-
Notifications
You must be signed in to change notification settings - Fork 6
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
adds Example component to example-component component definition [ski…
…p ci]
- Loading branch information
1 parent
b042f01
commit af93903
Showing
9 changed files
with
567 additions
and
0 deletions.
There are no files selected for viewing
126 changes: 126 additions & 0 deletions
126
component-definitions/example-component/component-definition.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,126 @@ | ||
{ | ||
"component-definition": { | ||
"uuid": "b30a86e9-fda4-4eb1-a38f-8a635dff0080", | ||
"metadata": { | ||
"title": "Component definition for example-component", | ||
"last-modified": "2024-09-13T21:42:30+00:00", | ||
"version": "1.0", | ||
"oscal-version": "1.1.2" | ||
}, | ||
"components": [ | ||
{ | ||
"uuid": "d8535bfa-ca46-4b12-bccb-09027a9f85cc", | ||
"type": "service", | ||
"title": "Example", | ||
"description": "My example components", | ||
"props": [ | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-ac-2", | ||
"remarks": "rule_set_0" | ||
}, | ||
{ | ||
"name": "Rule_Description", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "Rule for ac-2", | ||
"remarks": "rule_set_0" | ||
}, | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-sc-1", | ||
"remarks": "rule_set_1" | ||
}, | ||
{ | ||
"name": "Rule_Description", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "Rule for sc-1", | ||
"remarks": "rule_set_1" | ||
}, | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-ac-4.4", | ||
"remarks": "rule_set_2" | ||
}, | ||
{ | ||
"name": "Rule_Description", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "Rule for ac-4.4", | ||
"remarks": "rule_set_2" | ||
}, | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-ac-1", | ||
"remarks": "rule_set_3" | ||
}, | ||
{ | ||
"name": "Rule_Description", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "Rule for ac-1", | ||
"remarks": "rule_set_3" | ||
} | ||
], | ||
"control-implementations": [ | ||
{ | ||
"uuid": "71404fca-e869-457a-8bde-d667b2968f10", | ||
"source": "trestle://profiles/example/profile.json", | ||
"description": "Example", | ||
"implemented-requirements": [ | ||
{ | ||
"uuid": "39d22e71-7551-4072-b4e5-4c78f777b8c0", | ||
"control-id": "ac-2", | ||
"description": "", | ||
"props": [ | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-ac-2" | ||
} | ||
] | ||
}, | ||
{ | ||
"uuid": "82ba0121-8531-48bf-938e-9554997f9825", | ||
"control-id": "sc-1", | ||
"description": "", | ||
"props": [ | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-sc-1" | ||
} | ||
] | ||
}, | ||
{ | ||
"uuid": "ad730b51-b905-405c-b515-381a263867bd", | ||
"control-id": "ac-4.4", | ||
"description": "", | ||
"props": [ | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-ac-4.4" | ||
} | ||
] | ||
}, | ||
{ | ||
"uuid": "f7126c84-3b8d-44e2-b617-6908f7d8bacd", | ||
"control-id": "ac-1", | ||
"description": "", | ||
"props": [ | ||
{ | ||
"name": "Rule_Id", | ||
"ns": "https://oscal-compass.github.io/compliance-trestle/schemas/oscal", | ||
"value": "rule-ac-1" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
] | ||
} | ||
] | ||
} | ||
} |
99 changes: 99 additions & 0 deletions
99
markdown/components/example-component/Example/example/ac/ac-1.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,99 @@ | ||
--- | ||
x-trestle-comp-def-rules: | ||
Example: | ||
- name: rule-ac-1 | ||
description: Rule for ac-1 | ||
x-trestle-param-values: | ||
ac-1_prm_1: | ||
ac-01_odp.01: | ||
ac-01_odp.02: | ||
ac-01_odp.03: | ||
ac-01_odp.04: | ||
ac-01_odp.05: | ||
ac-01_odp.06: | ||
ac-01_odp.07: | ||
ac-01_odp.08: | ||
x-trestle-global: | ||
profile: | ||
title: Example | ||
href: trestle://profiles/example/profile.json | ||
sort-id: ac-01 | ||
--- | ||
|
||
# ac-1 - \[Access Control\] Policy and Procedures | ||
|
||
## Control Statement | ||
|
||
- \[a.\] Develop, document, and disseminate to {{ insert: param, ac-1_prm_1 }}: | ||
|
||
- \[1.\] {{ insert: param, ac-01_odp.03 }} access control policy that: | ||
|
||
- \[(a)\] Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and | ||
- \[(b)\] Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and | ||
|
||
- \[2.\] Procedures to facilitate the implementation of the access control policy and the associated access controls; | ||
|
||
- \[b.\] Designate an {{ insert: param, ac-01_odp.04 }} to manage the development, documentation, and dissemination of the access control policy and procedures; and | ||
|
||
- \[c.\] Review and update the current access control: | ||
|
||
- \[1.\] Policy {{ insert: param, ac-01_odp.05 }} and following {{ insert: param, ac-01_odp.06 }} ; and | ||
- \[2.\] Procedures {{ insert: param, ac-01_odp.07 }} and following {{ insert: param, ac-01_odp.08 }}. | ||
|
||
## Control Assessment Objective | ||
|
||
- \[AC-01a.\] | ||
|
||
- \[AC-01a.[01]\] an access control policy is developed and documented; | ||
- \[AC-01a.[02]\] the access control policy is disseminated to {{ insert: param, ac-01_odp.01 }}; | ||
- \[AC-01a.[03]\] access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented; | ||
- \[AC-01a.[04]\] the access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }}; | ||
- \[AC-01a.01\] | ||
|
||
- \[AC-01a.01(a)\] | ||
|
||
- \[AC-01a.01(a)[01]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose; | ||
- \[AC-01a.01(a)[02]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses scope; | ||
- \[AC-01a.01(a)[03]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses roles; | ||
- \[AC-01a.01(a)[04]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities; | ||
- \[AC-01a.01(a)[05]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment; | ||
- \[AC-01a.01(a)[06]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities; | ||
- \[AC-01a.01(a)[07]\] the {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance; | ||
|
||
- \[AC-01a.01(b)\] the {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; | ||
|
||
- \[AC-01b.\] the {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures; | ||
|
||
- \[AC-01c.\] | ||
|
||
- \[AC-01c.01\] | ||
|
||
- \[AC-01c.01[01]\] the current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }}; | ||
- \[AC-01c.01[02]\] the current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }}; | ||
|
||
- \[AC-01c.02\] | ||
|
||
- \[AC-01c.02[01]\] the current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }}; | ||
- \[AC-01c.02[02]\] the current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}. | ||
|
||
## Control guidance | ||
|
||
Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies reflecting the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to access control policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure. | ||
|
||
______________________________________________________________________ | ||
|
||
## What is the solution and how is it implemented? | ||
|
||
<!-- For implementation status enter one of: implemented, partial, planned, alternative, not-applicable --> | ||
|
||
<!-- Note that the list of rules under ### Rules: is read-only and changes will not be captured after assembly to JSON --> | ||
|
||
<!-- Add control implementation description here for control: ac-1 --> | ||
|
||
### Rules: | ||
|
||
- rule-ac-1 | ||
|
||
### Implementation Status: planned | ||
|
||
______________________________________________________________________ |
144 changes: 144 additions & 0 deletions
144
markdown/components/example-component/Example/example/ac/ac-2.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,144 @@ | ||
--- | ||
x-trestle-comp-def-rules: | ||
Example: | ||
- name: rule-ac-2 | ||
description: Rule for ac-2 | ||
x-trestle-param-values: | ||
ac-02_odp.01: | ||
ac-02_odp.02: | ||
ac-02_odp.03: | ||
ac-02_odp.04: | ||
ac-02_odp.05: | ||
ac-02_odp.06: | ||
ac-02_odp.07: | ||
ac-02_odp.08: | ||
ac-02_odp.09: | ||
ac-02_odp.10: | ||
x-trestle-global: | ||
profile: | ||
title: Example | ||
href: trestle://profiles/example/profile.json | ||
sort-id: ac-02 | ||
--- | ||
|
||
# ac-2 - \[Access Control\] Account Management | ||
|
||
## Control Statement | ||
|
||
- \[a.\] Define and document the types of accounts allowed and specifically prohibited for use within the system; | ||
|
||
- \[b.\] Assign account managers; | ||
|
||
- \[c.\] Require {{ insert: param, ac-02_odp.01 }} for group and role membership; | ||
|
||
- \[d.\] Specify: | ||
|
||
- \[1.\] Authorized users of the system; | ||
- \[2.\] Group and role membership; and | ||
- \[3.\] Access authorizations (i.e., privileges) and {{ insert: param, ac-02_odp.02 }} for each account; | ||
|
||
- \[e.\] Require approvals by {{ insert: param, ac-02_odp.03 }} for requests to create accounts; | ||
|
||
- \[f.\] Create, enable, modify, disable, and remove accounts in accordance with {{ insert: param, ac-02_odp.04 }}; | ||
|
||
- \[g.\] Monitor the use of accounts; | ||
|
||
- \[h.\] Notify account managers and {{ insert: param, ac-02_odp.05 }} within: | ||
|
||
- \[1.\] {{ insert: param, ac-02_odp.06 }} when accounts are no longer required; | ||
- \[2.\] {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred; and | ||
- \[3.\] {{ insert: param, ac-02_odp.08 }} when system usage or need-to-know changes for an individual; | ||
|
||
- \[i.\] Authorize access to the system based on: | ||
|
||
- \[1.\] A valid access authorization; | ||
- \[2.\] Intended system usage; and | ||
- \[3.\] {{ insert: param, ac-02_odp.09 }}; | ||
|
||
- \[j.\] Review accounts for compliance with account management requirements {{ insert: param, ac-02_odp.10 }}; | ||
|
||
- \[k.\] Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and | ||
|
||
- \[l.\] Align account management processes with personnel termination and transfer processes. | ||
|
||
## Control Assessment Objective | ||
|
||
- \[AC-02a.\] | ||
|
||
- \[AC-02a.[01]\] account types allowed for use within the system are defined and documented; | ||
- \[AC-02a.[02]\] account types specifically prohibited for use within the system are defined and documented; | ||
|
||
- \[AC-02b.\] account managers are assigned; | ||
|
||
- \[AC-02c.\] {{ insert: param, ac-02_odp.01 }} for group and role membership are required; | ||
|
||
- \[AC-02d.\] | ||
|
||
- \[AC-02d.01\] authorized users of the system are specified; | ||
- \[AC-02d.02\] group and role membership are specified; | ||
- \[AC-02d.03\] | ||
|
||
- \[AC-02d.03[01]\] access authorizations (i.e., privileges) are specified for each account; | ||
- \[AC-02d.03[02]\] {{ insert: param, ac-02_odp.02 }} are specified for each account; | ||
|
||
- \[AC-02e.\] approvals are required by {{ insert: param, ac-02_odp.03 }} for requests to create accounts; | ||
|
||
- \[AC-02f.\] | ||
|
||
- \[AC-02f.[01]\] accounts are created in accordance with {{ insert: param, ac-02_odp.04 }}; | ||
- \[AC-02f.[02]\] accounts are enabled in accordance with {{ insert: param, ac-02_odp.04 }}; | ||
- \[AC-02f.[03]\] accounts are modified in accordance with {{ insert: param, ac-02_odp.04 }}; | ||
- \[AC-02f.[04]\] accounts are disabled in accordance with {{ insert: param, ac-02_odp.04 }}; | ||
- \[AC-02f.[05]\] accounts are removed in accordance with {{ insert: param, ac-02_odp.04 }}; | ||
|
||
- \[AC-02g.\] the use of accounts is monitored; | ||
|
||
- \[AC-02h.\] | ||
|
||
- \[AC-02h.01\] account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.06 }} when accounts are no longer required; | ||
- \[AC-02h.02\] account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred; | ||
- \[AC-02h.03\] account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.08 }} when system usage or the need to know changes for an individual; | ||
|
||
- \[AC-02i.\] | ||
|
||
- \[AC-02i.01\] access to the system is authorized based on a valid access authorization; | ||
- \[AC-02i.02\] access to the system is authorized based on intended system usage; | ||
- \[AC-02i.03\] access to the system is authorized based on {{ insert: param, ac-02_odp.09 }}; | ||
|
||
- \[AC-02j.\] accounts are reviewed for compliance with account management requirements {{ insert: param, ac-02_odp.10 }}; | ||
|
||
- \[AC-02k.\] | ||
|
||
- \[AC-02k.[01]\] a process is established for changing shared or group account authenticators (if deployed) when individuals are removed from the group; | ||
- \[AC-02k.[02]\] a process is implemented for changing shared or group account authenticators (if deployed) when individuals are removed from the group; | ||
|
||
- \[AC-02l.\] | ||
|
||
- \[AC-02l.[01]\] account management processes are aligned with personnel termination processes; | ||
- \[AC-02l.[02]\] account management processes are aligned with personnel transfer processes. | ||
|
||
## Control guidance | ||
|
||
Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan. Users requiring administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access, including system owner, mission or business owner, senior agency information security officer, or senior agency official for privacy. Types of accounts that organizations may wish to prohibit due to increased risk include shared, group, emergency, anonymous, temporary, and guest accounts. | ||
|
||
Where access involves personally identifiable information, security programs collaborate with the senior agency official for privacy to establish the specific conditions for group and role membership; specify authorized users, group and role membership, and access authorizations for each account; and create, adjust, or remove system accounts in accordance with organizational policies. Policies can include such information as account expiration dates or other factors that trigger the disabling of accounts. Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of the two. Examples of other attributes required for authorizing access include restrictions on time of day, day of week, and point of origin. In defining other system account attributes, organizations consider system-related requirements and mission/business requirements. Failure to consider these factors could affect system availability. | ||
|
||
Temporary and emergency accounts are intended for short-term use. Organizations establish temporary accounts as part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts, including local logon accounts used for special tasks or when network resources are unavailable (may also be known as accounts of last resort). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include when shared/group, emergency, or temporary accounts are no longer required and when individuals are transferred or terminated. Changing shared/group authenticators when members leave the group is intended to ensure that former group members do not retain access to the shared or group account. Some types of system accounts may require specialized training. | ||
|
||
______________________________________________________________________ | ||
|
||
## What is the solution and how is it implemented? | ||
|
||
<!-- For implementation status enter one of: implemented, partial, planned, alternative, not-applicable --> | ||
|
||
<!-- Note that the list of rules under ### Rules: is read-only and changes will not be captured after assembly to JSON --> | ||
|
||
<!-- Add control implementation description here for control: ac-2 --> | ||
|
||
### Rules: | ||
|
||
- rule-ac-2 | ||
|
||
### Implementation Status: planned | ||
|
||
______________________________________________________________________ |
Oops, something went wrong.