11 | 1.0 12 | 1.0-Milestone3 13 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 14 | 15 |

Initial publication.

16 |
17 |
18 | 19 | 2020-06-01T00:00:00.00-04:00 20 | 2.0 21 | 1.0-Milestone3 22 | csp 23 | 24 |

Updated for annual assessment.

25 |
26 |
27 |
28 | Controlled Unclassified Information 29 | 30 | Prepared By 31 | The organization that prepared this SSP. If developed in-house, this is the CSP itself. 32 | 33 | 34 | Prepared For 35 | The organization for which this SSP was prepared. Typically the CSP. 36 | 37 | 38 | System Security Plan Approval 39 | The individual or individuals accountable for the accuracy of this SSP. 40 | 41 | 42 | Cloud Service Provider 43 | CSP 44 | 45 | 46 | Information System Owner 47 | The individual within the CSP who is ultimately accountable for everything related to this system. 48 | 49 | 50 | Authorizing Official 51 | The individual or individuals who must grant this system an authorization to operate. 52 | 53 | 54 | Authorizing Official's Point of Contact 55 | The individual representing the authorizing official. 56 | 57 | 58 | Information System Management Point of Contact (POC) 59 | The highest level manager who responsible for system operation on behalf of the System Owner. 60 | 61 | 62 | Information System Technical Point of Contact 63 | The individual or individuals leading the technical operation of the system. 64 | 65 | 66 | General Point of Contact (POC) 67 | A general point of contact for the system, designated by the system owner. 68 | 69 | 70 | System Information System Security Officer (or Equivalent) 71 | The individual accountable for the security posture of the system on behalf of the system owner. 72 | 73 | 74 | Privacy Official's Point of Contact 75 | The individual responsible for the privacy threshold analysis and if necessary the privacy impact assessment. 76 | 77 | 78 | Owner of an inventory item within the system. 79 | 80 | 81 | Administrative responsibility an inventory item within the system. 82 | 83 | 84 | ICA POC (Local) 85 | The point of contact for an interconnection on behalf of this system. 86 | 87 |

Remove this role if there are no ICAs.

88 |
89 |
90 | 91 | ICA POC (Remote) 92 | The point of contact for an interconnection on behalf of this external system to which this system connects. 93 | 94 |

Remove this role if there are no ICAs.

95 |
96 |
97 | 98 | ICA Signatory (Local) 99 | Responsible for signing an interconnection security agreement on behalf of this system. 100 | 101 |

Remove this role if there are no ICAs.

102 |
103 |
104 | 105 | ICA Signatory (Remote) 106 | Responsible for signing an interconnection security agreement on behalf of the external system to which this system connects. 107 | 108 |

Remove this role if there are no ICAs.

109 |
110 |
111 | 112 | Consultant 113 | Any consultants involved with developing or maintaining this content. 114 | 115 | 116 | [SAMPLE]Unix Administrator 117 | This is a sample role. 118 | 119 | 120 | [SAMPLE]Client Administrator 121 | This is a sample role. 122 | 123 | 124 | [SAMPLE]Program Director 125 | This is a sample role. 126 | 127 | 128 | Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) 129 | FedRAMP PMO 130 | 131 | 132 | Federal Risk and Authorization Management Program (FedRAMP) Joint Authorization Board (JAB) 133 | FedRAMP JAB 134 | 135 | 136 | CSP HQ 137 |
138 | Suite 0000 139 | 1234 Some Street 140 | Haven 141 | ME 142 | 00000 143 |
144 | 145 |

There must be one location identifying the CSP's primary business address, such as the CSP's HQ, or the address of the system owner's primary business location.

146 |
147 |
148 | 149 | Primary Data Center 150 |
151 | 2222 Main Street 152 | Anywhere 153 | -- 154 | 00000-0000 155 |
156 | data-center 157 | primary-data-center 158 | 159 |

There must be one location for each data center.

160 |

There must be at least two data centers.

161 |

For a data center, briefly summarize the components at this location.

162 |

All data centers must have a conformity tag of "data-center".

163 |

A primary data center must also have a conformity tag of "primary-data-center".

164 |
165 |
166 | 167 | Secondary Data Center 168 |
169 | 3333 Small Road 170 | Anywhere 171 | -- 172 | 00000-0000 173 |
174 | data-center 175 | alternate-data-center 176 | 177 |

There must be one location for each data center.

178 |

There must be at least two data centers.

179 |

For a data center, briefly summarize the components at this location.

180 |

All data centers must have a conformity tag of "data-center"

181 |

An alternate or backup data center must also have a conformity tag of "alternate-data-center".

182 |
183 |
184 | 185 | Cloud Service Provider (CSP) Name 186 | CSP Acronym/Short Name 187 | 27b78960-59ef-4619-82b0-ae20b9c709ac 188 | 189 |

Replace sample CSP information.

190 |
191 |
192 | 193 | Federal Risk and Authorization Management Program: Program Management Office 194 | FedRAMP PMO 195 | 196 |
197 | 1800 F St. NW 198 | Washington 199 | DC 200 | US 201 |
202 | info@fedramp.gov 203 | 204 |

This party entry must be present in a FedRAMP SSP.

205 |

The uuid may be different; however, the uuid must be associated with the "fedramp-pmo" role in the responsible-party assemblies.

206 |
207 |
208 | 209 | Federal Risk and Authorization Management Program: Joint Authorization Board 210 | FedRAMP JAB 211 | 212 |

This party entry must be present in a FedRAMP SSP.

213 |

The uuid may be different; however, the uuid must be associated with the "fedramp-jab" role in the responsible-party assemblies.

214 |
215 |
216 | 217 | External Organization 218 | External 219 | 220 |

Generic placeholder for any external organization.

221 |
222 |
223 | 224 | Agency Name 225 | A.N. 226 | 227 |

Generic placeholder for an authorizing agency.

228 |
229 |
230 | 231 | Name of Consulting Org 232 | NOCO 233 | 234 |
235 | 3333 Corporate Way 236 | Washington 237 | DC 238 | US 239 |
240 | poc@consulting.sample 241 |
242 | 243 | [SAMPLE]Remote System Org Name 244 | 245 | 246 | [SAMPLE]ICA POC's Name 247 | Individual's Title 248 | person@ica.org.example 249 | 202-555-1212 250 | 80361ec4-bfce-4b5c-85c8-313d6ebd220b 251 | 252 | 253 | [SAMPLE]Example IaaS Provider 254 | E.I.P. 255 | 256 |

Underlying service provider. Leveraged Authorization.

257 |
258 |
259 | 260 | [SAMPLE]Person Name 1 261 | Individual's Title 262 |
263 | Mailstop A-1 264 |
265 | name@org.domain 266 | 202-000-0001 267 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 268 | 27b78960-59ef-4619-82b0-ae20b9c709ac 269 |
270 | 271 | [SAMPLE]Person Name 2 272 | Individual's Title 273 |
274 | Address Line 275 | City 276 | ST 277 | 00000 278 | US 279 |
280 | name@org.domain 281 | 202-000-0002 282 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 283 |
284 | 285 | [SAMPLE]Person Name 3 286 | Individual's Title 287 |
288 | Address Line 289 | City 290 | ST 291 | 00000 292 | US 293 |
294 | name@org.domain 295 | 202-000-0003 296 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 297 |
298 | 299 | [SAMPLE]Person Name 4 300 | Individual's Title 301 |
302 | Address Line 303 | City 304 | ST 305 | 00000 306 | US 307 |
308 | name@org.domain 309 | 202-000-0004 310 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 311 |
312 | 313 | [SAMPLE]Person Name 5 314 | Individual's Title 315 |
316 | Address Line 317 | City 318 | ST 319 | 00000 320 | US 321 |
322 | name@org.domain 323 | 202-000-0005 324 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 325 |
326 | 327 | [SAMPLE]Person Name 6 328 | Individual's Title 329 |
330 | Address Line 331 | City 332 | ST 333 | 00000 334 | US 335 |
336 | name@org.domain 337 | 202-000-0006 338 | 78992555-4a99-4eaa-868c-f2c249679dd3 339 |
340 | 341 | [SAMPLE]Person Name 7 342 | Individual's Title 343 |
344 | Address Line 345 | City 346 | ST 347 | 00000 348 | US 349 |
350 | name@org.domain 351 | 202-000-0007 352 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 353 |
354 | 355 | [SAMPLE] IT Department 356 | 357 | 358 | [SAMPLE]Security Team 359 | 360 | 361 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 362 | 363 |

Exactly one

364 |
365 |
366 | 367 | 3360e343-9860-4bda-9dfc-ff427c3dfab6 368 | 369 |

Exactly one

370 |
371 |
372 | 373 | 6b286b5d-8f07-4fa7-8847-1dd0d88f73fb 374 | 375 | 376 | 3360e343-9860-4bda-9dfc-ff427c3dfab6 377 | 36b8d6c0-3b25-42cc-b529-cf4066145cdd 378 | 379 |

One or more

380 |
381 |
382 | 383 | 3360e343-9860-4bda-9dfc-ff427c3dfab6 384 | 385 |

Exactly one

386 |
387 |
388 | 389 | 49017ec3-9f51-4dbd-9253-858c2b1295fd 390 | 4fded5fd-7a65-47ea-bd76-df57c46e27d1 391 | 392 |

One or more

393 |
394 |
395 | 396 | 0cec09d9-20c6-470b-9ffc-85763375880b 397 | 398 |

Exactly one

399 |
400 |
401 | 402 | f75e21f6-43d8-46ab-890d-7f2eebc5a830 403 | 404 |

Exactly one

405 |
406 |
407 | 408 | 132953a9-640c-46f7-9de9-3fa15ec99361 409 | 410 |

Exactly one

411 |
412 |
413 | 414 | 4fded5fd-7a65-47ea-bd76-df57c46e27d1 415 | 416 |

Exactly one

417 |
418 |
419 | 420 | db234cb7-1776-425c-9ac4-b067c1723011 421 | 422 |

Exactly one

423 |
424 |
425 | 426 | 77e0e2c8-2560-4fe9-ac78-c3ff4ffc9f6d 427 | 428 |

Exactly one

429 |
430 |
431 | 432 | 49017ec3-9f51-4dbd-9253-858c2b1295fd 433 | 434 |

Exactly one

435 |
436 |
437 | 438 |

This OSCAL-based FedRAMP SSP Template can be used for the FedRAMP Low, Moderate, and 439 | High baselines.

440 |

Guidance for OSCAL-based FedRAMP Tailored content has not yet been developed.

441 |
442 |
443 | 444 | 445 | F00000000 446 | Red Hat Enterprise Linux 8.x 447 | rhel-8 448 |

Automatically generated OSCAL SSP from OpenControl guidance for Red Hat Enterprise Linux 8.x

449 | low 450 | 451 | 452 | Information Type Name 453 |

This item is useless nevertheless required.

454 | 455 | fips-199-moderate 456 | 457 | 458 | fips-199-moderate 459 | 460 | 461 | fips-199-moderate 462 | 463 |
464 |
465 | 466 | fips-199-moderate 467 | fips-199-moderate 468 | fips-199-moderate 469 | 470 | 471 | 472 |

A holistic, top-level explanation of the FedRAMP authorization boundary.

473 |
474 |
475 | 476 | 477 | generator 478 | 479 | 480 | This system 481 |

The entire system as depicted in the system authorization boundary

482 | 483 |
484 |
485 | 486 |

FedRAMP SSP Template Section 13

487 | 488 | 489 | 490 | 491 |

Describe how is the software component satisfying the control.

492 |

This control reflects organizational procedure/policy and is not 493 | applicable to component-level configuration. 494 |

495 |
496 |
497 | 498 | 499 |

Describe how is the software component satisfying the control.

500 |

This control reflects organizational procedure/policy and is not 501 | applicable to component-level configuration. 502 |

503 |
504 |
505 |
506 | 507 | 508 | 509 | 510 |

Describe how is the software component satisfying the control.

511 |

This control reflects organizational procedure/policy and is not 512 | applicable to component-level configuration. 513 |

514 |
515 |
516 | 517 | 518 |

Describe how is the software component satisfying the control.

519 |

This control reflects organizational procedure/policy and is not 520 | applicable to component-level configuration. 521 |

522 |
523 |
524 | 525 | 526 |

Describe how is the software component satisfying the control.

527 |

This control reflects organizational procedure/policy and is not 528 | applicable to component-level configuration. 529 |

530 |
531 |
532 |
533 | 534 | 535 | 536 | 537 |

Describe how is the software component satisfying the control.

538 |

This control reflects organizational procedure/policy and is not 539 | applicable to component-level configuration. 540 |

541 |
542 |
543 | 544 | 545 |

Describe how is the software component satisfying the control.

546 |

This control reflects organizational procedure/policy and is not 547 | applicable to component-level configuration. 548 |

549 |
550 |
551 | 552 | 553 |

Describe how is the software component satisfying the control.

554 |

This control reflects organizational procedure/policy and is not 555 | applicable to component-level configuration. 556 |

557 |
558 |
559 |
560 | 561 | 562 | 563 | 564 |

Describe how is the software component satisfying the control.

565 |

This control reflects organizational procedure/policy and is not 566 | applicable to component-level configuration. 567 |

568 |
569 |
570 | 571 | 572 |

Describe how is the software component satisfying the control.

573 |

This control reflects organizational procedure/policy and is not 574 | applicable to component-level configuration. 575 |

576 |
577 |
578 |
579 | 580 | 581 | 582 | 583 |

Describe how is the software component satisfying the control.

584 |

This control reflects organizational procedures/policies, and is not 585 | applicable to the configuration of Red Hat Enterprise Linux. 586 |

587 |
588 |
589 | 590 | 591 |

Describe how is the software component satisfying the control.

592 |

This control reflects organizational procedures/policies, and is not 593 | applicable to the configuration of Red Hat Enterprise Linux. 594 |

595 |
596 |
597 | 598 | 599 |

Describe how is the software component satisfying the control.

600 |

This control reflects organizational procedures/policies, and is not 601 | applicable to the configuration of Red Hat Enterprise Linux. 602 |

603 |
604 |
605 | 606 | 607 |

Describe how is the software component satisfying the control.

608 |

This control reflects organizational procedures/policies, and is not 609 | applicable to the configuration of Red Hat Enterprise Linux. 610 |

611 |
612 |
613 | 614 | 615 |

Describe how is the software component satisfying the control.

616 |

This control reflects organizational procedures/policies, and is not 617 | applicable to the configuration of Red Hat Enterprise Linux. 618 |

619 |
620 |
621 | 622 | 623 |

Describe how is the software component satisfying the control.

624 |

This control reflects organizational procedures/policies, and is not 625 | applicable to the configuration of Red Hat Enterprise Linux. 626 |

627 |
628 |
629 |
630 | 631 | 632 | 633 | 634 |

Describe how is the software component satisfying the control.

635 |

This control reflects organizational procedures/policies, and is not 636 | applicable to the configuration of Red Hat Enterprise Linux. 637 |

638 |
639 |
640 | 641 | 642 |

Describe how is the software component satisfying the control.

643 |

This control reflects organizational procedures/policies, and is not 644 | applicable to the configuration of Red Hat Enterprise Linux. 645 |

646 |
647 |
648 | 649 | 650 |

Describe how is the software component satisfying the control.

651 |

This control reflects organizational procedures/policies, and is not 652 | applicable to the configuration of Red Hat Enterprise Linux. 653 |

654 |
655 |
656 |
657 | 658 | 659 | 660 | 661 |

Describe how is the software component satisfying the control.

662 |

This control reflects organizational procedures/policies, and is not 663 | applicable to the configuration of Red Hat Enterprise Linux. 664 |

665 |
666 |
667 | 668 | 669 |

Describe how is the software component satisfying the control.

670 |

This control reflects organizational procedures/policies, and is not 671 | applicable to the configuration of Red Hat Enterprise Linux. 672 |

673 |
674 |
675 | 676 | 677 |

Describe how is the software component satisfying the control.

678 |

This control reflects organizational procedures/policies, and is not 679 | applicable to the configuration of Red Hat Enterprise Linux. 680 |

681 |
682 |
683 |
684 | 685 | 686 | 687 | 688 |

Describe how is the software component satisfying the control.

689 |

This control reflects organizational procedure/policies and is not 690 | applicable to Red Hat Enterprise Linux configuration. 691 |

692 |
693 |
694 |
695 | 696 | 697 | 698 | 699 |

Describe how is the software component satisfying the control.

700 |

This control reflects organizational procedures/policies, and is not 701 | applicable to the configuration of Red Hat Enterprise Linux. 702 |

703 |
704 |
705 | 706 | 707 |

Describe how is the software component satisfying the control.

708 |

This control reflects organizational procedures/policies, and is not 709 | applicable to the configuration of Red Hat Enterprise Linux. 710 |

711 |
712 |
713 |
714 | 715 | 716 | 717 | 718 |

Describe how is the software component satisfying the control.

719 |

This control reflects organizational procedures/policies, and is not 720 | applicable to the configuration of Red Hat Enterprise Linux. 721 |

722 |
723 |
724 |
725 | 726 | 727 | 728 | 729 |

Describe how is the software component satisfying the control.

730 |

This control reflects organizational procedures/policies, and is not 731 | applicable to the configuration of Red Hat Enterprise Linux. 732 |

733 |
734 |
735 | 736 | 737 |

Describe how is the software component satisfying the control.

738 |

This control reflects organizational procedures/policies, and is not 739 | applicable to the configuration of Red Hat Enterprise Linux. 740 |

741 |
742 |
743 | 744 | 745 |

Describe how is the software component satisfying the control.

746 |

This control reflects organizational procedures/policies, and is not 747 | applicable to the configuration of Red Hat Enterprise Linux. 748 |

749 |
750 |
751 | 752 | 753 |

Describe how is the software component satisfying the control.

754 |

This control reflects organizational procedures/policies, and is not 755 | applicable to the configuration of Red Hat Enterprise Linux. 756 |

757 |
758 |
759 | 760 | 761 |

Describe how is the software component satisfying the control.

762 |

This control reflects organizational procedures/policies, and is not 763 | applicable to the configuration of Red Hat Enterprise Linux. 764 |

765 |
766 |
767 | 768 | 769 |

Describe how is the software component satisfying the control.

770 |

This control reflects organizational procedures/policies, and is not 771 | applicable to the configuration of Red Hat Enterprise Linux. 772 |

773 |
774 |
775 | 776 | 777 |

Describe how is the software component satisfying the control.

778 |

This control reflects organizational procedures/policies, and is not 779 | applicable to the configuration of Red Hat Enterprise Linux. 780 |

781 |
782 |
783 | 784 | 785 |

Describe how is the software component satisfying the control.

786 |

This control reflects organizational procedures/policies, and is not 787 | applicable to the configuration of Red Hat Enterprise Linux. 788 |

789 |
790 |
791 | 792 | 793 |

Describe how is the software component satisfying the control.

794 |

This control reflects organizational procedures/policies, and is not 795 | applicable to the configuration of Red Hat Enterprise Linux. 796 |

797 |
798 |
799 | 800 | 801 |

Describe how is the software component satisfying the control.

802 |

This control reflects organizational procedures/policies, and is not 803 | applicable to the configuration of Red Hat Enterprise Linux. 804 |

805 |
806 |
807 | 808 | 809 |

Describe how is the software component satisfying the control.

810 |

This control reflects organizational procedures/policies, and is not 811 | applicable to the configuration of Red Hat Enterprise Linux. 812 |

813 |
814 |
815 | 816 | 817 |

Describe how is the software component satisfying the control.

818 |

This control reflects organizational procedures/policies, and is not 819 | applicable to the configuration of Red Hat Enterprise Linux. 820 |

821 |
822 |
823 | 824 | 825 |

Describe how is the software component satisfying the control.

826 |

This control reflects organizational procedures/policies, and is not 827 | applicable to the configuration of Red Hat Enterprise Linux. 828 |

829 |
830 |
831 | 832 | 833 |

Describe how is the software component satisfying the control.

834 |

This control reflects organizational procedures/policies, and is not 835 | applicable to the configuration of Red Hat Enterprise Linux. 836 |

837 |
838 |
839 |
840 | 841 | 842 | 843 | 844 |

Describe how is the software component satisfying the control.

845 |

Development, documentation, and dissemination of a physical 846 | and environmental protection policy reflects organizational 847 | procedure/policy and is not applicable to component-level 848 | configuration. 849 |

850 |
851 |
852 | 853 | 854 |

Describe how is the software component satisfying the control.

855 |

Organizational review and updates to the physical and 856 | environmental protection policy reflects organizational 857 | procedure/policy and is not applicable to component-level 858 | configuration. 859 |

860 |
861 |
862 |
863 | 864 | 865 | 866 | 867 |

Describe how is the software component satisfying the control.

868 |

Development, approval, and maintenance of a list 869 | of individuals with authorized access to the facility 870 | where the information system resides reflects organizational 871 | procedure/policy and is not applicable to component-level 872 | configuration. 873 |

874 |
875 |
876 | 877 | 878 |

Describe how is the software component satisfying the control.

879 |

Issuing authorization credentials for facility access 880 | reflects organizational procedure/policy and is not 881 | applicable to component-level configuration. 882 |

883 |
884 |
885 | 886 | 887 |

Describe how is the software component satisfying the control.

888 |

Reviewing the access list detailing authorized facility 889 | access by individuals at an organization-defined frequency 890 | reflects organizational procedure/policy and is not 891 | applicable to component-level configuration. 892 |

893 |
894 |
895 | 896 | 897 |

Describe how is the software component satisfying the control.

898 |

Removal of individuals from the facility access list when access 899 | is no longer required reflects organizational procedure/policy 900 | and is not applicable to component-level configuration. 901 |

902 |
903 |
904 |
905 | 906 | 907 | 908 | 909 |

Describe how is the software component satisfying the control.

910 |

Enforcing physical access authorizations at organization-defined 911 | entry/exit points to the facility where the information system resides 912 | reflects organizational procedure/policy and is not applicable to 913 | component-level configuration. 914 |

915 |
916 |
917 | 918 | 919 |

Describe how is the software component satisfying the control.

920 |

Maintaining physical access audit logs for organization-defined 921 | entry/exit points reflects organizational procedure/policy and 922 | is not applicable to component-level configuration. 923 |

924 |
925 |
926 | 927 | 928 |

Describe how is the software component satisfying the control.

929 |

Providing organization-defined security safeguards to control access 930 | to areas within the facility officially designated as publicly 931 | accessible reflects organizational procedure/policy and 932 | is not applicable to component-level configuration. 933 |

934 |
935 |
936 | 937 | 938 |

Describe how is the software component satisfying the control.

939 |

Escorting visitors and monitoring visitor activity during 940 | organization-defined circumstances requiring visitor escorts 941 | and monitoring reflects organizational procedure/policy and 942 | is not applicable to component-level configuration. 943 |

944 |
945 |
946 | 947 | 948 |

Describe how is the software component satisfying the control.

949 |

Securing keys, combinations, and other physical access devices 950 | reflects organizational procedure/policy and 951 | is not applicable to component-level configuration. 952 |

953 |
954 |
955 | 956 | 957 |

Describe how is the software component satisfying the control.

958 |

Inventory of organization-defined physical access devices 959 | at an organization-defined frequency reflects organizational 960 | procedure/policy and is not applicable to component-level 961 | configuration. 962 |

963 |
964 |
965 | 966 | 967 |

Describe how is the software component satisfying the control.

968 |

Changing combinations and keys at an organization-defined frequency 969 | and/or when keys are lost, combinations are compromised, or individuals 970 | are transferred or terminated, reflects organizational procedure/policy 971 | and is not applicable to component-level configuration. 972 |

973 |
974 |
975 |
976 | 977 | 978 | 979 | 980 |

Describe how is the software component satisfying the control.

981 |

Monitoring physical access to the facility where the information 982 | system resides to detect and respond to physical security incidents 983 | reflects organizational procedure/policy and is outside the scope 984 | of component-level configuration. 985 |

986 |
987 |
988 | 989 | 990 |

Describe how is the software component satisfying the control.

991 |

Reviewing physical access logs at an organization-defined 992 | frequency and upon occurence of organization-defined events 993 | or potential indications of events, reflects organizational 994 | procedure/policy and is not applicable to component-level 995 | configuration. 996 |

997 |
998 |
999 | 1000 | 1001 |

Describe how is the software component satisfying the control.

1002 |

Coordinating results of reviews and investigations with 1003 | the organizational incident response capability reflects 1004 | organizational procedure/policy and is not applicable to 1005 | component-level configuration. 1006 |

1007 |
1008 |
1009 |
1010 | 1011 | 1012 | 1013 | 1014 |

Describe how is the software component satisfying the control.

1015 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1016 |

1017 |
1018 |
1019 | 1020 | 1021 |

Describe how is the software component satisfying the control.

1022 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1023 |

1024 |
1025 |
1026 |
1027 | 1028 | 1029 | 1030 | 1031 |

Describe how is the software component satisfying the control.

1032 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1033 |

1034 |
1035 |
1036 |
1037 | 1038 | 1039 | 1040 | 1041 |

Describe how is the software component satisfying the control.

1042 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1043 |

1044 |
1045 |
1046 |
1047 | 1048 | 1049 | 1050 | 1051 |

Describe how is the software component satisfying the control.

1052 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1053 |

1054 |
1055 |
1056 | 1057 | 1058 |

Describe how is the software component satisfying the control.

1059 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1060 |

1061 |
1062 |
1063 |
1064 | 1065 | 1066 | 1067 | 1068 |

Describe how is the software component satisfying the control.

1069 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1070 |

1071 |
1072 |
1073 |
1074 | 1075 | 1076 | 1077 | 1078 |

Describe how is the software component satisfying the control.

1079 |

This control is outside the scope of Red Hat Enterprise Linux configuration. 1080 |

1081 |
1082 |
1083 |
1084 | 1085 | 1086 | 1087 | 1088 |

Describe how is the software component satisfying the control.

1089 |

This control reflects organizational procedures/policies, and is not 1090 | applicable to the configuration of Red Hat Enterprise Linux. 1091 |

1092 |
1093 |
1094 | 1095 | 1096 |

Describe how is the software component satisfying the control.

1097 |

This control reflects organizational procedures/policies, and is not 1098 | applicable to the configuration of Red Hat Enterprise Linux. 1099 |

1100 |
1101 |
1102 |
1103 | 1104 | 1105 | 1106 | 1107 |

Describe how is the software component satisfying the control.

1108 |

This control reflects organizational procedures/policies, and is not 1109 | applicable to the configuration of Red Hat Enterprise Linux. 1110 |

1111 |
1112 |
1113 | 1114 | 1115 |

Describe how is the software component satisfying the control.

1116 |

This control reflects organizational procedures/policies, and is not 1117 | applicable to the configuration of Red Hat Enterprise Linux. 1118 |

1119 |
1120 |
1121 | 1122 | 1123 |

Describe how is the software component satisfying the control.

1124 |

This control reflects organizational procedures/policies, and is not 1125 | applicable to the configuration of Red Hat Enterprise Linux. 1126 |

1127 |
1128 |
1129 | 1130 | 1131 |

Describe how is the software component satisfying the control.

1132 |

This control reflects organizational procedures/policies, and is not 1133 | applicable to the configuration of Red Hat Enterprise Linux. 1134 |

1135 |
1136 |
1137 | 1138 | 1139 |

Describe how is the software component satisfying the control.

1140 |

This control reflects organizational procedures/policies, and is not 1141 | applicable to the configuration of Red Hat Enterprise Linux. 1142 |

1143 |
1144 |
1145 |
1146 | 1147 | 1148 | 1149 | 1150 |

Describe how is the software component satisfying the control.

1151 |

This control reflects organizational procedures/policies, and is not 1152 | applicable to the configuration of Red Hat Enterprise Linux. 1153 |

1154 |
1155 |
1156 | 1157 | 1158 |

Describe how is the software component satisfying the control.

1159 |

This control reflects organizational procedures/policies, and is not 1160 | applicable to the configuration of Red Hat Enterprise Linux. 1161 |

1162 |
1163 |
1164 | 1165 | 1166 |

Describe how is the software component satisfying the control.

1167 |

This control reflects organizational procedures/policies, and is not 1168 | applicable to the configuration of Red Hat Enterprise Linux. 1169 |

1170 |
1171 |
1172 | 1173 | 1174 |

Describe how is the software component satisfying the control.

1175 |

This control reflects organizational procedures/policies, and is not 1176 | applicable to the configuration of Red Hat Enterprise Linux. 1177 |

1178 |
1179 |
1180 |
1181 | 1182 | 1183 | 1184 | 1185 |

Describe how is the software component satisfying the control.

1186 |

Organizational development, documentation, and dissemination of 1187 | a personnel security policy to organization-defined personnel 1188 | is outside the scope of Red Hat Enterprise Linux configuration. 1189 |

1190 |
1191 |
1192 | 1193 | 1194 |

Describe how is the software component satisfying the control.

1195 |

Organizational development, documentation, and dissemination of 1196 | a personnel security policy to organization-defined personnel 1197 | is outside the scope of Red Hat Enterprise Linux configuration. 1198 |

1199 |
1200 |
1201 | 1202 | 1203 |

Describe how is the software component satisfying the control.

1204 |

Organizational development, documentation, and dissemination of 1205 | a personnel security policy to organization-defined personnel 1206 | is outside the scope of Red Hat Enterprise Linux configuration. 1207 |

1208 |
1209 |
1210 | 1211 | 1212 |

Describe how is the software component satisfying the control.

1213 |

Organizational reviews and updates to the personnel security policy 1214 | and personnel security procedures at an organization-defined frequency 1215 | is outside the scope of Red Hat Enterprise Linux configuration. 1216 |

1217 |
1218 |
1219 | 1220 | 1221 |

Describe how is the software component satisfying the control.

1222 |

Organizational development, documentation, and dissemination of 1223 | a personnel security policy to organization-defined personnel 1224 | is outside the scope of Red Hat Enterprise Linux configuration. 1225 |

1226 |
1227 |
1228 | 1229 | 1230 |

Describe how is the software component satisfying the control.

1231 |

Organizational development, documentation, and dissemination of 1232 | a personnel security policy to organization-defined personnel 1233 | is outside the scope of Red Hat Enterprise Linux configuration. 1234 |

1235 |
1236 |
1237 |
1238 | 1239 | 1240 | 1241 | 1242 |

Describe how is the software component satisfying the control.

1243 |

Organizational assignment of a risk designation to all organizational 1244 | positions is outside the scope of Red Hat Enterprise Linux configuration. 1245 |

1246 |
1247 |
1248 | 1249 | 1250 |

Describe how is the software component satisfying the control.

1251 |

Organizational establishment of screening criteria for individuals 1252 | filling those positions is outside the scope of Red Hat Enterprise Linux 1253 | configuration. 1254 |

1255 |
1256 |
1257 | 1258 | 1259 |

Describe how is the software component satisfying the control.

1260 |

Organizational review and updating of position risk 1261 | designations at an organization-defined frequency is outside the scope 1262 | of Red Hat Enterprise Linux configuration. 1263 |

1264 |
1265 |
1266 |
1267 | 1268 | 1269 | 1270 | 1271 |

Describe how is the software component satisfying the control.

1272 |

Organizational screening of individuals prior to authorizing access 1273 | to the information system is outside the scope of Red Hat Enterprise Linux 1274 | configuration. 1275 |

1276 |
1277 |
1278 | 1279 | 1280 |

Describe how is the software component satisfying the control.

1281 |

Organizational processes to rescreen individuals according to 1282 | organization-defined conditions requiring rescreening and, 1283 | where rescreening is so indicated, the frequency of such 1284 | rescreening, is outside the scope of Red Hat Enterprise Linux 1285 | configuration. 1286 |

1287 |
1288 |
1289 |
1290 | 1291 | 1292 | 1293 | 1294 |

Describe how is the software component satisfying the control.

1295 |

Organizational processes ensuring that, upon termination of individual 1296 | employment, information system access is disabled within an 1297 | organization-defined time period, are outside the scope of 1298 | Red Hat Enterprise Linux configuration. 1299 |

1300 |
1301 |
1302 | 1303 | 1304 |

Describe how is the software component satisfying the control.

1305 |

Organizational processes ensuring that, upon termination of individual 1306 | employment, any authenticators/credentials associated with the individual 1307 | are terminated/revoked, are outside the scope of 1308 | Red Hat Enterprise Linux configuration. 1309 |

1310 |
1311 |
1312 | 1313 | 1314 |

Describe how is the software component satisfying the control.

1315 |

Organizational processes ensuring that, upon termination of individual 1316 | employment, exit interviews are conducted that include a discussion of 1317 | organization-defined information security topics, are outside the scope 1318 | of Red Hat Enterprise Linux configuration. 1319 |

1320 |
1321 |
1322 | 1323 | 1324 |

Describe how is the software component satisfying the control.

1325 |

Organizational processes ensuring that, upon termination of individual 1326 | employment, all security-related organizational information 1327 | system-related property is retrieved, are outside the scope 1328 | of Red Hat Enterprise Linux configuration. 1329 |

1330 |
1331 |
1332 | 1333 | 1334 |

Describe how is the software component satisfying the control.

1335 |

Organizational processes ensuring that, upon termination of individual 1336 | employment, the organization retains access to organizational 1337 | information systems formerly controlled by the terminated individual, 1338 | are outside the scope of Red Hat Enterprise Linux configuration. 1339 |

1340 |
1341 |
1342 | 1343 | 1344 |

Describe how is the software component satisfying the control.

1345 |

Organizational processes ensuring that, upon termination of individual 1346 | employment, the organization notifies organization-defined personnel 1347 | or roles within an organization-defined time period, are outside 1348 | the scope of Red Hat Enterprise Linux configuration. 1349 |

1350 |
1351 |
1352 |
1353 | 1354 | 1355 | 1356 | 1357 |

Describe how is the software component satisfying the control.

1358 |

Organizational processes to review and confirm ongoing operational 1359 | need for current logical and physical access authorizations to 1360 | information systems/facilities when individuals are reassigned or 1361 | transferred to other positions within the organization are 1362 | outside the scope of Red Hat Enterprise Linux configuration. 1363 |

1364 |
1365 |
1366 | 1367 | 1368 |

Describe how is the software component satisfying the control.

1369 |

Organizational processes to initiate organization-defined transfer 1370 | or reassignment actions within organization-defined time period 1371 | following the formal transfer action are outside the scope of 1372 | Red Hat Enterprise Linux configuration. 1373 |

1374 |
1375 |
1376 | 1377 | 1378 |

Describe how is the software component satisfying the control.

1379 |

Organizational processes to modify access authorizations as needed to 1380 | correspond with any changes in oeprational need due to reassignment 1381 | or transfer are outside the scope of Red Hat Enterprise Linux configuration. 1382 |

1383 |
1384 |
1385 | 1386 | 1387 |

Describe how is the software component satisfying the control.

1388 |

Organizational notifications of organization-defined personnel 1389 | or roles within an organization-defined time period are outside 1390 | the scope of Red Hat Enterprise Linux configuration. 1391 |

1392 |
1393 |
1394 |
1395 | 1396 | 1397 | 1398 | 1399 |

Describe how is the software component satisfying the control.

1400 |

Organizational process to develop and document access agreements for 1401 | organizational information systems are outside the scope of 1402 | Red Hat Enterprise Linux configuration. 1403 |

1404 |
1405 |
1406 | 1407 | 1408 |

Describe how is the software component satisfying the control.

1409 |

Organizational reviews and updates to the access agreements at an 1410 | organization-defined frequency are outside the scope of 1411 | Red Hat Enterprise Linux configuration. 1412 |

1413 |
1414 |
1415 | 1416 | 1417 |

Describe how is the software component satisfying the control.

1418 |

Organizational processes that ensure individuals requiring access to 1419 | organizational information and information systems sign and re-sign 1420 | access agreements are outside the scope of Red Hat Enterprise Linux configuration. 1421 |

1422 |
1423 |
1424 | 1425 | 1426 |

Describe how is the software component satisfying the control.

1427 |

Organizational processes that ensure individuals requiring access to 1428 | organizational information and information systems sign and re-sign 1429 | access agreements are outside the scope of Red Hat Enterprise Linux configuration. 1430 |

1431 |
1432 |
1433 | 1434 | 1435 |

Describe how is the software component satisfying the control.

1436 |

Organizational processes that ensure individuals requiring access to 1437 | organizational information and information systems sign and re-sign 1438 | access agreements are outside the scope of Red Hat Enterprise Linux configuration. 1439 |

1440 |
1441 |
1442 |
1443 | 1444 | 1445 | 1446 | 1447 |

Describe how is the software component satisfying the control.

1448 |

Organizational processes to establish security requirements including 1449 | security roles and responsibilities for third-party providers are 1450 | outside the scope of Red Hat Enterprise Linux configuration. 1451 |

1452 |
1453 |
1454 | 1455 | 1456 |

Describe how is the software component satisfying the control.

1457 |

Organizational processes requiring third-party providers to comply 1458 | with personnel security polocies and procedures established by 1459 | the organization are outside the scope of Red Hat Enterprise Linux configuration. 1460 |

1461 |
1462 |
1463 | 1464 | 1465 |

Describe how is the software component satisfying the control.

1466 |

Organizational processes to document presonnel security requirements 1467 | are outside the scope of Red Hat Enterprise Linux configuration. 1468 |

1469 |
1470 |
1471 | 1472 | 1473 |

Describe how is the software component satisfying the control.

1474 |

Organizational processes to require third-party providers to notify 1475 | organization-defined personnel or roles of any personnel transfers or 1476 | terminations of third-party personnel who possess organizational 1477 | credentials and/or badges, or who have information system privileges 1478 | within an organization-defined time period, are outside the 1479 | scope of Red Hat Enterprise Linux configuration. 1480 |

1481 |
1482 |
1483 | 1484 | 1485 |

Describe how is the software component satisfying the control.

1486 |

Organizational monitoring of provider compliance is outside 1487 | the scope of Red Hat Enterprise Linux configuration. 1488 |

1489 |
1490 |
1491 |
1492 | 1493 | 1494 | 1495 | 1496 |

Describe how is the software component satisfying the control.

1497 |

Organizational employment of a formal sanctions process for individuals 1498 | failing to comply with established information security policies 1499 | and procedures is outside the scope of Red Hat Enterprise Linux configuration. 1500 |

1501 |
1502 |
1503 | 1504 | 1505 |

Describe how is the software component satisfying the control.

1506 |

Organizational notification of organization-defined personnel 1507 | or roles within an organization-defined time period when a formal 1508 | employee santions process is initiated, identifying the individual 1509 | sanctioned and the reason for the sanction. 1510 |

1511 |
1512 |
1513 |
1514 |
1515 | 1516 | 1517 | FedRAMP Applicable Laws and Regulations 1518 | fedramp-citations 1519 | 1520 | 1521 | 1522 | FedRAMP Master Acronym and Glossary 1523 | fedramp-acronyms 1524 | 1525 | 1526 | 1527 | [SAMPLE]Name or Title of Document 1528 | law 1529 | Publication Date 1530 | Identification Number 1531 | 1532 | 1533 | 1534 | [SAMPLE]Privacy-Related Law Citation 1535 | law 1536 | pii 1537 | Publication Date 1538 | Identification Number 1539 | 1540 | 1541 | 1542 | [SAMPLE]Regulation Citation 1543 | regulation 1544 | Publication Date 1545 | Identification Number 1546 | 1547 | 1548 | 1549 | [SAMPLE]Interconnection Security Agreement Title 1550 | Document Date 1551 | Document Version 1552 | 1553 | 1554 | CSP Logo 1555 | prepared-for-logo 1556 | csp-logo 1557 | 1558 | 00000000 1559 | 1560 | 1561 | Preparer Logo 1562 | prepared-by-logo 1563 | 1564 | 00000000 1565 | 1566 | 1567 | FedRAMP Logo 1568 | fedramp-logo 1569 | 1570 | 1571 | 1572 | 3PAO Logo 1573 | 3pao-logo 1574 | 1575 | 00000000 1576 | 1577 | 1578 | The primary authorization boundary diagram. 1579 | 1580 | 00000000 1581 | 1582 |

Section 9.2, Figure 9-1 Authorization Boundary Diagram (graphic)

1583 |

This should be referenced in the 1584 | system-characteristics/authorization-boundary/diagram/link/@href flag using a value 1585 | of "#d2eb3c18-6754-4e3a-a933-03d289e3fad5"

1586 |
1587 |
1588 | 1589 | The primary network diagram. 1590 | 1591 | 00000000 1592 | 1593 |

Section 9.4, Figure 9-2 Network Diagram (graphic)

1594 |

This should be referenced in the 1595 | system-characteristics/network-architecture/diagram/link/@href flag using a value 1596 | of "#61081e81-850b-43c1-bf43-1ecbddcb9e7f"

1597 |
1598 |
1599 | 1600 | The primary data flow diagram. 1601 | 1602 | 00000000 1603 | 1604 |

Section 10, Figure 10-1 Data Flow Diagram (graphic)

1605 |

This should be referenced in the 1606 | system-characteristics/data-flow/diagram/link/@href flag using a value 1607 | of "#ac5d7535-f3b8-45d3-bf3b-735c82c64547"

1608 |
1609 |
1610 | 1611 | Policy Title 1612 | Policy document 1613 | policy 1614 | Document Date 1615 | Document Version 1616 | 1617 | 00000000 1618 | 1619 |

Table 15-1 Attachments: Policy Attachment

1620 |
1621 |
1622 | 1623 | Policy Title 1624 | Policy document 1625 | policy 1626 | Document Date 1627 | Document Version 1628 | 1629 | 00000000 1630 | 1631 |

Table 15-1 Attachments: Policy Attachment

1632 |
1633 |
1634 | 1635 | Procedure Title 1636 | Procedure document 1637 | procedure 1638 | Document Date 1639 | Document Version 1640 | 1641 | 00000000 1642 | 1643 |

Table 15-1 Attachments: Procedure Attachment

1644 |
1645 |
1646 | 1647 | Procedure Title 1648 | Procedure document 1649 | procedure 1650 | Document Date 1651 | Document Version 1652 | 1653 | 00000000 1654 | 1655 |

Table 15-1 Attachments: Procedure Attachment

1656 |
1657 |
1658 | 1659 | User's Guide 1660 | User's Guide 1661 | user-guide 1662 | guide 1663 | Document Date 1664 | Document Version 1665 | 1666 | 00000000 1667 | 1668 |

Table 15-1 Attachments: User's Guide Attachment

1669 |
1670 |
1671 | 1672 | Privacy Impact Assessment 1673 | privacy-impact-assessment 1674 | Document Date 1675 | Document Version 1676 | 1677 | 00000000 1678 | 1679 |

Table 15-1 Attachments: Privacy Impact Assessment

1680 |
1681 |
1682 | 1683 | Document Title 1684 | Rules of Behavior 1685 | rules-of-behavior 1686 | rob 1687 | Document Date 1688 | Document Version 1689 | 1690 | 00000000 1691 | 1692 |

Table 15-1 Attachments: Rules of Behavior (ROB)

1693 |
1694 |
1695 | 1696 | Document Title 1697 | Contingency Plan (CP) 1698 | plan 1699 | Document Date 1700 | Document Version 1701 | 1702 | 00000000 1703 | 1704 |

Table 15-1 Attachments: Contingency Plan (CP) Attachment

1705 |
1706 |
1707 | 1708 | Document Title 1709 | Configuration Management (CM) Plan 1710 | plan 1711 | Document Date 1712 | Document Version 1713 | 1714 | 00000000 1715 | 1716 |

Table 15-1 Attachments: Configuration Management (CM) Plan Attachment

1717 |
1718 |
1719 | 1720 | Document Title 1721 | Incident Response (IR) Plan 1722 | plan 1723 | Document Date 1724 | Document Version 1725 | 1726 | 00000000 1727 | 1728 |

Table 15-1 Attachments: Incident Response (IR) Plan Attachment

1729 |
1730 |
1731 | 1732 | Separation of Duties Matrix 1733 | Separation of Duties Matrix 1734 | Document Date 1735 | Document Version 1736 | 1737 | 00000000 1738 | 1739 |

Table 15-1 Attachments: Separation of Duties Matrix Attachment

1740 |
1741 |
1742 | 1743 | FedRAMP High Baseline 1744 | 1745 | 1746 |

Pointer to High baseline content in OSCAL.

1747 |
1748 |
1749 | 1750 | FedRAMP Moderate Baseline 1751 | 1752 | 1753 |

Pointer to Moderate baseline content in OSCAL.

1754 |
1755 |
1756 | 1757 | FedRAMP Low Baseline 1758 | 1759 | 1760 |

Pointer to Low baseline content in OSCAL.

1761 |
1762 |
1763 |
1764 |
--------------------------------------------------------------------------------