Identifies the FedRAMP authorization type.
The "authorization-type" is used to specify the authorization path of a CSO in the SSP. The extension is also used to specify the authorization path of any leveraged CSOs.
+The overall electronic authentication (eAuth) level applied to the system.
Deprecated.
+The organization that prepared this content.
+This machine-readable file documents how FedRAMP extends OSCAL to meet its information + requirements.
+It provides the extensions, defined identifiers, and references constraints necessary to + meet FedRAMP Authorization Package requirements.
+The type of assessment (e.g., initial authorization, annual assessment, + assessment for a significant change, or another type of assessment).
Added for rev 5 templates.
+Identifies the type of asset.
The authentication method(s) for users of a leveraged service or external + interconnection. Refer to for authentication methods NIST 800-63B + (https://pages.nist.gov/800-63-3/sp800-63b.html) for authentication methods
Added for rev 5 templates.
+The date the system was authorized. Omit or leave blank for an initial + authorization.
Indicates whether the assessor recommends the system be authorized by the + authorizing official.
Deprecated.
+Use "recommend-authorization" prop
instead.
Identifies the FedRAMP authorization type.
The users or roles that can access the leveraged service or external + interconnection.
Added for rev 5 templates.
+A circuit used for the communication.
Indicates the implementation status of the control.
Updated bindings and constraint.
+Indicates the implementation status of the control objective.
Deprecated.
+Use "implementation-status" prop
instead.
The point(s) from which the control satisfaction originates.
Identifies a control that must be included in every FedRAMP + assessment.
Core controls must be assessed every year, and are often subject to additional + scrutiny + by assessors and adjudication reviewers.
+The cryptographic module is used for data at rest (DAT) or data in transit + (DIT).
Added for rev 5 templates.
+The CSP ensured the independent assessor team roles are appropriately + filled.
Added for rev 5 templates.
+A brief description of the system.
Deprecated.
+Any discrepancies between inventory that was in scope for the planned + assessment + and the assets in the assessment results.
Added for rev 5 templates.
+The justification or reason for any discrepancies between inventory that was + in + scope for the planned assessment and the assets in the assessment results.
Added for rev 5 templates.
+The risk was found to be a false positive report.
The date when security control implementations for the appropriate control + baseline was completed.
Added for rev 5 templates.
+“Fully operational” means there are no “gaps” in the security control baseline + implementations for the system. The CSP attests that the security controls are + implemented correctly, operating as intended, and producing the desired outcome with + respect to meeting established security requirements.
+Confirmation that the independent assessor performed a manual review of (scan) + configuration files to analyze for existing vulnerabilities.
Added for rev 5 templates.
+The independent assessor ensured the assessment team roles are appropriately + filled.
Added for rev 5 templates.
+The impact level of a leveraged authorization.
Added for rev 5 templates.
+The baseline/profile for this system based on its FIPS-199 + categorization.
Describes the information transmitted over the interconnection.
Any (security) compliance certifications the third party external service has + (e.g., PCI SOC 2, CSA STAR Level 2, etc.).
Added for rev 5 templates.
+The security impact level of the data (Low, Moderate, High), processed by or + stored in the external service, in accordance with FIPS 199 & NIST 800-60 Vol. + 2.
Added for rev 5 templates.
+The type of data / information processed by or stored in the external service, + in + accordance with NIST 800-60 Vol. 2.
Added for rev 5 templates.
+Identifies the direction of information flow for the + interconnection.
Deprecated.
+Use core OSCAL "direction" prop
instead.
A description of the hosting environment (e.g., corporate network, IaaS, or + self-hosted) for the external service.
Added for rev 5 templates.
+A description of the potential risks introduced by the external system/service + and impact to the CSO or federal data if the confidentiality, integrity, and + availability + (CIA) of the system/service is compromised.
Added for rev 5 templates.
+Identifies the type of security applied to the interconnection.
Identifies the mechanisms/protocol(s) used to secure the + communication.
Renamed from "connection-security" to "interconnection-security".
+Numeric indicator of the type of interconnection, where 1 = Non-FedRAMP + Authorized Cloud Services, 2 = Corporate Shared Services, and 3 = Update Services for + In-Boundary Software/Services.
Added for rev 5 templates.
+Indicates if the asset is virtual.
Deprecated.
+Use core OSCAL "public" and "virtual" prop
instead.
The IP address of a component, inventory item, or other asset.
Added for rev 5 templates.
+Core OSCAL has an "ipv4-address" prop
which can be used for certain
+ component types and for inventory items. This extension can be used instead, and is also
+ applicable for other assemblies such as assessment-platform
.
The subnet for a component of inventory item.
Added for rev 5 templates.
+The ISO/IEC-17020 identifier assigned to the assessor related to their status + as + an A2LA Accredited Third Party Assessment Organization.
Indicates if this vulnerability is on the CISA Known Exploited Vulnerabilities + (KEV) Catalog.
Added for rev 5 templates.
+In accordance with Binding Operational Directive (BOD) 22-01, CSPs must track their + vulnerabilities against the KEV catalog.
+The KEV catalog specified due date by which the vulnerability must be + remediated.
Added for rev 5 templates.
+In accordance with Binding Operational Directive (BOD) 22-01, CSPs must track their + vulnerabilities against the KEV catalog.
+The test ID for the manual test method.
Added for rev 5 templates.
+Indicates a leveraged authorization used for this control.
This is for legacy SSP conversion to OSCAL. The preferred approach is to specify the
+ leveraged system as a component
and reference it in the control using
+ by-component
.
The identifier corresponding to the FedRAMP package ID.
Added for rev 5 templates.
+The likelihood of a risk.
The product or tool name for a component or inventory item.
Added for rev 5 templates.
+Any type of agreement between a CSP and the leveraged CSP vendors who support + products (e.g., End User Licensing Agreement (EULA), Service-Level Agreement (SLA), App + License Agreement, Contract, etc.).
Added for rev 5 templates.
+The date of the system's initial FedRAMP authorization.
Identifies the relevant OSCAL baseline.
As with all URIs in OSCAL, this may contain a URI fragment, which identifies the + local + resource containing the relevant profile.
+The FedRAMP-assigned system identifier.
The FedRAMP-assigned system identifier.
The abbreviated name for the system, such as an acronym.
The risk cannot be remediated without impact to the system and must be + accepted.
Provides the date the control expects to be implemented. Must be present when + Implementation Status is "Planned"
A tool assigned Plugin ID.
A CSP-assigned POA&M identifier.
A control impacted by this POA&M item.
Impacted control is required in the POA&M and optional in the SAR.
+It is allowed in the SAR in anticipation of duplicating open risks from the SAR to + the + POA&M.
+Indicates whether this system is privacy sensitive.
Deprecated.
+Does the ISA collect, maintain, or share PII in any identifiable + form?
Deprecated.
+Does the ISA collect, maintain, or share PII from or about the + public?
Deprecated.
+Has a Privacy Impact Assessment (PIA) ever been performed for the + ISA?
Deprecated.
+Is there a Privacy Act System of Records Notice (SORN) for this ISA + system?
Deprecated.
+Explains the system's purpose.
The back-matter resource reference used to determine which FedRAMP validation + rule sets apply.
Added for rev 5 templates.
+A property whose presence indicates its parent part is a required point of + response for FedRAMP stakeholders.
This appears in FedRAMP profiles and resolved profile catalogs.
+For control statements, it signals to the CSP which statements require a response in + the + SSP.
+For control objectives, it signals to the assessor which control objectives must + appear + in the assessment results, which aligns with the FedRAMP test case workbook.
+Identifies the party who authored this revision.
Mitigating factors were identified or implemented, reducing the likelihood or + impact of the risk.
Indicates whether a sampling methodology was used instead of assessing the + entire + system.
Indicates the assessor's recommendation for initial or continued + authorization.
Assessor's recommended risk priority. Lower numbers are higher priority. One + (1) + is highest priority.
The scan coverage
Added for rev 5 templates.
+Identifies the type(s) of scans to be performed on this inventory-item or + component.
The overall electronic authentication (eAuth) level applied to the + system.
Deprecated.
+Name of the interconnection service processor.
Identifies what uses the service.
The general quantity of significant change(s) in scope.
Added for rev 5 templates.
+An assigned System of Records Notice (SORN) identifier for this + system.
Deprecated.
+Identifier for sort ordering content.
Core OSCAL has a "sort-id" prop
, however this "sort-id" extension can be
+ applied to any assembly that provided information which may need to be rendered in a
+ specific order. The step
assembly is an example of this.
Specify if the product / component is still supported by the vendor / + manufacturer.
Added for rev 5 templates.
+The FedRAMP-assigned identifier for this system.
The login ID used to assess the web application.
Extension renamed from "login-id" to "login-id".
+The login URL for a web application.
Extension renamed from "login-url" to "login-url".
+Indicates the type of test represented by the task.
Cites the SSP defined user role to use for testing.
The short name for the system represented in the resource.
The "type" of back-matter resource.
Added for rev 5 templates.
+Locally defined resource types.
+Defines the sensitivity level of the identified user type.
Values are as required by FedRAMP for packages based on NIST 800-53, Revision 4.
+Authoritative source: OPM Position + Designation (Page 18).
+The current number of users external to the organization.
The anticipated number of users external to the organization in one + year.
The current number of users internal to the organization.
The anticipated number of users internal to the organization in one + year.
A vendor resolution is pending, but not yet available.
The vendor or manufacturer of a component or inventory item.
Added for rev 5 templates.
+A tool assigned vulnerability ID.
The OSCAL Extension Model is used to describe the comprehensive set of extenstions.
+This provides OSCAL practitioners a machine-readable documentation of the extensions used + in an organization's authorization package. Specific requirements, in the form of external + constraints, are referenced in this model.
+