GSA / fedramp-automation

FedRAMP Automation
https://www.fedramp.gov/using-the-fedramp-oscal-resources-and-templates/
Other
293 stars 89 forks source link

Check that SaaS has at least one leveraged authorization #895

Open Rene2mt opened 1 week ago

Rene2mt commented 1 week ago

Constraint Task

As a maintainer of a digital authorization package, I need make sure that my SaaS cloud service offering has at least one leveraged authorization, so that agencies that use my service have a clear understanding of what authorizations are being leveraged (e.g., underlying IaaS) and can more effectively understand control inheritance and how control responsibilities are satisfied. Checking to ensure that the SSP for a SaaS has at least one leveraged authorization may prevent pass back during review of my SSP.

Intended Outcome

Define a constraint to ensure that if //system-characteristics/prop[@name='cloud-service-model']/@value is saas, then count(//leveraged-authorization) >= 1

Syntax Type

This is optional core OSCAL syntax.

Allowed Values

Not sure, can maintainers help me choose?

Metapath(s) to Content

//system-characteristics/prop[@name='cloud-service-model']/@value

Purpose of the OSCAL Content

In order to understand the overall security posture of a SaaS cloud service offering, reviewers need to

Failure to provide leveraged authorizations (e.g., for a SaaS) gives reviewers and agencies an incomplete view of the cloud service offering's security posture. This will result in a "pass back" to obtain the missing information.

Dependencies

Check to ensure that for each leveraged authorized system / service, the SSP clearly documents (what user types / roles) are authorized users.

Acceptance Criteria

Other information

No response

Rene2mt commented 1 week ago

Per review with @aj-stein-gsa and @brian-ruf , this constraint should be level="WARNING". This is rare, but there can be cases where a CSO is a SAAS, but the CSP owns the entire stack so there isn't a leveraged authorization for the underlying IaaS.