OSCAL Foundation Model Reference Documentation
JSON XML
Models
Catalog Profile Component Definition System Security Plan Assessment Plan Assessment Results Plan of Action and Milestones
Definitions
System Security Plan (SSP) Import Profile System Name - Full System Name - Short System Description Security Sensitivity Level System Characteristics Information Type Systematized Identifier Information Type Categorization title field Information Type System Information Impact Level Security Objective: Confidentiality Security Objective: Integrity Security Objective: Availability Security Impact Level Status Authorization Boundary Caption Diagram Network Architecture Data Flow party-uuid field Leveraged Authorization System Implementation Control Implementation Control-based Requirement Specific Control Statement Provided Control Implementation Control Implementation Responsibility Export Inherited Control Implementation Satisfied Control Implementation Responsibility Component Control Implementation Base Level (Confidentiality, Integrity, or Availability) Selected Level (Confidentiality, Integrity, or Availability) Adjustment Justification System Authorization Date Revision History Entry Role Short Name Role Location URL Location Party Name Party External Identifier Organizational Affiliation Party Document Metadata Citation Text Citation Resource link Base64 Resource Back matter Property Link Responsible Party Action Responsible Role City State Postal Code Country Code Address Location Universally Unique Identifier Reference Role Identifier Reference Hash Remarks Publication Timestamp Last Modified Timestamp Document Version OSCAL Version Email Address Telephone Number Address line Document Identifier Purpose Component Service Protocol Information Port Range Implementation Status System User Privilege Implemented Component Inventory Item Parameter Value Set Parameter Value Functions Performed System Identification Part Text Part Parameter Label Parameter Usage Description Parameter Constraint test Constraint Test Constraint Guideline Choice Selection Include All Match Controls by Pattern Select Control Parameter Value Match Controls by Identifier

System Security Plan

JSON Format Outline

Click the triangle next to any property to expand its structure. Property names link to their definitions below.

system-security-plan [1]: {
uuid [1]: uuid ,
metadata [1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-parties [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [1 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
actions [0 to ∞]: [ {
uuid [1]: uuid ,
date [0 or 1]: date-time-with-timezone ,
type [1]: token ,
system [1]: uri ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-parties [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [1 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks
} ],
published [0 or 1]: published,
last-modified [1]: last-modified,
version [1]: version,
oscal-version [1]: oscal-version,
document-ids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks,
revisions [0 to ∞]: [ {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
published [0 or 1]: published,
last-modified [0 or 1]: last-modified,
version [1]: version,
oscal-version [0 or 1]: oscal-version,
remarks [0 or 1]: remarks,
title [0 or 1]: title
} ],
roles [0 to ∞]: [ {
id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
remarks [0 or 1]: remarks,
title [1]: title,
short-name [0 or 1]: short-name,
description [0 or 1]: description
} ],
locations [0 to ∞]: [ {
uuid [1]: uuid ,
address [0 or 1]: {
addr-lines [0 to ∞]: [ ... ],
city [0 or 1]: city,
state [0 or 1]: state,
postal-code [0 or 1]: postal-code,
country [0 or 1]: country
},
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
email-addresses [0 to ∞]: [ ... ],
telephone-numbers [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks,
title [0 or 1]: title,
urls [0 to ∞]: [ ... ]
} ],
parties [0 to ∞]: [ {
uuid [1]: uuid ,
type [1]: string ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
email-addresses [0 to ∞]: [ ... ],
telephone-numbers [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks,
name [0 or 1]: name,
short-name [0 or 1]: short-name,
external-ids [0 to ∞]: [ ... ],
member-of-organizations [0 to ∞]: [ ... ],
addresses [0 to ∞]: [ {
addr-lines [0 to ∞]: [ ... ],
city [0 or 1]: city,
state [0 or 1]: state,
postal-code [0 or 1]: postal-code,
country [0 or 1]: country
} ],
location-uuids [0 to ∞]: [ ... ]
} ],
title [1]: title
},
import-profile [1]: {
href [1]: uri-reference ,
remarks [0 or 1]: remarks
},
system-characteristics [1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
system-information [1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
information-types [1 to ∞]: [ {
uuid [0 or 1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
impact [0 or 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
base [1]: base,
selected [0 or 1]: selected,
adjustment-justification [0 or 1]: adjustment-justification
},
impact [0 or 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
base [1]: base,
selected [0 or 1]: selected,
adjustment-justification [0 or 1]: adjustment-justification
},
impact [0 or 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
base [1]: base,
selected [0 or 1]: selected,
adjustment-justification [0 or 1]: adjustment-justification
},
categorizations [0 to ∞]: [ {
system [1]: uri ,
information-type-ids [0 to ∞]: [ ... ]
} ],
title [1]: title,
description [1]: description
} ]
},
security-impact-level [0 or 1]: {
security-objective-confidentiality [1]: security-objective-confidentiality,
security-objective-integrity [1]: security-objective-integrity,
security-objective-availability [1]: security-objective-availability
},
status [1]: {
state [1]: string ,
remarks [0 or 1]: remarks
},
authorization-boundary [1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
diagrams [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
remarks [0 or 1]: remarks,
description [0 or 1]: description,
caption [0 or 1]: caption
} ],
remarks [0 or 1]: remarks,
description [1]: description
},
network-architecture [0 or 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
diagrams [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
remarks [0 or 1]: remarks,
description [0 or 1]: description,
caption [0 or 1]: caption
} ],
remarks [0 or 1]: remarks,
description [1]: description
},
data-flow [0 or 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
diagrams [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
remarks [0 or 1]: remarks,
description [0 or 1]: description,
caption [0 or 1]: caption
} ],
remarks [0 or 1]: remarks,
description [1]: description
},
responsible-parties [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [1 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
system-ids [1 to ∞]: [ ... ],
date-authorized [0 or 1]: date-authorized,
remarks [0 or 1]: remarks,
system-name [1]: system-name,
system-name-short [0 or 1]: system-name-short,
description [1]: description,
security-sensitivity-level [0 or 1]: security-sensitivity-level
},
system-implementation [1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
users [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
authorized-privileges [0 to ∞]: [ {
functions-performed [1 to ∞]: [ ... ],
title [1]: title,
description [0 or 1]: description
} ],
role-ids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks,
title [0 or 1]: title,
short-name [0 or 1]: short-name,
description [0 or 1]: description
} ],
components [1 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
protocols [0 to ∞]: [ {
uuid [0 or 1]: uuid ,
name [0 or 1]: string ,
port-ranges [0 to ∞]: [ {
start [0 or 1]: non-negative-integer ,
end [0 or 1]: non-negative-integer ,
transport [0 or 1]: token ,
remarks [0 to 1]: remarks
} ],
title [0 or 1]: title
} ],
remarks [0 or 1]: remarks,
status [1]: {
state [1]: string ,
remarks [0 or 1]: remarks
},
title [1]: title,
description [1]: description,
purpose [0 or 1]: purpose
} ],
inventory-items [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-parties [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [1 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
implemented-components [0 to ∞]: [ {
component-uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-parties [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [1 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks
} ],
description [1]: description
} ],
remarks [0 or 1]: remarks,
leveraged-authorizations [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
date-authorized [1]: date-authorized,
remarks [0 or 1]: remarks,
title [1]: title,
party-uuid [1]: party-uuid
} ]
},
control-implementation [1]: {
set-parameters [0 to ∞]: [ {
remarks [0 or 1]: remarks,
values [1 to ∞]: [ ... ]
} ],
implemented-requirements [1 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
set-parameters [0 to ∞]: [ {
remarks [0 or 1]: remarks,
values [1 to ∞]: [ ... ]
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
statements [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
by-components [0 to ∞]: [ {
component-uuid [1]: uuid ,
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
set-parameters [0 to ∞]: [ {
remarks [0 or 1]: remarks,
values [1 to ∞]: [ ... ]
} ],
implementation-status [0 or 1]: {
state [1]: token ,
remarks [0 to 1]: remarks
},
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
export [0 to 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
remarks [0 or 1]: remarks,
provided [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
description [1]: description
} ],
responsibilities [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
description [1]: description
} ],
description [0 or 1]: description
},
inherited [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
description [1]: description
} ],
satisfied [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
description [1]: description
} ],
description [1]: description
} ],
remarks [0 or 1]: remarks
} ],
by-components [0 to ∞]: [ {
component-uuid [1]: uuid ,
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
set-parameters [0 to ∞]: [ {
remarks [0 or 1]: remarks,
values [1 to ∞]: [ ... ]
} ],
implementation-status [0 or 1]: {
state [1]: token ,
remarks [0 to 1]: remarks
},
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
export [0 to 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
remarks [0 or 1]: remarks,
provided [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
description [1]: description
} ],
responsibilities [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
description [1]: description
} ],
description [0 or 1]: description
},
inherited [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
description [1]: description
} ],
satisfied [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
responsible-roles [0 to ∞]: [ {
role-id [1]: token ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
party-uuids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks
} ],
remarks [0 or 1]: remarks,
description [1]: description
} ],
description [1]: description
} ],
remarks [0 or 1]: remarks
} ],
description [1]: description
},
back-matter [0 or 1]: {
resources [0 to ∞]: [ {
uuid [1]: uuid ,
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
document-ids [0 to ∞]: [ ... ],
remarks [0 or 1]: remarks,
citation [0 or 1]: {
props [0 to ∞]: [ {
name [1]: token ,
uuid [0 or 1]: uuid ,
ns [0 or 1]: uri ,
value [1]: string ,
class [0 or 1]: token ,
group [0 or 1]: token ,
remarks [0 or 1]: remarks
} ],
links [0 to ∞]: [ {
href [1]: uri-reference ,
rel [0 or 1]: token ,
resource-fragment [0 or 1]: string ,
text [0 or 1]: text
} ],
text [1]: text
},
rlinks [0 to ∞]: [ {
href [1]: uri-reference ,
hashes [0 to ∞]: [ ... ]
} ],
title [0 or 1]: title,
description [0 or 1]: description,
base64 [0 or 1]: { ... }
} ]
}
}

Definitions (106)

system-security-plan assembly
System Security Plan (SSP)
A system security plan, such as those described in NIST SP 800-18.

Keys (7)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
metadata Document Metadata [1] Provides information about the containing document, and defines concepts that are shared across the document.
import-profile Import Profile [1] Used to import the OSCAL profile representing the system's control baseline.
system-characteristics System Characteristics [1] Contains the characteristics of the system, such as its name, purpose, and security impact level.
system-implementation System Implementation [1] Provides information as to how the system is implemented.
control-implementation Control Implementation [1] Describes how the system satisfies a set of controls.
back-matter Back matter [0 or 1] A collection of resources that may be referenced from within the OSCAL document instance.

Constraints (1)

  • index for control-implementation/implemented-requirement//by-component|doc(system-implementation/leveraged-authorization/link[@rel='system-security-plan']/@href)/system-security-plan/control-implementation/implemented-requirement//by-component Index "by-component-uuid" on control-implementation/implemented-requirement//by-component|doc(system-implementation/leveraged-authorization/link[@rel='system-security-plan']/@href)/system-security-plan/control-implementation/implemented-requirement//by-component
import-profile assembly
Import Profile
Used to import the OSCAL profile representing the system's control baseline.

Keys (2)

Name Definition Cardinality Description
href uri-reference [1] A resolvable URL reference to the profile or catalog to use as the system's control baseline.
remarks Remarks [0 or 1] Additional commentary about the containing object.
system-name field
System Name - Full
The full name of the system.
system-name-short field
System Name - Short
A short name for the system, such as an acronym, that is suitable for display in a data table or summary list.

Since system-name-short is optional, if the system-name-short is not provided, the system-name can be used as a substitute.

description field
System Description
An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
security-sensitivity-level field
Security Sensitivity Level
The overall information system sensitivity categorization, such as defined by FIPS-199.

Often, organizations require the security sensitivity level to correspond with the highest confidentiality, integrity, or availability level identified by security-impact-level.

system-characteristics assembly
System Characteristics
Contains the characteristics of the system, such as its name, purpose, and security impact level.

Keys (16)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
system-information System Information [1] Contains details about all information types that are stored, processed, or transmitted by the system, such as privacy information, and those defined in NIST SP 800-60.
security-impact-level Security Impact Level [0 or 1] The overall level of expected impact resulting from unauthorized disclosure, modification, or loss of access to information.
status Status [1] Describes the operational status of the system.
authorization-boundary Authorization Boundary [1] A description of this system's authorization boundary, optionally supplemented by diagrams that illustrate the authorization boundary.
network-architecture Network Architecture [0 or 1] A description of the system's network architecture, optionally supplemented by diagrams that illustrate the network architecture.
data-flow Data Flow [0 or 1] A description of the logical flow of information within the system and across its boundaries, optionally supplemented by diagrams that illustrate these flows.
responsible-parties Responsible Party [0 to ∞] A reference to a set of persons and/or organizations that have responsibility for performing the referenced role in the context of the containing object.
system-ids System Identification [1 to ∞] A human-oriented, globally unique identifier with cross-instance scope that can be used to reference this system identification property elsewhere in this or other OSCAL instances. When referencing an externally defined system identification, the system identification must be used in the context of the external / imported OSCAL instance (e.g., uri-reference). This string should be assigned per-subject, which means it should be consistently used to identify the same system across revisions of the document.
date-authorized System Authorization Date [0 or 1] The date the system received its authorization.
remarks Remarks [0 or 1] Additional commentary about the containing object.
system-name System Name - Full [1] The full name of the system.
system-name-short System Name - Short [0 or 1] A short name for the system, such as an acronym, that is suitable for display in a data table or summary list.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
security-sensitivity-level Security Sensitivity Level [0 or 1] The overall information system sensitivity categorization, such as defined by FIPS-199.

Constraints (6)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • identity-assurance-level: A value of 1, 2, or 3 as defined by SP 800-63-3.
    • authenticator-assurance-level: A value of 1, 2, or 3 as defined by SP 800-63-3.
    • federation-assurance-level: A value of 1, 2, or 3 as defined by SP 800-63-3.
  • allowed-values for prop[@name=('identity-assurance-level','authenticator-assurance-level','federation-assurance-level')]/@value
    • 1: As defined by SP 800-63-3.
    • 2: As defined by SP 800-63-3.
    • 3: As defined by SP 800-63-3.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • cloud-deployment-model: The associated value is one of: public-cloud, private-cloud, community-cloud, government-only-cloud, hybrid-cloud, or other.
    • cloud-service-model: The associated value is one of: saas, paas, iaas, or other.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='cloud-deployment-model']/@value
    • public-cloud: The public cloud deployment model as defined by The NIST Definition of Cloud Computing.
    • private-cloud: The private cloud deployment model as defined by The NIST Definition of Cloud Computing.
    • community-cloud: The community cloud deployment model as defined by The NIST Definition of Cloud Computing.
    • hybrid-cloud: The hybrid cloud deployment model as defined by The NIST Definition of Cloud Computing.
    • government-only-cloud: A specific type of community-cloud for use only by government services.
    • other: Some other state.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='cloud-service-model']/@value
    • saas: Software as a service (SaaS) cloud service model as defined by The NIST Definition of Cloud Computing.
    • paas: Platform as a service (PaaS) cloud service model as defined by The NIST Definition of Cloud Computing.
    • iaas: Infrastructure as a service (IaaS) cloud service model as defined by The NIST Definition of Cloud Computing.
    • other: Some other state.
  • allowed-values for responsible-party/@role-id
    • authorizing-official: The authorizing official for this system.
    • authorizing-official-poc: The authorizing official's designated point of contact (POC) for this system.
    • system-owner: The executive ultimately accountable for the system.
    • system-poc-management: The primary management-level point of contact (POC) for the system.
    • system-poc-technical: The primary technical point of contact (POC) for the system.
    • system-poc-other: Other point of contact (POC) for the system that is not the management or technical POC.
    • information-system-security-officer: The primary role responsible for ensuring the organization operates the system securely.
    • privacy-poc: The point of contact (POC) responsible for identifying privacy information within the system, and ensuring its protection if present.
information-type-id field
Information Type Systematized Identifier
A human-oriented, globally unique identifier qualified by the given identification system used, such as NIST SP 800-60. This identifier has cross-instance scope and can be used to reference this system elsewhere in this or other OSCAL instances. This id should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
categorization assembly
Information Type Categorization
A set of information type identifiers qualified by the given identification system used, such as NIST SP 800-60.

Keys (2)

Name Definition Cardinality Description
system uri [1] Specifies the information type identification system used.
information-type-ids Information Type Systematized Identifier [0 to ∞] A human-oriented, globally unique identifier qualified by the given identification system used, such as NIST SP 800-60. This identifier has cross-instance scope and can be used to reference this system elsewhere in this or other OSCAL instances. This id should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
title field
title field
A human readable name for the leveraged authorization in the context of the system.
information-type assembly
Information Type
Contains details about one information type that is stored, processed, or transmitted by the system, such as privacy information, and those defined in NIST SP 800-60.

Keys (9)

Name Definition Cardinality Description
uuid uuid [0 or 1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
impact Impact Level [0 or 1] The expected level of impact resulting from the described information.
impact Impact Level [0 or 1] The expected level of impact resulting from the described information.
impact Impact Level [0 or 1] The expected level of impact resulting from the described information.
categorizations Information Type Categorization [0 to ∞] A set of information type identifiers qualified by the given identification system used, such as NIST SP 800-60.
title title field [1] A human readable name for the leveraged authorization in the context of the system.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.

Constraints (1)

  • expect for . Test: @uuid
system-information assembly
System Information
Contains details about all information types that are stored, processed, or transmitted by the system, such as privacy information, and those defined in NIST SP 800-60.

Keys (3)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
information-types Information Type [1 to ∞] Contains details about one information type that is stored, processed, or transmitted by the system, such as privacy information, and those defined in NIST SP 800-60.

Constraints (4)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • privacy-designation: Is this a privacy sensitive system? yes or no
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='privacy-designation']/@value
    • yes: The component allows an authenticated scan.
    • no: The component does not allow an authenticated scan.
  • allowed-values for link/@rel
    • privacy-impact-assessment: A link to the privacy impact assessment.
  • allowed-values for information-type/(confidentiality-impact|integrity-impact|availability-impact)/(base|selected)
    • fips-199-low: A 'low' sensitivity level as defined in FIPS-199.
    • fips-199-moderate: A 'moderate' sensitivity level as defined in FIPS-199.
    • fips-199-high: A 'high' sensitivity level as defined in FIPS-199.
impact assembly
Impact Level
The expected level of impact resulting from the described information.

Keys (5)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
base Base Level (Confidentiality, Integrity, or Availability) [1] The prescribed base (Confidentiality, Integrity, or Availability) security impact level.
selected Selected Level (Confidentiality, Integrity, or Availability) [0 or 1] The selected (Confidentiality, Integrity, or Availability) security impact level.
adjustment-justification Adjustment Justification [0 or 1] If the selected security level is different from the base security level, this contains the justification for the change.
security-objective-confidentiality field
Security Objective: Confidentiality
A target-level of confidentiality for the system, based on the sensitivity of information within the system.
security-objective-integrity field
Security Objective: Integrity
A target-level of integrity for the system, based on the sensitivity of information within the system.
security-objective-availability field
Security Objective: Availability
A target-level of availability for the system, based on the sensitivity of information within the system.
security-impact-level assembly
Security Impact Level
The overall level of expected impact resulting from unauthorized disclosure, modification, or loss of access to information.

Keys (3)

Name Definition Cardinality Description
security-objective-confidentiality Security Objective: Confidentiality [1] A target-level of confidentiality for the system, based on the sensitivity of information within the system.
security-objective-integrity Security Objective: Integrity [1] A target-level of integrity for the system, based on the sensitivity of information within the system.
security-objective-availability Security Objective: Availability [1] A target-level of availability for the system, based on the sensitivity of information within the system.
status assembly
Status
Describes the operational status of the system.

If 'other' is selected, a remark must be included to describe the current state.

Keys (2)

Name Definition Cardinality Description
state string [1] The current operating status.
remarks Remarks [0 or 1] Additional commentary about the containing object.
authorization-boundary assembly
Authorization Boundary
A description of this system's authorization boundary, optionally supplemented by diagrams that illustrate the authorization boundary.

Keys (5)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
diagrams Diagram [0 to ∞] A graphic that provides a visual representation the system, or some aspect of it.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
caption field
Caption
A brief caption to annotate the diagram.
diagram assembly
Diagram
A graphic that provides a visual representation the system, or some aspect of it.

A diagram must include a link with a rel value of "diagram", who's href references a remote URI or an internal reference within this document containing the diagram.

Keys (6)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
caption Caption [0 or 1] A brief caption to annotate the diagram.

Constraints (1)

  • allowed-values for link/@rel
    • diagram: A reference to the diagram image.
network-architecture assembly
Network Architecture
A description of the system's network architecture, optionally supplemented by diagrams that illustrate the network architecture.

Keys (5)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
diagrams Diagram [0 to ∞] A graphic that provides a visual representation the system, or some aspect of it.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
data-flow assembly
Data Flow
A description of the logical flow of information within the system and across its boundaries, optionally supplemented by diagrams that illustrate these flows.

Keys (5)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
diagrams Diagram [0 to ∞] A graphic that provides a visual representation the system, or some aspect of it.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
party-uuid field
party-uuid field
A machine-oriented identifier reference to the party that manages the leveraged system.
leveraged-authorization assembly
Leveraged Authorization
A description of another authorized system from which this system inherits capabilities that satisfy security requirements. Another term for this concept is a common control provider.

Keys (7)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
date-authorized System Authorization Date [1] The date the system received its authorization.
remarks Remarks [0 or 1] Additional commentary about the containing object.
title title field [1] A human readable name for the leveraged authorization in the context of the system.
party-uuid party-uuid field [1] A machine-oriented identifier reference to the party that manages the leveraged system.

Constraints (1)

  • allowed-values for link/@rel
    • system-security-plan: A reference to the system security plan for the leveraged authorization.
system-implementation assembly
System Implementation
Provides information as to how the system is implemented.

Keys (7)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
users System User [0 to ∞] A type of user that interacts with the system based on an associated role.
components Component [1 to ∞] A defined component that can be part of an implemented system.
inventory-items Inventory Item [0 to ∞] A single managed inventory item within the system.
remarks Remarks [0 or 1] Additional commentary about the containing object.
leveraged-authorizations Leveraged Authorization [0 to ∞] A description of another authorized system from which this system inherits capabilities that satisfy security requirements. Another term for this concept is a common control provider.

Constraints (5)

  • allowed-values for (component | inventory-item)/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='allows-authenticated-scan']/@value
    • yes: The component allows an authenticated scan.
    • no: The component does not allow an authenticated scan.
  • index for leveraged-authorization Index "index-system-implementation-leveraged-authorization-uuid" on leveraged-authorization
  • index for component Index "index-system-implementation-component-uuid" on component
  • index for component[@type='validation'] Index "index-system-implementation-component-uuid-validation" on component[@type='validation']
  • index for component[@type='service'] Index "index-system-implementation-component-uuid-service" on component[@type='service']
control-implementation assembly
Control Implementation
Describes how the system satisfies a set of controls.

Use of set-parameter in this context, sets the parameter for all controls referenced by any implemented-requirement contained in this context. Any set-parameter defined in a child context will override this value. If not overridden by a child, this value applies in the child context.

Keys (3)

Name Definition Cardinality Description
set-parameters Set Parameter Value [0 to ∞] Identifies the parameter that will be set by the enclosed value.
implemented-requirements Control-based Requirement [1 to ∞] Describes how the system satisfies the requirements of an individual control.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.

Constraints (1)

  • index for implemented-requirement//by-component/export/provided Index "by-component-export-provided-uuid" on implemented-requirement//by-component/export/provided
implemented-requirement assembly
Control-based Requirement
Describes how the system satisfies the requirements of an individual control.

Use of set-parameter in this context, sets the parameter for the referenced control. Any set-parameter defined in a child context will override this value. If not overridden by a child, this value applies in the child context.

Keys (8)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
set-parameters Set Parameter Value [0 to ∞] Identifies the parameter that will be set by the enclosed value.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
statements Specific Control Statement [0 to ∞] Identifies which statements within a control are addressed.
by-components Component Control Implementation [0 to ∞] Defines how the referenced component implements a set of controls.
remarks Remarks [0 or 1] Additional commentary about the containing object.

Constraints (3)

  • allowed-values for (.|statement|.//by-component)/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • control-origination: Identifies the source of the implemented control. Any control-origination prop defined in a child context will override the parent value.
  • allowed-values for (.|statement|.//by-component)/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='control-origination']/@value
    • organization: The control is implemented by the organization owning the system, but is not specific to the system itself.
    • system-specific: The control is implemented specifically to this system.
    • customer-configured: The control is provided by the system, but must be configured by the customer.
    • customer-provided: The control must be implemented by the customer.
    • inherited: This control is inherited from an underlying system.
  • allowed-values for responsible-role/@role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
statement assembly
Specific Control Statement
Identifies which statements within a control are addressed.

Keys (6)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
by-components Component Control Implementation [0 to ∞] Defines how the referenced component implements a set of controls.
remarks Remarks [0 or 1] Additional commentary about the containing object.

Constraints (1)

  • allowed-values for responsible-role/@role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
provided assembly
Provided Control Implementation
Describes a capability which may be inherited by a leveraging system.

Keys (6)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
responsibility assembly
Control Implementation Responsibility
Describes a control implementation responsibility imposed on a leveraging system.

Keys (6)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
export assembly
Export
Identifies content intended for external consumption, such as with leveraged organizations.

Keys (6)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
remarks Remarks [0 or 1] Additional commentary about the containing object.
provided Provided Control Implementation [0 to ∞] Describes a capability which may be inherited by a leveraging system.
responsibilities Control Implementation Responsibility [0 to ∞] Describes a control implementation responsibility imposed on a leveraging system.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
inherited assembly
Inherited Control Implementation
Describes a control implementation inherited by a leveraging system.

Keys (5)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
satisfied assembly
Satisfied Control Implementation Responsibility
Describes how this system satisfies a responsibility imposed by a leveraged system.

Keys (6)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
remarks Remarks [0 or 1] Additional commentary about the containing object.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
by-component assembly
Component Control Implementation
Defines how the referenced component implements a set of controls.

Use of set-parameter in this context, sets the parameter for the control referenced in the containing implemented-requirement applied to the referenced component. If the by-component is used as a child of a statement, then the parameter value also applies only in the context of the referenced statement. If the same parameter is also set in the control-implementation or a specific implemented-requirement, then this by-component/set-parameter value will override the other value(s) in the context of the referenced component, control, and statement (if parent).

Keys (12)

Name Definition Cardinality Description
component-uuid uuid [1] A machine-oriented identifier reference to the component that is implementing a given control.
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this satisfied control implementation entry elsewhere in this or other OSCAL instances. The locally defined UUID of the control implementation can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
set-parameters Set Parameter Value [0 to ∞] Identifies the parameter that will be set by the enclosed value.
implementation-status Implementation Status [0 or 1] Indicates the degree to which the a given control is implemented.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
remarks Remarks [0 or 1] Additional commentary about the containing object.
export Export [0 to 1] Identifies content intended for external consumption, such as with leveraged organizations.
inherited Inherited Control Implementation [0 to ∞] Describes a control implementation inherited by a leveraging system.
satisfied Satisfied Control Implementation Responsibility [0 to ∞] Describes how this system satisfies a responsibility imposed by a leveraged system.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.

Constraints (2)

  • allowed-values for link/@rel
    • imported-from: The hyperlink identifies a URI pointing to the component in a component-definition that originally described the component this component was based on.
    • provided-by: A reference to the UUID of a control or statement by-component object that is used as evidence of implementation.
  • allowed-values for .//responsible-role/@role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
    • maintainer: Responsible for the creation and maintenance of a component.
    • provider: Organization responsible for providing the component, if this is different from the "maintainer" (e.g., a reseller).
base field
Base Level (Confidentiality, Integrity, or Availability)
The prescribed base (Confidentiality, Integrity, or Availability) security impact level.
selected field
Selected Level (Confidentiality, Integrity, or Availability)
The selected (Confidentiality, Integrity, or Availability) security impact level.
adjustment-justification field
Adjustment Justification
If the selected security level is different from the base security level, this contains the justification for the change.
date-authorized field
System Authorization Date
The date the system received its authorization.
revision assembly
Revision History Entry
An entry in a sequential list of revisions to the containing document, expected to be in reverse chronological order (i.e. latest first).

While published, last-modified, and oscal-version are not required, values for these entries should be provided if the information is known. A link with a rel of source should be provided if the information is known.

Keys (8)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
published Publication Timestamp [0 or 1] The date and time the document was last made available.
last-modified Last Modified Timestamp [0 or 1] The date and time the document was last stored for later retrieval.
version Document Version [1] Used to distinguish a specific revision of an OSCAL document from other previous and future versions.
oscal-version OSCAL Version [0 or 1] The OSCAL model version the document was authored against and will conform to as valid.
remarks Remarks [0 or 1] Additional commentary about the containing object.
title title field [0 or 1] A human readable name for the leveraged authorization in the context of the system.

Constraints (1)

  • allowed-values for link/@rel
    • canonical: The link identifies the authoritative location for this resource. Defined by RFC 6596.
    • alternate: The link identifies an alternative location or format for this resource. Defined by the HTML Living Standard
    • predecessor-version: This link identifies a resource containing the predecessor version in the version history. Defined by RFC 5829.
    • successor-version: This link identifies a resource containing the predecessor version in the version history. Defined by RFC 5829.
    • version-history: This link identifies a resource containing the version history of this document. Defined by RFC 5829.
short-name field
Role Short Name
A short common name, abbreviation, or acronym for the party.
role assembly
Role
Defines a function, which might be assigned to a party in a specific situation.

Permissible values to be determined closer to the application (e.g. by a receiving authority).

OSCAL has defined a set of standardized roles for consistent use in OSCAL documents. This allows tools consuming OSCAL content to infer specific semantics when these roles are used. These roles are documented in the specific contexts of their use (e.g., responsible-party, responsible-role). When using such a role, it is necessary to define these roles in this list, which will then allow such a role to be referenced.

Keys (7)

Name Definition Cardinality Description
id token [1] A unique identifier for the role.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
remarks Remarks [0 or 1] Additional commentary about the containing object.
title title field [1] A human readable name for the leveraged authorization in the context of the system.
short-name Role Short Name [0 or 1] A short common name, abbreviation, or acronym for the party.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
url field
Location URL
The uniform resource locator (URL) for a web site or other resource associated with the location.

This data field is deprecated in favor of using a link with an appropriate relationship.

location assembly
Location
A physical point of presence, which may be associated with people, organizations, or other concepts within the current or linked OSCAL document.

An address might be sensitive in nature. In such cases a title, mailing address, email-address, and/or phone number may be used instead.

Keys (9)

Name Definition Cardinality Description
uuid uuid [1] A unique identifier that can be used to reference this defined action elsewhere in an OSCAL document. A UUID should be consistently used for a given location across revisions of the document.
address Address [0 or 1] A postal address for the location.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
email-addresses Email Address [0 to ∞] An email address as defined by RFC 5322 Section 3.4.1.
telephone-numbers Telephone Number [0 to ∞] A telephone service number as defined by ITU-T E.164.
remarks Remarks [0 or 1] Additional commentary about the containing object.
title title field [0 or 1] A human readable name for the leveraged authorization in the context of the system.
urls Location URL [0 to ∞] The uniform resource locator (URL) for a web site or other resource associated with the location.

Constraints (3)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • type: Identifies the type of resource represented. The most specific appropriate type value SHOULD be used.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='type']/@value
    • data-center: A location that contains computing assets. A class can be used to indicate the sub-type of data-center as primary or alternate.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='type' and @value='data-center']/@class
    • primary: The location is a data-center used for normal operations.
    • alternate: The link identifies an alternative location or format for this resource. Defined by the HTML Living Standard
name field
Party Name
The full name of the party. This is typically the legal name associated with the party.
external-id field
Party External Identifier
An identifier for a person or organization using a designated scheme. e.g. an Open Researcher and Contributor ID (ORCID).

Keys (1)

Name Definition Cardinality Description
scheme uri [1] Qualifies the kind of document identifier using a URI. If the scheme is not provided the value of the element will be interpreted as a string of characters.
member-of-organization field
Organizational Affiliation
A reference to another party by UUID, typically an organization, that this subject is associated with.

Since the reference target of an organizational affiliation must be another party (whether further qualified as person or organization) as indicated by its uuid. As a machine-oriented identifier with uniqueness across document and trans-document scope, this uuid value is sufficient to reference the data item locally or globally across related documents, e.g., in an imported OSCAL instance.

Parties of both the person or organization type can be associated with an organization using the member-of-organization.

party assembly
Party
An organization or person, which may be associated with roles or other concepts within the current or linked OSCAL document.

A party can be optionally associated with either an address or a location. While providing a meaningful location for a party is desired, there are some cases where it might not be possible to provide an exact location or even any location.

Keys (13)

Name Definition Cardinality Description
uuid uuid [1] A unique identifier that can be used to reference this defined action elsewhere in an OSCAL document. A UUID should be consistently used for a given location across revisions of the document.
type string [1] Indicates the type of phone number.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
email-addresses Email Address [0 to ∞] An email address as defined by RFC 5322 Section 3.4.1.
telephone-numbers Telephone Number [0 to ∞] A telephone service number as defined by ITU-T E.164.
remarks Remarks [0 or 1] Additional commentary about the containing object.
name Party Name [0 or 1] The full name of the party. This is typically the legal name associated with the party.
short-name Role Short Name [0 or 1] A short common name, abbreviation, or acronym for the party.
external-ids Party External Identifier [0 to ∞] An identifier for a person or organization using a designated scheme. e.g. an Open Researcher and Contributor ID (ORCID).
member-of-organizations Organizational Affiliation [0 to ∞] A reference to another party by UUID, typically an organization, that this subject is associated with.
addresses Address [0 to ∞] A postal address for the location.
location-uuids Location Universally Unique Identifier Reference [0 to ∞] Reference to a location by UUID.

Constraints (1)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • mail-stop: A mail stop associated with the party.
    • office: An office phone number.
    • job-title: The formal job title of a person.
metadata assembly
Document Metadata
Provides information about the containing document, and defines concepts that are shared across the document.

All OSCAL documents use the same metadata structure, that provides a consistent way of expressing OSCAL document metadata across all OSCAL models. The metadata section also includes declarations of individual objects (i.e., roles, location, parties) that may be referenced within and across linked OSCAL documents.

The metadata in an OSCAL document has few required fields, representing only the bare minimum data needed to differentiate one instance from another. Tools and users creating OSCAL documents may choose to use any of the optional fields, as well as extension mechanisms (e.g., properties, links) to go beyond this minimum to suit their use cases.

A publisher of OSCAL content can use the published, last-modified, and version fields to establish information about an individual in a sequence of successive revisions of a given OSCAL-based publication. The metadata for a previous revision can be represented as a revision within this object. Links may also be provided using the predecessor-version and successor-version link relations to provide for direct access to the related resource. These relations can be provided as a link child of this object or as link within a given revision.

A responsible-party entry in this context refers to roles and parties that have responsibility relative to the production, review, publication, and use of the containing document.

Keys (15)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-parties Responsible Party [0 to ∞] A reference to a set of persons and/or organizations that have responsibility for performing the referenced role in the context of the containing object.
actions Action [0 to ∞] An action applied by a role within a given party to the content.
published Publication Timestamp [0 or 1] The date and time the document was last made available.
last-modified Last Modified Timestamp [1] The date and time the document was last stored for later retrieval.
version Document Version [1] Used to distinguish a specific revision of an OSCAL document from other previous and future versions.
oscal-version OSCAL Version [1] The OSCAL model version the document was authored against and will conform to as valid.
document-ids Document Identifier [0 to ∞] A document identifier qualified by an identifier scheme.
remarks Remarks [0 or 1] Additional commentary about the containing object.
revisions Revision History Entry [0 to ∞] An entry in a sequential list of revisions to the containing document, expected to be in reverse chronological order (i.e. latest first).
roles Role [0 to ∞] Defines a function, which might be assigned to a party in a specific situation.
locations Location [0 to ∞] A physical point of presence, which may be associated with people, organizations, or other concepts within the current or linked OSCAL document.
parties Party [0 to ∞] An organization or person, which may be associated with roles or other concepts within the current or linked OSCAL document.
title title field [1] A human readable name for the leveraged authorization in the context of the system.

Constraints (9)

  • allowed-values for responsible-party/@role-id
    • creator: Indicates the person or organization that created this content.
    • prepared-by: Indicates the person or organization that prepared this content.
    • prepared-for: Indicates the person or organization for which this content was created.
    • content-approver: Indicates the person or organization responsible for all content represented in the "document".
    • contact: Indicates the person or organization to contact for questions or support related to this content.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • keywords: The value identifies a comma-seperated listing of keywords associated with this content. These keywords may be used as search terms for indexing and other applications.
  • allowed-values for link/@rel
    • canonical: The link identifies the authoritative location for this resource. Defined by RFC 6596.
    • alternate: The link identifies an alternative location or format for this resource. Defined by the HTML Living Standard
    • latest-version: This link identifies a resource containing the latest version in the version history. Defined by RFC 5829.
    • predecessor-version: This link identifies a resource containing the predecessor version in the version history. Defined by RFC 5829.
    • successor-version: This link identifies a resource containing the predecessor version in the version history. Defined by RFC 5829.
  • index for role Index "index-metadata-role-ids" on role
  • index for .//prop Index "index-metadata-property-uuid" on .//prop
  • index for role Index "index-metadata-role-id" on role
  • index for location Index "index-metadata-location-uuid" on location
  • index for party Index "index-metadata-party-uuid" on party
  • index for party[@type='organization'] Index "index-metadata-party-organizations-uuid" on party[@type='organization']
text field
Citation Text
A textual label to associate with the link, which may be used for presentation in a tool.
citation assembly
Citation
An optional citation consisting of end note text using structured markup.

Keys (3)

Name Definition Cardinality Description
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
text Citation Text [1] A textual label to associate with the link, which may be used for presentation in a tool.
rlink assembly
Resource link
A URL-based pointer to an external resource with an optional hash for verification and change detection.

Multiple rlink objects can be included for a resource. In such a case, all provided rlink items are intended to be equivalent in content, but may differ in structure or format.

A media-type is used to identify the format of a given rlink, and can be used to differentiate items in a collection of rlinks. The media-type provides a hint to the OSCAL document consumer about the structure of the resource referenced by the rlink.

Keys (2)

Name Definition Cardinality Description
href uri-reference [1] A resolvable URL reference to a resource.
hashes Hash [0 to ∞] A representation of a cryptographic digest generated over a resource using a specified hash algorithm.
base64 field
Base64
A resource encoded using the Base64 alphabet defined by RFC 2045.

Keys (1)

Name Definition Cardinality Description
filename token [0 or 1] Name of the file before it was encoded as Base64 to be embedded in a resource. This is the name that will be assigned to the file when the file is decoded.
resource assembly
Resource
A resource associated with content in the containing document instance. A resource may be directly included in the document using base64 encoding or may point to one or more equivalent internet resources.

A resource can be used in two ways. 1) it may point to an specific retrievable network resource using a rlink, or 2) it may be included as an attachment using a base64. A resource may contain multiple rlink and base64 entries that represent alternative download locations (rlink) and attachments (base64) for the same resource.

Both rlink and base64 allow for a media-type to be specified, which is used to distinguish between different representations of the same resource (e.g., Microsoft Word, PDF). When multiple rlink and base64 items are included for a given resource, all items must contain equivalent information. This allows the document consumer to choose a preferred item to process based on a the selected item's media-type. This is extremely important when the items represent OSCAL content that is represented in alternate formats (i.e., XML, JSON, YAML), allowing the same OSCAL data to be processed from any of the available formats indicated by the items.

When a resource includes a citation, then the title and citation properties must both be included.

Keys (9)

Name Definition Cardinality Description
uuid uuid [1] A unique identifier that can be used to reference this defined action elsewhere in an OSCAL document. A UUID should be consistently used for a given location across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
document-ids Document Identifier [0 to ∞] A document identifier qualified by an identifier scheme.
remarks Remarks [0 or 1] Additional commentary about the containing object.
citation Citation [0 or 1] An optional citation consisting of end note text using structured markup.
rlinks Resource link [0 to ∞] A URL-based pointer to an external resource with an optional hash for verification and change detection.
title title field [0 or 1] A human readable name for the leveraged authorization in the context of the system.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
base64 Base64 [0 or 1] A resource encoded using the Base64 alphabet defined by RFC 2045.

Constraints (3)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • type: Identifies the type of resource represented. The most specific appropriate type value SHOULD be used.
    • version: For resources representing a published document, this represents the version number of that document.
    • published: For resources representing a published document, this represents the publication date of that document.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='type']/@value
    • logo: Indicates the resource is an organization's logo.
    • image: Indicates the resource represents an image.
    • screen-shot: Indicates the resource represents an image of screen content.
    • law: Indicates the resource represents an applicable law.
    • regulation: Indicates the resource represents an applicable regulation.
    • standard: Indicates the resource represents an applicable standard.
    • external-guidance: Indicates the resource represents applicable guidance.
    • acronyms: Indicates the resource provides a list of relevant acronyms.
    • citation: Indicates the resource cites relevant information.
    • policy: Indicates the resource is a policy.
    • procedure: Indicates the resource is a procedure.
    • system-guide: Indicates the resource is guidance document related to the subject system of an SSP.
    • users-guide: Indicates the resource is guidance document a user's guide or administrator's guide.
    • administrators-guide: Indicates the resource is guidance document a administrator's guide.
    • rules-of-behavior: Indicates the resource represents rules of behavior content.
    • plan: Indicates the resource represents a plan.
    • artifact: Indicates the resource represents an artifact, such as may be reviewed by an assessor.
    • evidence: Indicates the resource represents evidence, such as to support an assessment finding.
    • tool-output: Indicates the resource represents output from a tool.
    • raw-data: Indicates the resource represents machine data, which may require a tool or analysis for interpretation or presentation.
    • interview-notes: Indicates the resource represents notes from an interview, such as may be collected during an assessment.
    • questionnaire: Indicates the resource is a set of questions, possibly with responses.
    • report: Indicates the resource is a report.
    • agreement: Indicates the resource is a formal agreement between two or more parties.
  • expect for .[citation] Test: title
back-matter assembly
Back matter
A collection of resources that may be referenced from within the OSCAL document instance.

Provides a collection of identified resource objects that can be referenced by a link with a rel value of "reference" and an href value that is a fragment "#" followed by a reference to a reference's uuid. Other specialized link "rel" values also use this pattern when indicated in that context of use.

Keys (1)

Name Definition Cardinality Description
resources Resource [0 to ∞] A resource associated with content in the containing document instance. A resource may be directly included in the document using base64 encoding or may point to one or more equivalent internet resources.

Constraints (1)

  • index for resource Index "index-back-matter-resource" on resource
property assembly
Property
An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.

Properties permit the deployment and management of arbitrary controlled values, within OSCAL objects. A property can be included for any purpose useful to an application or implementation. Typically, properties will be used to sort, filter, select, order, and arrange OSCAL content objects, to relate OSCAL objects to one another, or to associate an OSCAL object to class hierarchies, taxonomies, or external authorities. Thus, the lexical composition of properties may be constrained by external processes to ensure consistency.

Property allows for associated remarks that describe why the specific property value was applied to the containing object, or the significance of the value in the context of the containing object.

Keys (7)

Name Definition Cardinality Description
name token [1] A textual label, within a namespace, that identifies a specific attribute, characteristic, or quality of the property's containing object.
uuid uuid [0 or 1] A unique identifier that can be used to reference this defined action elsewhere in an OSCAL document. A UUID should be consistently used for a given location across revisions of the document.
ns uri [0 or 1] A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name.
value string [1] Indicates the value of the attribute, characteristic, or quality.
class token [0 or 1] A textual label that provides a sub-type or characterization of the property's name.
group token [0 or 1] An identifier for relating distinct sets of properties.
remarks Remarks [0 or 1] Additional commentary about the containing object.

Constraints (1)

  • allowed-values for .[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • marking: A label or descriptor that is tied to a sensitivity or classification marking system. An optional class can be used to define the specific marking system used for the associated value.
link assembly
Link
A reference to a local or remote resource, that has a specific relation to the containing object.

To provide a cryptographic hash for a remote target resource, a local reference to a back matter resource is needed. The resource allows one or more hash values to be provided using the rlink/hash object.

The OSCAL link is a roughly based on the HTML link element.

Keys (4)

Name Definition Cardinality Description
href uri-reference [1] A resolvable URL reference to a resource.
rel token [0 or 1] Describes the type of relationship provided by the link's hypertext reference. This can be an indicator of the link's purpose.
resource-fragment string [0 or 1] In case where the href points to a back-matter/resource, this value will indicate the URI fragment to append to any rlink associated with the resource. This value MUST be URI encoded.
text Citation Text [0 or 1] A textual label to associate with the link, which may be used for presentation in a tool.

Constraints (1)

  • expect for .[starts-with(@href,'#')] Test: not(exists(@media-type))
responsible-party assembly
Responsible Party
A reference to a set of persons and/or organizations that have responsibility for performing the referenced role in the context of the containing object.

A responsible-party requires one or more party-uuid references creating a strong relationship arc between the referenced role-id and the reference parties. This differs in semantics from responsible-role which doesn't require that a party-uuid is referenced.

The scope of use of this object determines if the responsibility has been performed or will be performed in the future. The containing object will describe the intent.

Keys (5)

Name Definition Cardinality Description
role-id token [1] A human-oriented identifier reference to a role performed.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
party-uuids party-uuid field [1 to ∞] A machine-oriented identifier reference to the party that manages the leveraged system.
remarks Remarks [0 or 1] Additional commentary about the containing object.
action assembly
Action
An action applied by a role within a given party to the content.

Keys (8)

Name Definition Cardinality Description
uuid uuid [1] A unique identifier that can be used to reference this defined action elsewhere in an OSCAL document. A UUID should be consistently used for a given location across revisions of the document.
date date-time-with-timezone [0 or 1] The date and time when the action occurred.
type token [1] Indicates the type of phone number.
system uri [1] Specifies the action type system used.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-parties Responsible Party [0 to ∞] A reference to a set of persons and/or organizations that have responsibility for performing the referenced role in the context of the containing object.
remarks Remarks [0 or 1] Additional commentary about the containing object.

Constraints (2)

  • allowed-values for ./system/@value
    • http://csrc.nist.gov/ns/oscal: This value identifies action types defined in the NIST OSCAL namespace.
  • allowed-values for ./type[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@value
    • approval: An approval of a document instance's content.
    • request-changes: A request from the responsible party or parties to change the content.
responsible-role assembly
Responsible Role
A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.

A responsible-role allows zero or more party-uuid references, each of which creates a relationship arc between the referenced role-id and the referenced party. This differs in semantics from responsible-party, which requires that at least one party-uuid is referenced.

The scope of use of this object determines if the responsibility has been performed or will be performed in the future. The containing object will describe the intent.

Keys (5)

Name Definition Cardinality Description
role-id token [1] A human-oriented identifier reference to a role performed.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
party-uuids party-uuid field [0 to ∞] A machine-oriented identifier reference to the party that manages the leveraged system.
remarks Remarks [0 or 1] Additional commentary about the containing object.
city field
City
City, town or geographical region for the mailing address.
state field
State
State, province or analogous geographical region for a mailing address.
postal-code field
Postal Code
Postal or ZIP code for mailing address.
country field
Country Code
The ISO 3166-1 alpha-2 country code for the mailing address.
address assembly
Address
A postal address for the location.

Keys (5)

Name Definition Cardinality Description
addr-lines Address line [0 to ∞] A single line of an address.
city City [0 or 1] City, town or geographical region for the mailing address.
state State [0 or 1] State, province or analogous geographical region for a mailing address.
postal-code Postal Code [0 or 1] Postal or ZIP code for mailing address.
country Country Code [0 or 1] The ISO 3166-1 alpha-2 country code for the mailing address.
location-uuid field
Location Universally Unique Identifier Reference
Reference to a location by UUID.
role-id field
Role Identifier Reference
Reference to a role by UUID.
hash field
Hash
A representation of a cryptographic digest generated over a resource using a specified hash algorithm.

Keys (1)

Name Definition Cardinality Description
algorithm string [1] The digest method by which a hash is derived.
remarks field
Remarks
Additional commentary about the containing object.

The remarks field SHOULD not be used to store arbitrary data. Instead, a prop or link should be used to annotate or reference any additional data not formally supported by OSCAL.

published field
Publication Timestamp
The date and time the document was last made available.

Typically, this date value will be machine-generated at the time the containing document is published.

In some cases, an OSCAL document may be derived from some source material provided in a different format. In such a case, the published value should indicate when the OSCAL document instance was last published, not the source material.

last-modified field
Last Modified Timestamp
The date and time the document was last stored for later retrieval.

This value represents the point in time when the OSCAL document was last updated, or at the point of creation the creation date. Typically, this date value will be machine generated at time of creation or modification. Ideally, this field will be managed by the editing tool or service used to make modifications when storing the modified document.

The intent of the last modified timestamp is to distinguish between significant change milestones when the document may be accessed by multiple entities. This allows a given entity to differentiate between multiple document states at specific points in time. It is possible to make multiple modifications to the document without storing these changes. In such a case, the last modified timestamp might not be updated until the document is finally stored.

In some cases, an OSCAL document may be derived from some source material in a different format. In such a case, the last-modified value should indicate the last modification time of the OSCAL document instance, not the source material.

version field
Document Version
Used to distinguish a specific revision of an OSCAL document from other previous and future versions.

A version may be a release number, sequence number, date, or other identifier sufficient to distinguish between different document revisions.

While not required, it is recommended that OSCAL content authors use Semantic Versioning as the version format. This allows for the easy identification of a version tree consisting of major, minor, and patch numbers.

A version is typically set by the document owner or by the tool used to maintain the content.

oscal-version field
OSCAL Version
The OSCAL model version the document was authored against and will conform to as valid.

Indicates the version of the OSCAL model to which the document conforms, for example 1.1.0 or 1.0.0-milestone1. That can be used as a hint for a tool indicating which version of the OSCAL XML or JSON schema to use for validation.

The OSCAL version serves a different purpose from the document version and is used to represent a different concept. If both have the same value, this is coincidental.

email-address field
Email Address
An email address as defined by RFC 5322 Section 3.4.1.
telephone-number field
Telephone Number
A telephone service number as defined by ITU-T E.164.

Keys (1)

Name Definition Cardinality Description
type string [0 or 1] Indicates the type of phone number.
addr-line field
Address line
A single line of an address.
document-id field
Document Identifier
A document identifier qualified by an identifier scheme.

A document identifier provides a globally unique identifier with a cross-instance scope that is used for a group of documents that are to be treated as different versions, representations or digital surrogates of the same document.

A document identifier provides an additional data point for identifying a document that can be assigned by a publisher or organization for purposes in a wider system, such as a digital object identifier (DOI) or a local content management system identifier.

Use of a document identifier allows for document creators to associate sets of documents that are related in some way by the same document-id.

An OSCAL document always has an implicit document identifier provided by the document's UUID, defined by the uuid on the top-level object. Having a default UUID-based identifier ensures all documents can be minimally identified when other document identifiers are not provided.

Keys (1)

Name Definition Cardinality Description
scheme uri [0 or 1] Qualifies the kind of document identifier using a URI. If the scheme is not provided the value of the element will be interpreted as a string of characters.
purpose field
Purpose
A summary of the technological or business purpose of the component.
system-component assembly
Component
A defined component that can be part of an implemented system.

Components may be products, services, application programming interface (APIs), policies, processes, plans, guidance, standards, or other tangible items that enable security and/or privacy.

The type indicates which of these component types is represented.

When defining a service component where are relationship to other components is known, one or more link entries with rel values of provided-by and used-by can be used to link to the specific component identifier(s) that provide and use the service respectively.

Keys (10)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this inventory item elsewhere in this or other OSCAL instances. The locally defined UUID of the inventory item can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-roles Responsible Role [0 to ∞] A reference to a role with responsibility for performing a function relative to the containing object, optionally associated with a set of persons and/or organizations that perform that role.
protocols Service Protocol Information [0 to ∞] Information about the protocol used to provide a service.
remarks Remarks [0 or 1] Additional commentary about the containing object.
status Status [1] Describes the operational status of the system.
title title field [1] A human readable name for the leveraged authorization in the context of the system.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
purpose Purpose [0 or 1] A summary of the technological or business purpose of the component.

Constraints (18)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • implementation-point: Relative placement of component ('internal' or 'external') to the system.
    • leveraged-authorization-uuid: UUID of the related leveraged-authorization assembly in this SSP.
    • inherited-uuid: UUID of the component as it was assigned in the leveraged system's SSP.
    • asset-type: Simple indication of the asset's function, such as Router, Storage Array, DNS Server.
    • asset-id: An organizationally specific identifier that is used to uniquely identify a logical or tangible item by the organization that owns the item.
    • asset-tag: An asset tag assigned by the organization responsible for maintaining the logical or tangible item.
    • public: Identifies whether the asset is publicly accessible (yes/no)
    • virtual: Identifies whether the asset is virtualized (yes/no)
    • vlan-id: Virtual LAN identifier of the asset.
    • network-id: The network identifier of the asset.
    • label: A human-readable label for the parent context.
    • sort-id: An alternative identifier, whose value is easily sortable among other such values in the document.
    • baseline-configuration-name: The name of the baseline configuration for the asset.
    • allows-authenticated-scan: Can the asset be check with an authenticated scan? (yes/no)
    • function: The function provided by the asset for the system.
    • hardware-model: **(deprecated)** Use 'model' instead.
    • model: The model of system used by the asset.
    • os-name: The name of the operating system used by the asset.
    • os-version: The version of the operating system used by the asset.
    • software-name: The software product name used by the asset.
    • software-version: The software product version used by the asset.
    • software-patch-level: The software product patch level used by the asset.
    • version: The version of the component.
    • patch-level: The specific patch level of the component.
    • model: The model of system used by the asset.
    • release-date: The date the component was released, such as a software release date or policy publication date.
    • validation-type: Used with component-type='validation' to provide a well-known name for a kind of validation.
    • validation-reference: Used with component-type='validation' to indicate the validating body's assigned identifier for their validation of this component.
  • allowed-values for link/@rel
    • depends-on: A reference to another component that this component has a dependency on.
    • validation: An external assessment performed on some other component, that has been validated by a third-party.
    • proof-of-compliance: A pointer to a validation record (e.g., FIPS 140-2) or other compliance information.
    • baseline-template: A reference to the baseline template used to configure the asset.
    • uses-service: This service is used by the referenced component identifier.
    • system-security-plan: A link to the system security plan of the external system.
    • uses-network: This component uses the network provided by the identified network component.
    • imported-from: The hyperlink identifies a URI pointing to the component in a component-definition that originally defined the component.
  • allowed-values for responsible-role/@role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
    • maintainer: Responsible for the creation and maintenance of a component.
    • provider: Organization responsible for providing the component, if this is different from the "maintainer" (e.g., a reseller).
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='asset-type']/@value
    • operating-system: System software that manages computer hardware, software resources, and provides common services for computer programs.
    • database: An electronic collection of data, or information, that is specially organized for rapid search and retrieval.
    • web-server: A system that delivers content or services to end users over the Internet or an intranet.
    • dns-server: A system that resolves domain names to internet protocol (IP) addresses.
    • email-server: A computer system that sends and receives electronic mail messages.
    • directory-server: A system that stores, organizes and provides access to directory information in order to unify network resources.
    • pbx: A private branch exchange (PBX) provides a a private telephone switchboard.
    • firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
    • router: A physical or virtual networking device that forwards data packets between computer networks.
    • switch: A physical or virtual networking device that connects devices within a computer network by using packet switching to receive and forward data to the destination device.
    • storage-array: A consolidated, block-level data storage capability.
    • appliance: A physical or virtual machine that centralizes hardware, software, or services for a specific purpose.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='allows-authenticated-scan']/@value
    • yes: The asset is included in periodic vulnerability scanning.
    • no: The asset is not included in periodic vulnerability scanning.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='public']/@value
    • yes: The asset is included in periodic vulnerability scanning.
    • no: The asset is not included in periodic vulnerability scanning.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='virtual']/@value
    • yes: The asset is included in periodic vulnerability scanning.
    • no: The asset is not included in periodic vulnerability scanning.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='implementation-point']/@value
    • internal: A user account for a person or entity that is part of the organization who owns or operates the system.
    • external: A user account for a person or entity that is not part of the organization who owns or operates the system.
  • allowed-values for (.)[@type=('software', 'hardware', 'service')]/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • vendor-name: The name of the company or organization
  • allowed-values for (.)[@type='validation']/link/@rel
    • validation-details: A link to an online information provided by the authorizing body.
  • allowed-values for (.)[@type='software']/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • software-identifier: If a "software" component-type, the identifier, such as a SWID tag, for the software component.
  • allowed-values for (.)[@type='service']/link/@rel
    • provided-by: This service is provided by the referenced component identifier.
    • used-by: This service is used by the referenced component identifier.
  • allowed-values for (.)[@type='interconnection']/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • isa-title: Title of the Interconnection Security Agreement (ISA).
    • isa-date: Date of the Interconnection Security Agreement (ISA).
    • isa-remote-system-name: The name of the remote interconnected system.
    • ipv4-address: The Internet Protocol v4 Address of the asset.
    • ipv6-address: The Internet Protocol v6 Address of the asset.
    • direction: The direction categorizes the network connectivity of an interconnection, service, or software component.
    • uri: A Uniform Resource Identifier (URI) for the asset.
    • fqdn: The full-qualified domain name (FQDN) of the asset.
  • allowed-values for (.)[@type=('interconnection', 'service', 'software', 'system')]/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • ipv4-address: The Internet Protocol v4 Address of the asset.
    • ipv6-address: The Internet Protocol v6 Address of the asset.
    • direction: The direction categorizes the network connectivity of an interconnection, service, or software component.
    • uri: A Uniform Resource Identifier (URI) for the asset.
    • fqdn: The full-qualified domain name (FQDN) of the asset.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name=('ipv4-address','ipv6-address')]/@class
    • local: The identified IP address is for this system.
    • remote: The identified IP address is for the remote system to which this system is connected.
  • allowed-values for (.)[@type='interconnection']/link/@rel
    • isa-agreement: A link to the system interconnection agreement.
  • allowed-values for (.)[@type='interconnection']/responsible-role/@role-id
    • isa-poc-local: Interconnection Security Agreement (ISA) point of contact (POC) for this system.
    • isa-poc-remote: Interconnection Security Agreement (ISA) point of contact (POC) for the remote interconnected system.
    • isa-authorizing-official-local: Interconnection Security Agreement (ISA) authorizing official for this system.
    • isa-authorizing-official-remote: Interconnection Security Agreement (ISA) authorizing official for the remote interconnected system.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='direction']/@value
    • incoming: Data from the remote system flows into this system.
    • outgoing: Data from this system flows to the remote system.
protocol assembly
Service Protocol Information
Information about the protocol used to provide a service.

Keys (4)

Name Definition Cardinality Description
uuid uuid [0 or 1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this inventory item elsewhere in this or other OSCAL instances. The locally defined UUID of the inventory item can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
name string [0 or 1] The common name of the protocol, which should be the appropriate "service name" from the IANA Service Name and Transport Protocol Port Number Registry.
port-ranges Port Range [0 to ∞] Where applicable this is the transport layer protocol port range an IPv4-based or IPv6-based service uses.
title title field [0 or 1] A human readable name for the leveraged authorization in the context of the system.

Constraints (1)

  • expect for . Test: @uuid
port-range assembly
Port Range
Where applicable this is the transport layer protocol port range an IPv4-based or IPv6-based service uses.

To be validated as a natural number (integer >= 1). A single port uses the same value for start and end. Use multiple 'port-range' entries for non-contiguous ranges.

Keys (4)

Name Definition Cardinality Description
start non-negative-integer [0 or 1] Indicates the starting port number in a port range for a transport layer protocol
end non-negative-integer [0 or 1] Indicates the ending port number in a port range for a transport layer protocol
transport token [0 or 1] Indicates the transport type.
remarks Remarks [0 to 1] Additional commentary about the containing object.

Constraints (3)

  • expect for . Test: exists(@start)
  • expect for . Test: exists(@end)
  • expect for . Test: not(@start > @end)
implementation-status assembly
Implementation Status
Indicates the degree to which the a given control is implemented.

Keys (2)

Name Definition Cardinality Description
state token [1] Identifies the implementation status of the control or control objective.
remarks Remarks [0 to 1] Additional commentary about the containing object.
system-user assembly
System User
A type of user that interacts with the system based on an associated role.

Permissible values to be determined closer to the application, such as by a receiving authority.

Keys (9)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this inventory item elsewhere in this or other OSCAL instances. The locally defined UUID of the inventory item can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
authorized-privileges Privilege [0 to ∞] Identifies a specific system privilege held by the user, along with an associated description and/or rationale for the privilege.
role-ids Role Identifier Reference [0 to ∞] Reference to a role by UUID.
remarks Remarks [0 or 1] Additional commentary about the containing object.
title title field [0 or 1] A human readable name for the leveraged authorization in the context of the system.
short-name Role Short Name [0 or 1] A short common name, abbreviation, or acronym for the party.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.

Constraints (4)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • type: The type of user, such as internal, external, or general-public.
    • privilege-level: The user's privilege level within the system, such as privileged, non-privileged, no-logical-access.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='type']/@value
    • internal: A user account for a person or entity that is part of the organization who owns or operates the system.
    • external: A user account for a person or entity that is not part of the organization who owns or operates the system.
    • general-public: A user of the system considered to be outside
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='privilege-level']/@value
    • privileged: This role has elevated access to the system, such as a group or system administrator.
    • non-privileged: This role has typical user-level access to the system without elevated access.
    • no-logical-access: This role has no access to the system, such as a manager who approves access as part of a process.
  • allowed-values for role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
authorized-privilege assembly
Privilege
Identifies a specific system privilege held by the user, along with an associated description and/or rationale for the privilege.

Keys (3)

Name Definition Cardinality Description
functions-performed Functions Performed [1 to ∞] Describes a function performed for a given authorized privilege by this user class.
title title field [1] A human readable name for the leveraged authorization in the context of the system.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
implemented-component assembly
Implemented Component
The set of components that are implemented in a given system inventory item.

Keys (5)

Name Definition Cardinality Description
component-uuid uuid [1] A machine-oriented identifier reference to a component that is implemented as part of an inventory item.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-parties Responsible Party [0 to ∞] A reference to a set of persons and/or organizations that have responsibility for performing the referenced role in the context of the containing object.
remarks Remarks [0 or 1] Additional commentary about the containing object.

Constraints (2)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • version: The version of the component.
    • patch-level: The specific patch level of the component.
    • model: The model of system used by the asset.
    • release-date: The date the component was released, such as a software release date or policy publication date.
    • validation-type: Used with component-type='validation' to provide a well-known name for a kind of validation.
    • validation-reference: Used with component-type='validation' to indicate the validating body's assigned identifier for their validation of this component.
    • asset-type: Simple indication of the asset's function, such as Router, Storage Array, DNS Server.
    • asset-id: An organizationally specific identifier that is used to uniquely identify a logical or tangible item by the organization that owns the item.
    • asset-tag: An asset tag assigned by the organization responsible for maintaining the logical or tangible item.
    • public: Identifies whether the asset is publicly accessible (yes/no)
    • virtual: Identifies whether the asset is virtualized (yes/no)
    • vlan-id: Virtual LAN identifier of the asset.
    • network-id: The network identifier of the asset.
    • label: A human-readable label for the parent context.
    • sort-id: An alternative identifier, whose value is easily sortable among other such values in the document.
    • baseline-configuration-name: The name of the baseline configuration for the asset.
    • allows-authenticated-scan: Can the asset be check with an authenticated scan? (yes/no)
    • function: The function provided by the asset for the system.
    • hardware-model: **(deprecated)** Use 'model' instead.
    • model: The model of system used by the asset.
    • os-name: The name of the operating system used by the asset.
    • os-version: The version of the operating system used by the asset.
    • software-name: The software product name used by the asset.
    • software-version: The software product version used by the asset.
    • software-patch-level: The software product patch level used by the asset.
  • allowed-values for responsible-party/@role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
inventory-item assembly
Inventory Item
A single managed inventory item within the system.

Keys (7)

Name Definition Cardinality Description
uuid uuid [1] A machine-oriented, globally unique identifier with cross-instance scope that can be used to reference this inventory item elsewhere in this or other OSCAL instances. The locally defined UUID of the inventory item can be used to reference the data item locally or globally (e.g., in an imported OSCAL instance). This UUID should be assigned per-subject, which means it should be consistently used to identify the same subject across revisions of the document.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
responsible-parties Responsible Party [0 to ∞] A reference to a set of persons and/or organizations that have responsibility for performing the referenced role in the context of the containing object.
remarks Remarks [0 or 1] Additional commentary about the containing object.
implemented-components Implemented Component [0 to ∞] The set of components that are implemented in a given system inventory item.
description System Description [1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.

Constraints (6)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • ipv4-address: The Internet Protocol v4 Address of the asset.
    • ipv6-address: The Internet Protocol v6 Address of the asset.
    • fqdn: The full-qualified domain name (FQDN) of the asset.
    • uri: A Uniform Resource Identifier (URI) for the asset.
    • serial-number: A serial number for the asset.
    • netbios-name: The NetBIOS name for the asset.
    • mac-address: The media access control (MAC) address for the asset.
    • physical-location: The physical location of the asset's hardware (e.g., Data Center ID, Cage#, Rack#, or other meaningful location identifiers).
    • is-scanned: is the asset subjected to network scans? (yes/no)
    • asset-type: Simple indication of the asset's function, such as Router, Storage Array, DNS Server.
    • asset-id: An organizationally specific identifier that is used to uniquely identify a logical or tangible item by the organization that owns the item.
    • asset-tag: An asset tag assigned by the organization responsible for maintaining the logical or tangible item.
    • public: Identifies whether the asset is publicly accessible (yes/no)
    • virtual: Identifies whether the asset is virtualized (yes/no)
    • vlan-id: Virtual LAN identifier of the asset.
    • network-id: The network identifier of the asset.
    • label: A human-readable label for the parent context.
    • sort-id: An alternative identifier, whose value is easily sortable among other such values in the document.
    • baseline-configuration-name: The name of the baseline configuration for the asset.
    • allows-authenticated-scan: Can the asset be check with an authenticated scan? (yes/no)
    • function: The function provided by the asset for the system.
    • hardware-model: **(deprecated)** Use 'model' instead.
    • model: The model of system used by the asset.
    • os-name: The name of the operating system used by the asset.
    • os-version: The version of the operating system used by the asset.
    • software-name: The software product name used by the asset.
    • software-version: The software product version used by the asset.
    • software-patch-level: The software product patch level used by the asset.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='asset-type']/@value
    • operating-system: System software that manages computer hardware, software resources, and provides common services for computer programs.
    • database: An electronic collection of data, or information, that is specially organized for rapid search and retrieval.
    • web-server: A system that delivers content or services to end users over the Internet or an intranet.
    • dns-server: A system that resolves domain names to internet protocol (IP) addresses.
    • email-server: A computer system that sends and receives electronic mail messages.
    • directory-server: A system that stores, organizes and provides access to directory information in order to unify network resources.
    • pbx: A private branch exchange (PBX) provides a a private telephone switchboard.
    • firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
    • router: A physical or virtual networking device that forwards data packets between computer networks.
    • switch: A physical or virtual networking device that connects devices within a computer network by using packet switching to receive and forward data to the destination device.
    • storage-array: A consolidated, block-level data storage capability.
    • appliance: A physical or virtual machine that centralizes hardware, software, or services for a specific purpose.
  • allowed-values for (.)[@type=('software', 'hardware', 'service')]/prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • vendor-name: The name of the company or organization
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal') and @name='is-scanned']/@value
    • yes: The asset is included in periodic vulnerability scanning.
    • no: The asset is not included in periodic vulnerability scanning.
  • allowed-values for link/@rel
    • baseline-template: A reference to the baseline template used to configure the asset.
  • allowed-values for responsible-party/@role-id
    • asset-owner: Accountable for ensuring the asset is managed in accordance with organizational policies and procedures.
    • asset-administrator: Responsible for administering a set of assets.
    • security-operations: Members of the security operations center (SOC).
    • network-operations: Members of the network operations center (NOC).
    • incident-response: Responsible for responding to an event that could lead to loss of, or disruption to, an organization's operations, services or functions.
    • help-desk: Responsible for providing information and support to users.
    • configuration-management: Responsible for the configuration management processes governing changes to the asset.
    • maintainer: Responsible for the creation and maintenance of a component.
    • provider: Organization responsible for providing the component, if this is different from the "maintainer" (e.g., a reseller).
value field
Parameter Value
A parameter value or set of values.
set-parameter assembly
Set Parameter Value
Identifies the parameter that will be set by the enclosed value.

Keys (2)

Name Definition Cardinality Description
remarks Remarks [0 or 1] Additional commentary about the containing object.
values Parameter Value [1 to ∞] A parameter value or set of values.
function-performed field
Functions Performed
Describes a function performed for a given authorized privilege by this user class.
system-id field
System Identification
A human-oriented, globally unique identifier with cross-instance scope that can be used to reference this system identification property elsewhere in this or other OSCAL instances. When referencing an externally defined system identification, the system identification must be used in the context of the external / imported OSCAL instance (e.g., uri-reference). This string should be assigned per-subject, which means it should be consistently used to identify the same system across revisions of the document.

Keys (1)

Name Definition Cardinality Description
identifier-type uri [0 or 1] Identifies the identification system from which the provided identifier was assigned.
prose field
Part Text
Prose permits multiple paragraphs, lists, tables etc.
part assembly
Part
An annotated, markup-based textual element of a control's or catalog group's definition, or a child of another part.

A part provides for logical partitioning of prose, and can be thought of as a grouping structure (e.g., section). A part can have child parts allowing for arbitrary nesting of prose content (e.g., statement hierarchy). A part can contain prop objects that allow for enriching prose text with structured name/value information.

A part can be assigned an optional id, which allows references to this part from within a catalog, or within an instance of another OSCAL model that has a need to reference the part. Examples of where part referencing is used in OSCAL include:

  • Referencing a part by id to tailor (make modifications to) a control statement in a profile.
  • Referencing a control statement represented by a part in a system security plan implemented-requirement where a statement-level response is desired.

Use of part and prop provides for a wide degree of extensibility within the OSCAL catalog model. The optional ns provides a means to qualify a part's name, allowing for organization-specific vocabularies to be defined with clear semantics. Any organization that extends OSCAL in this way should consistently assign a ns value that represents the organization, making a given namespace qualified name unique to that organization. This allows the combination of ns and name to always be unique and unambiguous, even when mixed with extensions from other organizations. Each organization is responsible for governance of their own extensions, and is strongly encouraged to publish their extensions as standards to their user community. If no ns is provided, the name is expected to be in the "OSCAL" namespace.

To ensure a ns is unique to an organization and naming conflicts are avoided, a URI containing a DNS or other globally defined organization name should be used. For example, if FedRAMP and DoD both extend OSCAL, FedRAMP will use the ns http://fedramp.gov/ns/oscal, while DoD might use the ns https://defense.gov for any organization specific name.

Tools that process OSCAL content are not required to interpret unrecognized OSCAL extensions; however, OSCAL compliant tools should not modify or remove unrecognized extensions, unless there is a compelling reason to do so, such as data sensitivity.

Keys (9)

Name Definition Cardinality Description
id token [0 or 1] A unique identifier for the parameter.
name token [1] A textual label that uniquely identifies the part's semantic type, which exists in a value space qualified by the ns.
ns uri [0 or 1] An optional namespace qualifying the part's name. This allows different organizations to associate distinct semantics with the same name.
class token [0 or 1] A textual label that provides a characterization of the type, purpose, use or scope of the parameter.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
parts Part [0 to ∞] An annotated, markup-based textual element of a control's or catalog group's definition, or a child of another part.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
title title field [0 or 1] A human readable name for the leveraged authorization in the context of the system.
prose Part Text [0 or 1] Prose permits multiple paragraphs, lists, tables etc.

Constraints (1)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • label: A human-readable label for the parent context, which may be rendered in place of the actual identifier for some use cases.
    • sort-id: An alternative identifier, whose value is easily sortable among other such values in the document.
    • alt-identifier: An alternate or aliased identifier for the parent context.
label field
Parameter Label
A short, placeholder name for the parameter, which can be used as a substitute for a value if no value is assigned.

The label value is intended use when rendering a parameter in generated documentation or a user interface when a parameter is referenced. Note that labels are not required to be distinctive, which means that parameters within the same control may have the same label.

usage field
Parameter Usage Description
Describes the purpose and use of a parameter.
parameter assembly
Parameter
Parameters provide a mechanism for the dynamic assignment of value(s) in a control.

In a catalog, a parameter is typically used as a placeholder for the future assignment of a parameter value, although the OSCAL model allows for the direct assignment of a value if desired by the control author. The value may be optionally used to specify one or more values. If no value is provided, then it is expected that the value will be provided at the Profile or Implementation layer.

A parameter can include a variety of metadata options that support the future solicitation of one or more values. A label provides a textual placeholder that can be used in a tool to solicit parameter value input, or to display in catalog documentation. The desc provides a short description of what the parameter is used for, which can be used in tooling to help a user understand how to use the parameter. A constraint can be used to provide criteria for the allowed values. A guideline provides a recommendation for the use of a parameter.

Keys (12)

Name Definition Cardinality Description
id token [1] A unique identifier for the parameter.
class token [0 or 1] A textual label that provides a characterization of the type, purpose, use or scope of the parameter.
depends-on token [0 or 1] (deprecated) Another parameter invoking this one. This construct has been deprecated and should not be used.
props Property [0 to ∞] An attribute, characteristic, or quality of the containing object expressed as a namespace qualified name/value pair.
links Link [0 to ∞] A reference to a local or remote resource, that has a specific relation to the containing object.
constraints Constraint [0 to ∞] A formal or informal expression of a constraint or test.
guidelines Guideline [0 to ∞] A prose statement that provides a recommendation for the use of a parameter.
remarks Remarks [0 or 1] Additional commentary about the containing object.
label Parameter Label [0 or 1] A short, placeholder name for the parameter, which can be used as a substitute for a value if no value is assigned.
usage Parameter Usage Description [0 or 1] Describes the purpose and use of a parameter.
parameter-selection Selection [0 or 1] Presenting a choice among alternatives.
values Parameter Value [0 to ∞] A parameter value or set of values.

Constraints (3)

  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/oscal')]/@name
    • label: A human-readable label for the parent context, which may be rendered in place of the actual identifier for some use cases.
    • sort-id: An alternative identifier, whose value is easily sortable among other such values in the document.
    • alt-identifier: An alternate or aliased identifier for the parent context.
    • alt-label: An alternate to the value provided by the parameter's label. This will typically be qualified by a class.
  • allowed-values for prop[has-oscal-namespace('http://csrc.nist.gov/ns/rmf')]/@name
    • aggregates: The parent parameter provides an aggregation of two or more other parameters, each described by this property.
  • expect for . Test: not(exists(@depends-on))
expression field
Constraint test
A formal (executable) expression of a constraint.
test assembly
Constraint Test
A test expression which is expected to be evaluated by a tool.

Keys (2)

Name Definition Cardinality Description
remarks Remarks [0 or 1] Additional commentary about the containing object.
expression Constraint test [1] A formal (executable) expression of a constraint.
parameter-constraint assembly
Constraint
A formal or informal expression of a constraint or test.

Keys (2)

Name Definition Cardinality Description
tests Constraint Test [0 to ∞] A test expression which is expected to be evaluated by a tool.
description System Description [0 or 1] An implementation statement that describes the aspects of a control or control statement implementation that a leveraging system is implementing based on a requirement from a leveraged system.
parameter-guideline assembly
Guideline
A prose statement that provides a recommendation for the use of a parameter.

Keys (1)

Name Definition Cardinality Description
prose Part Text [1] Prose permits multiple paragraphs, lists, tables etc.
choice field
Choice
A value selection among several such options.
parameter-selection assembly
Selection
Presenting a choice among alternatives.

A set of parameter value choices, that may be picked from to set the parameter value.

Keys (2)

Name Definition Cardinality Description
how-many token [0 or 1] Describes the number of selections that must occur. Without this setting, only one value should be assumed to be permitted.
choice Choice [0 to ∞] A value selection among several such options.
include-all assembly
Include All
Include all controls from the imported catalog or profile resources.

This element provides an alternative to calling controls individually from a catalog.

matching assembly
Match Controls by Pattern
Selecting a set of controls by matching their IDs with a wildcard pattern.

Keys (1)

Name Definition Cardinality Description
remarks Remarks [0 to 1] Additional commentary about the containing object.
select-control-by-id assembly
Select Control
Select a control or controls from an imported control set.

If with-child-controls is yes on the call to a control, no sibling callelements need to be used to call any controls appearing within it. Since generally, this is how control enhancements are represented (as controls within controls), this provides a way to include controls with all their dependent controls (enhancements) without having to call them individually.

Keys (2)

Name Definition Cardinality Description
matching Match Controls by Pattern [0 to ∞] Selecting a set of controls by matching their IDs with a wildcard pattern.
with-ids Match Controls by Identifier [0 to ∞] Selecting a control by its ID given as a literal.
parameter-value field
Parameter Value
A parameter value or set of values.
with-id field
Match Controls by Identifier
Selecting a control by its ID given as a literal.

Generated from OSCAL Metaschema sources. An OSCAL Foundation project.