Remarks are required if service model is "other". Optional otherwise.
-An external leveraged system.
Secure connection to an external API for data enrichment.
Some description of the authentication method.
Briefly describe the external system.
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Profile to be imported
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Profile to be imported
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
An external leveraged system.
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
This is an enhanced example system for demonstration purposes, incorporating more FedRAMP-specific elements.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
Remarks are required if service model is "other". Optional otherwise.
Secure connection to an external API for data enrichment.
Implementation of controls for the Enhanced Example System
Access Control Policy and Procedures (AC-1) is fully implemented in our system.
Information System Component Inventory (CM-8) is partially implemented.
Detailed access control policy document
Separation of Duties Matrix
Authorization Boundary Diagram
Network Architecture Diagram
Data flow Diagram
If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
@@ -24,8 +24,8 @@If 'yes', describe the authentication method.
If 'no', explain why no authentication is used.
@@ -36,9 +36,9 @@If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
@@ -54,7 +54,7 @@If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
@@ -70,7 +70,7 @@If 'yes', describe the authentication method in the remarks.
If 'no', explain why no authentication is used in the remarks.
diff --git a/src/validations/constraints/content/ssp-user-privilege-level-INVALID.xml b/src/validations/constraints/content/ssp-user-privilege-level-INVALID.xml index 695e56111..d7b35a773 100644 --- a/src/validations/constraints/content/ssp-user-privilege-level-INVALID.xml +++ b/src/validations/constraints/content/ssp-user-privilege-level-INVALID.xml @@ -2,7 +2,7 @@