Check for impact level of leveraged authorizations in a SSP #888
Labels
constraint: completeness
enhancement
New feature or request
model: ssp
scope: constraints
type: task
Milestone
Constraint Task
As a maintainer of a digital authorization package, in order to know I am using the appropriate version of a leveraged authorization in my package SSP and avoid a pass-back, I would like a check in my SSP to confirm the appropriate FIPS-199 impact level for the my leveraged system(s).
Intended Outcome
Goal
Check for FIPS-199 low, moderate, or high impact level for leveraged authorization(s) defined.
NOTE: There is a pre-existing
let/@var
that is used to select the "high-water mark value" of a similar selection in the security-senstivity-level of the system characteristics (e.g. not any allowed value, but the highest value). Thisexpect
solution is desirable because it can have a tailored custom error message, whileallowed-values
can not. You MAY chose to adjust the var/expression binding or create a new item, but @aj-stein-gsa recommends anexpect
constraint due to the customization of the message, you MUST still review that expression and constraint.Syntax
expect
/allowed-values
constraint (this is a developer design decision; see the NOTE above and consult with the development team if unsure) with that permits only the following values for the Metapath below:fips-199-low
fips-199-moderate
fips-199-high
Syntax Type
This is a FedRAMP constraint in the FedRAMP-specific namespace.
Allowed Values
FedRAMP allowed values must be defined or verified.
Metapath(s) to Content
Purpose of the OSCAL Content
No response
Dependencies
No response
Acceptance Criteria
oscal-cli metaschema metapath eval -e "expression"
.Other information
This task is part of #807.
The text was updated successfully, but these errors were encountered: