From 9d1ffd893c3b86636ca9e3aa8877b7e5087437da Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Fri, 12 May 2017 00:08:00 -0400 Subject: [PATCH 1/7] correcting AC syntax issues --- .../policies/AC-Access_Control/component.yaml | 133 ++++++++++-------- 1 file changed, 71 insertions(+), 62 deletions(-) diff --git a/OpenShift-v3/policies/AC-Access_Control/component.yaml b/OpenShift-v3/policies/AC-Access_Control/component.yaml index 7e3f3d8..d926ec0 100644 --- a/OpenShift-v3/policies/AC-Access_Control/component.yaml +++ b/OpenShift-v3/policies/AC-Access_Control/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Access Control schema_version: 3.0.0 @@ -11,11 +12,11 @@ satisfies: - key: a text: | ' - @@ -23,7 +24,7 @@ satisfies: group the relevant access granted by the role. OpenShift administrators can add and remove roles to and from users and groups using OpenShift commands. Documentation for the management of OpenShift Role Bindings - can be found at: + can be found at: https://docs.openshift.com/container-platform/latest/admin_guide/manage_authorization_policy.html#managing-role-bindings> ' @@ -53,7 +54,7 @@ satisfies: in use.>' - key: b text: | - '' @@ -85,10 +86,10 @@ satisfies: - key: g text: | '' + system accounts. This may include reviewing records of account + management activities. A successful control response will relate the + monitoring activities required for this control to the auditing + activities in the AU control family.>' - key: h text: | ' - <3rd party software must be used to fully support automated management - of OpenShift accounts. Documentation on authentication configuration + <3rd party software must be used to fully support automated management + of OpenShift accounts. Documentation on authentication configuration options exposed in OpenShift can be found here: https://docs.openshift.com/container-platform/3.3/architecture/additional_concepts/authentication.html>' @@ -141,17 +142,18 @@ satisfies: narrative: - text: | ' + disabling emergency and temporary accounts within the required + timeframe. A successful control response will need to address + all of the procedures and mechanisms involved in disabling these + accounts.> - <3rd party software must be used to fully support management of - temporary and emergency accounts. OpenShift does not have the capability + <3rd party software must be used to fully support management of + temporary and emergency accounts. OpenShift does not have the capability to automatically disable accounts after a configured period of time. To - meet this requirement, an authentication provider (such as Active - Directory) must be used. Integration between OpenShift and Active - Directory can be accomplished through the use of Kerberos cross-realm - trusts. Refer to the LDAP Authentication section of the OpenShift + meet this requirement, an authentication provider (such as Active + Directory) must be used. Integration between OpenShift and Active + Directory can be accomplished through the use of Kerberos cross-realm + trusts. Refer to the LDAP Authentication section of the OpenShift Administrators guide: https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth>' @@ -162,18 +164,18 @@ satisfies: implimentation_status: none narrative: - text: | - ' - <3rd party software must be used to fully support automatic disablement - of inactive OpenShift accounts. OpenShift does not have the capability - to automatically disable accounts after a configured period of time. To - meet this requirement, an authentication provider (such as Active - Directory) must be used. Integration between OpenShift and Active + <3rd party software must be used to fully support automatic disablement + of inactive OpenShift accounts. OpenShift does not have the capability + to automatically disable accounts after a configured period of time. To + meet this requirement, an authentication provider (such as Active + Directory) must be used. Integration between OpenShift and Active Directory can be accomplished throguh the use of Kerberos cross-realm - trusts. Refer to the LDAP Authentication section of the OpenShift + trusts. Refer to the LDAP Authentication section of the OpenShift Administrators guide: https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth>' @@ -190,19 +192,19 @@ satisfies: the personnel or roles that must be notified of account management activities, and the means by which notifications occur.> - ' @@ -212,9 +214,9 @@ satisfies: covered_by: [] implimentation_status: Implemented narrative: - - text: | - '' - control_key: AC-2 (7) @@ -231,11 +233,13 @@ satisfies: organization of the RBAC scheme.> ' + https://docs.openshift.com/container-platform/latest/admin_guide/ + manage_authorization_policy.html#managing-role-bindings >' + - key: b text: | ' - ' + https://docs.openshift.com/container-platform/3.3/admin_guide/ + manage_users.html#managing-users-managing-user-and-group-labels >' - control_key: AC-2 (10) standard_key: NIST-800-53 @@ -313,20 +318,22 @@ satisfies: For aggregate log sizing information, refer to the Aggregate Logging Sizing Guidelines of the Installation and Configuration Guide: - https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging_sizing.html + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging_sizing.html For instructions on how to configure aggregate logging, refer to the - Aggregating Container Logs section of the Installation and + Aggregating Container Logs section of the Installation and Configuration guide: - : https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging.html >' + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging.html >' + - key: b text: | '' - - control_key: AC-3 standard_key: NIST-800-53 @@ -338,7 +345,8 @@ satisfies: online. Each OpenShift deployment may chose differing authorization processes/configurations. Documentation can be found at: - https://docs.openshift.com/container-platform/3.3/architecture/additional_concepts/authorization.html >' + https://docs.openshift.com/container-platform/3.3/architecture/ + additional_concepts/authorization.html >' - control_key: AC-4 standard_key: NIST-800-53 @@ -355,7 +363,8 @@ satisfies: ' + https://docs.openshift.com/container-platform/3.3/architecture/ + additional_concepts/networking.html >' - control_key: AC-4 (21) standard_key: NIST-800-53 @@ -439,7 +448,7 @@ satisfies: '' - control_key: AC-6 (9) @@ -448,7 +457,7 @@ satisfies: implimentation_status: none narrative: - text: | - '' @@ -472,7 +481,7 @@ satisfies: narrative: - key: a text: | - '' - key: b text: | @@ -506,7 +515,7 @@ satisfies: information message to users. A successful control response will need to address the conditions under which the message will be displayed (if a non-government user accesses the system, the system - use information message may not be appropriate), as well as the + use information message may not be appropriate), as well as the contents of the notification message, including references to applicable monitoring, recording, or auditing, and authorized usage of the system.>' @@ -684,7 +693,7 @@ satisfies: - text: | '' @@ -774,7 +783,7 @@ satisfies: - key: 'b' text: | ' Date: Fri, 12 May 2017 00:39:42 -0400 Subject: [PATCH 2/7] adding make checks --- OpenShift-v3/Makefile | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/OpenShift-v3/Makefile b/OpenShift-v3/Makefile index 03dc30d..753b517 100644 --- a/OpenShift-v3/Makefile +++ b/OpenShift-v3/Makefile @@ -22,7 +22,7 @@ clean: rm -rf exports/ opencontrols/ pdf: exports - cd exports/ && gitbook pdf ./ ./OpenShift_v3_Compliance.pdf + cd exports/ && gitbook pdf ./ ./Red_Hat_Enterprise_Linux_7_Compliance.pdf serve: exports cd exports && gitbook serve @@ -30,15 +30,17 @@ serve: exports exports: opencontrols ${CM} docs gitbook FedRAMP-low -#opencontrols: opencontrol.yaml policies/*/.yaml opencontrols: opencontrol.yaml - ${CM} get + -${CM} get coverage: ${CM} diff FedRAMP-low fedramp: default - ${GOPATH}/bin/fedramp-templater fill opencontrols/ ../FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx exports/FedRAMP-Filled-v2.1.docx + ${GOPATH}/bin/fedramp-templater fill opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx exports/FedRAMP-Filled-v2.1.docx fedramp-diff: ${GOPATH}/bin/fedramp-templater diff opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx + +checks: + yamllint policies/ From 338a91ddc3c504f5074fb47a0f72864bfb4ab0a2 Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Fri, 12 May 2017 00:40:05 -0400 Subject: [PATCH 3/7] adding RHEL7 make checks --- RHEL7/Makefile | 3 +++ 1 file changed, 3 insertions(+) diff --git a/RHEL7/Makefile b/RHEL7/Makefile index 524675c..753b517 100644 --- a/RHEL7/Makefile +++ b/RHEL7/Makefile @@ -41,3 +41,6 @@ fedramp: default fedramp-diff: ${GOPATH}/bin/fedramp-templater diff opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx + +checks: + yamllint policies/ From 31f392179daf6e92224dd18123e242181891361b Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Fri, 12 May 2017 01:34:24 -0400 Subject: [PATCH 4/7] yamllint and updated string tags --- .../policies/AC-Access_Control/component.yaml | 426 ++++++++++++------ 1 file changed, 282 insertions(+), 144 deletions(-) diff --git a/OpenShift-v3/policies/AC-Access_Control/component.yaml b/OpenShift-v3/policies/AC-Access_Control/component.yaml index d926ec0..5451711 100644 --- a/OpenShift-v3/policies/AC-Access_Control/component.yaml +++ b/OpenShift-v3/policies/AC-Access_Control/component.yaml @@ -11,32 +11,35 @@ satisfies: narrative: - key: a text: | - ' - + and associated controls). - - ' + https://docs.openshift.com/container-platform/latest/admin_guide/ + manage_authorization_policy.html#managing-role-bindings + */' - key: b text: | - '' + providing approval of the updates. + */' - control_key: AC-2 standard_key: NIST-800-53 @@ -45,78 +48,100 @@ satisfies: narrative: - key: a text: | - '' + in use. + */' - key: b text: | - '' + how account managers are identified within the organization + */' - key: c text: | - '' + these conditions and how they are enforced. + */' - key: d text: | - '' + users are specified and privilege levels are determined. + */' - key: e text: | - '' + which those personnel or roles are notified and approval is granted. + */' - key: f text: | - '' + those conditions. + */' - key: g text: | - '' + activities in the AU control family. + */' - key: h text: | - '' + triggering events are identified and the managers are notified. + */' - key: i text: | - '' + authorization for a specific intended usage. + */' - key: j text: | - '' + process for remediation of any accounts found not to be in compliance. + */' - key: k text: | - '' + credentials is, and how the process is enforced. + */' - control_key: AC-2 (1) standard_key: NIST-800-53 @@ -124,7 +149,8 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - ' @@ -133,7 +159,8 @@ satisfies: of OpenShift accounts. Documentation on authentication configuration options exposed in OpenShift can be found here: - https://docs.openshift.com/container-platform/3.3/architecture/additional_concepts/authentication.html>' + https://docs.openshift.com/container-platform/3.3/architecture/additional_concepts/authentication.html + */' - control_key: AC-2 (2) standard_key: NIST-800-53 @@ -141,7 +168,8 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth + */' - control_key: AC-2 (3) standard_key: NIST-800-53 @@ -164,7 +193,8 @@ satisfies: implimentation_status: none narrative: - text: | - ' @@ -178,7 +208,8 @@ satisfies: trusts. Refer to the LDAP Authentication section of the OpenShift Administrators guide: - https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth>' + https://docs.openshift.com/container-platform/3.3/admin_solutions/authentication.html#ldap-auth + */' - control_key: AC-2 (4) standard_key: NIST-800-53 @@ -186,7 +217,8 @@ satisfies: implimentation_status: Implemented narrative: - text: | - '' + https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging.html + */' - control_key: AC-2 (5) standard_key: NIST-800-53 @@ -215,9 +248,11 @@ satisfies: implimentation_status: Implemented narrative: - text: | - '' + period of inactivity. + */' - control_key: AC-2 (7) standard_key: NIST-800-53 @@ -226,7 +261,8 @@ satisfies: narrative: - key: a text: | - '' + manage_authorization_policy.html#managing-role-bindings + */' - key: b text: | - '' + appropriateness. + */' - key: c text: | - '' + actions. + */' - control_key: AC-2 (9) standard_key: NIST-800-53 @@ -261,7 +302,8 @@ satisfies: implimentation_status: Implemented narrative: - text: | - '' + manage_users.html#managing-users-managing-user-and-group-labels + */' - control_key: AC-2 (10) standard_key: NIST-800-53 @@ -286,12 +329,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanism used to perform the change. + */' - control_key: AC-2 (12) standard_key: NIST-800-53 @@ -300,7 +345,8 @@ satisfies: narrative: - key: a text: | - '' + aggregate_logging.html + */' - key: b text: | - '' + for notification. + */' - control_key: AC-3 standard_key: NIST-800-53 @@ -341,12 +390,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + additional_concepts/authorization.html + */' - control_key: AC-4 standard_key: NIST-800-53 @@ -354,7 +405,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + additional_concepts/networking.html + */' - control_key: AC-4 (21) standard_key: NIST-800-53 @@ -372,11 +425,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + techniques used to accomplish this separation. + */' - control_key: AC-5 standard_key: NIST-800-53 @@ -385,23 +440,29 @@ satisfies: narrative: - key: a text: | - '' + prevent or reduce the likelihood of those actions. + */' - key: b text: | - '' + documentation and the process for reviewing it if necessary. + */' - key: c text: | - '' + policy and technical enforcement of separation of duties. + */' - control_key: AC-6 standard_key: NIST-800-53 @@ -409,12 +470,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + within the system. + */' - control_key: AC-6 (1) standard_key: NIST-800-53 @@ -422,11 +485,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + and information require explicit access authorization. + */' - control_key: AC-6 (2) standard_key: NIST-800-53 @@ -434,10 +499,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + access in use is monitored and enforced. + */' - control_key: AC-6 (5) standard_key: NIST-800-53 @@ -445,11 +512,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + privileged access is required. + */' - control_key: AC-6 (9) standard_key: NIST-800-53 @@ -457,10 +526,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + of the AU control family, + */' - control_key: AC-6 (10) standard_key: NIST-800-53 @@ -468,11 +539,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + levels. + */' - control_key: AC-7 standard_key: NIST-800-53 @@ -481,12 +554,16 @@ satisfies: narrative: - key: a text: | - '' + '//* + The customer will be responsible for enforcing a limit on consecutive + failed login attempts. + */' - key: b text: | - '' + '//* + The customer will be responsible for taking the FedRAMP required + actions defined by the customer, upon account lockout. + */' - control_key: AC-8 standard_key: NIST-800-53 @@ -495,48 +572,60 @@ satisfies: narrative: - key: a text: | - '' + of the nofication message. + */' - key: b text: | - '' + acknowlegement and move forward. + */' - key: c text: | ' - '' + of the system. + */' - key: 'Req. 1' text: | - '' + conditions must be reviewed and accepted by the FedRAMP JAB. + */' - key: 'Req. 2' text: | - '' + FedRAMP JAB. + */' - key: 'Req. 3' text: | - '' + review and accept the process used to perform the verification. + */' - control_key: AC-10 standard_key: NIST-800-53 @@ -544,10 +633,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanism used to enforce this limit. + */' - control_key: AC-11 standard_key: NIST-800-53 @@ -582,11 +673,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + or conditions. + */' - control_key: AC-14 standard_key: NIST-800-53 @@ -605,14 +698,17 @@ satisfies: narrative: - key: a text: | - '' + access). + */' - key: b text: | - '' + to protect those access control points. + */' - control_key: AC-17 (4) standard_key: NIST-800-53 @@ -669,20 +767,24 @@ satisfies: narrative: - key: a text: | - '' + at all, and refer to AC-2. + */' - key: b text: | - '' + to AC-2. + */' - control_key: AC-17 (9) @@ -691,7 +793,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for tenant applications immediately. + */' - control_key: AC-18 standard_key: NIST-800-53 @@ -716,16 +820,20 @@ satisfies: narrative: - key: 'a' text: | - '' + how usage and connection requirements were created. + */' - key: 'b' text: | - '' + encrption and/or passphrase requirements. + */' - control_key: AC-18 (1) @@ -734,10 +842,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authenticate to the wireless network. + */' - control_key: AC-19 standard_key: NIST-800-53 @@ -746,17 +856,21 @@ satisfies: narrative: - key: 'a' text: | - '' + and applications). + */' - key: 'b' text: | - '' + are authorized to connect to organizational networks (e.g. MDM). + */' - control_key: AC-19 (5) standard_key: NIST-800-53 @@ -764,9 +878,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + if mobile is within scope of your security package. + */' - control_key: AC-20 standard_key: NIST-800-53 @@ -775,19 +891,23 @@ satisfies: narrative: - key: 'a' text: | - '' + systems to which those terms and conditions apply. + */' - key: 'b' text: | - '' + and conditions apply. + */' - control_key: AC-20 (1) standard_key: NIST-800-53 @@ -796,17 +916,21 @@ satisfies: narrative: - key: 'a' text: | - '' + independent assessment). + */' - key: 'b' text: | - '' + information system used to access the customer application. + */' - control_key: AC-20 (2) standard_key: NIST-800-53 @@ -814,11 +938,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + or under what conditions such use may occur. + */' - control_key: AC-21 standard_key: NIST-800-53 @@ -827,16 +953,20 @@ satisfies: narrative: - key: 'a' text: | - '' + required. + */' - key: 'b' text: | - '' + sharing decisions. + */' - control_key: AC-22 standard_key: NIST-800-53 @@ -845,27 +975,35 @@ satisfies: narrative: - key: 'a' text: | - '' + that justify such access. + */' - key: 'b' text: | - '' + provided. + */' - key: 'c' text: | - '' + responsible for this review and the process for signoff. + */' - key: 'd' text: | - '' + nonpublic information. + */' From e9516708be6fb32ab8dfa7f64a4fabc9d8f01623 Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Fri, 12 May 2017 01:49:42 -0400 Subject: [PATCH 5/7] updating string wrapping --- .../AT-Awareness_and_Training/component.yaml | 73 ++-- .../component.yaml | 228 +++++++---- .../component.yaml | 210 ++++++---- .../component.yaml | 309 ++++++++++----- .../CP-Contingency_Planning/component.yaml | 267 ++++++++----- .../component.yaml | 337 ++++++++++------ .../IR-Incident_Response/component.yaml | 219 +++++++---- .../policies/MA-Maintenance/component.yaml | 149 ++++--- .../MP-Media_Protection/component.yaml | 21 +- .../component.yaml | 17 +- .../policies/PL-Planning/component.yaml | 99 +++-- .../PS-Personnel_Security/component.yaml | 171 ++++++--- .../RA-Risk_Assessment/component.yaml | 137 ++++--- .../component.yaml | 301 ++++++++++----- .../component.yaml | 225 +++++++---- .../component.yaml | 362 +++++++++++------- 16 files changed, 2052 insertions(+), 1073 deletions(-) diff --git a/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml b/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml index 7576a56..d868a91 100644 --- a/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml +++ b/OpenShift-v3/policies/AT-Awareness_and_Training/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Awareness and Training schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: 'a' text: | - '' + associated controls). + */' - key: 'b' text: | - '' + and providing approval of the updates. + */' - control_key: AT-2 standard_key: NIST-800-53 @@ -33,24 +38,30 @@ satisfies: narrative: - key: 'a' text: | - '' + process for ensuring that all users undergo the required training. + */' - key: 'b' text: | - '' + re-training. + */' - key: 'c' text: | - '' + re-trianing. + */' - control_key: AT-2 (2) standard_key: NIST-800-53 @@ -58,11 +69,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + organizational officials. + */' - control_key: AT-3 standard_key: NIST-800-53 @@ -71,25 +84,31 @@ satisfies: narrative: - key: 'a' text: | - '' + roles. + */' - key: 'b' text: | - '' + for re-training. + */' - key: 'c' text: | - '' + process for ensuring that all users undergo the required re-training. + */' - control_key: AT-4 standard_key: NIST-800-53 @@ -98,13 +117,17 @@ satisfies: narrative: - key: 'a' text: | - '' + the process or system used to monitor and document completion of + training for each user. + */' - key: 'b' text: | - '' + methods by which required retention is achieved. + */' diff --git a/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml b/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml index 80c6285..8774093 100644 --- a/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml +++ b/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Audit and Accountability schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: AU-2 standard_key: NIST-800-53 @@ -33,7 +38,8 @@ satisfies: narrative: - key: a text: | - '' + metadata required by this control is generated. + */' - key: b text: | - '' + determine the selection of auditable events. + */' - key: c text: | - '' + investigation. + */' - key: d text: | - '' + https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/ + html/Security_Guide/sec-configuring_the_audit_service.html + */' - control_key: AU-2 (3) standard_key: NIST-800-53 @@ -75,10 +89,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + reviewed. + */' - control_key: AU-3 standard_key: NIST-800-53 @@ -86,12 +102,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + what customers require their audit records to contain. + */' - control_key: AU-3 (1) standard_key: NIST-800-53 @@ -99,10 +117,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + systems audit generation, and the content that it includes. + */' - control_key: AU-4 standard_key: NIST-800-53 @@ -110,10 +130,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + storage is allocated according to meet customer requirements. + */' - control_key: AU-5 standard_key: NIST-800-53 @@ -122,16 +144,20 @@ satisfies: narrative: - key: a text: | - '' + failure occures. + */' - key: b text: | - '' + will outline the actions taken when an auditing failure occurs. + */' - control_key: AU-6 standard_key: NIST-800-53 @@ -140,29 +166,35 @@ satisfies: narrative: - key: a text: | - '' + reviewed for. + */' - key: b text: | - '' + will outline how the audit review findings are reported. + */' - control_key: AU-6 (1) standard_key: NIST-800-53 covered_by: [] implimentation_status: none narrative: - - text: | - '' + these tools are employed. + */' - control_key: AU-6 (3) standard_key: NIST-800-53 @@ -170,11 +202,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + include processes and tools used to meet these goals. + */' - control_key: AU-7 standard_key: NIST-800-53 @@ -183,11 +217,12 @@ satisfies: narrative: - key: a text: | - ' @@ -204,22 +239,28 @@ satisfies: For aggregate log sizing information, refer to the Aggregate Logging Sizing Guidelines of the Installation and Configuration guide: - https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging_sizing.html + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging_sizing.html For instructions on how to configure aggregate logging, refer to the - Aggregating Container Logs section of the Installation and + Aggregating Container Logs section of the Installation and Configuration guide: - https://docs.openshift.com/container-platform/3.3/install_config/aggregate_logging.html >' + https://docs.openshift.com/container-platform/3.3/install_config/ + aggregate_logging.html + */' + - key: b text: | - '' + https://www.redhat.com/en/technologies/industries/government/standards + + */' - control_key: AU-7 (1) standard_key: NIST-800-53 @@ -227,11 +268,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + fields. + */' - control_key: AU-8 standard_key: NIST-800-53 @@ -240,17 +283,20 @@ satisfies: narrative: - key: a text: | - '' + '//* + The Linux audit subsystem, upon which OpenShift logs are generated, + uses the system clock by default. This is non-configurable behavior. + */' - key: b text: | - '' + https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/ + 7/html/System_Administrators_Guide/chap-Configuring_the_Date_and_Time. + html#sect-Configuring_the_Date_and_Time-timedatectl-Time_Zone + */' - control_key: AU-8 (1) standard_key: NIST-800-53 @@ -267,15 +316,18 @@ satisfies: narrative: - key: a text: | - '' + clocks are synced with. + */' - key: b text: | - ' > iburst - For detailed NTP configuration, reference the Red Hat Enterprise Linu + For detailed NTP configuration, reference the Red Hat Enterprise Linux 7 System Administrators guide: - https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/System_Administrators_Guide/s1-Configure_NTP.html >' + https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/ + 7/html/System_Administrators_Guide/s1-Configure_NTP.html + */' + - key: 'Req.1' text: | - '' + are used by the system. + */' - key: 'Req. 2' text: | 'Customers are responsible for syncronizing the system clocks of - network computers that run operating systems other than Windows to the + network computers that run operating systems other than Windows to the Windows Domain Controler emulator, or the same time source for that server. A successful conttrol response will discuss which Internet time - services are for non-Windows systems.>' + services are for non-Windows systems. + */' - control_key: AU-9 standard_key: NIST-800-53 @@ -310,11 +368,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + control response will discuss the way that audit information and tools + are protected. This can include how access is controlled to audit + information and tools. + */' - control_key: AU-9 (2) standard_key: NIST-800-53 @@ -322,11 +382,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + include a centralized repository for all audit records. + */' - control_key: AU-9 (4) standard_key: NIST-800-53 @@ -334,11 +396,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + this functionality is restricted to, and how this is controlled. + */' - control_key: AU-11 standard_key: NIST-800-53 @@ -346,15 +410,17 @@ satisfies: implimentation_status: none narrative: - text: | - ' ' + Enterprise Linux audit daemon. If using a central or 3rd party + logging solution, this may likely need to be configured in that tool. + */' - control_key: AU-12 standard_key: NIST-800-53 @@ -363,26 +429,32 @@ satisfies: narrative: - key: a text: | - '' + defined in AU-2. + */' - key: b text: | - ' ' + /etc/audit/rules.d/openshift.rules + */' - key: c text: | - '' + the requirements defined in AU-2 and AU-3. + */' diff --git a/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml b/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml index 065f7da..223e71b 100644 --- a/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml +++ b/OpenShift-v3/policies/CA-Security_Assessment_and_Authorization/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Security Assessment and Authorization schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + and associated controls). + */' - key: b text: | - '' + providing approval of the updates. + */' - control_key: CA-2 standard_key: NIST-800-53 @@ -33,33 +38,41 @@ satisfies: narrative: - key: a text: | - '' + 3PAO. + */' - key: b text: | - '' + security and compliance posture of the system. + */' - key: c text: | - '' + and risks associated with the system). + */' - key: d text: | - '' + managing the package for submission and engaging with the PMO. + */' - control_key: CA-2 (1) standard_key: NIST-800-53 @@ -67,10 +80,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + Assessment Plan and Security Assessment Report (see CA-2). + */' - control_key: CA-2 (2) standard_key: NIST-800-53 @@ -78,13 +93,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + chooses to perform. + */' - control_key: CA-2 (3) standard_key: NIST-800-53 @@ -92,11 +109,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for approval. + */' - control_key: CA-3 standard_key: NIST-800-53 @@ -105,28 +124,34 @@ satisfies: narrative: - key: a text: | - '' + Interconnection System Agreements. + */' - key: b text: | - '' + above. + */' - key: c text: | - '' + documentation. + */' - control_key: CA-3 (3) standard_key: NIST-800-53 @@ -134,11 +159,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + policy considerations. + */' - control_key: CA-3 (5) standard_key: NIST-800-53 @@ -146,13 +173,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + sections of this Security Plan. + */' - control_key: CA-5 standard_key: NIST-800-53 @@ -161,20 +190,24 @@ satisfies: narrative: - key: a text: | - '' + creating and tracking POA&M items. + */' - key: b text: | - '' + remediated. + */' - control_key: CA-6 standard_key: NIST-800-53 @@ -183,24 +216,30 @@ satisfies: narrative: - key: a text: | - '' - - key: b + address how an appropriate authorizing official is selected. + */' + - key: b text: | - '' + decision can be made. + */' - key: c text: | - '' + process and engaging with FedRAMP for renewal of authorization. + */' - control_key: CA-7 standard_key: NIST-800-53 @@ -209,69 +248,89 @@ satisfies: narrative: - key: a text: | - '' + to demonstrate the ongoing security of the system. + */' - key: b text: | - '' + compatible with the frequency of POA&M reporting specified in CA-5. + */' - key: c text: | - '' + well as the methodology used for testing. + */' - key: d text: | - '' + or additions to related reporting, such as POA&M reporting. + */' - key: e text: | - '' + response will need to address tools or processes used to perform + correlation and analysis. + */' - key: f text: | - '' + system, a POA&M item should be opened). + */' - key: g text: | - '' + POA&M reporting specified in CA-5. + */' - key: 'Req. 1' text: | - '' + '//* + The customer will be responsible for performing vulnerability scans + of operating systems at least monthly. See also RA-5. + */' - key: 'Req. 2' text: | - '' + '//* + The customer will be responsible for performing vulnerability scans + of databases and web applications at least monthly. See also RA-5. + */' - key: 'Req. 3' text: | - '' + CA-2(2). + */' - control_key: CA-7 (1) standard_key: NIST-800-53 @@ -279,14 +338,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + system. + */' - control_key: CA-8 standard_key: NIST-800-53 @@ -294,12 +355,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for this test, etc.). + */' - control_key: CA-8 (1) standard_key: NIST-800-53 @@ -307,9 +370,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will need to address how independence is ensured. + */' - control_key: CA-9 standard_key: NIST-800-53 @@ -318,17 +383,20 @@ satisfies: narrative: - key: a text: | - '' + components or classes of components. + */' - key: b text: | - '' - + is created. + */' diff --git a/OpenShift-v3/policies/CM-Configuration_Management/component.yaml b/OpenShift-v3/policies/CM-Configuration_Management/component.yaml index c276d86..b6b7854 100644 --- a/OpenShift-v3/policies/CM-Configuration_Management/component.yaml +++ b/OpenShift-v3/policies/CM-Configuration_Management/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Configuration Management schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + approval of the updates + */' - control_key: CM-2 standard_key: NIST-800-53 @@ -32,11 +37,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + maintained. + */' - control_key: CM-2 (1) standard_key: NIST-800-53 @@ -45,23 +52,29 @@ satisfies: narrative: - key: a text: | - '' + baseline configuration is reviewed and updated. + */' - key: b text: | - '' + baseline configuration when required by the JAB. + */' - key: c text: | - '' + configuration as a part of installations and upgrades. + */' - control_key: CM-2(2) standard_key: NIST-800-53 @@ -69,11 +82,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + help maintain the baseline configurations of the information system. + */' - control_key: CM-2 (3) standard_key: NIST-800-53 @@ -81,11 +96,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + version. + */' - control_key: CM-2 (7) standard_key: NIST-800-53 @@ -106,55 +123,69 @@ satisfies: narrative: - key: a text: | - '' + to determine configuration controlled changes. + */' - key: b text: | - '' + how the security impact of these changes is considered. + */' - key: c text: | - '' + example, what tools are used and what information is documented. + */' - key: d text: | - '' + implemented after approval. + */' - key: e text: | - '' + records are maintained. + */' - key: f text: | - '' + these changes are reviewed. + */' - key: g text: | - '' + services will be coordinated and overseen. + */' - control_key: CM-4 standard_key: NIST-800-53 @@ -162,11 +193,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + include any analysis and testing done prior to implementation. + */' - control_key: CM-5 standard_key: NIST-800-53 @@ -174,13 +207,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + are approved for access. + */' - control_key: CM-5 (1) standard_key: NIST-800-53 @@ -188,10 +223,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + how this access is audited. + */' - control_key: CM-5 (3) standard_key: NIST-800-53 @@ -203,7 +240,7 @@ satisfies: packages of the operating system and OpenShift, the yum gpgcheck option must be enabled. This is accomplished by applying the following Red Hat CCEs: - + - CCE-26989-4: Ensure gpgcheck Enabled in Main Yum Configuration - CCE-26957-1: Ensure Red Hat GPG Key Installed - CCE-26876-3: Ensure gpgcheck Enabled for All Yum Package @@ -219,19 +256,23 @@ satisfies: narrative: - key: a text: | - '' + go through. + */' - key: b text: | - '' + to change the information system within the production environment. + */' - control_key: CM-6 standard_key: NIST-800-53 @@ -240,36 +281,44 @@ satisfies: narrative: - key: a text: | - '' + while still allowing the system to operate. + */' - key: b text: | - '' + or documentation followed. + */' - key: c text: | - '' + deviations. + */' - key: d text: | - '' + track and approve changes. + */' - control_key: CM-6 (1) standard_key: NIST-800-53 @@ -277,12 +326,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + Directory Group Policy Objects to manage security settings. + */' - control_key: CM-7 standard_key: NIST-800-53 @@ -291,19 +342,23 @@ satisfies: narrative: - key: a text: | - '' + are provided. + */' - key: b text: | - '' + or prohibit, using USGCB guidance. + */' - control_key: CM-7 (1) standard_key: NIST-800-53 @@ -312,17 +367,21 @@ satisfies: narrative: - key: a text: | - '' + how often functions, ports, protocols, and services are reviewed. + */' - key: b text: | - '' + process are disabled. + */' - control_key: CM-7 (2) standard_key: NIST-800-53 @@ -330,7 +389,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + said trusted registries to satisfy this control. + */' - control_key: CM-7 (5) standard_key: NIST-800-53 @@ -348,7 +409,8 @@ satisfies: narrative: - key: a text: | - '' + https://access.redhat.com/articles/2750891 + */' - key: b text: | - '' + information system. + */' - key: c text: | - '' + least annually and when changes are made. + */' - control_key: CM-8 standard_key: NIST-800-53 @@ -381,21 +448,25 @@ satisfies: narrative: - key: a text: | - '' + customer has deemed necessary to achieve effective accountability. + */' - key: b text: | - '' + discrepancies found. + */' - control_key: CM-8 (1) standard_key: NIST-800-53 @@ -403,11 +474,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + events change the inventory. + */' - control_key: CM-8 (3) standard_key: NIST-800-53 @@ -416,18 +489,22 @@ satisfies: narrative: - key: a text: | - '' + on the information system. + */' - key: b text: | - '' + to that system. + */' - control_key: CM-8 (5) standard_key: NIST-800-53 @@ -435,11 +512,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + in multiple system inventories. + */' - control_key: CM-9 standard_key: NIST-800-53 @@ -448,37 +527,45 @@ satisfies: narrative: - key: a text: | - '' + and procedures. + */' - key: b text: | - '' + manage changes to the system. + */' - key: c text: | - '' + items, and the process used to manage them. + */' - key: d text: | - '' + stored, and controls in place to prevent unauthorized access. + */' - control_key: CM-10 standard_key: NIST-800-53 @@ -487,25 +574,31 @@ satisfies: narrative: - key: a text: | - '' + to the customers acceptable use policy. + */' - key: b text: | - '' + a description of how these licenses are tracked and protected. + */' - key: c text: | - '' + acceptable use policies in place. + */' - control_key: CM-10 (1) standard_key: NIST-800-53 @@ -513,9 +606,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + describe any restrictions that the organization has in place. + */' - control_key: CM-11 standard_key: NIST-800-53 @@ -524,18 +619,24 @@ satisfies: narrative: - key: a text: | - '' + for installation of software by users. + */' - key: b text: | - '' + references to configuration control processes. + */' - key: c text: | - '' + used to monitor compliance of installation policies. + */' diff --git a/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml b/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml index 3d5c18e..cf0f9af 100644 --- a/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml +++ b/OpenShift-v3/policies/CP-Contingency_Planning/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Contingency Planning schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: CP-2 standard_key: NIST-800-53 @@ -33,50 +38,64 @@ satisfies: narrative: - key: a text: | - '' + to perform these tasks. + */' - key: b text: | - '' + and the means by which the customer ensures that all key personnel + receive the contingency plan. + */' - key: c text: | - '' + event of a security incident. + */' - key: d text: | - '' + outline how reviews are initiated, performed, and signed off on. + */' - key: e text: | - '' + how updates are proposed, implemented, and approved. + */' - key: f text: | - '' + contingency plan. + */' - key: g text: | - '' + safeguards that are in place to protect the contingency plan. + */' - control_key: CP-2 (1) standard_key: NIST-800-53 @@ -84,11 +103,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + updates to the contingency plan affect related plans and vice versa. + */' - control_key: CP-2 (2) standard_key: NIST-800-53 @@ -96,10 +117,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + alternate region. + */' - control_key: CP-2 (3) standard_key: NIST-800-53 @@ -107,11 +130,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + details how mission functions will be resumed. + */' - control_key: CP-2 (8) standard_key: NIST-800-53 @@ -119,13 +144,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + from your infrastruture provider. + */' - control_key: CP-3 standard_key: NIST-800-53 @@ -133,11 +160,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + training attendance is tracked and enforced. + */' - control_key: CP-4 standard_key: NIST-800-53 @@ -146,7 +175,8 @@ satisfies: narrative: - key: a text: | - '' + + https://azure.microsoft.com/en-us/documentation/articles/ + sql-database-disaster-recovery-drills/ + */' - key: b text: | - '' + format and content of reporting on the results. + */' - key: c text: | - '' + for those actions. + */' - control_key: CP-4 (1) standard_key: NIST-800-53 @@ -175,11 +211,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + communicated so that corrective actions may be taken as needed. + */' - control_key: CP-6 standard_key: NIST-800-53 @@ -188,17 +226,21 @@ satisfies: narrative: - key: a text: | - '' + Azure. + */' - key: b text: | - '' + site. + */' - control_key: CP-6 (1) standard_key: NIST-800-53 @@ -206,9 +248,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + susceptibility to the same threats. + */' - control_key: CP-6 (3) standard_key: NIST-800-53 @@ -216,11 +260,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + providers. + */' - control_key: CP-7 standard_key: NIST-800-53 @@ -229,22 +275,28 @@ satisfies: narrative: - key: a text: | - '' + most IaaS providers. + */' - key: b text: | - '' + from organizational processes. + */' - key: c text: | - '' + to that of the primary site. + */' - control_key: CP-7 (1) standard_key: NIST-800-53 @@ -252,13 +304,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + inherited from organizational processes. + */' - control_key: CP-7 (2) standard_key: NIST-800-53 @@ -266,11 +320,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + processes. + */' - control_key: CP-7 (3) standard_key: NIST-800-53 @@ -278,10 +334,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + is often inherited from organizational, IaaS, or PaaS providers. + */' - control_key: CP-8 standard_key: NIST-800-53 @@ -289,12 +347,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + IaaS, or PaaS providers. + */' - control_key: CP-8 (1) standard_key: NIST-800-53 @@ -303,18 +363,22 @@ satisfies: narrative: - key: a text: | - '' + control is often inherited from IaaS and PaaS providers. + */' - key: b text: | - '' + This control is often inherited from IaaS and PaaS providers. + */' - control_key: CP-8 (2) standard_key: NIST-800-53 @@ -322,10 +386,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + control is often inherited from IaaS and PaaS providers. + */' - control_key: CP-9 standard_key: NIST-800-53 @@ -334,42 +400,51 @@ satisfies: narrative: - key: a text: | - '' + '//* + The customer will be responsible for conducting daily incremental and + weekly full backups of user-level information contained in the + information system. Additional FedRAMP requirements and guidance include + maintaining at least three backup copies of user-level information (at + least one of which is available online) or provides an equivalent + alternative. A successful control response will detail how backups of + user-level information occures, and how three backup copies are + maintained. + */' - key: b text: | - '' + maintaining at least three backup copies of user-level information (at + least one of which is available online) or provides an equivalent + alternative. A successful control response will detail how backups of + user-level information occures, and how three backup copies are + maintained. + */' - key: c text: | - '' + are maintained. + */' - key: d text: | - '' + check. + */' - control_key: CP-9 (1) standard_key: NIST-800-53 @@ -377,9 +452,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + integrity. + */' - control_key: CP-9 (3) standard_key: NIST-800-53 @@ -387,8 +464,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + The customer will be responsible for enabling geo-replicated backups + within their subscriptions, which will allow restoration from backup. + */' - control_key: CP-10 standard_key: NIST-800-53 @@ -396,9 +475,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + disruption, compromise, or failure. + */' - control_key: CP-10 (2) standard_key: NIST-800-53 @@ -406,7 +487,9 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the case of failed or conflicting transactions. + */' diff --git a/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml b/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml index f19de83..73c4440 100644 --- a/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml +++ b/OpenShift-v3/policies/IA-Identification_and_Authentication/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Identification and Authentication schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + providing approval of the updates. + */' - control_key: IA-2 standard_key: NIST-800-53 @@ -32,7 +37,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + sync those LDAP records with internal OpenShift Container Platform + records, enabling you to manage your groups in one place. OpenShift + Container Platform currently supports group sync with LDAP servers using + three common schemas for defining group membership: RFC 2307, Active + Directory, and augmented Active Directory. For additional information, + refer to “Syncing Groups with LDAP” in the OpenShift Installation and + Configuration guide: + + https://docs.openshift.com/container-platform/3.3/install_config/ + syncing_groups_with_ldap.html + */' - control_key: IA-2 (1) standard_key: NIST-800-53 @@ -70,7 +80,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + https://docs.openshift.com/container-platform/3.3/install_config/ + configuring_authentication.html#RequestHeaderIdentityProvider + */' - control_key: IA-2 (2) standard_key: NIST-800-53 @@ -93,12 +106,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + access to non-privileged accounts. + */' - control_key: IA-2 (3) standard_key: NIST-800-53 @@ -126,14 +141,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + It is recommended to use Active Directory if possible. + */' - control_key: IA-2 (11) standard_key: NIST-800-53 @@ -141,12 +158,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + solution. + */' - control_key: IA-2 (12) standard_key: NIST-800-53 @@ -154,13 +173,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + Federation Services (ADFS). + */' - control_key: IA-3 standard_key: NIST-800-53 @@ -168,14 +189,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will provide identity of the machines. + */' - control_key: IA-4 standard_key: NIST-800-53 @@ -184,38 +207,48 @@ satisfies: narrative: - key: a text: | - '' + authorizing each type. + */' - key: b text: | - '' + will need to address all identifier types and the means by which + uniqueness of identifier is assured. + */' - key: c text: | - '' + to indivuals, groups, roles, or devices. + */' - key: d text: | - '' + types of identifiers in use and the means by which reuse is + prevented. + */' - key: e text: | - '' + identifier types and the means by which disabling takes place. + */' - control_key: IA-4 (4) standard_key: NIST-800-53 @@ -223,12 +256,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + into the individual identifier. + */' - control_key: IA-5 standard_key: NIST-800-53 @@ -237,79 +272,99 @@ satisfies: narrative: - key: a text: | - '' + identification card). + */' - key: b text: | - '' + initial content is established for each. + */' - key: c text: | - '' + for each. + */' - key: d text: | - '' + procedures established for each. + */' - key: e text: | - '' + process by which changing the default content is enforced. + */' - key: f text: | - '' + lifetime restrictions and reuse conditions for each. + */' - key: g text: | - '' + each, and the mechanism by which this cadence is enforced. + */' - key: h text: | - '' + authenticators to unauthorized personnel. + */' - key: i text: | - '' + authenticators to unauthorized personnel. + */' - key: j text: | - '' + to perform the change. + */' - control_key: IA-5 (1) standard_key: NIST-800-53 @@ -318,43 +373,55 @@ satisfies: narrative: - key: a text: | - '' + to enforce complexity. + */' - key: b text: | - '' + to address the mechanism used to enforce the required change. + */' - key: c text: | - '' + cryptographic protection of passwords. + */' - key: d text: | - '' + the mechanism used to enforce lifetime restrictions. + */' - key: e text: | - '' + the mechanism used to enforce the reuse requirement. + */' - key: f text: | - '' + change requirement. + */' - control_key: IA-5 (2) standard_key: NIST-800-53 @@ -363,32 +430,40 @@ satisfies: narrative: - key: a text: | - '' + to address the mechanism used to validate certificates. + */' - key: b text: | - '' + used for this purpose. A successful control response will need to + address the mechanism used to restrict access to private keys. + */' - key: c text: | - '' + certificates and accounts. + */' - key: d text: | - '' + populate the revocation data. + */' - control_key: IA-5 (3) standard_key: NIST-800-53 @@ -396,12 +471,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorization for distribution of the authenticators. + */' - control_key: IA-5 (4) standard_key: NIST-800-53 @@ -409,11 +486,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + enforce password strength requirements. + */' - control_key: IA-5 (6) standard_key: NIST-800-53 @@ -421,10 +500,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + tools used to protect authenticators. + */' - control_key: IA-5 (7) standard_key: NIST-800-53 @@ -432,10 +513,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanisms. + */' - control_key: IA-5 (11) standard_key: NIST-800-53 @@ -443,12 +526,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + requirements. + */' - control_key: IA-6 standard_key: NIST-800-53 @@ -456,14 +541,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + configured to be out of compliance with this requirement. + */' - control_key: IA-7 standard_key: NIST-800-53 @@ -471,14 +558,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + automatically converts incoming authentication requests to HTTPS. + */' - control_key: IA-8 standard_key: NIST-800-53 @@ -486,12 +575,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + identification and authentication for organizational users. + */' - control_key: IA-8 (1) standard_key: NIST-800-53 @@ -499,13 +590,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + through Active Directory Federation Services (ADFS). + */' - control_key: IA-8 (2) standard_key: NIST-800-53 @@ -513,14 +606,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + (ADFS). + */' - control_key: IA-8 (3) standard_key: NIST-800-53 @@ -528,14 +623,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + (ADFS). + */' - control_key: IA-8 (4) standard_key: NIST-800-53 @@ -543,11 +640,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + (ADFS). + */' diff --git a/OpenShift-v3/policies/IR-Incident_Response/component.yaml b/OpenShift-v3/policies/IR-Incident_Response/component.yaml index 98fd460..3329b22 100644 --- a/OpenShift-v3/policies/IR-Incident_Response/component.yaml +++ b/OpenShift-v3/policies/IR-Incident_Response/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Incident Response schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: IR-2 standard_key: NIST-800-53 @@ -33,27 +38,33 @@ satisfies: narrative: - key: a text: | - '' + enforced. + */' - key: b text: | - '' + attendance. + */' - key: c text: | - '' + training attendance is tracked and enforced. + */' - control_key: IR-3 standard_key: NIST-800-53 @@ -61,7 +72,8 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + of incident response plans. + */' - control_key: IR-3 (2) standard_key: NIST-800-53 @@ -78,12 +91,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + needed. + */' - control_key: IR-4 standard_key: NIST-800-53 @@ -92,7 +107,8 @@ satisfies: narrative: - key: a text: | - '' + for each step. + */' - key: b text: | - '' + delays in service restoration). + */' - key: c text: | - '' + reviewing and signing off on changes. + */' - control_key: IR-4 (1) standard_key: NIST-800-53 @@ -125,11 +146,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + place within the overall incident handling process. + */' - control_key: IR-5 standard_key: NIST-800-53 @@ -137,11 +160,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + used in IR-4(1). + */' - control_key: IR-6 standard_key: NIST-800-53 @@ -150,20 +175,24 @@ satisfies: narrative: - key: a text: | - '' + used for reporting. + */' - key: b text: | - '' + notifications. + */' - control_key: IR-6 (1) standard_key: NIST-800-53 @@ -171,11 +200,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + used for reporting of incidents. + */' - control_key: IR-7 standard_key: NIST-800-53 @@ -183,11 +214,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + discuss how users are notified of the existence of these resources. + */' - control_key: IR-7 (1) standard_key: NIST-800-53 @@ -195,11 +228,13 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + information and support resources provided via each mechanism. + */' - control_key: IR-7 (2) standard_key: NIST-800-53 @@ -208,7 +243,8 @@ satisfies: narrative: - key: a text: | - '' + capability. + */' - key: b text: | - '' + this identification is communicated. + */' - control_key: IR-8 standard_key: NIST-800-53 @@ -232,44 +271,56 @@ satisfies: narrative: - key: a text: | - '' + the requirements are met. + */' - key: b text: | - '' + distribution list. + */' - key: c text: | - '' + individuals responsible for performing the review. + */' - key: d text: | - '' + for approval of updates. + */' - key: e text: | - '' + identified in IR-8(b). + */' - key: f text: | - '' + safeguards that are in place to protect the incident response plan. + */' - control_key: IR-9 standard_key: NIST-800-53 @@ -278,43 +329,55 @@ satisfies: narrative: - key: a text: | - '' + or processes used to identify the specific information involved. + */' - key: b text: | - '' + notified. + */' - key: c text: | - '' + each type. + */' - key: d text: | - '' + eradication is carried out and confirmed. + */' - key: e text: | - '' + investigative process used to make this determination. + */' - key: f text: | - '' + identifying and performing the actions. + */' - control_key: IR-9 (1) standard_key: NIST-800-53 @@ -322,12 +385,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + address the rationale for the selection. + */' - control_key: IR-9 (2) standard_key: NIST-800-53 @@ -335,12 +400,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + the frequency at which training is provided. + */' - control_key: IR-9 (3) standard_key: NIST-800-53 @@ -348,12 +415,14 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + processes required to employ those alternate means. + */' - control_key: IR-9 (4) standard_key: NIST-800-53 @@ -361,10 +430,12 @@ satisfies: implimentation_status: Not applicable narrative: - text: | - '' + (following information spillage incidents). + */' diff --git a/OpenShift-v3/policies/MA-Maintenance/component.yaml b/OpenShift-v3/policies/MA-Maintenance/component.yaml index 61067db..17e4ed7 100644 --- a/OpenShift-v3/policies/MA-Maintenance/component.yaml +++ b/OpenShift-v3/policies/MA-Maintenance/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Maintenance schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + approval of the updates. + */' - control_key: MA-2 standard_key: NIST-800-53 @@ -33,45 +38,57 @@ satisfies: narrative: - key: a text: | - '' + response will outline maintenance procedures. + */' - key: b text: | - '' + accomplished through lifecycle management tools, e.g. Remedy + */' - key: c text: | - '' + deployments. + */' - key: d text: | - '' + from IaaS providers and not applicable to OpenShift deployments. + */' - key: e text: | - '' + properly following maintenance or repair actions. + */' - key: f text: | - '' + maintenance records. A successful control response will outline the + process for including such metadata in maintenance records. + */' - control_key: MA-3 standard_key: NIST-800-53 @@ -79,9 +96,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + The customer will be responsible for approving, controlling, and + monitoring information system maintenance records. A successful + control response will document this process. + */' - control_key: MA-3 (1) standard_key: NIST-800-53 @@ -89,10 +108,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will document this process. + */' - control_key: MA-3 (2) standard_key: NIST-800-53 @@ -100,10 +121,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + documents this process. + */' - control_key: MA-3 (3) standard_key: NIST-800-53 @@ -111,14 +134,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorizes removal of equipment from the facility + */' - control_key: MA-4 standard_key: NIST-800-53 @@ -127,7 +152,8 @@ satisfies: narrative: - key: a text: | - '' + and how those activities are tracked. + */' - key: b text: | - '' + performing maintenance and diagnostic activities. + */' - key: c text: | - '' + multifactor authentication. + */' - key: d text: | - '' + as well as the contents of those records. + */' - key: e text: | - '' + monitoring and enforcement of the disconnectionr requirement. + */' - control_key: MA-4 (2) standard_key: NIST-800-53 @@ -170,12 +205,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + udner what circumstances connections must be terminated. + */' - control_key: MA-5 standard_key: NIST-800-53 @@ -184,24 +221,30 @@ satisfies: narrative: - key: a text: | - '' + document this process and where the records are kept. + */' - key: b text: | - '' + signing off on this access. + */' - key: c text: | - '' + how technical competence is established. + */' - control_key: MA-5 (1) standard_key: NIST-800-53 @@ -210,7 +253,8 @@ satisfies: narrative: - key: a text: | - '' + disconnected from the system and secured. + */' - key: b text: | - '' + data residing on the informarion system. + */' - control_key: MA-6 standard_key: NIST-800-53 @@ -234,6 +281,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + to minimize production impact. + */' diff --git a/OpenShift-v3/policies/MP-Media_Protection/component.yaml b/OpenShift-v3/policies/MP-Media_Protection/component.yaml index c2743ef..783d766 100644 --- a/OpenShift-v3/policies/MP-Media_Protection/component.yaml +++ b/OpenShift-v3/policies/MP-Media_Protection/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Media Protection schema_version: 3.0.0 @@ -9,7 +10,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-1 goes here. + Narrative text on how product can be configured against MP-1. This answer can be multi-line. @@ -19,7 +20,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-2 goes here. + Narrative text on how product can be configured against MP-2. This answer can be multi-line. @@ -29,7 +30,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-3 goes here. + Narrative text on how product can be configured against MP-3. This answer can be multi-line. @@ -39,7 +40,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-4 goes here. + Narrative text on how product can be configured against MP-4. This answer can be multi-line. @@ -49,7 +50,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-5 goes here. + Narrative text on how product can be configured against MP-5. This answer can be multi-line. @@ -59,7 +60,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-5 (4) goes here. + Narrative text on how product can be configured against MP-5 (4). This answer can be multi-line. @@ -69,7 +70,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-6 goes here. + Narrative text on how product can be configured against MP-6. This answer can be multi-line. @@ -79,7 +80,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-6 (2) goes here. + Narrative text on how product can be configured against MP-6 (2). This answer can be multi-line. @@ -89,7 +90,7 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-7 goes here. + Narrative text on how product can be configured against MP-7. This answer can be multi-line. @@ -99,6 +100,6 @@ satisfies: implimentation_status: none narrative: - text: | - Narrative text on how product can be configured against MP-7 (1) goes here. + Narrative text on how product can be configured against MP-7 (1). This answer can be multi-line. diff --git a/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml b/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml index f391d07..23b1edd 100644 --- a/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml +++ b/OpenShift-v3/policies/PE-Physical_and_Environmental_Protection/component.yaml @@ -1 +1,16 @@ -# Nothing here - no Physical Controls associated to OpenShift +--- +documentation_complete: false +name: Planning +schema_version: 3.0.0 +satisfies: + +- control_key: PE-1 + standard_key: NIST-800-53 + covered_by: [] + implimentation_status: none + narrative: + - key: a + text: | + '//* + Text goes here - testing + */' diff --git a/OpenShift-v3/policies/PL-Planning/component.yaml b/OpenShift-v3/policies/PL-Planning/component.yaml index 0e363ef..133b7ca 100644 --- a/OpenShift-v3/policies/PL-Planning/component.yaml +++ b/OpenShift-v3/policies/PL-Planning/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Planning schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + approval of the updates. + */' - control_key: PL-2 standard_key: NIST-800-53 @@ -33,45 +38,55 @@ satisfies: narrative: - key: a text: | - '' + infrastructure providers SSP. + */' - key: b text: | - '' + appropriately. + */' - key: c text: | - '' + individuals responsible for review. + */' - key: d text: | - '' + the process for approval of any updates. + */' - key: e text: | - '' + are in place to protect the system security plan. + */' - control_key: PL-2 (3) standard_key: NIST-800-53 @@ -79,13 +94,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + consulted regarding such activities. + */' - control_key: PL-4 standard_key: NIST-800-53 @@ -94,29 +111,37 @@ satisfies: narrative: - key: a text: | - '' + available to users requiring access to the system. + */' - key: b text: | - '' + signatures are obtained. + */' - key: c text: | - '' + approving the final version. + */' - key: d text: | - '' + are not obtained in a timely manner. + */' - control_key: PL-4 (1) standard_key: NIST-800-53 @@ -124,11 +149,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + relevant portions of the rules of behavior. + */' - control_key: PL-8 standard_key: NIST-800-53 @@ -137,25 +164,31 @@ satisfies: narrative: - key: a text: | - '' + in the introductory sections of this system security plan. + */' - key: b text: | - '' + managing updates, and approving the final version. + */' - key: c text: | - '' + individuals or roles responsible for that alignment. + */' diff --git a/OpenShift-v3/policies/PS-Personnel_Security/component.yaml b/OpenShift-v3/policies/PS-Personnel_Security/component.yaml index 794205e..851a8d6 100644 --- a/OpenShift-v3/policies/PS-Personnel_Security/component.yaml +++ b/OpenShift-v3/policies/PS-Personnel_Security/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Personnel Security schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: PS-2 standard_key: NIST-800-53 @@ -33,26 +38,32 @@ satisfies: narrative: - key: a text: | - '' + to certain types of data, etc.). + */' - key: b text: | - '' + associated with each risk designation. + */' - key: c text: | - '' + designations, and providing approval of any changes. + */' - control_key: PS-3 standard_key: NIST-800-53 @@ -61,16 +72,20 @@ satisfies: narrative: - key: a text: | - '' + requirements established in PS-2. + */' - key: b text: | - '' + removing access if rescreening is not completed in a timely manner. + */' - control_key: PS-3 (3) standard_key: NIST-800-53 @@ -78,12 +93,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorization of access + */' - control_key: PS-4 standard_key: NIST-800-53 @@ -92,45 +109,57 @@ satisfies: narrative: - key: a text: | - '' + completing the request. + */' - key: b text: | - '' + terminating or revoking each. + */' - key: c text: | - '' + the interviews. + */' - key: d text: | - '' + is retrieved. + */' - key: e text: | - '' + maximum retention periods. + */' - key: f text: | - '' + by which notification happens. + */' - control_key: PS-5 standard_key: NIST-800-53 @@ -139,32 +168,40 @@ satisfies: narrative: - key: a text: | - '' + the results of reviews. + */' - key: b text: | - '' + actions, and timeframes for initiation of those actions. + */' - key: c text: | - '' + change, and any technical means of enforcement of the change. + */' - key: d text: | - '' + occurs. + */' - control_key: PS-6 standard_key: NIST-800-53 @@ -173,26 +210,32 @@ satisfies: narrative: - key: a text: | - '' + are used. + */' - key: b text: | - '' + process for approval of any changes. + */' - key: c text: | - '' + a timely manner. + */' - control_key: PS-7 standard_key: NIST-800-53 @@ -201,35 +244,45 @@ satisfies: narrative: - key: a text: | - '' + for notifying third-party providers of the requirements. + */' - key: b text: | - '' + agreement to the requirements and enforcing the requirements. + */' - key: c text: | - '' + it with the providers. + */' - key: d text: | - '' + notification within the same day. + */' - key: e text: | - '' + mechanisms used for monitoring, and consequences of non-compliance. + */' - control_key: PS-8 standard_key: NIST-800-53 @@ -238,15 +291,19 @@ satisfies: narrative: - key: a text: | - '' + specific measures that may be enforced for each. + */' - key: b text: | - '' + indivual sanctioned and the reason for the sanction). + */' diff --git a/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml b/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml index bc14d59..3f88950 100644 --- a/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml +++ b/OpenShift-v3/policies/RA-Risk_Assessment/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Risk Assessment schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: RA-2 standard_key: NIST-800-53 @@ -33,7 +38,8 @@ satisfies: narrative: - key: a text: | - '' + Types of Information and Inforation Systems to Security Categories. + */' - key: b text: | - '' + analysis, and input from stakeholders and organizational officials. + */' - key: c text: | - '' + designated representative for review and approval. + */' - control_key: RA-3 standard_key: NIST-800-53 @@ -62,11 +73,12 @@ satisfies: narrative: - key: a text: | - '' + assessment. + */' - key: b text: | - '' + the initial risk assessment (see CA-2). + */' - key: c text: | - '' + well as any actions taken in response to risk assessment results. + */' - key: d text: | - '' + involved and the means of distribution of results. + */' - key: e text: | - '' + other documentation). + */' - control_key: RA-5 standard_key: NIST-800-53 @@ -117,43 +138,53 @@ satisfies: narrative: - key: a text: | - '' + scan the system on an annual basis. + */' - key: b text: | - '' + Exposures (CVE) values). + */' - key: c text: | - '' + analysis, as well as criteria used in performing the analysis. + */' - key: d text: | - '' + met. + */' - key: e text: | - '' + each stakeholder. + */' - control_key: RA-5 (1) standard_key: NIST-800-53 @@ -161,12 +192,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for each. + */' - control_key: RA-5 (2) standard_key: NIST-800-53 @@ -174,11 +207,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + initiating a new scan if the required update does not occur. + */' - control_key: RA-5 (3) standard_key: NIST-800-53 @@ -186,11 +221,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + provide sufficient breadth and depth of coverage. + */' - control_key: RA-5 (5) standard_key: NIST-800-53 @@ -198,11 +235,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + authorization is validated during the analysis of scan results. + */' - control_key: RA-5 (6) standard_key: NIST-800-53 @@ -210,10 +249,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + and the metrics employed in scan result analysis. + */' - control_key: RA-5 (8) standard_key: NIST-800-53 @@ -221,8 +262,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + data with vulnerability scan results. + */' diff --git a/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml b/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml index 6b3c6d3..0e19cc8 100644 --- a/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml +++ b/OpenShift-v3/policies/SA-System_and_Services_Acquisition/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: System and Services Acquisition schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + of the updates. + */' - control_key: SA-2 standard_key: NIST-800-53 @@ -33,24 +38,30 @@ satisfies: narrative: - key: a text: | - '' + integrated into mission/business planning. + */' - key: b text: | - '' + has been incorporated into financial planning processes. + */' - key: c text: | - '' + organization. + */' - control_key: SA-3 standard_key: NIST-800-53 @@ -59,31 +70,39 @@ satisfies: narrative: - key: a text: | - '' + plans. + */' - key: b text: | - '' + stages of the information systems lifecycle. + */' - key: c text: | - '' + information. + */' - key: d text: | - '' + NIST Risk Management Framework, or an agency-specific derivative. + */' - control_key: SA-4 standard_key: NIST-800-53 @@ -92,61 +111,75 @@ satisfies: narrative: - key: a text: | - '' + of the contracts. + */' - key: b text: | - '' + of the contracts. + */' - key: c text: | - '' + of the contracts. + */' - key: d text: | - '' + of the contracts. + */' - key: e text: | - '' + creation of the contracts. + */' - key: f text: | - '' + of the contracts. + */' - key: g text: | - '' + contracts. + */' - control_key: SA-4 (1) standard_key: NIST-800-53 @@ -154,11 +187,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + procurement language. + */' - control_key: SA-4 (2) standard_key: NIST-800-53 @@ -166,13 +201,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + into procurement language. + */' - control_key: SA-4 (8) standard_key: NIST-800-53 @@ -180,11 +217,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + by the customer as part of these continuous monitoring activities. + */' - control_key: SA-4 (9) standard_key: NIST-800-53 @@ -192,11 +231,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + which this requirement is enforced. + */' - control_key: SA-4 (10) standard_key: NIST-800-53 @@ -204,13 +245,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + signature. + */' - control_key: SA-5 standard_key: NIST-800-53 @@ -219,37 +262,47 @@ satisfies: narrative: - key: a text: | - '' + outlined in the control + */' - key: b text: | - '' + the control. + */' - key: c text: | - '' + taken. + */' - key: d text: | - '' + in accordance with the organizations risk management strategy. + */' - key: e text: | - '' + or roles. + */' - control_key: SA-8 standard_key: NIST-800-53 @@ -257,10 +310,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + response will discuss the processes followed. + */' - control_key: SA-9 standard_key: NIST-800-53 @@ -269,26 +324,32 @@ satisfies: narrative: - key: a text: | - '' + external information systems. + */' - key: b text: | - '' + the procedures for this oversight. + */' - key: c text: | - '' + accomplish this. + */' - control_key: SA-9 (1) standard_key: NIST-800-53 @@ -297,16 +358,20 @@ satisfies: narrative: - key: a text: | - '' + address the process of the risk assessment and analysis of findings. + */' - key: b text: | - '' + address formal approval processes. + */' - control_key: SA-9 (2) standard_key: NIST-800-53 @@ -314,11 +379,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + will indicate this requirement in contracting language. + */' - control_key: SA-9 (4) @@ -327,11 +394,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + how FedRAMP security requirements are enforced in external systems. + */' - control_key: SA-9 (5) standard_key: NIST-800-53 @@ -339,9 +408,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + continental United States datacenters based on business requirements. + */' - control_key: SA-10 standard_key: NIST-800-53 @@ -350,34 +421,44 @@ satisfies: narrative: - key: a text: | - '' + mechanisms involved in configuration management. + */' - key: b text: | - '' + address the processes and mechanisms involved in these activities. + */' - key: c text: | - '' + changes are implemented. + */' - key: d text: | - '' + response will need to discuss the process for documentation. + */' - key: e text: | - '' + process and tools used for tracking, resolution, and reporting. + */' - control_key: SA-10 (1) standard_key: NIST-800-53 @@ -385,7 +466,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + https://access.redhat.com/articles/2750891 + */' - control_key: SA-11 standard_key: NIST-800-53 @@ -403,40 +486,50 @@ satisfies: narrative: - key: a text: | - '' + response will need to outline the security assessment plan. + */' - key: b text: | - '' + performed and the depth required. + */' - key: c text: | - '' + obtains and reviews the evidence and results of testing. + */' - key: d text: | - '' + addressed. + */' - key: e text: | - '' + of the correction. + */' - control_key: SA-11 (1) standard_key: NIST-800-53 @@ -444,11 +537,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + common flaws, and the process for documenting results of testing. + */' - control_key: SA-11 (2) standard_key: NIST-800-53 @@ -456,13 +551,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + are reviewed and mitigated. + */' - control_key: SA-11 (8) @@ -471,8 +568,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + common flaws, and the process for documenting results of testing. + */' diff --git a/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml b/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml index 1a93d01..36b58f0 100644 --- a/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml +++ b/OpenShift-v3/policies/SC-Systems_and_Communications_Protection/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: Systems and Communications Protection schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + of the policies and associated controls). + */' - key: b text: | - '' + approval of the updates. + */' - control_key: SC-2 standard_key: NIST-800-53 @@ -32,10 +37,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + instance. + */' - control_key: SC-4 standard_key: NIST-800-53 @@ -43,9 +50,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + successful control response will discuss how this is prevented. + */' - control_key: SC-5 standard_key: NIST-800-53 @@ -53,12 +62,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + from these attacks. + */' - control_key: SC-6 standard_key: NIST-800-53 @@ -66,10 +77,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + discuss how resource availability is protected. + */' - control_key: SC-7 standard_key: NIST-800-53 @@ -78,22 +91,28 @@ satisfies: narrative: - key: a text: | - '' + response will address how communications are monitored and shaped. + */' - key: b text: | - '' + component traffic is separated. + */' - key: c text: | - '' + managed interfaces and boundary protection devices. + */' - control_key: SC-7 (3) standard_key: NIST-800-53 @@ -101,10 +120,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + enforcement. + */' - control_key: SC-7 (4) standard_key: NIST-800-53 @@ -133,9 +154,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + by exception (i.e. deny all, permit by exception). + */' - control_key: SC-7 (7) standard_key: NIST-800-53 @@ -143,9 +166,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + internal and external networks. + */' - control_key: SC-7 (12) standard_key: NIST-800-53 @@ -153,9 +178,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + local firewalld and SELinux policies. + */' - control_key: SC-7 (13) standard_key: NIST-800-53 @@ -163,12 +190,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + control. + */' - control_key: SC-7 (18) standard_key: NIST-800-53 @@ -184,12 +213,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + operating in FIPS mode. + */' - control_key: SC-8 (1) standard_key: NIST-800-53 @@ -197,11 +228,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + network communications that carry customer data. + */' - control_key: SC-10 standard_key: NIST-800-53 @@ -209,10 +242,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + means on how this is established. + */' - control_key: SC-12 standard_key: NIST-800-53 @@ -220,7 +255,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + + */' - control_key: SC-12 (2) standard_key: NIST-800-53 @@ -238,12 +275,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the reasons they are considered compliant. + */' - control_key: SC-12 (3) standard_key: NIST-800-53 @@ -251,12 +290,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + compliant. + */' - control_key: SC-13 standard_key: NIST-800-53 @@ -264,9 +305,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + in FIPS mode, follow CCE-80359-3, "Enable FIPS Mode in GRUB2". + */' - control_key: SC-15 standard_key: NIST-800-53 @@ -275,21 +318,27 @@ satisfies: narrative: - key: a text: | - '' + the customer application. + */' - key: b text: | - '' + it takes, and the means by which activation can be verified. + */' - key: 'Req. 1' text: | - '' + or controlled from the customer application. + */' - control_key: SC-17 standard_key: NIST-800-53 @@ -297,12 +346,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + service provider and the process by which certificates are obtained. + */' - control_key: SC-18 standard_key: NIST-800-53 @@ -311,19 +362,25 @@ satisfies: narrative: - key: a text: | - '' + unacceptable for use within the system. + */' - key: b text: | - '' + code technologies. + */' - key: c text: | - '' + '//* + The customer will be responsible for authorizing, monitoring, and + controlling the use of mobile code within the system. + */' - control_key: SC-19 standard_key: NIST-800-53 @@ -332,15 +389,19 @@ satisfies: narrative: - key: a text: | - '' + the conditions under which that usage is appropriate. + */' - key: b text: | - '' + '//* + The customer will be responsible for authorizing, monitoring, and + controlling the use of VoIP within the system. + */' - control_key: SC-20 standard_key: NIST-800-53 @@ -349,18 +410,22 @@ satisfies: narrative: - key: a text: | - '' + accomplish this. + */' - key: b text: | - '' + accomplish this. + */' - control_key: SC-21 standard_key: NIST-800-53 @@ -368,9 +433,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + endpoints. + */' - control_key: SC-22 standard_key: NIST-800-53 @@ -378,9 +445,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + separation. + */' - control_key: SC-23 standard_key: NIST-800-53 @@ -388,7 +457,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the authenticity of communications sessions. + */' - control_key: SC-28 standard_key: NIST-800-53 @@ -404,8 +475,10 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + A successful control response will need to address the means by + which data at rest is protected. + */' - control_key: SC-28 (1) standard_key: NIST-800-53 @@ -413,7 +486,8 @@ satisfies: implimentation_status: none narrative: - text: | - '' + protect confidentiality and integrity of data in transport. + */' - control_key: SC-39 standard_key: NIST-800-53 diff --git a/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml b/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml index 41fd8e7..ab35c17 100644 --- a/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml +++ b/OpenShift-v3/policies/SI-System_and_Information_Integrity/component.yaml @@ -1,3 +1,4 @@ +--- documentation_complete: false name: System and Information Integrity schema_version: 3.0.0 @@ -10,21 +11,25 @@ satisfies: narrative: - key: a text: | - '' + associated controls). + */' - key: b text: | - '' + and providing approval of the updates. + */' - control_key: SI-2 standard_key: NIST-800-53 @@ -33,33 +38,41 @@ satisfies: narrative: - key: a text: | - '' + assist in detection and remediation. + */' - key: b text: | - '' + etc.). + */' - key: c text: | - '' + performing sufficient testing. + */' - key: d text: | - '' + (see the CM family of controls). + */' - control_key: SI-2 (2) @@ -68,13 +81,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the state of system components with regard to flaw remediation. + */' - control_key: SI-2 (3) standard_key: NIST-800-53 @@ -83,19 +98,23 @@ satisfies: narrative: - key: a text: | - '' + using timestamps and calculates the time elapsed difference. + */' - key: b text: | - '' + defined period after a flaws discovery. + */' - control_key: SI-3 standard_key: NIST-800-53 @@ -104,37 +123,45 @@ satisfies: narrative: - key: a text: | - '' + scripts). + */' - key: b text: | - '' + when a new version or definition release becomes available. + */' - key: c text: | - '' + personnel in response to detected malicious code. + */' - key: d text: | - '' + resulting impact of availability to the information system. + */' - control_key: SI-3 (1) standard_key: NIST-800-53 @@ -142,11 +169,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanism is centered in one location. + */' - control_key: SI-3 (2) standard_key: NIST-800-53 @@ -154,11 +183,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + mechanisms definitions are configured to be updated automatically. + */' - control_key: SI-3 (7) standard_key: NIST-800-53 @@ -166,13 +197,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + do not yet exist. + */' - control_key: SI-4 standard_key: NIST-800-53 @@ -181,56 +214,68 @@ satisfies: narrative: - key: a text: | - '' + this control on behalf of infrastructure components. A successful + control response must articulate how both technology and process is + used to identify attacks and indicators of potential attacks. + */' - key: b text: | - '' + not, how each category is uniquely monitored. + */' - key: c text: | - '' + this control on behalf of tenants. + */' - key: d text: | - '' + on behalf of tenants. + */' - key: e text: | - '' + this control on behalf of their IaaS users. + */' - key: g text: | - '' + control on behalf of tenants. + */' - control_key: SI-4 (1) standard_key: NIST-800-53 @@ -238,12 +283,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + systems. + */' - control_key: SI-4 (2) standard_key: NIST-800-53 @@ -251,14 +298,16 @@ satisfies: implimentation_status: none narrative: - text: | - '' + technology and processes are in place to support near-realtime + analysis of events. + */' - control_key: SI-4 (4) standard_key: NIST-800-53 @@ -266,12 +315,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + how network traffic is continuously monitored. + */' - control_key: SI-4 (5) standard_key: NIST-800-53 @@ -279,11 +330,13 @@ satisfies: implimentation_status: none narrative: - text: | - '' + name or position title(s), and the mechanism of the notification. + */' - control_key: SI-4 (14) standard_key: NIST-800-53 @@ -292,7 +345,8 @@ satisfies: narrative: - text: | 'An OpenShift infrastructure does not have wireless capabilities. This - control is Not Applicable.>' + control is Not Applicable. + */' - control_key: SI-4 (16) standard_key: NIST-800-53 @@ -300,9 +354,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + is frequently accomplished with centralized audit reduction tools. + */' - control_key: SI-4 (23) standard_key: NIST-800-53 @@ -310,9 +366,11 @@ satisfies: implimentation_status: none narrative: - text: | - '' + '//* + The customer will be responsible for installing host-based monitoring + mechanisms. A successful control response will need to discuss how + various elements of the OpenShift infrastructure are monitored. + */' - control_key: SI-5 standard_key: NIST-800-53 @@ -321,30 +379,38 @@ satisfies: narrative: - key: a text: | - '' + directives (including US-CERT as required by FedRAMP. + */' - key: b text: | - '' + mission, software, or service. + */' - key: c text: | - '' + require notificiation. + */' - key: d text: | - '' + successful control response will need to address how the organization + meets established time frames for implementing security directives. + */' - control_key: SI-6 standard_key: NIST-800-53 @@ -353,32 +419,40 @@ satisfies: narrative: - key: a text: | - '' + testing the correct operation and resolving any issues found. + */' - key: b text: | - '' + of security function verification. + */' - key: c text: | - '' + administrators and security personnel as required by FedRAMP). + */' - key: d text: | - '' + by FedRAMP) as well as the rationale for selecting these actions. + */' - control_key: SI-7 standard_key: NIST-800-53 @@ -386,10 +460,12 @@ satisfies: implimentation_status: none narrative: - text: | - '' + the integrity-checking mechanisms these tools employ. + */' - control_key: SI-7 (1) standard_key: NIST-800-53 @@ -397,12 +473,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + for selecting those criteria. + */' - control_key: SI-7 (7) standard_key: NIST-800-53 @@ -410,12 +488,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + needed. + */' - control_key: SI-8 standard_key: NIST-800-53 @@ -451,12 +531,14 @@ satisfies: implimentation_status: none narrative: - text: | - '' + taken by the system to invalid inputs. + */' - control_key: SI-11 standard_key: NIST-800-53 @@ -465,18 +547,22 @@ satisfies: narrative: - key: a text: | - '' + messages are created, analyzed, and corrected when necessary. + */' - key: b text: | - '' + to error messages is controlled. + */' - control_key: SI-12 standard_key: NIST-800-53 @@ -484,13 +570,15 @@ satisfies: implimentation_status: none narrative: - text: | - '' + means by which those requirements are met. + */' - control_key: SI-16 standard_key: NIST-800-53 @@ -498,62 +586,64 @@ satisfies: implimentation_status: none narrative: - text: | - '' + + */' From 3bbcbda014c5db2954834bcbfc0c088577bbff19 Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Fri, 12 May 2017 01:53:25 -0400 Subject: [PATCH 6/7] removing whitespaces --- .../policies/AC-Access_Control/component.yaml | 14 +++++++------- .../AU-Audit_and_Accountability/component.yaml | 12 ++++++------ .../CM-Configuration_Management/component.yaml | 2 +- .../CP-Contingency_Planning/component.yaml | 2 +- .../component.yaml | 4 ++-- .../component.yaml | 2 +- .../component.yaml | 2 +- .../component.yaml | 2 +- 8 files changed, 20 insertions(+), 20 deletions(-) diff --git a/OpenShift-v3/policies/AC-Access_Control/component.yaml b/OpenShift-v3/policies/AC-Access_Control/component.yaml index 5451711..3586b36 100644 --- a/OpenShift-v3/policies/AC-Access_Control/component.yaml +++ b/OpenShift-v3/policies/AC-Access_Control/component.yaml @@ -11,7 +11,7 @@ satisfies: narrative: - key: a text: | - '//* + '//* The customer will be responsible for developing, documenting, and disseminating Access Control policy and procedures. A successful control response will need to address the content of the policy @@ -32,7 +32,7 @@ satisfies: - key: b text: | - '//* + '//* The customer will be responsible for reviewing and updating the Access Control policy every 3 years, and procedures annually. A successful control response will need to address and review and @@ -274,7 +274,7 @@ satisfies: for the management of Role Bindings can be found at: https://docs.openshift.com/container-platform/latest/admin_guide/ - manage_authorization_policy.html#managing-role-bindings + manage_authorization_policy.html#managing-role-bindings */' - key: b @@ -320,7 +320,7 @@ satisfies: Labels in OpenShift Cluster Administration Guide: https://docs.openshift.com/container-platform/3.3/admin_guide/ - manage_users.html#managing-users-managing-user-and-group-labels + manage_users.html#managing-users-managing-user-and-group-labels */' - control_key: AC-2 (10) @@ -372,7 +372,7 @@ satisfies: Configuration guide: https://docs.openshift.com/container-platform/3.3/install_config/ - aggregate_logging.html + aggregate_logging.html */' - key: b @@ -396,7 +396,7 @@ satisfies: processes/configurations. Documentation can be found at: https://docs.openshift.com/container-platform/3.3/architecture/ - additional_concepts/authorization.html + additional_concepts/authorization.html */' - control_key: AC-4 @@ -416,7 +416,7 @@ satisfies: Architecture guide: https://docs.openshift.com/container-platform/3.3/architecture/ - additional_concepts/networking.html + additional_concepts/networking.html */' - control_key: AC-4 (21) diff --git a/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml b/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml index 8774093..05b5dbf 100644 --- a/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml +++ b/OpenShift-v3/policies/AU-Audit_and_Accountability/component.yaml @@ -80,7 +80,7 @@ satisfies: here: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/ - html/Security_Guide/sec-configuring_the_audit_service.html + html/Security_Guide/sec-configuring_the_audit_service.html */' - control_key: AU-2 (3) @@ -247,7 +247,7 @@ satisfies: Configuration guide: https://docs.openshift.com/container-platform/3.3/install_config/ - aggregate_logging.html + aggregate_logging.html */' - key: b @@ -259,7 +259,7 @@ satisfies: documents can be found publicly at: https://www.redhat.com/en/technologies/industries/government/standards - + */' - control_key: AU-7 (1) @@ -306,7 +306,7 @@ satisfies: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/ 7/html/System_Administrators_Guide/chap-Configuring_the_Date_and_Time. - html#sect-Configuring_the_Date_and_Time-timedatectl-Time_Zone + html#sect-Configuring_the_Date_and_Time-timedatectl-Time_Zone */' - control_key: AU-8 (1) @@ -341,7 +341,7 @@ satisfies: 7 System Administrators guide: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/ - 7/html/System_Administrators_Guide/s1-Configure_NTP.html + 7/html/System_Administrators_Guide/s1-Configure_NTP.html */' - key: 'Req.1' @@ -448,7 +448,7 @@ satisfies: Date: Fri, 12 May 2017 01:53:35 -0400 Subject: [PATCH 7/7] create make check --- OpenShift-v3/Makefile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/OpenShift-v3/Makefile b/OpenShift-v3/Makefile index 753b517..df68350 100644 --- a/OpenShift-v3/Makefile +++ b/OpenShift-v3/Makefile @@ -22,7 +22,7 @@ clean: rm -rf exports/ opencontrols/ pdf: exports - cd exports/ && gitbook pdf ./ ./Red_Hat_Enterprise_Linux_7_Compliance.pdf + cd exports/ && gitbook pdf ./ ./OpenShift_v3_Compliance.pdf serve: exports cd exports && gitbook serve @@ -37,7 +37,7 @@ coverage: ${CM} diff FedRAMP-low fedramp: default - ${GOPATH}/bin/fedramp-templater fill opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx exports/FedRAMP-Filled-v2.1.docx + ${GOPATH}/bin/fedramp-templater fill opencontrols/ ../FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx exports/FedRAMP-Filled-v2.1.docx fedramp-diff: ${GOPATH}/bin/fedramp-templater diff opencontrols/ FedRAMP_Template/FedRAMP-System-Security-Plan-Template-v2.1.docx