Skip to content

Commit 9d0ee68

Browse files
wandmagiciMichaela
authored andcommitted
remove extra spaces
1 parent ca05d91 commit 9d0ee68

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

src/examples/ssp/xml/ifa_ssp-example.xml

+3-3
Original file line numberDiff line numberDiff line change
@@ -59,13 +59,13 @@
5959
<system-information>
6060
<information-type uuid="bccfbb65-a7f3-41ac-989f-01d96eddfdc7">
6161
<title>User-provided Links</title>
62-
<description><p>This system maintains a set of user-provided links and their associated shortlinks</p>
62+
<description><p>This system maintains a set of user-provided links and their associated shortlinks</p>
6363
</description>
6464
<categorization system="https://doi.org/10.6028/NIST.SP.800-60v2r1"><information-type-id>C.2.8.12</information-type-id>
6565
</categorization>
6666
<confidentiality-impact><base>fips-199-low</base>
6767
</confidentiality-impact>
68-
<integrity-impact><base>fips-199-low</base><selected>fips-199-moderate</selected><adjustment-justification> <p>Maliciously modified links are a concern</p></adjustment-justification>
68+
<integrity-impact><base>fips-199-low</base><selected>fips-199-moderate</selected><adjustment-justification><p>Maliciously modified links are a concern</p></adjustment-justification>
6969
</integrity-impact>
7070
<availability-impact><base>fips-199-low</base>
7171
</availability-impact>
@@ -243,7 +243,7 @@
243243
<implemented-requirement uuid="d5f9b263-965d-440b-99e7-77f5df670a11" control-id="ac-6.1">
244244
<by-component component-uuid="551b9706-d6a4-4d25-8207-f2ccec548b89"
245245
uuid="a4c2d318-26a9-49df-9818-ee0acaf066f2">
246-
<description><p>The IFA GoodRead application and infrastructure are composed as designed and implemented with lease privilege for the elements of this system.</p><p>For the IFA GoodRead application, the custom application is designed and implemented on top of the Django Framework to enforce least privilege. The application has a role for IFA Public Affairs Officers and one for the developers for privileged permissions, respectively. Only the latter can access or change administrative and security configurations and related data.</p><p>The Django Framework and Django REST Framework (DRF), by default, allows any user with the <code>is_staff</code> role attribute to access administrative functions in an application using the framework. IFA GoodRead developers have disabled this behavior, relying on the custom roles identified in the relevant section.</p><p>For the IFA GoodRead database, the system account and accredentials for the application to read and write to the system datastore has specific read and write authorization for specific tables. This database service account does not have full administrative permissions to add, modify, or delete all respective tables. For the production environment, only the IFA GoodRead developer has a dedicated account with equivalent permissions. Only local network socket access, within in the Linux server, is permitted by host firewall configuration. Remote access, privileged or unprivileged, is not allowed remotely and the system engineer must locally authenticate for access.</p><p>For the RedHat Linux server upon which the IFA GoodRead application is deployed in this system, only the system engineer has a non-privileged user to log in remotely via the SSH protocol to perform ad-hoc inspection, monthly log review as required by policy and procedure, and emergency debugging of the system. Privileged system administration operations may only be performed with the <code>sudo</code> subsystem which requires a password, two-factor authentication, and has enhanced logging of all commands executed. The system engineer must log in remotely and then use <code> sudo</code> to elevate privileges. Remote access with the privileged account is prohibited by configuration and attempts are logged.</p><p>For this remote SSH access, least privilege is additionally enforced by allowing this access via a specific network zone in the IFA GoodRead AwesomeCloud account accessible to only the system engineer via IFA's VPN solution, which requires the system engineer use a dedicated account with their own password and two-factor authentication token.</p><p>For cloud account and API access to reconfigure the Linux server and its load balancer, administrative access is only allowed for the system engineer via a special AwesomeCloud IAM role. The authentication and authorization for this role is controlled by an integration with the organization's single sign-on solution. This solution will only be accessible and correctly execute for them when they are on the VPN with their account with traffic forwarded to the appropriate network zone in the IFA GoodRead account in AwesomeCloud. It will not work the developer or any staff users of the application.</p>
246+
<description><p>The IFA GoodRead application and infrastructure are composed as designed and implemented with lease privilege for the elements of this system.</p><p>For the IFA GoodRead application, the custom application is designed and implemented on top of the Django Framework to enforce least privilege. The application has a role for IFA Public Affairs Officers and one for the developers for privileged permissions, respectively. Only the latter can access or change administrative and security configurations and related data.</p><p>The Django Framework and Django REST Framework (DRF), by default, allows any user with the <code>is_staff</code> role attribute to access administrative functions in an application using the framework. IFA GoodRead developers have disabled this behavior, relying on the custom roles identified in the relevant section.</p><p>For the IFA GoodRead database, the system account and accredentials for the application to read and write to the system datastore has specific read and write authorization for specific tables. This database service account does not have full administrative permissions to add, modify, or delete all respective tables. For the production environment, only the IFA GoodRead developer has a dedicated account with equivalent permissions. Only local network socket access, within in the Linux server, is permitted by host firewall configuration. Remote access, privileged or unprivileged, is not allowed remotely and the system engineer must locally authenticate for access.</p><p>For the RedHat Linux server upon which the IFA GoodRead application is deployed in this system, only the system engineer has a non-privileged user to log in remotely via the SSH protocol to perform ad-hoc inspection, monthly log review as required by policy and procedure, and emergency debugging of the system. Privileged system administration operations may only be performed with the <code>sudo</code> subsystem which requires a password, two-factor authentication, and has enhanced logging of all commands executed. The system engineer must log in remotely and then use <code>sudo</code> to elevate privileges. Remote access with the privileged account is prohibited by configuration and attempts are logged.</p><p>For this remote SSH access, least privilege is additionally enforced by allowing this access via a specific network zone in the IFA GoodRead AwesomeCloud account accessible to only the system engineer via IFA's VPN solution, which requires the system engineer use a dedicated account with their own password and two-factor authentication token.</p><p>For cloud account and API access to reconfigure the Linux server and its load balancer, administrative access is only allowed for the system engineer via a special AwesomeCloud IAM role. The authentication and authorization for this role is controlled by an integration with the organization's single sign-on solution. This solution will only be accessible and correctly execute for them when they are on the VPN with their account with traffic forwarded to the appropriate network zone in the IFA GoodRead account in AwesomeCloud. It will not work the developer or any staff users of the application.</p>
247247
</description>
248248
<implementation-status state="implemented" />
249249
</by-component>

0 commit comments

Comments
 (0)