Open Rene2mt opened 1 week ago
Per review with @aj-stein-gsa and @brian-ruf , this constraint should be level="WARNING"
. This is rare, but there can be cases where a CSO is a SAAS, but the CSP owns the entire stack so there isn't a leveraged authorization for the underlying IaaS.
Constraint Task
As a maintainer of a digital authorization package, I need make sure that my SaaS cloud service offering has at least one leveraged authorization, so that agencies that use my service have a clear understanding of what authorizations are being leveraged (e.g., underlying IaaS) and can more effectively understand control inheritance and how control responsibilities are satisfied. Checking to ensure that the SSP for a SaaS has at least one leveraged authorization may prevent pass back during review of my SSP.
Intended Outcome
Define a constraint to ensure that if
//system-characteristics/prop[@name='cloud-service-model']/@value
issaas
, thencount(//leveraged-authorization) >= 1
Syntax Type
This is optional core OSCAL syntax.
Allowed Values
Not sure, can maintainers help me choose?
Metapath(s) to Content
Purpose of the OSCAL Content
In order to understand the overall security posture of a SaaS cloud service offering, reviewers need to
Failure to provide leveraged authorizations (e.g., for a SaaS) gives reviewers and agencies an incomplete view of the cloud service offering's security posture. This will result in a "pass back" to obtain the missing information.
Dependencies
Check to ensure that for each leveraged authorized system / service, the SSP clearly documents (what user types / roles) are authorized users.
Acceptance Criteria
oscal-cli metaschema metapath eval -e "expression"
.Other information
No response