-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authorized Users for Leveraged Authorizations and External, Interconnected, and Unauthorized Systems #893
Comments
This was revised and is now ready for assignment. It was changed to align the handling of authorized users the same for both #807 and #808 above, and using the Variant 2 solution discussed in THIS COMMENT of issue #534. |
This issue uses the same target and data constructs as #937 . Consider having the same person work both together. |
@Gabeblis the metapath needs to change for this one as well: //component[
(@type='system' and ./prop[@name='leveraged-authorization-uuid'])
or
(@type=('service', 'software') and not(./prop[@name='leveraged-authorization-uuid']) and ./prop[@name='implementation-point' and @value='external'])
or
(@type='interconnection')
or
(@type=('service', 'software') and ./prop[@name='implementation-point' and @value='internal'] and ./prop[@name='communicates-externally' and @value='yes' and @ns='http://fedramp.gov/ns/oscal'])
] |
Ok, resolved in #974. |
Constraint Task
As a maintainer of a digital authorization package, I need to clearly document the in my SSP the authorized uses of any leveraged FedRAMP authorized services, so that agencies that use my service understand potential risk around the user types that can access data in the external system. Checking to ensure I have provided complete listing of authorized users will prevent pass back during review of my SSP.
Intended Outcome
Define a constraint to ensure that only valid / defined users are referenced when listing authorized users for a leveraged authorization. In other words, each
//system-implementation/leveraged-authorization/prop[@name='user-uuid'][@ns='http://fedramp.gov/ns/oscal']/@value
must reference a valid//system-implementation/user
The constraint should give an
ERROR
if the condition is not met.Syntax Type
This is a FedRAMP constraint in the FedRAMP-specific namespace.
Allowed Values
There are no relevant allowed values.
Metapath(s) to Content
Each appropriate component type (leveraged authorizations, interconnections, external services, etc.) has at least one
responsible-role
other than the "provider" role.Constraint:
Each non-provider responsible role references at least one
user/authorized-privilege/function-performed
via the "privilege-uuid" property/extension.Constraint:
Purpose of the OSCAL Content
No response
Dependencies
Check to ensure that for each leveraged authorized system / service, the SSP clearly documents (what user types / roles) are authorized users.
Acceptance Criteria
oscal-cli metaschema metapath eval -e "expression"
.Other information
No response
The text was updated successfully, but these errors were encountered: