Sections 1 - 11
1. Introduction
This entire chapter is FedRAMP PMO boilerplate and does not need to be represented in OSCAL conte...
2. Purpose
This entire chapter is FedRAMP PMO boilerplate and does not need to be represented in OSCAL conte...
3. System Information
System Information CSP Name The cloud service provider (CSP) name and abbreviation are represent...
4. System Owner
System Owner follows the Roles pattern, using the system-owner role. Defined Identifiers Requir...
5. Assignment of Security Responsibility
Information System Security Officer (ISSO) follows the Roles pattern, using the information-syst...
6. Leveraged FedRAMP-Authorized Services
The leveraged FedRAMP-Authorized services table is used to list both underlying leveraged authori...
7. External Systems and Services Not Having FedRAMP Authorization
FedRAMP authorized services should be used, whenever possible, since their risk is defined. Howe...
8. Illustratred Architecture and Narratives
The Architecture, Network and Data Flow Diagramss are each represented using the same OSCAL patte...
9. Services, Ports and Protocols
Entries in the services, ports, and protocols table are represented as component assemblies, with...
10. Cryptographic Modules Implemented for DAR and DIT
This is address in Appendix Q: Cryptographic Modules.