New Adoption Path
If you are approaching OSCAL to intially create your system security plan and do not have legacy documentaiton to convert, follow this path.
If you need to convert legacy documentation to OSCAL, follow the Retrofit Adoption Path.
THIS PAGE IS STILL UNDER DEVELOPMENT
Organizations adopting OSCAL for initial SSP creation must be mindful of OSCAL's relational dependencies to ensure efficient content population. The New Adoption Path starts with components and other core system details, then builds on those components in later phases to achieve highly normalized and complete SSP content.
This approach prioritzes data normalization from the start. It establishes foundational data elements on which later phases build. This ensures logical sequencing of activties and efficient progression of SSP detail.
SSP New Adoption Overview
The OSCAL Foundation recommends the following addoption path for new FedRAMP SSP creation.
CORE
-
MinimumProvideInformationOSCAL RequiredinContentanandOSCALBasicSSPCSP/CSO Details-
metadataincludes:title,last-modified,version,oscal-version(required OSCAL fields)roles:cloud-service-providerparties: the CSPresponsible-parties: exactly one, linking the CSP party to the CSProlerole.
-
system-characteristicsincludes:system-id,system-name,system-name-short,descriptionsystem-information:(requiredexactlyOSCALone entry with Appendix K pasted into thefields)description- cloud-service-model and cloud-deployment-model
props system-informationsecurity-sensitivity-level(fips-199-high,fips-199-moderate,fips-199-low)status:Requiredsetfield.toUseoperationalas-is(required OSCAL fields)authorization-:boundaryboundary/descriptionOnly a brief descriptiononlyis required.
-
-
FocusDefineon DefiningFoundational Componentssystem-implementationcomponents:- Exactly one "this system" component (
type=this-system) (Represents the system as a whole.) - One for each technical
componentelement (hardware, software, virtual appliance, service) used in the system - One for each required document (policies, procedures, plans, user guides, Rules of Behavior)
- See [Section citation and link] for more information.
- Exactly one "this system" component (
DETAIL
SSP-Required
SSPRolesRolesand Parties: See [Seciton citation and link]Leveraged Authorizations
: See [Seciton citation and link]External Systems and Services
: See [Seciton citation and link]
: See [Seciton citation and link]Services,Ports and ProtocolsSeparation of Duties:
See [Seciton citation and link]MatrixCryptographic Modules
: See [Seciton citation and link]- Diagrams:
See [Seciton citation and link] See [Seciton citation and link]Diagrams- Boundary/Architecture Diagram and Narriative
- Network Architecture Diagram and Narriative
- Data Flow Diagram and Narriative
Information Types / FIPS-199 CategorizationLeveraged Authorizations and External Services (needed forControlsbelow.)Componentsthis-system(Core OSCAL Mandatory)technical components. Appropriate level of granularity for:SSP control responses: If you need to reference an element of the system in a control response, there should be a defined OSCAL component.normalizing inventory reporting: for any item appearing in the inventory, details about its vendor, product/service name, version or other details should be a defined component.
Document Components for Policies, Procedures, Plans, RoB, User Guides
CONTROLS
AssignAlign Components to Controls: See [Seciton citation and link]ResponsesRespondattotheControls per-Component:LevelSee Derived[Secitonfromcitationincludedandcomponents:RolesImplementaiton Status
Add roles where they are not inherited from cited componentsOverride implementation status only where necessary. Examples:Cited components don't represent all components.Planned upgrades or replacement of components
link]
TARGET
Advanced topics.
Cryptographic Module representationConvert controls without modification, with all response statements in the "this-system" component.control-implementationimplemented-requirement(AC-1, AC-2, etc.)set-parameters: set parameters as neededstatement(part a, part b, etc.by-component("this system")description: Content directly from legacy Word SSP (part a, part b, etc.)implementation-statusresponsible-roles: One entry per role. Userole-id. Must matchmetadata/roles/id.
Flat Inventory, converted directly from spreadsheet. No corrisponding components.Component-Based Inventory Representation:system-implementation- See [Seciton citation and link]
Verify/Adjust Control Origin and Aggregated Status:inventory-itemsAllSeeinventory[SecitonconvertedcitationfromandExcel spreadsheetlink]
- Add Customer
Intermediate
Required attachmentsAdd directlinksfrom the appropriate controls to identify relevant attachments
Required SSP rolesmetadata/rolesThe roles required by SSP (System owner, ISSO, AO, etc.)metada/parties: the people, teams and organizations responsible for the above rolesmetadata/responsible-parties: links the aboverolesandparties
Information typessystem-characteristics/system-information/information-typesa single entry for each row in appendix K.
leveraged authorizationssystem-implementation/leveraged-authorizations:one entry for leveraged authorizationcorrispondingmetadata/partiesentry for eachcorrispondingsystem-implementation/componentsfor each.
Separation of Duties Matrixsystem-implementation/usersone entry per row in Table 11.1./authorized-privilege/functions-performed: SSP Table 11.1 Duty Description (just one entry in the array)./authorized-privilege/title: Required by OSCAL, not by FedRAMP. Recommend duplicating thefunctions-performedcontent.role-ids: linksmetadata/rolestofunctions-performed
Customer Responsibility and Inheritance:Move customer responsibility statements to//by-components/export/responsibilities
Advanced
external systems and servicessystem-implementation/componentsentries for each
Transition toresourcesWhere practical,linksentries use URI fragments to reference resources instead of direct links.
Components for Required Documentspolicycomponentsentries for each required policyprocess-procedurecomponentsentries for each required processplancomponentsentries for each required plan_useradd components for policies, processes, plans and other documents
Ideal
Services, Ports and ProtocolsCryptographic Modules (App Q table)Migrateto component-based control responsesAddby-componentsentries toimplemented-requirementsfor each relevant componentAdd/move component-specific control responses to their associatedby-componentsresponse.Migrate slowly over time.
