diff --git a/OpenShift-v3/Makefile b/OpenShift-v3/Makefile index 03dc30d..df68350 100644 --- a/OpenShift-v3/Makefile +++ b/OpenShift-v3/Makefile @@ -30,9 +30,8 @@ serve: exports exports: opencontrols ${CM} docs gitbook FedRAMP-low -#opencontrols: opencontrol.yaml policies/*/.yaml opencontrols: opencontrol.yaml - ${CM} get + -${CM} get coverage: ${CM} diff FedRAMP-low @@ -42,3 +41,6 @@ fedramp: default fedramp-diff: ${GOPATH}/bin/fedramp-templater diff opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx + +checks: + yamllint policies/ diff --git a/OpenShift-v3/policies/AC-Access_Control/component.yaml b/OpenShift-v3/policies/AC-Access_Control/component.yaml index 7e3f3d8..3586b36 100644 --- a/OpenShift-v3/policies/AC-Access_Control/component.yaml +++ b/OpenShift-v3/policies/AC-Access_Control/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Access Control schema_version: 3.0.0 @@ -10,32 +11,35 @@ satisfies: narrative: - key: a text: | - ' - + and associated controls). - - ' + https://docs.openshift.com/container-platform/latest/admin_guide/ + manage_authorization_policy.html#managing-role-bindings + */' - key: b text: | - '' + providing approval of the updates. + */' - control_key: AC-2 standard_key: NIST-800-53 @@ -44,78 +48,100 @@ satisfies: narrative: - key: a text: | - '' + in use. + */' - key: b text: | - '' + how account managers are identified within the organization + */' - key: c text: | - '' + these conditions and how they are enforced. + */' - key: d text: | - '' + users are specified and privilege levels are determined. + */' - key: e text: | - '' + which those personnel or roles are notified and approval is granted. + */' - key: f text: | - '' + those conditions. + */' - key: g text: | - '' + '//* + The customer will be responsible for monitoring the use of information + system accounts. This may include reviewing records of account + management activities. A successful control response will relate the + monitoring activities required for this control to the auditing + activities in the AU control family. + */' - key: h text: | - '' + triggering events are identified and the managers are notified. + */' - key: i text: | - '' + authorization for a specific intended usage. + */' - key: j text: | - '' + process for remediation of any accounts found not to be in compliance. + */' - key: k text: | - '' + credentials is, and how the process is enforced. + */' - control_key: AC-2 (1) standard_key: NIST-800-53 @@ -123,16 +149,18 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - ' - <3rd party software must be used to fully support automated management - of OpenShift accounts. Documentation on authentication configuration + <3rd party software must be used to fully support automated management + of OpenShift accounts. Documentation on authentication configuration options exposed in OpenShift can be found here: - https://docs.openshift.com/container-platform/3.3/architecture/additional_concepts/authentication.html>' + https://docs.openshift.com/container-platform/3.3/architecture/additional_concepts/authentication.html + */' - control_key: AC-2 (2) standard_key: NIST-800-53 @@ -140,21 +168,24 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - ' - - <3rd party software must be used to fully support management of - temporary and emergency accounts. OpenShift does not have the capability + '//* + The customer will be responsible for automatically removing or + disabling emergency and temporary accounts within the required + timeframe. A successful control response will need to address + all of the procedures and mechanisms involved in disabling these + accounts.> + + <3rd party software must be used to fully support management of + temporary and emergency accounts. OpenShift does not have the capability to automatically disable accounts after a configured period of time. To - meet this requirement, an authentication provider (such as Active - Directory) must be used. Integration between OpenShift and Active - Directory can be accomplished through the use of Kerberos cross-realm - trusts. Refer to the LDAP Authentication section of the OpenShift + meet this requirement, an authentication provider (such as Active + Directory) must be used. Integration between OpenShift and Active + Directory can be accomplished through the use of Kerberos cross-realm + trusts. Refer to the LDAP Authentication section of the OpenShift Administrators guide: - https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth>' + https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth + */' - control_key: AC-2 (3) standard_key: NIST-800-53 @@ -162,21 +193,23 @@ satisfies: implimentation_status: none narrative: - text: | - ' - <3rd party software must be used to fully support automatic disablement - of inactive OpenShift accounts. OpenShift does not have the capability - to automatically disable accounts after a configured period of time. To - meet this requirement, an authentication provider (such as Active - Directory) must be used. Integration between OpenShift and Active + <3rd party software must be used to fully support automatic disablement + of inactive OpenShift accounts. OpenShift does not have the capability + to automatically disable accounts after a configured period of time. To + meet this requirement, an authentication provider (such as Active + Directory) must be used. Integration between OpenShift and Active Directory can be accomplished throguh the use of Kerberos cross-realm - trusts. Refer to the LDAP Authentication section of the OpenShift + trusts. Refer to the LDAP Authentication section of the OpenShift Administrators guide: - https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth>' + https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth + */' - control_key: AC-2 (4) standard_key: NIST-800-53 @@ -184,38 +217,42 @@ satisfies: implimentation_status: Implemented narrative: - text: | - ' - ' + https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging.html + */' - control_key: AC-2 (5) standard_key: NIST-800-53 covered_by: [] implimentation_status: Implemented narrative: - - text: | - '' + - text: | + '//* + Within OpenShift, the sessionMaxAgeSeconds variable in the + master-config.yaml file controls when/if users must logout after a + period of inactivity. + */' - control_key: AC-2 (7) standard_key: NIST-800-53 @@ -224,32 +261,40 @@ satisfies: narrative: - key: a text: | - ' ' + https://docs.openshift.com/container-platform/latest/admin_guide/ + manage_authorization_policy.html#managing-role-bindings + */' + - key: b text: | - '' + appropriateness. + */' - key: c text: | - '' + actions. + */' - control_key: AC-2 (9) standard_key: NIST-800-53 @@ -257,23 +302,26 @@ satisfies: implimentation_status: Implemented narrative: - text: | - ' - ' + https://docs.openshift.com/container-platform/3.3/admin_guide/ + manage_users.html#managing-users-managing-user-and-group-labels + */' - control_key: AC-2 (10) standard_key: NIST-800-53 @@ -281,12 +329,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanism used to perform the change. + */' - control_key: AC-2 (12) standard_key: NIST-800-53 @@ -295,7 +345,8 @@ satisfies: narrative: - key: a text: | - '' + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging.html + */' + - key: b text: | - '' - + for notification. + */' - control_key: AC-3 standard_key: NIST-800-53 @@ -334,11 +390,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + https://docs.openshift.com/container-platform/3.3/architecture/ + additional_concepts/authorization.html + */' - control_key: AC-4 standard_key: NIST-800-53 @@ -346,7 +405,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + https://docs.openshift.com/container-platform/3.3/architecture/ + additional_concepts/networking.html + */' - control_key: AC-4 (21) standard_key: NIST-800-53 @@ -363,11 +425,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + techniques used to accomplish this separation. + */' - control_key: AC-5 standard_key: NIST-800-53 @@ -376,23 +440,29 @@ satisfies: narrative: - key: a text: | - '' + prevent or reduce the likelihood of those actions. + */' - key: b text: | - '' + documentation and the process for reviewing it if necessary. + */' - key: c text: | - '' + policy and technical enforcement of separation of duties. + */' - control_key: AC-6 standard_key: NIST-800-53 @@ -400,12 +470,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + within the system. + */' - control_key: AC-6 (1) standard_key: NIST-800-53 @@ -413,11 +485,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + and information require explicit access authorization. + */' - control_key: AC-6 (2) standard_key: NIST-800-53 @@ -425,10 +499,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + access in use is monitored and enforced. + */' - control_key: AC-6 (5) standard_key: NIST-800-53 @@ -436,11 +512,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + to address the job functions or responsibilities for which + privileged access is required. + */' - control_key: AC-6 (9) standard_key: NIST-800-53 @@ -448,10 +526,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + of the AU control family, + */' - control_key: AC-6 (10) standard_key: NIST-800-53 @@ -459,11 +539,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + levels. + */' - control_key: AC-7 standard_key: NIST-800-53 @@ -472,12 +554,16 @@ satisfies: narrative: - key: a text: | - '' + '//* + The customer will be responsible for enforcing a limit on consecutive + failed login attempts. + */' - key: b text: | - '' + '//* + The customer will be responsible for taking the FedRAMP required + actions defined by the customer, upon account lockout. + */' - control_key: AC-8 standard_key: NIST-800-53 @@ -486,48 +572,60 @@ satisfies: narrative: - key: a text: | - '' + of the nofication message. + */' - key: b text: | - '' + acknowlegement and move forward. + */' - key: c text: | ' - '' + of the system. + */' - key: 'Req. 1' text: | - '' + conditions must be reviewed and accepted by the FedRAMP JAB. + */' - key: 'Req. 2' text: | - '' + FedRAMP JAB. + */' - key: 'Req. 3' text: | - '' + review and accept the process used to perform the verification. + */' - control_key: AC-10 standard_key: NIST-800-53 @@ -535,10 +633,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanism used to enforce this limit. + */' - control_key: AC-11 standard_key: NIST-800-53 @@ -573,11 +673,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + or conditions. + */' - control_key: AC-14 standard_key: NIST-800-53 @@ -596,14 +698,17 @@ satisfies: narrative: - key: a text: | - '' + access). + */' - key: b text: | - '' + to protect those access control points. + */' - control_key: AC-17 (4) standard_key: NIST-800-53 @@ -660,20 +767,24 @@ satisfies: narrative: - key: a text: | - '' + at all, and refer to AC-2. + */' - key: b text: | - '' + to AC-2. + */' - control_key: AC-17 (9) @@ -682,9 +793,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for tenant applications immediately. + */' - control_key: AC-18 standard_key: NIST-800-53 @@ -707,16 +820,20 @@ satisfies: narrative: - key: 'a' text: | - '' + how usage and connection requirements were created. + */' - key: 'b' text: | - '' + encrption and/or passphrase requirements. + */' - control_key: AC-18 (1) @@ -725,10 +842,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authenticate to the wireless network. + */' - control_key: AC-19 standard_key: NIST-800-53 @@ -737,17 +856,21 @@ satisfies: narrative: - key: 'a' text: | - '' + and applications). + */' - key: 'b' text: | - '' + are authorized to connect to organizational networks (e.g. MDM). + */' - control_key: AC-19 (5) standard_key: NIST-800-53 @@ -755,9 +878,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + if mobile is within scope of your security package. + */' - control_key: AC-20 standard_key: NIST-800-53 @@ -766,19 +891,23 @@ satisfies: narrative: - key: 'a' text: | - '' + systems to which those terms and conditions apply. + */' - key: 'b' text: | - '' + and conditions apply. + */' - control_key: AC-20 (1) standard_key: NIST-800-53 @@ -787,17 +916,21 @@ satisfies: narrative: - key: 'a' text: | - '' + independent assessment). + */' - key: 'b' text: | - '' + information system used to access the customer application. + */' - control_key: AC-20 (2) standard_key: NIST-800-53 @@ -805,11 +938,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + or under what conditions such use may occur. + */' - control_key: AC-21 standard_key: NIST-800-53 @@ -818,16 +953,20 @@ satisfies: narrative: - key: 'a' text: | - '' + required. + */' - key: 'b' text: | - '' + sharing decisions. + */' - control_key: AC-22 standard_key: NIST-800-53 @@ -836,27 +975,35 @@ satisfies: narrative: - key: 'a' text: | - '' + that justify such access. + */' - key: 'b' text: | - '' + provided. + */' - key: 'c' text: | - '' + responsible for this review and the process for signoff. + */' - key: 'd' text: | - '' + nonpublic information. + */' diff --git a/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml b/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml index 7576a56..d868a91 100644 --- a/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml +++ b/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Awareness and Training schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: 'a' text: | - '' + associated controls). + */' - key: 'b' text: | - '' + and providing approval of the updates. + */' - control_key: AT-2 standard_key: NIST-800-53 @@ -33,24 +38,30 @@ satisfies: narrative: - key: 'a' text: | - '' + process for ensuring that all users undergo the required training. + */' - key: 'b' text: | - '' + re-training. + */' - key: 'c' text: | - '' + re-trianing. + */' - control_key: AT-2 (2) standard_key: NIST-800-53 @@ -58,11 +69,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + organizational officials. + */' - control_key: AT-3 standard_key: NIST-800-53 @@ -71,25 +84,31 @@ satisfies: narrative: - key: 'a' text: | - '' + roles. + */' - key: 'b' text: | - '' + for re-training. + */' - key: 'c' text: | - '' + process for ensuring that all users undergo the required re-training. + */' - control_key: AT-4 standard_key: NIST-800-53 @@ -98,13 +117,17 @@ satisfies: narrative: - key: 'a' text: | - '' + the process or system used to monitor and document completion of + training for each user. + */' - key: 'b' text: | - '' + methods by which required retention is achieved. + */' diff --git a/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml b/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml index 80c6285..05b5dbf 100644 --- a/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml +++ b/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Audit and Accountability schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: AU-2 standard_key: NIST-800-53 @@ -33,7 +38,8 @@ satisfies: narrative: - key: a text: | - '' + metadata required by this control is generated. + */' - key: b text: | - '' + determine the selection of auditable events. + */' - key: c text: | - '' + investigation. + */' - key: d text: | - '' + https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/ + html/Security_Guide/sec-configuring_the_audit_service.html + */' - control_key: AU-2 (3) standard_key: NIST-800-53 @@ -75,10 +89,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + reviewed. + */' - control_key: AU-3 standard_key: NIST-800-53 @@ -86,12 +102,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + what customers require their audit records to contain. + */' - control_key: AU-3 (1) standard_key: NIST-800-53 @@ -99,10 +117,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + systems audit generation, and the content that it includes. + */' - control_key: AU-4 standard_key: NIST-800-53 @@ -110,10 +130,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + storage is allocated according to meet customer requirements. + */' - control_key: AU-5 standard_key: NIST-800-53 @@ -122,16 +144,20 @@ satisfies: narrative: - key: a text: | - '' + failure occures. + */' - key: b text: | - '' + will outline the actions taken when an auditing failure occurs. + */' - control_key: AU-6 standard_key: NIST-800-53 @@ -140,29 +166,35 @@ satisfies: narrative: - key: a text: | - '' + reviewed for. + */' - key: b text: | - '' + will outline how the audit review findings are reported. + */' - control_key: AU-6 (1) standard_key: NIST-800-53 covered_by: [] implimentation_status: none narrative: - - text: | - '' + these tools are employed. + */' - control_key: AU-6 (3) standard_key: NIST-800-53 @@ -170,11 +202,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + include processes and tools used to meet these goals. + */' - control_key: AU-7 standard_key: NIST-800-53 @@ -183,11 +217,12 @@ satisfies: narrative: - key: a text: | - ' @@ -204,22 +239,28 @@ satisfies: For aggregate log sizing information, refer to the Aggregate Logging Sizing Guidelines of the Installation and Configuration guide: - https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging_sizing.html + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging_sizing.html For instructions on how to configure aggregate logging, refer to the - Aggregating Container Logs section of the Installation and + Aggregating Container Logs section of the Installation and Configuration guide: - https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging.html >' + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging.html + */' + - key: b text: | - '' + https://www.redhat.com/en/technologies/industries/government/standards + + */' - control_key: AU-7 (1) standard_key: NIST-800-53 @@ -227,11 +268,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + fields. + */' - control_key: AU-8 standard_key: NIST-800-53 @@ -240,17 +283,20 @@ satisfies: narrative: - key: a text: | - '' + '//* + The Linux audit subsystem, upon which OpenShift logs are generated, + uses the system clock by default. This is non-configurable behavior. + */' - key: b text: | - '' + https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/ + 7/html/System_Administrators_Guide/chap-Configuring_the_Date_and_Time. + html#sect-Configuring_the_Date_and_Time-timedatectl-Time_Zone + */' - control_key: AU-8 (1) standard_key: NIST-800-53 @@ -267,15 +316,18 @@ satisfies: narrative: - key: a text: | - '' + clocks are synced with. + */' - key: b text: | - ' > iburst - For detailed NTP configuration, reference the Red Hat Enterprise Linu + For detailed NTP configuration, reference the Red Hat Enterprise Linux 7 System Administrators guide: - https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/System_Administrators_Guide/s1-Configure_NTP.html >' + https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/ + 7/html/System_Administrators_Guide/s1-Configure_NTP.html + */' + - key: 'Req.1' text: | - '' + are used by the system. + */' - key: 'Req. 2' text: | 'Customers are responsible for syncronizing the system clocks of - network computers that run operating systems other than Windows to the + network computers that run operating systems other than Windows to the Windows Domain Controler emulator, or the same time source for that server. A successful conttrol response will discuss which Internet time - services are for non-Windows systems.>' + services are for non-Windows systems. + */' - control_key: AU-9 standard_key: NIST-800-53 @@ -310,11 +368,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + control response will discuss the way that audit information and tools + are protected. This can include how access is controlled to audit + information and tools. + */' - control_key: AU-9 (2) standard_key: NIST-800-53 @@ -322,11 +382,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + include a centralized repository for all audit records. + */' - control_key: AU-9 (4) standard_key: NIST-800-53 @@ -334,11 +396,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + this functionality is restricted to, and how this is controlled. + */' - control_key: AU-11 standard_key: NIST-800-53 @@ -346,15 +410,17 @@ satisfies: implimentation_status: none narrative: - text: | - ' ' + Enterprise Linux audit daemon. If using a central or 3rd party + logging solution, this may likely need to be configured in that tool. + */' - control_key: AU-12 standard_key: NIST-800-53 @@ -363,26 +429,32 @@ satisfies: narrative: - key: a text: | - '' + defined in AU-2. + */' - key: b text: | - ' ' + /etc/audit/rules.d/openshift.rules + */' - key: c text: | - '' + the requirements defined in AU-2 and AU-3. + */' diff --git a/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml b/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml index 065f7da..223e71b 100644 --- a/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml +++ b/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Security Assessment and Authorization schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + and associated controls). + */' - key: b text: | - '' + providing approval of the updates. + */' - control_key: CA-2 standard_key: NIST-800-53 @@ -33,33 +38,41 @@ satisfies: narrative: - key: a text: | - '' + 3PAO. + */' - key: b text: | - '' + security and compliance posture of the system. + */' - key: c text: | - '' + and risks associated with the system). + */' - key: d text: | - '' + managing the package for submission and engaging with the PMO. + */' - control_key: CA-2 (1) standard_key: NIST-800-53 @@ -67,10 +80,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + Assessment Plan and Security Assessment Report (see CA-2). + */' - control_key: CA-2 (2) standard_key: NIST-800-53 @@ -78,13 +93,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + chooses to perform. + */' - control_key: CA-2 (3) standard_key: NIST-800-53 @@ -92,11 +109,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for approval. + */' - control_key: CA-3 standard_key: NIST-800-53 @@ -105,28 +124,34 @@ satisfies: narrative: - key: a text: | - '' + Interconnection System Agreements. + */' - key: b text: | - '' + above. + */' - key: c text: | - '' + documentation. + */' - control_key: CA-3 (3) standard_key: NIST-800-53 @@ -134,11 +159,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + policy considerations. + */' - control_key: CA-3 (5) standard_key: NIST-800-53 @@ -146,13 +173,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + sections of this Security Plan. + */' - control_key: CA-5 standard_key: NIST-800-53 @@ -161,20 +190,24 @@ satisfies: narrative: - key: a text: | - '' + creating and tracking POA&M items. + */' - key: b text: | - '' + remediated. + */' - control_key: CA-6 standard_key: NIST-800-53 @@ -183,24 +216,30 @@ satisfies: narrative: - key: a text: | - '' - - key: b + address how an appropriate authorizing official is selected. + */' + - key: b text: | - '' + decision can be made. + */' - key: c text: | - '' + process and engaging with FedRAMP for renewal of authorization. + */' - control_key: CA-7 standard_key: NIST-800-53 @@ -209,69 +248,89 @@ satisfies: narrative: - key: a text: | - '' + to demonstrate the ongoing security of the system. + */' - key: b text: | - '' + compatible with the frequency of POA&M reporting specified in CA-5. + */' - key: c text: | - '' + well as the methodology used for testing. + */' - key: d text: | - '' + or additions to related reporting, such as POA&M reporting. + */' - key: e text: | - '' + response will need to address tools or processes used to perform + correlation and analysis. + */' - key: f text: | - '' + system, a POA&M item should be opened). + */' - key: g text: | - '' + POA&M reporting specified in CA-5. + */' - key: 'Req. 1' text: | - '' + '//* + The customer will be responsible for performing vulnerability scans + of operating systems at least monthly. See also RA-5. + */' - key: 'Req. 2' text: | - '' + '//* + The customer will be responsible for performing vulnerability scans + of databases and web applications at least monthly. See also RA-5. + */' - key: 'Req. 3' text: | - '' + CA-2(2). + */' - control_key: CA-7 (1) standard_key: NIST-800-53 @@ -279,14 +338,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + system. + */' - control_key: CA-8 standard_key: NIST-800-53 @@ -294,12 +355,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for this test, etc.). + */' - control_key: CA-8 (1) standard_key: NIST-800-53 @@ -307,9 +370,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will need to address how independence is ensured. + */' - control_key: CA-9 standard_key: NIST-800-53 @@ -318,17 +383,20 @@ satisfies: narrative: - key: a text: | - '' + components or classes of components. + */' - key: b text: | - '' - + is created. + */' diff --git a/OpenShift-v3/policies/CM-Configuration_Management/component.yaml b/OpenShift-v3/policies/CM-Configuration_Management/component.yaml index c276d86..63869ef 100644 --- a/OpenShift-v3/policies/CM-Configuration_Management/component.yaml +++ b/OpenShift-v3/policies/CM-Configuration_Management/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Configuration Management schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + approval of the updates + */' - control_key: CM-2 standard_key: NIST-800-53 @@ -32,11 +37,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + maintained. + */' - control_key: CM-2 (1) standard_key: NIST-800-53 @@ -45,23 +52,29 @@ satisfies: narrative: - key: a text: | - '' + baseline configuration is reviewed and updated. + */' - key: b text: | - '' + baseline configuration when required by the JAB. + */' - key: c text: | - '' + configuration as a part of installations and upgrades. + */' - control_key: CM-2(2) standard_key: NIST-800-53 @@ -69,11 +82,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + help maintain the baseline configurations of the information system. + */' - control_key: CM-2 (3) standard_key: NIST-800-53 @@ -81,11 +96,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + version. + */' - control_key: CM-2 (7) standard_key: NIST-800-53 @@ -106,55 +123,69 @@ satisfies: narrative: - key: a text: | - '' + to determine configuration controlled changes. + */' - key: b text: | - '' + how the security impact of these changes is considered. + */' - key: c text: | - '' + example, what tools are used and what information is documented. + */' - key: d text: | - '' + implemented after approval. + */' - key: e text: | - '' + records are maintained. + */' - key: f text: | - '' + these changes are reviewed. + */' - key: g text: | - '' + services will be coordinated and overseen. + */' - control_key: CM-4 standard_key: NIST-800-53 @@ -162,11 +193,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + include any analysis and testing done prior to implementation. + */' - control_key: CM-5 standard_key: NIST-800-53 @@ -174,13 +207,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + are approved for access. + */' - control_key: CM-5 (1) standard_key: NIST-800-53 @@ -188,10 +223,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + how this access is audited. + */' - control_key: CM-5 (3) standard_key: NIST-800-53 @@ -203,7 +240,7 @@ satisfies: packages of the operating system and OpenShift, the yum gpgcheck option must be enabled. This is accomplished by applying the following Red Hat CCEs: - + - CCE-26989-4: Ensure gpgcheck Enabled in Main Yum Configuration - CCE-26957-1: Ensure Red Hat GPG Key Installed - CCE-26876-3: Ensure gpgcheck Enabled for All Yum Package @@ -219,19 +256,23 @@ satisfies: narrative: - key: a text: | - '' + go through. + */' - key: b text: | - '' + to change the information system within the production environment. + */' - control_key: CM-6 standard_key: NIST-800-53 @@ -240,36 +281,44 @@ satisfies: narrative: - key: a text: | - '' + while still allowing the system to operate. + */' - key: b text: | - '' + or documentation followed. + */' - key: c text: | - '' + deviations. + */' - key: d text: | - '' + track and approve changes. + */' - control_key: CM-6 (1) standard_key: NIST-800-53 @@ -277,12 +326,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + Directory Group Policy Objects to manage security settings. + */' - control_key: CM-7 standard_key: NIST-800-53 @@ -291,19 +342,23 @@ satisfies: narrative: - key: a text: | - '' + are provided. + */' - key: b text: | - '' + or prohibit, using USGCB guidance. + */' - control_key: CM-7 (1) standard_key: NIST-800-53 @@ -312,17 +367,21 @@ satisfies: narrative: - key: a text: | - '' + how often functions, ports, protocols, and services are reviewed. + */' - key: b text: | - '' + process are disabled. + */' - control_key: CM-7 (2) standard_key: NIST-800-53 @@ -330,7 +389,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + said trusted registries to satisfy this control. + */' - control_key: CM-7 (5) standard_key: NIST-800-53 @@ -348,7 +409,8 @@ satisfies: narrative: - key: a text: | - '' + https://access.redhat.com/articles/2750891 + */' - key: b text: | - '' + information system. + */' - key: c text: | - '' + least annually and when changes are made. + */' - control_key: CM-8 standard_key: NIST-800-53 @@ -381,21 +448,25 @@ satisfies: narrative: - key: a text: | - '' + customer has deemed necessary to achieve effective accountability. + */' - key: b text: | - '' + discrepancies found. + */' - control_key: CM-8 (1) standard_key: NIST-800-53 @@ -403,11 +474,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + events change the inventory. + */' - control_key: CM-8 (3) standard_key: NIST-800-53 @@ -416,18 +489,22 @@ satisfies: narrative: - key: a text: | - '' + on the information system. + */' - key: b text: | - '' + to that system. + */' - control_key: CM-8 (5) standard_key: NIST-800-53 @@ -435,11 +512,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + in multiple system inventories. + */' - control_key: CM-9 standard_key: NIST-800-53 @@ -448,37 +527,45 @@ satisfies: narrative: - key: a text: | - '' + and procedures. + */' - key: b text: | - '' + manage changes to the system. + */' - key: c text: | - '' + items, and the process used to manage them. + */' - key: d text: | - '' + stored, and controls in place to prevent unauthorized access. + */' - control_key: CM-10 standard_key: NIST-800-53 @@ -487,25 +574,31 @@ satisfies: narrative: - key: a text: | - '' + to the customers acceptable use policy. + */' - key: b text: | - '' + a description of how these licenses are tracked and protected. + */' - key: c text: | - '' + acceptable use policies in place. + */' - control_key: CM-10 (1) standard_key: NIST-800-53 @@ -513,9 +606,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + describe any restrictions that the organization has in place. + */' - control_key: CM-11 standard_key: NIST-800-53 @@ -524,18 +619,24 @@ satisfies: narrative: - key: a text: | - '' + for installation of software by users. + */' - key: b text: | - '' + references to configuration control processes. + */' - key: c text: | - '' + used to monitor compliance of installation policies. + */' diff --git a/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml b/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml index 3d5c18e..aedb2a2 100644 --- a/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml +++ b/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Contingency Planning schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: CP-2 standard_key: NIST-800-53 @@ -33,50 +38,64 @@ satisfies: narrative: - key: a text: | - '' + to perform these tasks. + */' - key: b text: | - '' + and the means by which the customer ensures that all key personnel + receive the contingency plan. + */' - key: c text: | - '' + event of a security incident. + */' - key: d text: | - '' + outline how reviews are initiated, performed, and signed off on. + */' - key: e text: | - '' + how updates are proposed, implemented, and approved. + */' - key: f text: | - '' + contingency plan. + */' - key: g text: | - '' + safeguards that are in place to protect the contingency plan. + */' - control_key: CP-2 (1) standard_key: NIST-800-53 @@ -84,11 +103,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + updates to the contingency plan affect related plans and vice versa. + */' - control_key: CP-2 (2) standard_key: NIST-800-53 @@ -96,10 +117,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + alternate region. + */' - control_key: CP-2 (3) standard_key: NIST-800-53 @@ -107,11 +130,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + details how mission functions will be resumed. + */' - control_key: CP-2 (8) standard_key: NIST-800-53 @@ -119,13 +144,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + from your infrastruture provider. + */' - control_key: CP-3 standard_key: NIST-800-53 @@ -133,11 +160,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + training attendance is tracked and enforced. + */' - control_key: CP-4 standard_key: NIST-800-53 @@ -146,7 +175,8 @@ satisfies: narrative: - key: a text: | - '' + + https://azure.microsoft.com/en-us/documentation/articles/ + sql-database-disaster-recovery-drills/ + */' - key: b text: | - '' + format and content of reporting on the results. + */' - key: c text: | - '' + for those actions. + */' - control_key: CP-4 (1) standard_key: NIST-800-53 @@ -175,11 +211,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + communicated so that corrective actions may be taken as needed. + */' - control_key: CP-6 standard_key: NIST-800-53 @@ -188,17 +226,21 @@ satisfies: narrative: - key: a text: | - '' + Azure. + */' - key: b text: | - '' + site. + */' - control_key: CP-6 (1) standard_key: NIST-800-53 @@ -206,9 +248,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + susceptibility to the same threats. + */' - control_key: CP-6 (3) standard_key: NIST-800-53 @@ -216,11 +260,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + providers. + */' - control_key: CP-7 standard_key: NIST-800-53 @@ -229,22 +275,28 @@ satisfies: narrative: - key: a text: | - '' + most IaaS providers. + */' - key: b text: | - '' + from organizational processes. + */' - key: c text: | - '' + to that of the primary site. + */' - control_key: CP-7 (1) standard_key: NIST-800-53 @@ -252,13 +304,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + inherited from organizational processes. + */' - control_key: CP-7 (2) standard_key: NIST-800-53 @@ -266,11 +320,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + processes. + */' - control_key: CP-7 (3) standard_key: NIST-800-53 @@ -278,10 +334,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + is often inherited from organizational, IaaS, or PaaS providers. + */' - control_key: CP-8 standard_key: NIST-800-53 @@ -289,12 +347,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + IaaS, or PaaS providers. + */' - control_key: CP-8 (1) standard_key: NIST-800-53 @@ -303,18 +363,22 @@ satisfies: narrative: - key: a text: | - '' + control is often inherited from IaaS and PaaS providers. + */' - key: b text: | - '' + This control is often inherited from IaaS and PaaS providers. + */' - control_key: CP-8 (2) standard_key: NIST-800-53 @@ -322,10 +386,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + control is often inherited from IaaS and PaaS providers. + */' - control_key: CP-9 standard_key: NIST-800-53 @@ -334,42 +400,51 @@ satisfies: narrative: - key: a text: | - '' + '//* + The customer will be responsible for conducting daily incremental and + weekly full backups of user-level information contained in the + information system. Additional FedRAMP requirements and guidance include + maintaining at least three backup copies of user-level information (at + least one of which is available online) or provides an equivalent + alternative. A successful control response will detail how backups of + user-level information occures, and how three backup copies are + maintained. + */' - key: b text: | - '' + maintaining at least three backup copies of user-level information (at + least one of which is available online) or provides an equivalent + alternative. A successful control response will detail how backups of + user-level information occures, and how three backup copies are + maintained. + */' - key: c text: | - '' + are maintained. + */' - key: d text: | - '' + check. + */' - control_key: CP-9 (1) standard_key: NIST-800-53 @@ -377,9 +452,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + integrity. + */' - control_key: CP-9 (3) standard_key: NIST-800-53 @@ -387,8 +464,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + The customer will be responsible for enabling geo-replicated backups + within their subscriptions, which will allow restoration from backup. + */' - control_key: CP-10 standard_key: NIST-800-53 @@ -396,9 +475,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + disruption, compromise, or failure. + */' - control_key: CP-10 (2) standard_key: NIST-800-53 @@ -406,7 +487,9 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the case of failed or conflicting transactions. + */' diff --git a/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml b/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml index f19de83..b518c2c 100644 --- a/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml +++ b/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Identification and Authentication schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + providing approval of the updates. + */' - control_key: IA-2 standard_key: NIST-800-53 @@ -32,7 +37,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + sync those LDAP records with internal OpenShift Container Platform + records, enabling you to manage your groups in one place. OpenShift + Container Platform currently supports group sync with LDAP servers using + three common schemas for defining group membership: RFC 2307, Active + Directory, and augmented Active Directory. For additional information, + refer to “Syncing Groups with LDAP” in the OpenShift Installation and + Configuration guide: + + https://docs.openshift.com/container-platform/3.3/install_config/ + syncing_groups_with_ldap.html + */' - control_key: IA-2 (1) standard_key: NIST-800-53 @@ -70,7 +80,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + https://docs.openshift.com/container-platform/3.3/install_config/ + configuring_authentication.html#RequestHeaderIdentityProvider + */' - control_key: IA-2 (2) standard_key: NIST-800-53 @@ -93,12 +106,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + access to non-privileged accounts. + */' - control_key: IA-2 (3) standard_key: NIST-800-53 @@ -126,14 +141,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + It is recommended to use Active Directory if possible. + */' - control_key: IA-2 (11) standard_key: NIST-800-53 @@ -141,12 +158,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + solution. + */' - control_key: IA-2 (12) standard_key: NIST-800-53 @@ -154,13 +173,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + Federation Services (ADFS). + */' - control_key: IA-3 standard_key: NIST-800-53 @@ -168,14 +189,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will provide identity of the machines. + */' - control_key: IA-4 standard_key: NIST-800-53 @@ -184,38 +207,48 @@ satisfies: narrative: - key: a text: | - '' + authorizing each type. + */' - key: b text: | - '' + will need to address all identifier types and the means by which + uniqueness of identifier is assured. + */' - key: c text: | - '' + to indivuals, groups, roles, or devices. + */' - key: d text: | - '' + types of identifiers in use and the means by which reuse is + prevented. + */' - key: e text: | - '' + identifier types and the means by which disabling takes place. + */' - control_key: IA-4 (4) standard_key: NIST-800-53 @@ -223,12 +256,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + into the individual identifier. + */' - control_key: IA-5 standard_key: NIST-800-53 @@ -237,79 +272,99 @@ satisfies: narrative: - key: a text: | - '' + identification card). + */' - key: b text: | - '' + initial content is established for each. + */' - key: c text: | - '' + for each. + */' - key: d text: | - '' + procedures established for each. + */' - key: e text: | - '' + process by which changing the default content is enforced. + */' - key: f text: | - '' + lifetime restrictions and reuse conditions for each. + */' - key: g text: | - '' + each, and the mechanism by which this cadence is enforced. + */' - key: h text: | - '' + authenticators to unauthorized personnel. + */' - key: i text: | - '' + authenticators to unauthorized personnel. + */' - key: j text: | - '' + to perform the change. + */' - control_key: IA-5 (1) standard_key: NIST-800-53 @@ -318,43 +373,55 @@ satisfies: narrative: - key: a text: | - '' + to enforce complexity. + */' - key: b text: | - '' + to address the mechanism used to enforce the required change. + */' - key: c text: | - '' + cryptographic protection of passwords. + */' - key: d text: | - '' + the mechanism used to enforce lifetime restrictions. + */' - key: e text: | - '' + the mechanism used to enforce the reuse requirement. + */' - key: f text: | - '' + change requirement. + */' - control_key: IA-5 (2) standard_key: NIST-800-53 @@ -363,32 +430,40 @@ satisfies: narrative: - key: a text: | - '' + to address the mechanism used to validate certificates. + */' - key: b text: | - '' + used for this purpose. A successful control response will need to + address the mechanism used to restrict access to private keys. + */' - key: c text: | - '' + certificates and accounts. + */' - key: d text: | - '' + populate the revocation data. + */' - control_key: IA-5 (3) standard_key: NIST-800-53 @@ -396,12 +471,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorization for distribution of the authenticators. + */' - control_key: IA-5 (4) standard_key: NIST-800-53 @@ -409,11 +486,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + enforce password strength requirements. + */' - control_key: IA-5 (6) standard_key: NIST-800-53 @@ -421,10 +500,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + tools used to protect authenticators. + */' - control_key: IA-5 (7) standard_key: NIST-800-53 @@ -432,10 +513,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanisms. + */' - control_key: IA-5 (11) standard_key: NIST-800-53 @@ -443,12 +526,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + requirements. + */' - control_key: IA-6 standard_key: NIST-800-53 @@ -456,14 +541,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + configured to be out of compliance with this requirement. + */' - control_key: IA-7 standard_key: NIST-800-53 @@ -471,14 +558,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + automatically converts incoming authentication requests to HTTPS. + */' - control_key: IA-8 standard_key: NIST-800-53 @@ -486,12 +575,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + identification and authentication for organizational users. + */' - control_key: IA-8 (1) standard_key: NIST-800-53 @@ -499,13 +590,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + through Active Directory Federation Services (ADFS). + */' - control_key: IA-8 (2) standard_key: NIST-800-53 @@ -513,14 +606,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + (ADFS). + */' - control_key: IA-8 (3) standard_key: NIST-800-53 @@ -528,14 +623,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + (ADFS). + */' - control_key: IA-8 (4) standard_key: NIST-800-53 @@ -543,11 +640,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + (ADFS). + */' diff --git a/OpenShift-v3/policies/IR-Incident_Response/component.yaml b/OpenShift-v3/policies/IR-Incident_Response/component.yaml index 98fd460..3329b22 100644 --- a/OpenShift-v3/policies/IR-Incident_Response/component.yaml +++ b/OpenShift-v3/policies/IR-Incident_Response/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Incident Response schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: IR-2 standard_key: NIST-800-53 @@ -33,27 +38,33 @@ satisfies: narrative: - key: a text: | - '' + enforced. + */' - key: b text: | - '' + attendance. + */' - key: c text: | - '' + training attendance is tracked and enforced. + */' - control_key: IR-3 standard_key: NIST-800-53 @@ -61,7 +72,8 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + of incident response plans. + */' - control_key: IR-3 (2) standard_key: NIST-800-53 @@ -78,12 +91,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + needed. + */' - control_key: IR-4 standard_key: NIST-800-53 @@ -92,7 +107,8 @@ satisfies: narrative: - key: a text: | - '' + for each step. + */' - key: b text: | - '' + delays in service restoration). + */' - key: c text: | - '' + reviewing and signing off on changes. + */' - control_key: IR-4 (1) standard_key: NIST-800-53 @@ -125,11 +146,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + place within the overall incident handling process. + */' - control_key: IR-5 standard_key: NIST-800-53 @@ -137,11 +160,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + used in IR-4(1). + */' - control_key: IR-6 standard_key: NIST-800-53 @@ -150,20 +175,24 @@ satisfies: narrative: - key: a text: | - '' + used for reporting. + */' - key: b text: | - '' + notifications. + */' - control_key: IR-6 (1) standard_key: NIST-800-53 @@ -171,11 +200,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + used for reporting of incidents. + */' - control_key: IR-7 standard_key: NIST-800-53 @@ -183,11 +214,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + discuss how users are notified of the existence of these resources. + */' - control_key: IR-7 (1) standard_key: NIST-800-53 @@ -195,11 +228,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + information and support resources provided via each mechanism. + */' - control_key: IR-7 (2) standard_key: NIST-800-53 @@ -208,7 +243,8 @@ satisfies: narrative: - key: a text: | - '' + capability. + */' - key: b text: | - '' + this identification is communicated. + */' - control_key: IR-8 standard_key: NIST-800-53 @@ -232,44 +271,56 @@ satisfies: narrative: - key: a text: | - '' + the requirements are met. + */' - key: b text: | - '' + distribution list. + */' - key: c text: | - '' + individuals responsible for performing the review. + */' - key: d text: | - '' + for approval of updates. + */' - key: e text: | - '' + identified in IR-8(b). + */' - key: f text: | - '' + safeguards that are in place to protect the incident response plan. + */' - control_key: IR-9 standard_key: NIST-800-53 @@ -278,43 +329,55 @@ satisfies: narrative: - key: a text: | - '' + or processes used to identify the specific information involved. + */' - key: b text: | - '' + notified. + */' - key: c text: | - '' + each type. + */' - key: d text: | - '' + eradication is carried out and confirmed. + */' - key: e text: | - '' + investigative process used to make this determination. + */' - key: f text: | - '' + identifying and performing the actions. + */' - control_key: IR-9 (1) standard_key: NIST-800-53 @@ -322,12 +385,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + address the rationale for the selection. + */' - control_key: IR-9 (2) standard_key: NIST-800-53 @@ -335,12 +400,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + the frequency at which training is provided. + */' - control_key: IR-9 (3) standard_key: NIST-800-53 @@ -348,12 +415,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + processes required to employ those alternate means. + */' - control_key: IR-9 (4) standard_key: NIST-800-53 @@ -361,10 +430,12 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + (following information spillage incidents). + */' diff --git a/OpenShift-v3/policies/MA-Maintenance/component.yaml b/OpenShift-v3/policies/MA-Maintenance/component.yaml index 61067db..17e4ed7 100644 --- a/OpenShift-v3/policies/MA-Maintenance/component.yaml +++ b/OpenShift-v3/policies/MA-Maintenance/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Maintenance schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + approval of the updates. + */' - control_key: MA-2 standard_key: NIST-800-53 @@ -33,45 +38,57 @@ satisfies: narrative: - key: a text: | - '' + response will outline maintenance procedures. + */' - key: b text: | - '' + accomplished through lifecycle management tools, e.g. Remedy + */' - key: c text: | - '' + deployments. + */' - key: d text: | - '' + from IaaS providers and not applicable to OpenShift deployments. + */' - key: e text: | - '' + properly following maintenance or repair actions. + */' - key: f text: | - '' + maintenance records. A successful control response will outline the + process for including such metadata in maintenance records. + */' - control_key: MA-3 standard_key: NIST-800-53 @@ -79,9 +96,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + The customer will be responsible for approving, controlling, and + monitoring information system maintenance records. A successful + control response will document this process. + */' - control_key: MA-3 (1) standard_key: NIST-800-53 @@ -89,10 +108,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will document this process. + */' - control_key: MA-3 (2) standard_key: NIST-800-53 @@ -100,10 +121,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + documents this process. + */' - control_key: MA-3 (3) standard_key: NIST-800-53 @@ -111,14 +134,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorizes removal of equipment from the facility + */' - control_key: MA-4 standard_key: NIST-800-53 @@ -127,7 +152,8 @@ satisfies: narrative: - key: a text: | - '' + and how those activities are tracked. + */' - key: b text: | - '' + performing maintenance and diagnostic activities. + */' - key: c text: | - '' + multifactor authentication. + */' - key: d text: | - '' + as well as the contents of those records. + */' - key: e text: | - '' + monitoring and enforcement of the disconnectionr requirement. + */' - control_key: MA-4 (2) standard_key: NIST-800-53 @@ -170,12 +205,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + udner what circumstances connections must be terminated. + */' - control_key: MA-5 standard_key: NIST-800-53 @@ -184,24 +221,30 @@ satisfies: narrative: - key: a text: | - '' + document this process and where the records are kept. + */' - key: b text: | - '' + signing off on this access. + */' - key: c text: | - '' + how technical competence is established. + */' - control_key: MA-5 (1) standard_key: NIST-800-53 @@ -210,7 +253,8 @@ satisfies: narrative: - key: a text: | - '' + disconnected from the system and secured. + */' - key: b text: | - '' + data residing on the informarion system. + */' - control_key: MA-6 standard_key: NIST-800-53 @@ -234,6 +281,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + to minimize production impact. + */' diff --git a/OpenShift-v3/policies/MP-Media_Protection/component.yaml b/OpenShift-v3/policies/MP-Media_Protection/component.yaml index c2743ef..783d766 100644 --- a/OpenShift-v3/policies/MP-Media_Protection/component.yaml +++ b/OpenShift-v3/policies/MP-Media_Protection/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Media Protection schema_version: 3.0.0 @@ -9,7 +10,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-1 goes here. + Narrative text on how product can be configured against MP-1. This answer can be multi-line. @@ -19,7 +20,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-2 goes here. + Narrative text on how product can be configured against MP-2. This answer can be multi-line. @@ -29,7 +30,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-3 goes here. + Narrative text on how product can be configured against MP-3. This answer can be multi-line. @@ -39,7 +40,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-4 goes here. + Narrative text on how product can be configured against MP-4. This answer can be multi-line. @@ -49,7 +50,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-5 goes here. + Narrative text on how product can be configured against MP-5. This answer can be multi-line. @@ -59,7 +60,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-5 (4) goes here. + Narrative text on how product can be configured against MP-5 (4). This answer can be multi-line. @@ -69,7 +70,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-6 goes here. + Narrative text on how product can be configured against MP-6. This answer can be multi-line. @@ -79,7 +80,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-6 (2) goes here. + Narrative text on how product can be configured against MP-6 (2). This answer can be multi-line. @@ -89,7 +90,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-7 goes here. + Narrative text on how product can be configured against MP-7. This answer can be multi-line. @@ -99,6 +100,6 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-7 (1) goes here. + Narrative text on how product can be configured against MP-7 (1). This answer can be multi-line. diff --git a/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml b/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml index f391d07..23b1edd 100644 --- a/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml +++ b/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml @@ -1 +1,16 @@ -# Nothing here - no Physical Controls associated to OpenShift +--- +documentation_complete: false +name: Planning +schema_version: 3.0.0 +satisfies: + +- control_key: PE-1 + standard_key: NIST-800-53 + covered_by: [] + implimentation_status: none + narrative: + - key: a + text: | + '//* + Text goes here - testing + */' diff --git a/OpenShift-v3/policies/PL-Planning/component.yaml b/OpenShift-v3/policies/PL-Planning/component.yaml index 0e363ef..133b7ca 100644 --- a/OpenShift-v3/policies/PL-Planning/component.yaml +++ b/OpenShift-v3/policies/PL-Planning/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Planning schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + approval of the updates. + */' - control_key: PL-2 standard_key: NIST-800-53 @@ -33,45 +38,55 @@ satisfies: narrative: - key: a text: | - '' + infrastructure providers SSP. + */' - key: b text: | - '' + appropriately. + */' - key: c text: | - '' + individuals responsible for review. + */' - key: d text: | - '' + the process for approval of any updates. + */' - key: e text: | - '' + are in place to protect the system security plan. + */' - control_key: PL-2 (3) standard_key: NIST-800-53 @@ -79,13 +94,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + consulted regarding such activities. + */' - control_key: PL-4 standard_key: NIST-800-53 @@ -94,29 +111,37 @@ satisfies: narrative: - key: a text: | - '' + available to users requiring access to the system. + */' - key: b text: | - '' + signatures are obtained. + */' - key: c text: | - '' + approving the final version. + */' - key: d text: | - '' + are not obtained in a timely manner. + */' - control_key: PL-4 (1) standard_key: NIST-800-53 @@ -124,11 +149,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + relevant portions of the rules of behavior. + */' - control_key: PL-8 standard_key: NIST-800-53 @@ -137,25 +164,31 @@ satisfies: narrative: - key: a text: | - '' + in the introductory sections of this system security plan. + */' - key: b text: | - '' + managing updates, and approving the final version. + */' - key: c text: | - '' + individuals or roles responsible for that alignment. + */' diff --git a/OpenShift-v3/policies/PS-Personnel_Security/component.yaml b/OpenShift-v3/policies/PS-Personnel_Security/component.yaml index 794205e..851a8d6 100644 --- a/OpenShift-v3/policies/PS-Personnel_Security/component.yaml +++ b/OpenShift-v3/policies/PS-Personnel_Security/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Personnel Security schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: PS-2 standard_key: NIST-800-53 @@ -33,26 +38,32 @@ satisfies: narrative: - key: a text: | - '' + to certain types of data, etc.). + */' - key: b text: | - '' + associated with each risk designation. + */' - key: c text: | - '' + designations, and providing approval of any changes. + */' - control_key: PS-3 standard_key: NIST-800-53 @@ -61,16 +72,20 @@ satisfies: narrative: - key: a text: | - '' + requirements established in PS-2. + */' - key: b text: | - '' + removing access if rescreening is not completed in a timely manner. + */' - control_key: PS-3 (3) standard_key: NIST-800-53 @@ -78,12 +93,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorization of access + */' - control_key: PS-4 standard_key: NIST-800-53 @@ -92,45 +109,57 @@ satisfies: narrative: - key: a text: | - '' + completing the request. + */' - key: b text: | - '' + terminating or revoking each. + */' - key: c text: | - '' + the interviews. + */' - key: d text: | - '' + is retrieved. + */' - key: e text: | - '' + maximum retention periods. + */' - key: f text: | - '' + by which notification happens. + */' - control_key: PS-5 standard_key: NIST-800-53 @@ -139,32 +168,40 @@ satisfies: narrative: - key: a text: | - '' + the results of reviews. + */' - key: b text: | - '' + actions, and timeframes for initiation of those actions. + */' - key: c text: | - '' + change, and any technical means of enforcement of the change. + */' - key: d text: | - '' + occurs. + */' - control_key: PS-6 standard_key: NIST-800-53 @@ -173,26 +210,32 @@ satisfies: narrative: - key: a text: | - '' + are used. + */' - key: b text: | - '' + process for approval of any changes. + */' - key: c text: | - '' + a timely manner. + */' - control_key: PS-7 standard_key: NIST-800-53 @@ -201,35 +244,45 @@ satisfies: narrative: - key: a text: | - '' + for notifying third-party providers of the requirements. + */' - key: b text: | - '' + agreement to the requirements and enforcing the requirements. + */' - key: c text: | - '' + it with the providers. + */' - key: d text: | - '' + notification within the same day. + */' - key: e text: | - '' + mechanisms used for monitoring, and consequences of non-compliance. + */' - control_key: PS-8 standard_key: NIST-800-53 @@ -238,15 +291,19 @@ satisfies: narrative: - key: a text: | - '' + specific measures that may be enforced for each. + */' - key: b text: | - '' + indivual sanctioned and the reason for the sanction). + */' diff --git a/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml b/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml index bc14d59..3f88950 100644 --- a/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml +++ b/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Risk Assessment schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: RA-2 standard_key: NIST-800-53 @@ -33,7 +38,8 @@ satisfies: narrative: - key: a text: | - '' + Types of Information and Inforation Systems to Security Categories. + */' - key: b text: | - '' + analysis, and input from stakeholders and organizational officials. + */' - key: c text: | - '' + designated representative for review and approval. + */' - control_key: RA-3 standard_key: NIST-800-53 @@ -62,11 +73,12 @@ satisfies: narrative: - key: a text: | - '' + assessment. + */' - key: b text: | - '' + the initial risk assessment (see CA-2). + */' - key: c text: | - '' + well as any actions taken in response to risk assessment results. + */' - key: d text: | - '' + involved and the means of distribution of results. + */' - key: e text: | - '' + other documentation). + */' - control_key: RA-5 standard_key: NIST-800-53 @@ -117,43 +138,53 @@ satisfies: narrative: - key: a text: | - '' + scan the system on an annual basis. + */' - key: b text: | - '' + Exposures (CVE) values). + */' - key: c text: | - '' + analysis, as well as criteria used in performing the analysis. + */' - key: d text: | - '' + met. + */' - key: e text: | - '' + each stakeholder. + */' - control_key: RA-5 (1) standard_key: NIST-800-53 @@ -161,12 +192,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for each. + */' - control_key: RA-5 (2) standard_key: NIST-800-53 @@ -174,11 +207,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + initiating a new scan if the required update does not occur. + */' - control_key: RA-5 (3) standard_key: NIST-800-53 @@ -186,11 +221,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + provide sufficient breadth and depth of coverage. + */' - control_key: RA-5 (5) standard_key: NIST-800-53 @@ -198,11 +235,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorization is validated during the analysis of scan results. + */' - control_key: RA-5 (6) standard_key: NIST-800-53 @@ -210,10 +249,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + and the metrics employed in scan result analysis. + */' - control_key: RA-5 (8) standard_key: NIST-800-53 @@ -221,8 +262,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + data with vulnerability scan results. + */' diff --git a/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml b/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml index 6b3c6d3..5688c0e 100644 --- a/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml +++ b/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: System and Services Acquisition schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: SA-2 standard_key: NIST-800-53 @@ -33,24 +38,30 @@ satisfies: narrative: - key: a text: | - '' + integrated into mission/business planning. + */' - key: b text: | - '' + has been incorporated into financial planning processes. + */' - key: c text: | - '' + organization. + */' - control_key: SA-3 standard_key: NIST-800-53 @@ -59,31 +70,39 @@ satisfies: narrative: - key: a text: | - '' + plans. + */' - key: b text: | - '' + stages of the information systems lifecycle. + */' - key: c text: | - '' + information. + */' - key: d text: | - '' + NIST Risk Management Framework, or an agency-specific derivative. + */' - control_key: SA-4 standard_key: NIST-800-53 @@ -92,61 +111,75 @@ satisfies: narrative: - key: a text: | - '' + of the contracts. + */' - key: b text: | - '' + of the contracts. + */' - key: c text: | - '' + of the contracts. + */' - key: d text: | - '' + of the contracts. + */' - key: e text: | - '' + creation of the contracts. + */' - key: f text: | - '' + of the contracts. + */' - key: g text: | - '' + contracts. + */' - control_key: SA-4 (1) standard_key: NIST-800-53 @@ -154,11 +187,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + procurement language. + */' - control_key: SA-4 (2) standard_key: NIST-800-53 @@ -166,13 +201,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + into procurement language. + */' - control_key: SA-4 (8) standard_key: NIST-800-53 @@ -180,11 +217,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + by the customer as part of these continuous monitoring activities. + */' - control_key: SA-4 (9) standard_key: NIST-800-53 @@ -192,11 +231,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + which this requirement is enforced. + */' - control_key: SA-4 (10) standard_key: NIST-800-53 @@ -204,13 +245,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + signature. + */' - control_key: SA-5 standard_key: NIST-800-53 @@ -219,37 +262,47 @@ satisfies: narrative: - key: a text: | - '' + outlined in the control + */' - key: b text: | - '' + the control. + */' - key: c text: | - '' + taken. + */' - key: d text: | - '' + in accordance with the organizations risk management strategy. + */' - key: e text: | - '' + or roles. + */' - control_key: SA-8 standard_key: NIST-800-53 @@ -257,10 +310,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + response will discuss the processes followed. + */' - control_key: SA-9 standard_key: NIST-800-53 @@ -269,26 +324,32 @@ satisfies: narrative: - key: a text: | - '' + external information systems. + */' - key: b text: | - '' + the procedures for this oversight. + */' - key: c text: | - '' + accomplish this. + */' - control_key: SA-9 (1) standard_key: NIST-800-53 @@ -297,16 +358,20 @@ satisfies: narrative: - key: a text: | - '' + address the process of the risk assessment and analysis of findings. + */' - key: b text: | - '' + address formal approval processes. + */' - control_key: SA-9 (2) standard_key: NIST-800-53 @@ -314,11 +379,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will indicate this requirement in contracting language. + */' - control_key: SA-9 (4) @@ -327,11 +394,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + how FedRAMP security requirements are enforced in external systems. + */' - control_key: SA-9 (5) standard_key: NIST-800-53 @@ -339,9 +408,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + continental United States datacenters based on business requirements. + */' - control_key: SA-10 standard_key: NIST-800-53 @@ -350,34 +421,44 @@ satisfies: narrative: - key: a text: | - '' + mechanisms involved in configuration management. + */' - key: b text: | - '' + address the processes and mechanisms involved in these activities. + */' - key: c text: | - '' + changes are implemented. + */' - key: d text: | - '' + response will need to discuss the process for documentation. + */' - key: e text: | - '' + process and tools used for tracking, resolution, and reporting. + */' - control_key: SA-10 (1) standard_key: NIST-800-53 @@ -385,7 +466,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + https://access.redhat.com/articles/2750891 + */' - control_key: SA-11 standard_key: NIST-800-53 @@ -403,40 +486,50 @@ satisfies: narrative: - key: a text: | - '' + response will need to outline the security assessment plan. + */' - key: b text: | - '' + performed and the depth required. + */' - key: c text: | - '' + obtains and reviews the evidence and results of testing. + */' - key: d text: | - '' + addressed. + */' - key: e text: | - '' + of the correction. + */' - control_key: SA-11 (1) standard_key: NIST-800-53 @@ -444,11 +537,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + common flaws, and the process for documenting results of testing. + */' - control_key: SA-11 (2) standard_key: NIST-800-53 @@ -456,13 +551,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + are reviewed and mitigated. + */' - control_key: SA-11 (8) @@ -471,8 +568,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + common flaws, and the process for documenting results of testing. + */' diff --git a/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml b/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml index 1a93d01..4e0a95e 100644 --- a/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml +++ b/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Systems and Communications Protection schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + of the policies and associated controls). + */' - key: b text: | - '' + approval of the updates. + */' - control_key: SC-2 standard_key: NIST-800-53 @@ -32,10 +37,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + instance. + */' - control_key: SC-4 standard_key: NIST-800-53 @@ -43,9 +50,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + successful control response will discuss how this is prevented. + */' - control_key: SC-5 standard_key: NIST-800-53 @@ -53,12 +62,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + from these attacks. + */' - control_key: SC-6 standard_key: NIST-800-53 @@ -66,10 +77,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + discuss how resource availability is protected. + */' - control_key: SC-7 standard_key: NIST-800-53 @@ -78,22 +91,28 @@ satisfies: narrative: - key: a text: | - '' + response will address how communications are monitored and shaped. + */' - key: b text: | - '' + component traffic is separated. + */' - key: c text: | - '' + managed interfaces and boundary protection devices. + */' - control_key: SC-7 (3) standard_key: NIST-800-53 @@ -101,10 +120,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + enforcement. + */' - control_key: SC-7 (4) standard_key: NIST-800-53 @@ -133,9 +154,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + by exception (i.e. deny all, permit by exception). + */' - control_key: SC-7 (7) standard_key: NIST-800-53 @@ -143,9 +166,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + internal and external networks. + */' - control_key: SC-7 (12) standard_key: NIST-800-53 @@ -153,9 +178,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + local firewalld and SELinux policies. + */' - control_key: SC-7 (13) standard_key: NIST-800-53 @@ -163,12 +190,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + control. + */' - control_key: SC-7 (18) standard_key: NIST-800-53 @@ -184,12 +213,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + operating in FIPS mode. + */' - control_key: SC-8 (1) standard_key: NIST-800-53 @@ -197,11 +228,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + network communications that carry customer data. + */' - control_key: SC-10 standard_key: NIST-800-53 @@ -209,10 +242,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + means on how this is established. + */' - control_key: SC-12 standard_key: NIST-800-53 @@ -220,7 +255,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + + */' - control_key: SC-12 (2) standard_key: NIST-800-53 @@ -238,12 +275,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the reasons they are considered compliant. + */' - control_key: SC-12 (3) standard_key: NIST-800-53 @@ -251,12 +290,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + compliant. + */' - control_key: SC-13 standard_key: NIST-800-53 @@ -264,9 +305,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + in FIPS mode, follow CCE-80359-3, "Enable FIPS Mode in GRUB2". + */' - control_key: SC-15 standard_key: NIST-800-53 @@ -275,21 +318,27 @@ satisfies: narrative: - key: a text: | - '' + the customer application. + */' - key: b text: | - '' + it takes, and the means by which activation can be verified. + */' - key: 'Req. 1' text: | - '' + or controlled from the customer application. + */' - control_key: SC-17 standard_key: NIST-800-53 @@ -297,12 +346,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + service provider and the process by which certificates are obtained. + */' - control_key: SC-18 standard_key: NIST-800-53 @@ -311,19 +362,25 @@ satisfies: narrative: - key: a text: | - '' + unacceptable for use within the system. + */' - key: b text: | - '' + code technologies. + */' - key: c text: | - '' + '//* + The customer will be responsible for authorizing, monitoring, and + controlling the use of mobile code within the system. + */' - control_key: SC-19 standard_key: NIST-800-53 @@ -332,15 +389,19 @@ satisfies: narrative: - key: a text: | - '' + the conditions under which that usage is appropriate. + */' - key: b text: | - '' + '//* + The customer will be responsible for authorizing, monitoring, and + controlling the use of VoIP within the system. + */' - control_key: SC-20 standard_key: NIST-800-53 @@ -349,18 +410,22 @@ satisfies: narrative: - key: a text: | - '' + accomplish this. + */' - key: b text: | - '' + accomplish this. + */' - control_key: SC-21 standard_key: NIST-800-53 @@ -368,9 +433,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + endpoints. + */' - control_key: SC-22 standard_key: NIST-800-53 @@ -378,9 +445,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + separation. + */' - control_key: SC-23 standard_key: NIST-800-53 @@ -388,7 +457,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the authenticity of communications sessions. + */' - control_key: SC-28 standard_key: NIST-800-53 @@ -404,8 +475,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + A successful control response will need to address the means by + which data at rest is protected. + */' - control_key: SC-28 (1) standard_key: NIST-800-53 @@ -413,7 +486,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + protect confidentiality and integrity of data in transport. + */' - control_key: SC-39 standard_key: NIST-800-53 diff --git a/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml b/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml index 41fd8e7..04ebd2b 100644 --- a/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml +++ b/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: System and Information Integrity schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + and providing approval of the updates. + */' - control_key: SI-2 standard_key: NIST-800-53 @@ -33,33 +38,41 @@ satisfies: narrative: - key: a text: | - '' + assist in detection and remediation. + */' - key: b text: | - '' + etc.). + */' - key: c text: | - '' + performing sufficient testing. + */' - key: d text: | - '' + (see the CM family of controls). + */' - control_key: SI-2 (2) @@ -68,13 +81,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the state of system components with regard to flaw remediation. + */' - control_key: SI-2 (3) standard_key: NIST-800-53 @@ -83,19 +98,23 @@ satisfies: narrative: - key: a text: | - '' + using timestamps and calculates the time elapsed difference. + */' - key: b text: | - '' + defined period after a flaws discovery. + */' - control_key: SI-3 standard_key: NIST-800-53 @@ -104,37 +123,45 @@ satisfies: narrative: - key: a text: | - '' + scripts). + */' - key: b text: | - '' + when a new version or definition release becomes available. + */' - key: c text: | - '' + personnel in response to detected malicious code. + */' - key: d text: | - '' + resulting impact of availability to the information system. + */' - control_key: SI-3 (1) standard_key: NIST-800-53 @@ -142,11 +169,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanism is centered in one location. + */' - control_key: SI-3 (2) standard_key: NIST-800-53 @@ -154,11 +183,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanisms definitions are configured to be updated automatically. + */' - control_key: SI-3 (7) standard_key: NIST-800-53 @@ -166,13 +197,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + do not yet exist. + */' - control_key: SI-4 standard_key: NIST-800-53 @@ -181,56 +214,68 @@ satisfies: narrative: - key: a text: | - '' + this control on behalf of infrastructure components. A successful + control response must articulate how both technology and process is + used to identify attacks and indicators of potential attacks. + */' - key: b text: | - '' + not, how each category is uniquely monitored. + */' - key: c text: | - '' + this control on behalf of tenants. + */' - key: d text: | - '' + on behalf of tenants. + */' - key: e text: | - '' + this control on behalf of their IaaS users. + */' - key: g text: | - '' + control on behalf of tenants. + */' - control_key: SI-4 (1) standard_key: NIST-800-53 @@ -238,12 +283,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + systems. + */' - control_key: SI-4 (2) standard_key: NIST-800-53 @@ -251,14 +298,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + technology and processes are in place to support near-realtime + analysis of events. + */' - control_key: SI-4 (4) standard_key: NIST-800-53 @@ -266,12 +315,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + how network traffic is continuously monitored. + */' - control_key: SI-4 (5) standard_key: NIST-800-53 @@ -279,11 +330,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + name or position title(s), and the mechanism of the notification. + */' - control_key: SI-4 (14) standard_key: NIST-800-53 @@ -292,7 +345,8 @@ satisfies: narrative: - text: | 'An OpenShift infrastructure does not have wireless capabilities. This - control is Not Applicable.>' + control is Not Applicable. + */' - control_key: SI-4 (16) standard_key: NIST-800-53 @@ -300,9 +354,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + is frequently accomplished with centralized audit reduction tools. + */' - control_key: SI-4 (23) standard_key: NIST-800-53 @@ -310,9 +366,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + The customer will be responsible for installing host-based monitoring + mechanisms. A successful control response will need to discuss how + various elements of the OpenShift infrastructure are monitored. + */' - control_key: SI-5 standard_key: NIST-800-53 @@ -321,30 +379,38 @@ satisfies: narrative: - key: a text: | - '' + directives (including US-CERT as required by FedRAMP. + */' - key: b text: | - '' + mission, software, or service. + */' - key: c text: | - '' + require notificiation. + */' - key: d text: | - '' + successful control response will need to address how the organization + meets established time frames for implementing security directives. + */' - control_key: SI-6 standard_key: NIST-800-53 @@ -353,32 +419,40 @@ satisfies: narrative: - key: a text: | - '' + testing the correct operation and resolving any issues found. + */' - key: b text: | - '' + of security function verification. + */' - key: c text: | - '' + administrators and security personnel as required by FedRAMP). + */' - key: d text: | - '' + by FedRAMP) as well as the rationale for selecting these actions. + */' - control_key: SI-7 standard_key: NIST-800-53 @@ -386,10 +460,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the integrity-checking mechanisms these tools employ. + */' - control_key: SI-7 (1) standard_key: NIST-800-53 @@ -397,12 +473,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for selecting those criteria. + */' - control_key: SI-7 (7) standard_key: NIST-800-53 @@ -410,12 +488,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + needed. + */' - control_key: SI-8 standard_key: NIST-800-53 @@ -451,12 +531,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + taken by the system to invalid inputs. + */' - control_key: SI-11 standard_key: NIST-800-53 @@ -465,18 +547,22 @@ satisfies: narrative: - key: a text: | - '' + messages are created, analyzed, and corrected when necessary. + */' - key: b text: | - '' + to error messages is controlled. + */' - control_key: SI-12 standard_key: NIST-800-53 @@ -484,13 +570,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + means by which those requirements are met. + */' - control_key: SI-16 standard_key: NIST-800-53 @@ -498,62 +586,64 @@ satisfies: implimentation_status: none narrative: - text: | - '' + + */' diff --git a/RHEL7/Makefile b/RHEL7/Makefile index 524675c..753b517 100644 --- a/RHEL7/Makefile +++ b/RHEL7/Makefile @@ -41,3 +41,6 @@ fedramp: default fedramp-diff: ${GOPATH}/bin/fedramp-templater diff opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx + +checks: + yamllint policies/