Skip to main content

FedRAMP System Security Plan (SSP)


Adopting OSCAL for SSP Representation

OSCAL Requirements

All OSCAL Core Requirements must be met for all OSCAL artifacts. This chapter contains informat...

Title Page, Prepared by/for, Approvers

Sections 1 - 11

Appendices A - Q

Appendicies Overview

Most attachments required by FedRAMP are called out in the NIST SP 800-53 controls appearning in ...

Appendix A: FedRAMP Security Controls

See [Controls citation and link]

Appendix B: Related Acronyms

There is no OSCAL construct for representing an acronyms list. Attach a document (e.g., Word, Exc...

Appendix C: Security Policies and Procedures

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix D: User Guide

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix E: Digital Identity Level (DIL) Determination

The Digital Identity Level (DIL) is represented on the page below. Within system-characteristics...

Appendix F: Rules of Behavior (RoB)

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix G: Information System Contingency Plan (ISCP)

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix H: Configuration Management Plan (CMP)

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix I: Incident Response Plan (IRP)

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix J: CIS and CRM Workbook

The FedRAMP Control Information Summary (CIS) and Customer Responsibility Matrix (CRM) are derive...

Appendix K: FIPS-199 Worksheet

The system's overall FIPS-199 impact level is determined primarily by the sensitivity of the info...

Appendix L: CSO-Specific Required Laws and Regulations

Needs Work Content cleanup YAML Example For MVP: attach a Word or PDF document enumerating t...

Appendix M: Integrated Inventory Workbook

See Inventory Approaches for guidance.

Appendix N: Continuous Monitoring Plan

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix O: POA&M

See the FedRAMP POA&M book.

Appendix P: Supply Chain Risk Management Plan (SCRMP)

This needs work that may have been completed elsewhere and nees to be moved into here. This ...

Appendix Q: Cryptographic Modules

Cryptographic Modules Implemented for Data-in-Transit (DIT) This page needs work: The examples ...

System Components and Inventory

FedRAMP Security Controls

Control Response: Approaches

OSCAL offers a great deal of flexibility for controls responses. To balance consistency, interope...

Control Response: Flat Approach

The flat approach to control responses is only intended as a starting point for service providers...

Control Response: Normalized Approach

The normalized approach is prefered. Organizations starting new with no legacy SSP content should...

Control Definitions

Conrol definitions are imported by an OSCAL SSP and referenced as needed. Importing a Baseline I...

Responsible Roles

Every control should have one or more responsible roles identified. In OSCAL, there are three op...

Parameter Assignments

Need rework and to cover aggregated parameters Every applicable control must have at least one re...

Implementaiton Status

FedRAMP only accepts only one of five values for implementation-status: implemented, partial, pla...

Control Origination

FedRAMP accepts only one of five values for control-origination: sp-corporate, sp-system, custome...

Control Response Overview

Within the OSCAL-based FedRAMP baselines, control statements and control objectives are tagged w...

Control Responses

Implementation Statements: General Organization: Multi-Part Statements There must be one statemen...

Control Response: Policies and Procedures

The first control in each NIST SP 800-53 control family is a policy and procedure control. These ...

Inheritence and Customer Responsibilities

For systems that may be leveraged, OSCAL enables a robust mechanism for providing both inheritanc...

Example

Within each of the statement assemblies, all responses appear in one or more by-component assembl...