Skip to content

Commit

Permalink
Manual publishing auto-converted artifacts [skip ci]
Browse files Browse the repository at this point in the history
Follow-on work is needed to also auto-commit on release branch in GHA,
not just main.
  • Loading branch information
aj-stein-nist committed Nov 2, 2023
1 parent 690f517 commit bae69b5
Show file tree
Hide file tree
Showing 92 changed files with 240,514 additions and 1,045,343 deletions.
4 changes: 2 additions & 2 deletions examples/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# OSCAL Model-Specific Examples

This directory contains OSCAL examples organized by their corresponding OSCAL model.
This directory contains the source files for examples organized by their corresponding OSCAL model.

The contents of the examples directory are as follows:

Expand All @@ -10,4 +10,4 @@ The contents of the examples directory are as follows:

[catalog-model]: https://pages.nist.gov/OSCAL/documentation/schema/catalog-layer/catalog/
[component-definition-model]: https://pages.nist.gov/OSCAL/documentation/schema/implementation-layer/component/
[ssp-model]: https://pages.nist.gov/OSCAL/documentation/schema/implementation-layer/ssp/
[ssp-model]: https://pages.nist.gov/OSCAL/documentation/schema/implementation-layer/ssp/
284 changes: 1 addition & 283 deletions examples/catalog/json/basic-catalog-min.json

Large diffs are not rendered by default.

8 changes: 4 additions & 4 deletions examples/catalog/json/basic-catalog.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@
"uuid": "74c8ba1e-5cd4-4ad1-bbfd-d888e2f6c724",
"metadata": {
"title": "Sample Security Catalog *for Demonstration* and Testing",
"published": "2020-02-02T11:01:04.736-04:00",
"last-modified": "2021-06-08T13:57:28.355446-04:00",
"version": "1.0",
"oscal-version": "1.0.0",
"published": "2023-10-12T00:00:00.000000-04:00",
"last-modified": "2023-10-12T00:00:00.000000-04:00",
"version": "1.1",
"oscal-version": "1.1.1",
"remarks": "The following is a short excerpt from [ISO/IEC 27002:2013](https://www.iso.org/standard/54533.html), *Information technology — Security techniques — Code of practice for information security controls*. This work is provided here under copyright \"fair use\" for non-profit, educational purposes only. Copyrights for this work are held by the publisher, the International Organization for Standardization (ISO)."
},
"groups": [
Expand Down
10 changes: 5 additions & 5 deletions examples/catalog/xml/basic-catalog.xml
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
<?xml version="1.0" encoding="UTF-8"?>
<!-- Modified by the OSCAL 1.0.0 RC2 to OSCAL 1.0.0 conversion XSLT on 2021-06-08T13:57:28.355446-04:00 -->
<?xml-model schematypens="http://www.w3.org/2001/XMLSchema" type="application/xml" href="https://github.com/usnistgov/OSCAL/releases/download/v1.1.1/oscal_complete_schema.xsd"?>
<catalog xmlns="http://csrc.nist.gov/ns/oscal/1.0"
uuid="74c8ba1e-5cd4-4ad1-bbfd-d888e2f6c724">
<metadata>
<title>Sample Security Catalog <em>for Demonstration</em> and Testing</title>
<published>2020-02-02T11:01:04.736-04:00</published>
<last-modified>2021-06-08T13:57:28.355446-04:00</last-modified>
<version>1.0</version>
<oscal-version>1.0.0</oscal-version>
<published>2023-10-12T00:00:00.000000-04:00</published>
<last-modified>2023-10-12T00:00:00.000000-04:00</last-modified>
<version>1.1</version>
<oscal-version>1.1.1</oscal-version>
<remarks>
<p>The following is a short excerpt from <a href="https://www.iso.org/standard/54533.html">ISO/IEC 27002:2013</a>, <em>Information technology — Security techniques — Code of practice for information security controls</em>. This work is provided here under copyright <q>fair use</q> for non-profit, educational purposes only. Copyrights for this work are held by the publisher, the International Organization for Standardization (ISO).</p>
</remarks>
Expand Down
234 changes: 58 additions & 176 deletions examples/catalog/yaml/basic-catalog.yaml

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -1,104 +1 @@
{
"component-definition": {
"uuid": "a7ba800c-a432-44cd-9075-0862cd66da6b",
"metadata": {
"title": "MongoDB Component Definition Example",
"last-modified": "2001-08-26T23:11:47Z",
"version": "20210826",
"oscal-version": "1.0.0",
"roles": [
{
"id": "provider",
"title": "Provider"
}
],
"parties": [
{
"uuid": "ef7c799a-c50e-49ab-83e0-515e989e6df1",
"type": "organization",
"name": "MongoDB",
"links": [
{
"href": "https://www.mongodb.com",
"rel": "website"
}
]
}
]
},
"components": [
{
"uuid": "91f646c5-b1b6-4786-9ec3-2305a044e217",
"type": "software",
"title": "MongoDB",
"description": "MongoDB is a source-available, cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas.",
"purpose": "Provides a NoSQL database service",
"responsible-roles": [
{
"role-id": "provider",
"party-uuids": [
"ef7c799a-c50e-49ab-83e0-515e989e6df1"
]
}
],
"protocols": [
{
"uuid": "2b4a1b3a-cbc5-4cc8-bde6-7437c28c4e54",
"name": "mongodb",
"title": "Primary daemon process for the MongoDB system.",
"port-ranges": [
{
"start": 27017,
"end": 27017,
"transport": "TCP"
}
]
},
{
"uuid": "99d8d4e5-e734-4e05-a2f9-7353097b8b61",
"name": "mongodb-shardsrv",
"title": "MongoDB protocol for sharding with shardsrv option.",
"port-ranges": [
{
"start": 27018,
"end": 27018,
"transport": "TCP"
}
]
},
{
"uuid": "6fa762f1-09ca-44d5-a94c-cfceb57debd5",
"name": "mongodb-configsvr",
"title": "MongoDB protocol for configsrv operation.",
"port-ranges": [
{
"start": 27019,
"end": 27019,
"transport": "TCP"
}
]
}
],
"control-implementations": [
{
"uuid": "49f0b690-ed9f-4f32-aae0-625b77aa6d27",
"source": "https://github.com/usnistgov/oscal-content/blob/master/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml",
"description": "MongoDB control implementations for NIST SP 800-53 revision 5.",
"implemented-requirements": [
{
"uuid": "cf8338c5-fb6e-4593-a4a8-b3c4946ee2a0",
"control-id": "sc-8.1",
"description": "MongoDB supports TLS 1.x to encrypt data in transit, preventing unauthorized disclosure or changes to information during transmission. To implement TLS, set the PEMKeyFile option in the configuration /etc/mongod.conf to the certificate file's path and restart the the component."
},
{
"uuid": "5227daf8-7a4b-4fe0-aea9-3547b7de2603",
"control-id": "sa-4.9",
"description": "Must ensure that MongoDB only listens for network connections on authorized interfaces by configuring the MongoDB configuration file to limit the services exposure to only the network interfaces on which MongoDB instances should listen for incoming connections."
}
]
}
]
}
]
}
}
{"component-definition":{"uuid":"a7ba800c-a432-44cd-9075-0862cd66da6b","metadata":{"title":"MongoDB Component Definition Example","last-modified":"2023-10-12T00:00:00.000000-04:00","version":"20231012","oscal-version":"1.1.1","roles":[{"id":"provider","title":"Provider"}],"parties":[{"uuid":"ef7c799a-c50e-49ab-83e0-515e989e6df1","type":"organization","name":"MongoDB","links":[{"href":"https:\/\/www.mongodb.com","rel":"website"}]}]},"components":[{"uuid":"91f646c5-b1b6-4786-9ec3-2305a044e217","type":"software","title":"MongoDB","description":"MongoDB is a source-available, cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas.","purpose":"Provides a NoSQL database service","responsible-roles":[{"role-id":"provider","party-uuids":["ef7c799a-c50e-49ab-83e0-515e989e6df1"]},{"role-id":"customer"}],"protocols":[{"uuid":"2b4a1b3a-cbc5-4cc8-bde6-7437c28c4e54","name":"mongodb","title":"Primary daemon process for the MongoDB system.","port-ranges":[{"start":27017,"end":27017,"transport":"TCP"}]},{"uuid":"99d8d4e5-e734-4e05-a2f9-7353097b8b61","name":"mongodb-shardsrv","title":"MongoDB protocol for sharding with shardsrv option.","port-ranges":[{"start":27018,"end":27018,"transport":"TCP"}]},{"uuid":"6fa762f1-09ca-44d5-a94c-cfceb57debd5","name":"mongodb-configsvr","title":"MongoDB protocol for configsrv operation.","port-ranges":[{"start":27019,"end":27019,"transport":"TCP"}]}],"control-implementations":[{"uuid":"49f0b690-ed9f-4f32-aae0-625b77aa6d27","source":"#ba047e56-faef-430c-bafb-c54e9a87c6e8","description":"MongoDB control implementations for NIST SP 800-53 revision 5.","implemented-requirements":[{"uuid":"cf8338c5-fb6e-4593-a4a8-b3c4946ee080","control-id":"sc-8","description":"MongoDB's implementation of SC-8 control. The details of the implementation are provided at the statement level.","set-parameters":[{"param-id":"sc-8_prm_1","values":["confidentiality"]}],"statements":[{"statement-id":"sc-8_smt","uuid":"bb9219b1-e51c-4680-abb0-616a43bbfbb1","description":"MongoDB implements TLS 1.x to protect the {{ insert: param, sc-8_prm_1 }} of transmitted data by encrypting data in transit, preventing unauthorized disclosure or changes to information during transmission."}]},{"uuid":"cf8338c5-fb6e-4593-a4a8-b3c4946ee081","control-id":"sc-8.1","description":"MongoDB implements cryptographic mechanisms (TLS 1.x) to provide cryptographic protection for data in transit.","set-parameters":[{"param-id":"sc-8.1_prm_1","values":["prevent unauthorized disclosure of information"]}],"statements":[{"statement-id":"sc-8.1_smt","uuid":"bb9219b1-e51c-4680-abb0-616a43bbfbb1","description":"To implement cryptographic mechanisms (aka enable TLS 1.x) to {{ insert: param, sc-8.1_prm_1 }}, customers need to set the `PEMKeyFile` option in the configuration file `\/etc\/mongod.conf` to the certificate file's path and restart the component.","responsible-roles":[{"role-id":"customer"}]}]},{"uuid":"5227daf8-7a4b-4fe0-aea9-3547b7de2603","control-id":"sa-4.9","description":"Must ensure that MongoDB only listens for network connections on authorized interfaces by configuring the MongoDB configuration file to limit the services exposure to only the network interfaces on which MongoDB instances should listen for incoming connections."}]}]}],"back-matter":{"resources":[{"uuid":"ba047e56-faef-430c-bafb-c54e9a87c6e8","description":"NIST Special Publication 800-53 Revision 5: Moderate Baseline Profile","rlinks":[{"href":"..\/..\/..\/nist.gov\/SP800-53\/rev5\/xml\/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml","media-type":"application\/oscal.catalog+xml"},{"href":"..\/..\/..\/nist.gov\/SP800-53\/rev5\/json\/NIST_SP-800-53_rev5_MODERATE-baseline_profile.json","media-type":"application\/oscal.catalog+json"},{"href":"..\/..\/..\/nist.gov\/SP800-53\/rev5\/yaml\/NIST_SP-800-53_rev5_MODERATE-baseline_profile.yaml","media-type":"application\/oscal.catalog+yaml"}]}]}}}
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@
"uuid": "a7ba800c-a432-44cd-9075-0862cd66da6b",
"metadata": {
"title": "MongoDB Component Definition Example",
"last-modified": "2001-08-26T23:11:47Z",
"version": "20210826",
"oscal-version": "1.0.0",
"last-modified": "2023-10-12T00:00:00.000000-04:00",
"version": "20231012",
"oscal-version": "1.1.1",
"roles": [
{
"id": "provider",
Expand Down Expand Up @@ -39,6 +39,9 @@
"party-uuids": [
"ef7c799a-c50e-49ab-83e0-515e989e6df1"
]
},
{
"role-id": "customer"
}
],
"protocols": [
Expand Down Expand Up @@ -82,13 +85,53 @@
"control-implementations": [
{
"uuid": "49f0b690-ed9f-4f32-aae0-625b77aa6d27",
"source": "https://github.com/usnistgov/oscal-content/blob/master/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml",
"source": "#ba047e56-faef-430c-bafb-c54e9a87c6e8",
"description": "MongoDB control implementations for NIST SP 800-53 revision 5.",
"implemented-requirements": [
{
"uuid": "cf8338c5-fb6e-4593-a4a8-b3c4946ee2a0",
"uuid": "cf8338c5-fb6e-4593-a4a8-b3c4946ee080",
"control-id": "sc-8",
"description": "MongoDB's implementation of SC-8 control. The details of the implementation are provided at the statement level.",
"set-parameters": [
{
"param-id": "sc-8_prm_1",
"values": [
"confidentiality"
]
}
],
"statements": [
{
"statement-id": "sc-8_smt",
"uuid": "bb9219b1-e51c-4680-abb0-616a43bbfbb1",
"description": "MongoDB implements TLS 1.x to protect the {{ insert: param, sc-8_prm_1 }} of transmitted data by encrypting data in transit, preventing unauthorized disclosure or changes to information during transmission."
}
]
},
{
"uuid": "cf8338c5-fb6e-4593-a4a8-b3c4946ee081",
"control-id": "sc-8.1",
"description": "MongoDB supports TLS 1.x to encrypt data in transit, preventing unauthorized disclosure or changes to information during transmission. To implement TLS, set the PEMKeyFile option in the configuration /etc/mongod.conf to the certificate file's path and restart the the component."
"description": "MongoDB implements cryptographic mechanisms (TLS 1.x) to provide cryptographic protection for data in transit.",
"set-parameters": [
{
"param-id": "sc-8.1_prm_1",
"values": [
"prevent unauthorized disclosure of information"
]
}
],
"statements": [
{
"statement-id": "sc-8.1_smt",
"uuid": "bb9219b1-e51c-4680-abb0-616a43bbfbb1",
"description": "To implement cryptographic mechanisms (aka enable TLS 1.x) to {{ insert: param, sc-8.1_prm_1 }}, customers need to set the `PEMKeyFile` option in the configuration file `/etc/mongod.conf` to the certificate file's path and restart the component.",
"responsible-roles": [
{
"role-id": "customer"
}
]
}
]
},
{
"uuid": "5227daf8-7a4b-4fe0-aea9-3547b7de2603",
Expand All @@ -99,6 +142,28 @@
}
]
}
]
],
"back-matter": {
"resources": [
{
"uuid": "ba047e56-faef-430c-bafb-c54e9a87c6e8",
"description": "NIST Special Publication 800-53 Revision 5: Moderate Baseline Profile",
"rlinks": [
{
"href": "../../../nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml",
"media-type": "application/oscal.catalog+xml"
},
{
"href": "../../../nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_MODERATE-baseline_profile.json",
"media-type": "application/oscal.catalog+json"
},
{
"href": "../../../nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.yaml",
"media-type": "application/oscal.catalog+yaml"
}
]
}
]
}
}
}
Loading

0 comments on commit bae69b5

Please sign in to comment.