Skip to main content

Recently Updated Pages

Comments Summary

Reports

:root { --accent: #2d6be4; --accent-dim: #e8effe; --border: #dde1e9; --surface2: #f0f2f5; --muted...

Updated 31 minutes ago by Brian Ruf

Attachments

FedRAMP Common

Attachments All OSCAL models handle attachments the same way. The following is used to attach fil...

Updated 13 hours ago by Brian Ruf

Title Pages

FedRAMP Common

All FedRAMP artifacts include a title page. The content found on the title page is represented u...

Updated 13 hours ago by Brian Ruf

Appendicies Overview

FedRAMP System Security Plan (SSP) Appendices A - Q

Most attachments required by FedRAMP are called out in the NIST SP 800-53 controls appearning in ...

Updated 14 hours ago by Brian Ruf

Appendix O: POA&M

FedRAMP System Security Plan (SSP) Appendices A - Q

See the FedRAMP POA&M book.

Updated 14 hours ago by Brian Ruf

Appendix Q: Cryptographic Modules

FedRAMP System Security Plan (SSP) Appendices A - Q

Cryptographic Modules Implemented for Data-in-Transit (DIT) This page needs work: The examples ...

Updated 14 hours ago by Brian Ruf

9. Services, Ports and Protocols

FedRAMP System Security Plan (SSP) Sections 1 - 11

Entries in the services, ports, and protocols table are represented as component assemblies, with...

Updated 14 hours ago by Brian Ruf

Appendix B: Related Acronyms

FedRAMP System Security Plan (SSP) Appendices A - Q

There is no OSCAL construct for representing an acronyms list. Attach a document (e.g., Word, Exc...

Updated 17 hours ago by Rene M. Tshiteya

8. Illustratred Architecture and Narratives

FedRAMP System Security Plan (SSP) Sections 1 - 11

The Architecture, Network and Data Flow Diagramss are each represented using the same OSCAL patte...

Updated 22 hours ago by Rene M. Tshiteya

7. External Systems and Services Not Having FedRAMP Authorization

FedRAMP System Security Plan (SSP) Sections 1 - 11

FedRAMP authorized services should be used, whenever possible, since their risk is defined. Howe...

Updated 22 hours ago by Rene M. Tshiteya

Validating FedRAMP Content with OSCAL CLI

Supporting Resources and Valid Content Validating Content

Get Started The oscal-cli is an open source command-line utility designed to help developers and ...

Updated 23 hours ago by Rene M. Tshiteya

The Tiered Validation Model

Supporting Resources and Valid Content Validating Content

Validating OSCAL content is a tiered process that ensures data integrity from basic file structur...

Updated 23 hours ago by Rene M. Tshiteya

Getting Started

Overview

Welcome to the OSCAL Foundation Patterns Library! The goal of the OSCAL Patterns Library is to ma...

Updated 1 day ago by Brian Ruf

Retrofit Adoption Path

FedRAMP System Security Plan (SSP) Adopting OSCAL for SSP Representation

If you need to convert legacy documentation to OSCAL, follow this path. If you are approaching OS...

Updated 1 day ago by Brian Ruf

Control Response: Approaches

FedRAMP System Security Plan (SSP) FedRAMP Security Controls

OSCAL offers a great deal of flexibility for controls responses. To balance consistency, interope...

Updated 1 day ago by Brian Ruf

Control Response: Normalized Approach

FedRAMP System Security Plan (SSP) FedRAMP Security Controls

The normalized approach is prefered. Organizations starting new with no legacy SSP content should...

Updated 1 day ago by Brian Ruf

3. System Information

FedRAMP System Security Plan (SSP) Sections 1 - 11

System Information CSP Name The cloud service provider (CSP) name and abbreviation are represent...

Updated 1 day ago by Erik Cass

Inventory Approaches

FedRAMP System Security Plan (SSP) System Components and Inventory

OSCAL makes two approaches available for depicting the system inventory: Flat Approach: Aligns ...

Updated 1 day ago by Brian Ruf

Inventory: Flat Approach

FedRAMP System Security Plan (SSP) System Components and Inventory

The flat approach to inventory is only intended as a starting point for service providers convert...

Updated 1 day ago by Brian Ruf

Inventory: Normalized Approach

FedRAMP System Security Plan (SSP) System Components and Inventory

The normalized approach is prefered. Organizations starting new with no legacy inventory reportin...

Updated 1 day ago by Brian Ruf