This repository contains documents and scripts that can be used to create and maintain a System Security Plan (SSP) as required by the Risk Management Framework (RMF) version 1. Included are examples of SSP "front matter", control implementation statements (as defined in NIST SP 800-53r4 along with the Privacy Overlay), and a collection of appendices.
We understand that version 2 of the Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy (RMFv2) has been released, and we are planning to update this repository to include the controls as defined in NIST SP 800-53r5 (draft) as this is finalized.
Control templates are in machine-readable (OpenControl) YAML files. The intention is to enable these files to be updated automatically by gathering evidence on the state of the running system.
A current version can be viewed in Git Markdown from this repository:
- Front matter (points of contact, system and technical description, ...)
- Control implementation statements
- Appendices (incident response, configuration management, regulations, ...)
The contents of these pages are provided as an information guide only. They are intended to enhance compliance understanding and are not intended to be used directly as a System Security Plan without agency-specific review
You will need Python Poetry to run the
SSP Toolkit in a Python virtual environment. Once you have Poetry
installed you will be able to run all the commands using the
format poetry run [COMMAND]
.
To install all the Python dependencies, run poetry install
.
To update the local Markdown and or to create new exportable files, perform the following steps:
Create/update the frontmatter, components and appendices using templates and keys
poetry run createfiles -t templates
Usage: createfiles [OPTIONS]
Options:
-t, --templates DIRECTORY Template directory
-o, --out PATH Output directory (default: current directory)
--help Show this message and exit.
Generate markdown versions of the RMF control implementation family files in the docs/controls/
directory:
poetry run makefamilies
Generate Standard Operating Procedure (SOP) docs (from components/
and keys/sop.yaml
) in the docs/sop
directory
poetry run sop -c components
Usage: sop [OPTIONS]
Options:
-c, --components DIRECTORY Rendered components directory
-o, --out PATH Output directory (default: docs/)
--help Show this message and exit.
Generate System Security Plan (SSP)
poetry run makessp
Generate Microsoft Word (.docx) versions of the control family, appendices, and frontmatter files
(see the docx/
directory):
exportto
uses the Pandoc file generation library. Go to the
install Pandoc page to learn how to install Pandoc locally.
poetry run exportto -c docs/controls
Usage: exportto [OPTIONS]
Options:
-r, --render_file PATH The directory containing the files, or a file, to
render.
-t, --type TEXT The file type to create using Pandoc (default: docx)
-o, --out PATH Output directory (default: docx)
--help Show this message and exit.
Generate a spreadsheet showing which, if any, components are responsible for addressing a given control.
poetry run creatematrix
The getconfig
command lets you read configuration data. There are two commands
that can be used with getconfig
; get-value
and list-files
.
Usage: getconfig [OPTIONS] COMMAND [ARGS]...
Options:
--help Show this message and exit.
Commands:
get-value
list-files
get-value
is used to get the value of a given key in the configuration dictionary.
For instance if you wanted to know the value of the name_short
parameter in the
Contractor
key file, you would run poetry run getconfig get-value -f contractor -k name_short
.
If you omit the --key/-k
parameter, for instance poetry run getconfig get-value -f contractor
this will output the entire contents of the key file formatted as YAML.
Get a value for a given key in the contractor.yaml
file:
poetry run getconfig get-value -f contractor -k name_short
Get the entire contents of the contractor.yaml
file
poetry run getconfig get-value -f contractor
Usage: getconfig get-value [OPTIONS]
Options:
-f, --file TEXT [required]
-k, --key TEXT The name of the configuration key whose value should be
shown.
--help Show this message and exit.
The list-files
command will list all the files loaded from the keys directory.
Most files are keyed using in the filename, for instance the values in the contractor.yaml
file would be accessible using the Jinja2 variable {{ contractor.some_variable }}
, but a few
files have aliases which are used for their key, for instance configuration-management.yaml
is aliased to cm
, so would be available as {{ cm.some_variable }}
. list-files
will show a
list of the files and their alias.
poetry run getconfig list-files
Usage: getconfig list-files [OPTIONS]
List all the files loaded from the keys directory
Options:
--help Show this message and exit.
Key files and configuration keys:
---------------------------------
contractor.yaml using alias contractor
regulations.yaml using alias regulations
justifications.yaml using alias justify
The SSP-Toolkit is currently in an extended format of OpenControl in which each component represents its controls in separate RMF Control Family files. Use the compliance-io tools to convert the SSP-Toolkit to a compliance-masonry-friendly OpenControl directory and from that generate an OSCAL component definition:
See the compliance-io/README.md for more information.
# You may want to create a python virtual environment for the pip install
pip install git+https://github.com/civicactions/compliance-io.git@main#egg=complianceio
mkdir opencontrol oscal
python library/defenestrate.py opencontrol.yaml opencontrol
python library/oc_to_oscal_components.py opencontrol/opencontrol.yaml > oscal/ssp-toolkit.json
GNU General Public License v3.0 or later. Some portions of this work were produced under a Government contract and are licensed under the terms of Creative Commons Zero v1.0 Universal.
SPDX-License-Identifier: GPL-3.0-or-later
Copyright 2019-2024 CivicActions, Inc.