Open brian-ruf opened 1 month ago
There are several possible ways policies, plans and procedures may be attached to security controls:
link
that points directly to the documentlink
with a URI fragment that points to a back-matter resource representing the document by-component
assembly that points to a component representing the document; the component could:
a. have a link
directly to the document
b. have a link
with a URI fragment that points to a back-matter resourceImportant Consideration
There are several possible ways policies, plans and procedures may be attached to security controls:
Thanks for the brief today, let's soon discuss how we should act with recommendations on 2 and 3b as the preferred recommendations and how to design constraints around them ASAP.
@aj-stein-gsa I've reached this issue in our priorities. We've both been very focused on other work and haven't resolved the above question of how best to model attachments.
As with other areas this is something where we should have a preferred approach as well as accepting a simpler approach in support of legacy Word -> OSCAL SSP conversions.
Further, we have allowed other attachments and links to be either a URI fragment or a direct external link.
As a result, I believe we should establish 3b as our preferred approach, but accept any of the above (1, 2, 3a and 3b). I think our team has become well skilled at writing xapth that supports these scenarios.
I will defer any further analysis on this until you return. Hope to have a clear direction by COB Monday, Dec 2nd
@Rene2mt FYSA
This is a ...
fix - something needs to be different
This relates to ...
User Story
As a consumer of FedRAMP automated completeness checks I want the following OSCAL-based SSP items to be automatically verified for completeness by metaschema constraints:
Goals
SSP Completeness checks are defined, tested and documented
Dependencies
No response
Acceptance Criteria
Other information
No response
Tasks