You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For network components that support leveraged authorizations and interconnections in different scenarios, you need to identify the connection security characteristics for those components.
Intended Outcome
Determine there is a connection-security property for the relevant components.
Syntax Type
This is required core OSCAL syntax.
Allowed Values
There are no relevant allowed values.
Metapath(s) to Content
<!-- Metapath target context -->
//component[ (@type='service' and not(./prop[@name='leveraged-authorization-uuid']) and ./prop[@name='implementation-point' and @value='external']) or (@type='interconnection') or (@type='service' and ./prop[@name='implementation-point' and @value='internal'] and ./prop[@name='direction']) or (@type='software' and ./prop[@name='asset-type' and @value='cli'] and ./prop[@name='direction']) ]
<!-- Constraint requirement: There must be at least one connection security property. -->
count(./prop[@name='connection-security' and @ns='http://fedramp.gov/ns/oscal']) >= 1
Purpose of the OSCAL Content
Allow reviewers to understand how network system components manage risk and conform to FedRAMP requirements and best practices.
Dependencies
No response
Acceptance Criteria
All OSCAL adoption content affected by the change in this issue have been updated in accordance with the Documentation Standards.
Explanation is present and accurate
sample content is present and accurate
Metapath is present, accurate, and does not throw a syntax exception using oscal-cli metaschema metapath eval -e "expression".
All constraints associated with the review task have been created
The appropriate example OSCAL file is updated with content that demonstrates the FedRAMP-compliant OSCAL presentation.
The constraint conforms to the FedRAMP Constraint Style Guide.
All automated and manual review items that identify non-conformance are addressed; or technical leads (David Waltermire; AJ Stein) have approved the PR and “override” the style guide requirement.
Known good test content is created for unit testing.
Known bad test content is created for unit testing.
Unit testing is configured to run both known good and known bad test content examples.
Passing and failing unit tests, and corresponding test vectors in the form of known valid and invalid OSCAL test files, are created or updated for each constraint.
A Pull Request (PR) is submitted that fully addresses the goals section of the User Story in the issue.
Constraint Task
For network components that support leveraged authorizations and interconnections in different scenarios, you need to identify the connection security characteristics for those components.
Intended Outcome
Determine there is a connection-security property for the relevant components.
Syntax Type
This is required core OSCAL syntax.
Allowed Values
There are no relevant allowed values.
Metapath(s) to Content
Purpose of the OSCAL Content
Allow reviewers to understand how network system components manage risk and conform to FedRAMP requirements and best practices.
Dependencies
No response
Acceptance Criteria
oscal-cli metaschema metapath eval -e "expression"
.Other information
These tasks are part of #807 and #808.
The text was updated successfully, but these errors were encountered: