Describe how Part a is satisfied within the system.
Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
@@ -2566,6 +2567,37 @@ SSP authors must add implmentations for all required controls.Describe how Part a is satisfied within the system.
+Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+In this case, a link must be provided to the policy.
+FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
+The specified component is the system itself.
+Any control implementation response that can not be associated with another component is associated with the component representing the system.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Identity Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+Describe how Part a is satisfied.
Describe how the control is satisfied within the system.
Describe how the control is satisfied within the system.
@@ -3784,7 +3816,9 @@ SSP authors must add implmentations for all required controls.For the portion of the control satisfied by the service provider, describe how the control is met.
@@ -3854,7 +3888,7 @@ SSP authors must add implmentations for all required controls.Describe how the control is satisfied within the system.
diff --git a/src/validations/constraints/content/resolved-example-profile.xml b/src/validations/constraints/content/resolved-example-profile.xml new file mode 100644 index 000000000..ce2dd5bc1 --- /dev/null +++ b/src/validations/constraints/content/resolved-example-profile.xml @@ -0,0 +1,33 @@ + +Should be INCLUDED (sample-1_smt.a)
+Should be INCLUDED (sample-1_smt.a.1)
+this should be EXCLUDED (sample-1_obj.a)
+this should be EXCLUDED (sample-1_obj.a-1)
+There
+Describe the plan to complete the implementation.
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part a is satisfied within the system.
+Legacy approach. If no policy component is defined, describe here how the policy satisfies part a.
+In this case, a link must be provided to the policy.
+FedRAMP prefers all policies and procedures be attached as a resource in the back-matter. The link points to a resource.
+The specified component is the system itself.
+Any control implementation response that can not be associated with another component is associated with the component representing the system.
+Describe how this policy component satisfies part a.
+Component approach. This links to a component representing the Identity Management and Access Control Policy.
+That component contains a link to the policy, so it does not have to be linked here too.
+There
+Describe the plan to complete the implementation.
+Describe how this policy currently satisfies part a.
+Describe the plan for addressing the missing policy elements.
+Identify what is currently missing from this policy.
+Describe how Part b-1 is satisfied.
+Describe how Part b-2 is satisfied.
+