diff --git a/.github/workflows/publish.yml b/.github/workflows/publish.yml
new file mode 100644
index 0000000..dcd8945
--- /dev/null
+++ b/.github/workflows/publish.yml
@@ -0,0 +1,38 @@
+# This workflow uses actions that are not certified by GitHub.
+# They are provided by a third-party and are governed by
+# separate terms of service, privacy policy, and support
+# documentation.
+
+# GitHub recommends pinning actions to a commit SHA.
+# To get a newer version, you will need to update the SHA.
+# You can also reference a tag or branch, but the action may change without warning.
+
+name: publish
+
+on:
+ workflow_dispatch:
+ inputs:
+ release-tag:
+ type: string
+ required: true
+ description: Git tag of the istribution to be published
+jobs:
+ publish-to-pypi:
+ name: Publish to PyPI
+ runs-on: ubuntu-latest
+
+ environment:
+ name: pypi
+ url: https://pypi.org/p/compliance-to-policy
+
+ permissions:
+ id-token: write # IMPORTANT: mandatory for trusted publishing
+
+ steps:
+ - name: Download the distributions from release
+ run: gh release download ${{ github.event.inputs.release-tag }} -D dist -p '*.tar.gz' -p '*.whl'
+ env:
+ GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+ GH_REPO: ${{ github.REPOSITORY }}
+ - name: Publish distribution 📦 to PyPI
+ uses: pypa/gh-action-pypi-publish@release/v1
\ No newline at end of file
diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml
new file mode 100644
index 0000000..e25f305
--- /dev/null
+++ b/.github/workflows/release.yml
@@ -0,0 +1,143 @@
+# This workflow uses actions that are not certified by GitHub.
+# They are provided by a third-party and are governed by
+# separate terms of service, privacy policy, and support
+# documentation.
+
+# GitHub recommends pinning actions to a commit SHA.
+# To get a newer version, you will need to update the SHA.
+# You can also reference a tag or branch, but the action may change without warning.
+
+name: release
+
+on:
+ workflow_dispatch:
+
+jobs:
+ build:
+ name: Build with semantic versioning
+ runs-on: ubuntu-latest
+ outputs:
+ release-tag: ${{ steps.release.outputs.tag }}
+ release-version: ${{ steps.release.outputs.version }}
+ permissions:
+ contents: write
+ steps:
+ - name: Checkout repository
+ uses: actions/checkout@v4
+ with:
+ fetch-depth: 0
+ - name: Python Semantic Release
+ id: release
+ uses: python-semantic-release/python-semantic-release@v9.8.7
+ with:
+ github_token: ${{ secrets.GITHUB_TOKEN }}
+ - name: Check release
+ if: steps.release.outputs.released == 'false'
+ run: |
+ echo 'No release will be made since there are no release commits. See also Commit Parsers configuration.'
+ exit 1
+ - name: Set up Python 3.10
+ uses: actions/setup-python@v5
+ with:
+ python-version: '3.10'
+ - name: Install build tools
+ run: |
+ make install-dev
+ - name: Build
+ run: |
+ make build
+ - name: Store the distribution packages
+ uses: actions/upload-artifact@v3
+ with:
+ name: python-package-distributions
+ path: dist/
+
+ publish-to-github:
+ name: Publish to GitHub
+ needs:
+ - build
+ runs-on: ubuntu-latest
+
+ permissions:
+ contents: write
+ packages: write
+ id-token: write # IMPORTANT: mandatory for trusted publishing
+
+ steps:
+ - name: Download all the dists
+ uses: actions/download-artifact@v3
+ with:
+ name: python-package-distributions
+ path: dist/
+ - name: Sign the dists with Sigstore
+ uses: sigstore/gh-action-sigstore-python@v3.0.0
+ with:
+ inputs: |
+ ./dist/*.tar.gz
+ ./dist/*.whl
+ - name: Upload package distributions to GitHub Releases
+ run: gh release upload ${{needs.build.outputs.release-tag}} ./dist/*
+ env:
+ GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+ GH_REPO: ${{ github.REPOSITORY }}
+
+ publish-to-testpypi:
+ name: Publish to TestPyPI
+ needs:
+ - build
+ - publish-to-github
+ runs-on: ubuntu-latest
+
+ environment:
+ name: testpypi
+ url: https://pypi.org/p/compliance-to-policy
+
+ permissions:
+ id-token: write # IMPORTANT: mandatory for trusted publishing
+
+ steps:
+ - name: Download the distributions from release
+ run: gh release download ${{needs.build.outputs.release-tag}} -D dist -p '*.tar.gz' -p '*.whl'
+ env:
+ GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+ GH_REPO: ${{ github.REPOSITORY }}
+ - name: Publish distribution 📦 to TestPyPI
+ uses: pypa/gh-action-pypi-publish@release/v1
+ with:
+ repository-url: https://test.pypi.org/legacy/
+
+ test:
+ name: Integration Test
+ needs:
+ - build
+ - publish-to-testpypi
+ runs-on: ubuntu-latest
+
+ steps:
+ - name: Checkout repository
+ uses: actions/checkout@v4
+ with:
+ ref: ${{needs.build.outputs.release-tag}}
+ - name: Set up Python 3.10
+ uses: actions/setup-python@v5
+ with:
+ python-version: '3.10'
+ - name: Install
+ run: |
+ version=${{needs.build.outputs.release-version}}
+ version=${version/-rc./rc}
+ count=0
+ while :; do
+ count=$(($count+1))
+ echo "Check if ${version} is available or not ...$count"
+ if pip index versions -i https://test.pypi.org/simple/ compliance-to-policy | grep ${version};then
+ break
+ fi
+ [[ "$count" -gt 5 ]] && echo "Not found ${version}" && exit 1
+ sleep 5
+ done
+ pip index versions -i https://test.pypi.org/simple/ compliance-to-policy | grep ${version}
+ pip install -i https://test.pypi.org/simple/ --extra-index-url https://pypi.org/simple compliance-to-policy==${version}
+ pip install pytest
+ - name: Run test
+ run: make it
\ No newline at end of file
diff --git a/.github/workflows/validate.yml b/.github/workflows/validate.yml
new file mode 100644
index 0000000..a3ee76d
--- /dev/null
+++ b/.github/workflows/validate.yml
@@ -0,0 +1,47 @@
+# This workflow uses actions that are not certified by GitHub.
+# They are provided by a third-party and are governed by
+# separate terms of service, privacy policy, and support
+# documentation.
+
+# GitHub recommends pinning actions to a commit SHA.
+# To get a newer version, you will need to update the SHA.
+# You can also reference a tag or branch, but the action may change without warning.
+
+name: validate
+
+on:
+ pull_request_target:
+ types:
+ - opened
+ - edited
+ - synchronize
+ branches:
+ - 'main'
+
+jobs:
+ validate:
+ name: Validate
+ runs-on: ubuntu-latest
+ steps:
+ - name: Checkout repository
+ uses: actions/checkout@v4
+ with:
+ repository: ${{ github.event.pull_request.head.repo.full_name }}
+ ref: ${{ github.event.pull_request.head.ref }}
+ - name: Set up Python 3.10
+ uses: actions/setup-python@v5
+ with:
+ python-version: '3.10'
+ - name: Install for develompemnt
+ run: |
+ make install-dev
+ - name: Unit Test
+ run: |
+ make test
+ - name: Build
+ run: |
+ make build
+ - name: Integration Test
+ run: |
+ pip install ./dist/*.tar.gz
+ make it
\ No newline at end of file
diff --git a/Makefile b/Makefile
index 254ee97..e73d306 100644
--- a/Makefile
+++ b/Makefile
@@ -1,57 +1,67 @@
-PYTHON := $(shell pwd)/.venv/bin/python
+.PHONY: build
+build:
+ python -m build
-.venv:
- @echo Please create venv firstly
+.PHONY: install
+install:
+ python -m pip install .
-build: .venv
- @$(PYTHON) -m build
+.PHONY: install-dev
+install-dev:
+ python -m pip install ".[dev]"
-install: .venv
- @$(PYTHON) -m pip install .
+# Direct dependency is not allowed for Pypi packaging even if the dependant module is defined as extra dependencies.
+# Workaround: Move to manual installation by make
+.PHONY: install-detect-descret
+install-detect-descret:
+ python -m pip install detect-secrets@git+https://github.com/ibm/detect-secrets.git@master#egg=detect-secrets
-install-dev: .venv
- @$(PYTHON) -m pip install ".[dev]"
+.PHONY: uninstall
+uninstall:
+ python -m pip uninstall compliance-to-policy
-uninstall: .venv
- @$(PYTHON) -m pip uninstall compliance-to-policy
+.PHONY: format
+format:
+ python -m isort .
+ python -m black .
-
-format: .venv
- @$(PYTHON) -m isort .
- @$(PYTHON) -m black .
-
-lint: .venv
- @$(PYTHON) -m pylint ./c2p ./tests
+.PHONY: lint
+lint:
+ python -m pylint ./c2p ./tests
.PHONY: docs
-docs: .venv
- @$(PYTHON) -m mkdocs build
+docs:
+ python -m mkdocs build
.PHONY: gh-pages
- gh-pages: .venv
- @$(PYTHON) -m mkdocs gh-deploy
+ gh-pages:
+ python -m mkdocs gh-deploy
# make test ARGS="-n 2 --dist loadscope --log-cli-level DEBUG" TARGET="tests/c2p/test_cli.py"
# TODO: -n 2 (pytest-xdist plugin) results in no logs displayed.
+.PHONY: test
test: ARGS ?=
test: TARGET ?= tests/
-test: .venv test-plugin
- @OUTPUT_PATH=/dev/null $(PYTHON) -m pytest $(ARGS) $(TARGET)
+test: test-plugin
+ @OUTPUT_PATH=/dev/null python -m pytest $(ARGS) $(TARGET)
+.PHONY: test-plugin
test-plugin: ARGS ?=
test-plugin: TARGET ?= plugins_public/tests/
-test-plugin: .venv
- @OUTPUT_PATH=/dev/null $(PYTHON) -m pytest $(ARGS) $(TARGET)
-
-# After published, the branch must be merged first-forwardly. TODO: Integrate with CI
-publish: GIT_TAG ?=
-publish:
- @toml set --toml-path pyproject.toml project.version $(GIT_TAG)
- @git add pyproject.toml
- @git commit -S -s -m "update version to $(GIT_TAG)"
- @git tag $(GIT_TAG)
-
-clean: .venv
+test-plugin:
+ @OUTPUT_PATH=/dev/null python -m pytest $(ARGS) $(TARGET)
+
+.PHONY: it
+it:
+ python samples_public/kyverno/compliance_to_policy.py
+ python samples_public/kyverno/result_to_compliance.py
+ python samples_public/ocm/compliance_to_policy.py
+ python samples_public/ocm/result_to_compliance.py
+ python samples_public/auditree/compliance_to_policy.py
+ python samples_public/auditree/result_to_compliance.py
+
+.PHONY: clean
+clean:
@rm -rf build *.egg-info dist
@find ./plugins -type d \( -name '*.egg-info' -o -name 'dist' \) | while read x; do echo $$x; rm -r $$x ; done
- @$(PYTHON) -m pyclean -v .
\ No newline at end of file
+ python -m pyclean -v .
\ No newline at end of file
diff --git a/README.md b/README.md
index a51d5e4..c706bdc 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,4 @@
-# Compliance-to-Policy (also known as `C2P`)
+# Compliance-to-Policy (also known as `C2P`)
Compliance-to-Policy (C2P) is designed to bridge Compliance as Code such as Open Security Controls Assessment Language (OSCAL) and Policy as Code used by Policy Validation Point (PVP). It generates policies in native format of PVP from OSCAL Component Definitions and produces OSCAL Assessment Results from the native assessment results of PVP. C2P can be used both as a command-line tool and a Python library, making it easy and flexible to integrate into your Continuous Compliance pipelines, such as GitHub Actions, Tekton Pipelines, or Agile Authoring Pipelines. It supports multiple PVP engines, including [Kyverno](https://kyverno.io/), [Open Cluster Management Policy Framework](https://open-cluster-management.io/), and the open-source [Auditree](https://auditree.github.io/), through dedicated plugins for each. Custom plugins can be implemented with a small amount of Python code.
diff --git a/c2p/tools/viewer/viewer.py b/c2p/tools/viewer/viewer.py
index 2c25e65..1a00a4d 100644
--- a/c2p/tools/viewer/viewer.py
+++ b/c2p/tools/viewer/viewer.py
@@ -101,7 +101,7 @@ def get_pvp_rule_pair(rule_id):
pvp, rule_set = get_pvp_rule_pair(rule_id)
if rule_set != None:
rule_result = RuleResult(id=f'{rule_id} ({pvp})', description=rule_set['Check_Description'])
- o = find_observation(assessment_results.results[0].observations, rule_set['Check_Id'])
+ o = find_observation(assessment_results.results[0].observations, rule_set['Rule_Id'])
if o != None:
for subject in o.subjects:
result = get_prop_value(subject.props, 'result')
diff --git a/docs/public/auditree.result.md b/docs/public/auditree.result.md
new file mode 100644
index 0000000..eec9fdc
--- /dev/null
+++ b/docs/public/auditree.result.md
@@ -0,0 +1,61 @@
+
+
+## Component: GitHub
+
+
+#### Result of control ac-2:
+
+
+
+Rule `rule_github_org_member (Auditree)`:
+- Check whether the GitHub org is not empty.
+
+Details
+
+
+ - Subject UUID: de01a6a4-4ebe-4191-b566-e1dc48e8c613
+ - Title: Auditree Check: demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty_0_oscal_compass
+ - Result: failure :x:
+ - Reason:
+ ```
+ {'oscal-compass': ['There are people in there, but less than 5!']}
+ ```
+
+
+ - Subject UUID: f933f9fa-fb6e-4a62-a708-2b4cf59009c2
+ - Title: Auditree Check: demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty_1_esa
+ - Result: pass :white_check_mark:
+ - Reason:
+ ```
+ {}
+ ```
+
+
+
+
+---
+
+#### Result of control cm-2:
+
+
+
+Rule `rule_github_api_version (Auditree)`:
+- Check whether there are any supported versions.
+
+Details
+
+
+ - Subject UUID: 841cc8b0-29a7-46ff-81fb-8f1279b1be7b
+ - Title: Auditree Check: demo_examples.checks.test_github.GitHubAPIVersionsCheck.test_supported_versions
+ - Result: failure :x:
+ - Reason:
+ ```
+ {'Supported GitHub API Versions Warning': ['There is only one supported version. Get with the program: 2022-11-28']}
+ ```
+
+
+
+
+---
+
+
diff --git a/go/cmd/publisher/samples/component-definition.json b/go/cmd/publisher/samples/component-definition.json
index e4f8e1a..36c330a 100755
--- a/go/cmd/publisher/samples/component-definition.json
+++ b/go/cmd/publisher/samples/component-definition.json
@@ -29,13 +29,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-self-provisioner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-kubeadmin",
"remarks": ""
}
@@ -48,7 +48,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-disallow-anonymous",
"remarks": ""
}
@@ -61,19 +61,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-appworkloads-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-clusterlevel-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rbac-adminiterpolicies",
"remarks": ""
}
@@ -86,7 +86,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-disallowed-roles",
"remarks": ""
}
@@ -99,7 +99,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-config-audit",
"remarks": ""
}
@@ -112,19 +112,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-events",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-observer",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield",
"remarks": ""
}
@@ -137,31 +137,31 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-high-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-hypershift-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-moderate-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-nerc-cip-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pci-dss-scan",
"remarks": ""
}
@@ -174,19 +174,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-htpasswd",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-ldap",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-openshift-servicemesh",
"remarks": ""
}
@@ -199,295 +199,295 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-ptp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-site-nw-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerlivenessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerreadinessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-clustercnf10-tag-workers",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-local-storage-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rhoda-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-cluster-security-central",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-subscription-admin-hub",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-policygenerator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-example-pod-disruption-budget",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-allowed-external-ips",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-sample-github",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "sample-network-policy-99",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-file-integrity-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kernel-devel",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sriov-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-annotation-owner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-odf-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod-disruption-budget-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "image-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-chrony",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-managed-clusterset-binding",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-opa-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder-templated",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "egress-example",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-config-exclude-namespaces",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pao-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "upgrade-cluster",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-vsphere-machineset-infra",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-config-exclude-resources",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-odf-lvm-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-config",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-managed-cluster-security",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-cert-manager-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerimagelatest",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-github-oauth",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-installed",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-proxy-protocol",
"remarks": ""
}
@@ -500,7 +500,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-blackduck",
"remarks": ""
}
@@ -513,19 +513,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco-app",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sysdig",
"remarks": ""
}
@@ -538,73 +538,73 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-helm-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-label-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-tvk-license",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-tvk-create-ns-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-operator-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk-helm",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-comp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-event-target",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-ns-backup",
"remarks": ""
}
@@ -617,7 +617,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-crowdstrike-falcon-rhmp",
"remarks": ""
}
diff --git a/go/cmd/publisher/samples/component-definition.low.json b/go/cmd/publisher/samples/component-definition.low.json
index 8fd3a86..51810fb 100755
--- a/go/cmd/publisher/samples/component-definition.low.json
+++ b/go/cmd/publisher/samples/component-definition.low.json
@@ -29,13 +29,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-self-provisioner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-kubeadmin",
"remarks": ""
}
@@ -48,7 +48,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-disallow-anonymous",
"remarks": ""
}
@@ -61,19 +61,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-appworkloads-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-clusterlevel-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rbac-adminiterpolicies",
"remarks": ""
}
@@ -86,7 +86,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-config-audit",
"remarks": ""
}
@@ -99,19 +99,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-events",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-observer",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield",
"remarks": ""
}
@@ -124,31 +124,31 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-high-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-hypershift-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-moderate-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-nerc-cip-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pci-dss-scan",
"remarks": ""
}
@@ -161,19 +161,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-htpasswd",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-ldap",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-openshift-servicemesh",
"remarks": ""
}
@@ -186,295 +186,295 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-ptp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-site-nw-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerlivenessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerreadinessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-clustercnf10-tag-workers",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-local-storage-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rhoda-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-cluster-security-central",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-subscription-admin-hub",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-policygenerator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-example-pod-disruption-budget",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-allowed-external-ips",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-sample-github",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "sample-network-policy-99",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-file-integrity-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kernel-devel",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sriov-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-annotation-owner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-odf-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod-disruption-budget-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "image-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-chrony",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-managed-clusterset-binding",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-opa-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder-templated",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "egress-example",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-config-exclude-namespaces",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pao-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "upgrade-cluster",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-vsphere-machineset-infra",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-config-exclude-resources",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-odf-lvm-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-config",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-managed-cluster-security",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-cert-manager-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerimagelatest",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-github-oauth",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-installed",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-proxy-protocol",
"remarks": ""
}
@@ -487,7 +487,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-blackduck",
"remarks": ""
}
@@ -500,19 +500,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco-app",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sysdig",
"remarks": ""
}
@@ -525,73 +525,73 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-helm-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-label-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-tvk-license",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-tvk-create-ns-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-operator-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk-helm",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-comp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-event-target",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-ns-backup",
"remarks": ""
}
@@ -604,7 +604,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-crowdstrike-falcon-rhmp",
"remarks": ""
}
diff --git a/go/controllers/composer/testdata/oscal/component-definition.json b/go/controllers/composer/testdata/oscal/component-definition.json
index 49a22b4..2cc208e 100644
--- a/go/controllers/composer/testdata/oscal/component-definition.json
+++ b/go/controllers/composer/testdata/oscal/component-definition.json
@@ -16,74 +16,74 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule1",
"class": "scc_class",
"remarks": "rule_set_01"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule1...",
"class": "scc_class",
"remarks": "rule_set_01"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "add-chrony",
"remarks": "rule_set_01"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule2",
"class": "scc_class",
"remarks": "rule_set_02"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule2...",
"class": "scc_class",
"remarks": "rule_set_02"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "install-odf-lvm-operator",
"remarks": "rule_set_02"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule3",
"class": "scc_class",
"remarks": "rule_set_03"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule3...",
"class": "scc_class",
"remarks": "rule_set_03"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-nginx-deployment",
"remarks": "rule_set_03"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "minimum_nginx_deployment_replicas",
"class": "scc_class",
"remarks": "rule_set_03"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Minimum # of NGINX pod",
"class": "scc_class",
"remarks": "rule_set_02"
@@ -110,13 +110,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule1",
"class": "scc_class"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule2",
"class": "scc_class"
}
@@ -129,13 +129,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule2",
"class": "scc_class"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "rule3",
"class": "scc_class"
}
diff --git a/go/controllers/testdata/configmap.component-definition.yaml b/go/controllers/testdata/configmap.component-definition.yaml
index 613813a..ffa9153 100644
--- a/go/controllers/testdata/configmap.component-definition.yaml
+++ b/go/controllers/testdata/configmap.component-definition.yaml
@@ -35,13 +35,13 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-self-provisioner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-kubeadmin",
"remarks": ""
}
@@ -54,7 +54,7 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-disallow-anonymous",
"remarks": ""
}
@@ -67,19 +67,19 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-appworkloads-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-clusterlevel-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rbac-adminiterpolicies",
"remarks": ""
}
@@ -92,7 +92,7 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-disallowed-roles",
"remarks": ""
}
@@ -105,7 +105,7 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-config-audit",
"remarks": ""
}
@@ -118,19 +118,19 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-events",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-observer",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield",
"remarks": ""
}
@@ -143,31 +143,31 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-high-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-hypershift-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-moderate-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-nerc-cip-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pci-dss-scan",
"remarks": ""
}
@@ -180,19 +180,19 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-htpasswd",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-ldap",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-openshift-servicemesh",
"remarks": ""
}
@@ -205,295 +205,295 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-ptp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-site-nw-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerlivenessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerreadinessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-clustercnf10-tag-workers",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-local-storage-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rhoda-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-cluster-security-central",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-subscription-admin-hub",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-policygenerator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-example-pod-disruption-budget",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-allowed-external-ips",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-sample-github",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "sample-network-policy-99",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-file-integrity-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kernel-devel",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sriov-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-annotation-owner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-odf-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod-disruption-budget-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "image-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-chrony",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-managed-clusterset-binding",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-opa-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder-templated",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "egress-example",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-config-exclude-namespaces",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pao-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "upgrade-cluster",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-vsphere-machineset-infra",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-config-exclude-resources",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-odf-lvm-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-config",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-managed-cluster-security",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-cert-manager-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerimagelatest",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-github-oauth",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-installed",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-proxy-protocol",
"remarks": ""
}
@@ -506,7 +506,7 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-blackduck",
"remarks": ""
}
@@ -519,19 +519,19 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco-app",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sysdig",
"remarks": ""
}
@@ -544,73 +544,73 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-helm-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-label-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-tvk-license",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-tvk-create-ns-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-operator-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk-helm",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-comp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-event-target",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-ns-backup",
"remarks": ""
}
@@ -623,7 +623,7 @@ data:
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-crowdstrike-falcon-rhmp",
"remarks": ""
}
diff --git a/go/controllers/utils/publisher/testdata/component-definition.json b/go/controllers/utils/publisher/testdata/component-definition.json
index e4f8e1a..36c330a 100755
--- a/go/controllers/utils/publisher/testdata/component-definition.json
+++ b/go/controllers/utils/publisher/testdata/component-definition.json
@@ -29,13 +29,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-self-provisioner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-kubeadmin",
"remarks": ""
}
@@ -48,7 +48,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-disallow-anonymous",
"remarks": ""
}
@@ -61,19 +61,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-appworkloads-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-clusterlevel-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rbac-adminiterpolicies",
"remarks": ""
}
@@ -86,7 +86,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-disallowed-roles",
"remarks": ""
}
@@ -99,7 +99,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-config-audit",
"remarks": ""
}
@@ -112,19 +112,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-events",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-observer",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield",
"remarks": ""
}
@@ -137,31 +137,31 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-high-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-hypershift-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-moderate-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-nerc-cip-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pci-dss-scan",
"remarks": ""
}
@@ -174,19 +174,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-htpasswd",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-ldap",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-openshift-servicemesh",
"remarks": ""
}
@@ -199,295 +199,295 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-ptp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-site-nw-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerlivenessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerreadinessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-clustercnf10-tag-workers",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-local-storage-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rhoda-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-cluster-security-central",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-subscription-admin-hub",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-policygenerator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-example-pod-disruption-budget",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-allowed-external-ips",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-sample-github",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "sample-network-policy-99",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-file-integrity-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kernel-devel",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sriov-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-annotation-owner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-odf-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod-disruption-budget-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "image-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-chrony",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-managed-clusterset-binding",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-opa-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder-templated",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "egress-example",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-config-exclude-namespaces",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pao-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "upgrade-cluster",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-vsphere-machineset-infra",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-config-exclude-resources",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-odf-lvm-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-config",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-managed-cluster-security",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-cert-manager-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerimagelatest",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-github-oauth",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-installed",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-proxy-protocol",
"remarks": ""
}
@@ -500,7 +500,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-blackduck",
"remarks": ""
}
@@ -513,19 +513,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco-app",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sysdig",
"remarks": ""
}
@@ -538,73 +538,73 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-helm-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-label-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-tvk-license",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-tvk-create-ns-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-operator-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk-helm",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-comp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-event-target",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-ns-backup",
"remarks": ""
}
@@ -617,7 +617,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-crowdstrike-falcon-rhmp",
"remarks": ""
}
diff --git a/go/docs/ocm/oscal/component-definition.csv b/go/docs/ocm/oscal/component-definition.csv
index 8d0045f..28a4707 100644
--- a/go/docs/ocm/oscal/component-definition.csv
+++ b/go/docs/ocm/oscal/component-definition.csv
@@ -1,6 +1,6 @@
$$Component_Title,$$Component_Description,$$Component_Type,$$Control_Id_List,$$Rule_Id,$$Rule_Description,$Policy_Id,$Parameter_Id,$Parameter_Description,$Parameter_Value_Alternatives,$Parameter_Value_Default,$$Profile_Source,$$Profile_Description,Rule_Actual_State_Data_Request_Evidence_Format_Reference_URL_list,Rule_Actual_State_TimeToLive,$Check_Id,$Check_Description,Fetcher_id,Fetcher_Description,Fix_id,Fix_Description,Rule_implementation_status,Rule_POAM_Reference_URL,$$Namespace
A human readable name for the component.,A description of the component including information about its function.,A category describing the purpose of the component. ALLOWED VALUES interconnection:software:hardware:service:physical:process-procedure:plan:guidance:standard:validation:,A list of textual labels that uniquely identify the controls or statements that the component implements.,A textual label that uniquely identifies a policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the policy (desired state) including information about its purpose and scope.,Directory Name to identify Policy Resoure,A textual label that uniquely identifies the parameter associated with that policy (desired state) or controls implemented by the policy (desired state).,A description of the parameter including the purpose and use of the parameter.,ONLY for the policy (desired state) parameters: A value or set of values the parameter can take. The catalog parameters values are defined in the catalog. ,"A value recommended by Compliance Team in this profile for the parameter of the control or policy (desired state). If a CIS-benchmark exists, the default default could be the CIS-benchmark recommanded value.",A URL reference to the source catalog or profile for which this component is implementing controls for. A profile designates a selection and configuration of controls from one or more catalogs,A description of the profile.,A list of URL references that contain the Actual State Data Model (eg schema or swager API or procedure template or terraform schema). Needed by the fetcher developer. ,A TimeToLive value of the duration of time the actual state is valid before it becomes stale or obsolite or overriden. Needed by the fetcher developer. ,A textual label that uniquely identifies a check of the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the check of the policy (desired state) including the method (interview or examine or test) and procedure details.,A textual label that uniquely identifies a collector of the actual state (evidence) associated with the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the collector of the actual state (evidence) associated with the policy (desired state) including the method (interview or examine or API) and questionaire or API details.,A textual label that uniquely identifies the fix of the failed policy.,A description of the fix to remediate the failed policy.,Indicates the degree to which the a given policy is implemented. ALLOWED VALUES: IMPLEMENTED: The control is fully implemented. PARTIAL: The control is partially implemented. PLANNED: There is a plan for implementing the control as explained in the remarks. ALTERNATIVE: There is an alternative implementation for this control as explained in the remarks. NOT-APPLICABLE: This control does not apply to this system as justified in the remarks.,A URL reference to the Plan of Action and Milestones this component may be subjected to for remediation or deviation or mitigation in case of the policy (desired state) non compliance or error or failure. ,"A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name. Used in conjunction with ""class"" as the ontology concept. "
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,test_configuration_check,Ensure deployment configuration is securely set up,policy-high-scan,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,test_configuration_check,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,test_proxy_check,Ensure Nginx is properly configured,policy-deployment,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,test_proxy_check,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,install_kyverno,Install Kyverno,policy-install-kyverno-from-manifests,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-install-kyverno-from-manifests,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,test_required_label,"By Kyverno, ensure required labels are set",policy-kyverno-require-labels,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-kyverno-require-labels,,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,test_configuration_check,Ensure deployment configuration is securely set up,policy-high-scan,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,test_configuration_check,,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,test_proxy_check,Ensure Nginx is properly configured,policy-deployment,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,test_proxy_check,,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,install_kyverno,Install Kyverno,policy-install-kyverno-from-manifests,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-install-kyverno-from-manifests,,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,test_required_label,"By Kyverno, ensure required labels are set",policy-kyverno-require-labels,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-kyverno-require-labels,,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
diff --git a/go/docs/ocm/oscal/component-definition.json b/go/docs/ocm/oscal/component-definition.json
index f40b04c..47c02ed 100644
--- a/go/docs/ocm/oscal/component-definition.json
+++ b/go/docs/ocm/oscal/component-definition.json
@@ -16,126 +16,126 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"class": "scc_class",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure deployment configuration is securely set up",
"class": "scc_class",
"remarks": "rule_set_0"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"remarks": "rule_set_0"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_0"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_proxy_check",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure Nginx is properly configured",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "minimum_nginx_deployment_replicas",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Minimum number of NGINX pod",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "3",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_proxy_check",
"remarks": "rule_set_1"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_1"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "install_kyverno",
"class": "scc_class",
"remarks": "rule_set_2"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Install Kyverno",
"class": "scc_class",
"remarks": "rule_set_2"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-install-kyverno-from-manifests",
"remarks": "rule_set_2"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-install-kyverno-from-manifests",
"remarks": "rule_set_2"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_required_label",
"class": "scc_class",
"remarks": "rule_set_3"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "By Kyverno, ensure required labels are set",
"class": "scc_class",
"remarks": "rule_set_3"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-kyverno-require-labels",
"remarks": "rule_set_3"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-kyverno-require-labels",
"remarks": "rule_set_3"
}
@@ -161,19 +161,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"class": "scc_class"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "install_kyverno",
"class": "scc_class"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_required_label",
"class": "scc_class"
}
@@ -186,7 +186,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_proxy_check",
"class": "scc_class"
}
diff --git a/go/pkg/oscal/oscal.go b/go/pkg/oscal/oscal.go
index d860ce4..6014789 100644
--- a/go/pkg/oscal/oscal.go
+++ b/go/pkg/oscal/oscal.go
@@ -33,7 +33,7 @@ var standardFromPolicyCollectionToOscal map[string]string = map[string]string{
}
const (
- OscaleNamespace = "http://ibm.github.io/compliance-trestle/schemas/oscal/cd"
+ OscaleNamespace = "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd"
)
func controlIdFromPolicyCollectionToOscal(controlId string) (string, bool) {
diff --git a/go/pkg/oscal/testdata/component-definition.json b/go/pkg/oscal/testdata/component-definition.json
index e4f8e1a..36c330a 100755
--- a/go/pkg/oscal/testdata/component-definition.json
+++ b/go/pkg/oscal/testdata/component-definition.json
@@ -29,13 +29,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-self-provisioner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-remove-kubeadmin",
"remarks": ""
}
@@ -48,7 +48,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-disallow-anonymous",
"remarks": ""
}
@@ -61,19 +61,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-appworkloads-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-clusterlevel-rbac",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rbac-adminiterpolicies",
"remarks": ""
}
@@ -86,7 +86,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-disallowed-roles",
"remarks": ""
}
@@ -99,7 +99,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-config-audit",
"remarks": ""
}
@@ -112,19 +112,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-events",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield-observer",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-integrity-shield",
"remarks": ""
}
@@ -137,31 +137,31 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-high-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-hypershift-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-moderate-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-nerc-cip-scan",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pci-dss-scan",
"remarks": ""
}
@@ -174,19 +174,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-htpasswd",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-ldap",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-openshift-servicemesh",
"remarks": ""
}
@@ -199,295 +199,295 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-ptp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-site-nw-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerlivenessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerreadinessprobenotset",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-clustercnf10-tag-workers",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-local-storage-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-rhoda-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-cluster-security-central",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-configure-subscription-admin-hub",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-policygenerator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-example-pod-disruption-budget",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-allowed-external-ips",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-sample-github",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "sample-network-policy-99",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-file-integrity-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-image-pull-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kernel-devel",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sriov-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-annotation-owner",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-odf-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod-disruption-budget-templatized",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "image-policy",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-chrony",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-managed-clusterset-binding",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-opa-sample",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-enableclusterlogforwarder-templated",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "egress-example",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-config-exclude-namespaces",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-container-tgps",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pao-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "upgrade-cluster",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-vsphere-machineset-infra",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-pod",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-idp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-config-exclude-resources",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-odf-lvm-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-oauth-config",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-advanced-managed-cluster-security",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-cert-manager-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-gatekeeper-containerimagelatest",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-github-oauth",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "openshift-gitops-installed",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-proxy-protocol",
"remarks": ""
}
@@ -500,7 +500,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-blackduck",
"remarks": ""
}
@@ -513,19 +513,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco-app",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-falco",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-sysdig",
"remarks": ""
}
@@ -538,73 +538,73 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-helm-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-label-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "add-tvk-license",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-kyverno-tvk-create-ns-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-operator-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk-helm",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "install-tvk",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-comp-operator",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-backup",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore-event-target",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "tvk-continuous-restore",
"remarks": ""
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "create-tvk-ns-backup",
"remarks": ""
}
@@ -617,7 +617,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "policy-crowdstrike-falcon-rhmp",
"remarks": ""
}
diff --git a/go/pkg/testdata/kyverno/component-definition.json b/go/pkg/testdata/kyverno/component-definition.json
index 86a8dd2..9904b16 100644
--- a/go/pkg/testdata/kyverno/component-definition.json
+++ b/go/pkg/testdata/kyverno/component-definition.json
@@ -16,13 +16,13 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/kubernetes",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/kubernetes",
"value": "allowed-base-images",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/kubernetes",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/kubernetes",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_0"
}
@@ -45,7 +45,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/kubernetes",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/kubernetes",
"value": "allowed-base-images"
}
]
@@ -64,19 +64,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/kyverno",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/kyverno",
"value": "allowed-base-images",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/kyverno",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/kyverno",
"value": "allowed-base-images",
"remarks": "rule_set_1"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/kyverno",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/kyverno",
"value": "allowed-base-images",
"remarks": "rule_set_1"
}
diff --git a/go/pkg/testdata/ocm/component-definition.json b/go/pkg/testdata/ocm/component-definition.json
index 0cc2ce3..e338814 100644
--- a/go/pkg/testdata/ocm/component-definition.json
+++ b/go/pkg/testdata/ocm/component-definition.json
@@ -16,100 +16,100 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"class": "scc_class",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure deployment configuration is securely set up",
"class": "scc_class",
"remarks": "rule_set_0"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"remarks": "rule_set_0"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_0"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_proxy_check",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure Nginx is properly configured",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "minimum_nginx_deployment_replicas",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Minimum number of NGINX pod",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "3",
"class": "scc_class",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_proxy_check",
"remarks": "rule_set_1"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_1"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_rbac_check",
"class": "scc_class",
"remarks": "rule_set_2"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure RBAC is securely configured",
"class": "scc_class",
"remarks": "rule_set_2"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_rbac_check",
"remarks": "rule_set_2"
},
{
"name": "Policy_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_2"
}
@@ -135,7 +135,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"class": "scc_class"
}
@@ -148,7 +148,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_proxy_check",
"class": "scc_class"
}
@@ -161,7 +161,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_rbac_check",
"class": "scc_class"
}
diff --git a/go/pkg/types/oscal/componentdefinition/component-definition.template.json b/go/pkg/types/oscal/componentdefinition/component-definition.template.json
index fd78c22..86169a2 100644
--- a/go/pkg/types/oscal/componentdefinition/component-definition.template.json
+++ b/go/pkg/types/oscal/componentdefinition/component-definition.template.json
@@ -16,97 +16,97 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_cert_file",
"remarks": "rule_set_00"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --cert-file and --key-file arguments are set as appropriate",
"remarks": "rule_set_00"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_key_file",
"remarks": "rule_set_01"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --cert-file and --key-file arguments are set as appropriate",
"remarks": "rule_set_01"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_client_cert_auth",
"remarks": "rule_set_02"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --client-cert-auth argument is set to true",
"remarks": "rule_set_02"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_auto_tls",
"remarks": "rule_set_03"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --auto-tls argument is not set to true",
"remarks": "rule_set_03"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_cert_file",
"remarks": "rule_set_04"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate",
"remarks": "rule_set_04"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_key_file",
"remarks": "rule_set_05"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate",
"remarks": "rule_set_05"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_client_cert_auth",
"remarks": "rule_set_06"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-client-cert-auth argument is set to true",
"remarks": "rule_set_06"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_auto_tls",
"remarks": "rule_set_07"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-auto-tls argument is not set to true",
"remarks": "rule_set_07"
}
@@ -124,12 +124,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_cert_file"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_key_file"
}
]
@@ -141,7 +141,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_client_cert_auth"
}
]
@@ -153,7 +153,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_auto_tls"
}
]
@@ -165,12 +165,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_cert_file"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_key_file"
}
]
@@ -182,7 +182,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_client_cert_auth"
}
]
@@ -194,7 +194,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_auto_tls"
}
]
@@ -211,193 +211,193 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_cert_file",
"remarks": "rule_set_08"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --cert-file and --key-file arguments are set as appropriate",
"remarks": "rule_set_08"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_cert_file",
"remarks": "rule_set_08"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --cert-file and --key-file arguments are set as appropriate",
"remarks": "rule_set_08"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_key_file",
"remarks": "rule_set_09"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --cert-file and --key-file arguments are set as appropriate",
"remarks": "rule_set_09"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_key_file",
"remarks": "rule_set_09"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --cert-file and --key-file arguments are set as appropriate",
"remarks": "rule_set_09"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_client_cert_auth",
"remarks": "rule_set_10"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --client-cert-auth argument is set to true",
"remarks": "rule_set_10"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_client_cert_auth",
"remarks": "rule_set_10"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --client-cert-auth argument is set to true",
"remarks": "rule_set_10"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_auto_tls",
"remarks": "rule_set_11"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --auto-tls argument is not set to true",
"remarks": "rule_set_11"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_auto_tls",
"remarks": "rule_set_11"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --auto-tls argument is not set to true",
"remarks": "rule_set_11"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_cert_file",
"remarks": "rule_set_12"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate",
"remarks": "rule_set_12"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_cert_file",
"remarks": "rule_set_12"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --peer-cert-file and --peer-key-file arguments are set as appropriate",
"remarks": "rule_set_12"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_key_file",
"remarks": "rule_set_13"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate",
"remarks": "rule_set_13"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_key_file",
"remarks": "rule_set_13"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --peer-cert-file and --peer-key-file arguments are set as appropriate",
"remarks": "rule_set_13"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_client_cert_auth",
"remarks": "rule_set_14"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-client-cert-auth argument is set to true",
"remarks": "rule_set_14"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_client_cert_auth",
"remarks": "rule_set_14"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --peer-client-cert-auth argument is set to true",
"remarks": "rule_set_14"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_auto_tls",
"remarks": "rule_set_15"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Ensure that the --peer-auto-tls argument is not set to true",
"remarks": "rule_set_15"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_auto_tls",
"remarks": "rule_set_15"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "Check that the --peer-auto-tls argument is not set to true",
"remarks": "rule_set_15"
}
@@ -415,12 +415,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_cert_file"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_key_file"
}
]
@@ -432,7 +432,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_client_cert_auth"
}
]
@@ -444,7 +444,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_auto_tls"
}
]
@@ -456,12 +456,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_cert_file"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_key_file"
}
]
@@ -473,7 +473,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_client_cert_auth"
}
]
@@ -485,7 +485,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd",
"value": "etcd_peer_auto_tls"
}
]
diff --git a/plugins_public/tests/data/auditree/component-definition.csv b/plugins_public/tests/data/auditree/component-definition.csv
index b5846d2..27bd4e6 100644
--- a/plugins_public/tests/data/auditree/component-definition.csv
+++ b/plugins_public/tests/data/auditree/component-definition.csv
@@ -1,6 +1,6 @@
$$Component_Title,$$Component_Description,$$Component_Type,$$Control_Id_List,$$Rule_Id,$$Rule_Description,$Parameter_Id,$Parameter_Description,$Parameter_Value_Alternatives,$Parameter_Value_Default,$$Profile_Source,$$Profile_Description,$Check_Id,$Check_Description,$$Namespace
A human readable name for the component.,A description of the component including information about its function.,A category describing the purpose of the component. ALLOWED VALUES interconnection:software:hardware:service:physical:process-procedure:plan:guidance:standard:validation:,A list of textual labels that uniquely identify the controls or statements that the component implements.,A textual label that uniquely identifies a policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the policy (desired state) including information about its purpose and scope.,A textual label that uniquely identifies the parameter associated with that policy (desired state) or controls implemented by the policy (desired state).,A description of the parameter including the purpose and use of the parameter.,ONLY for the policy (desired state) parameters: A value or set of values the parameter can take. The catalog parameters values are defined in the catalog. ,"A value recommended by Compliance Team in this profile for the parameter of the control or policy (desired state). If a CIS-benchmark exists, the default default could be the CIS-benchmark recommanded value.",A URL reference to the source catalog or profile for which this component is implementing controls for. A profile designates a selection and configuration of controls from one or more catalogs,A description of the profile.,A textual label that uniquely identifies a check of the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the check of the policy (desired state) including the method (interview or examine or test) and procedure details.,"A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name. Used in conjunction with ""class"" as the ontology concept. "
-GitHub,GitHub,Service,cm-2,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,Check whether there are any supported versions.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-GitHub,GitHub,Service,ac-2,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,GitHub org is not empty.,org.gh.orgs,List of organization name,"nasa,esa","nasa,esa",https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Auditree,Auditree,Validation,na,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,Check whether there are any supported versions.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Auditree,Auditree,Validation,na,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,GitHub org is not empty.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
+GitHub,GitHub,Service,ac-2,rule_github_org_member,GitHub org is not empty.,org.gh.orgs,List of organization name,"nasa,esa","nasa,esa",https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+GitHub,GitHub,Service,cm-2,rule_github_api_version,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubAPIVersionsCheck.test_supported_versions,Check whether there are any supported versions.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Auditree,Auditree,Validation,na,rule_github_org_member,GitHub org is not empty.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Auditree,Auditree,Validation,na,rule_github_api_version,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubAPIVersionsCheck.test_supported_versions,Check whether there are any supported versions.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
diff --git a/plugins_public/tests/data/auditree/component-definition.json b/plugins_public/tests/data/auditree/component-definition.json
index a078590..da170f8 100644
--- a/plugins_public/tests/data/auditree/component-definition.json
+++ b/plugins_public/tests/data/auditree/component-definition.json
@@ -1,89 +1,89 @@
{
"component-definition": {
- "uuid": "fff86296-a55f-4b4c-bec6-f89d0fef3569",
+ "uuid": "54d90566-7279-4be6-b2a5-423d55b8d5de",
"metadata": {
- "title": "Sample Component Definition using Auditree as PVP",
- "last-modified": "2024-06-02T07:14:14+00:00",
+ "title": "Component Definition",
+ "last-modified": "2024-08-25T08:45:01+00:00",
"version": "1.0",
- "oscal-version": "1.0.4"
+ "oscal-version": "1.1.2"
},
"components": [
{
- "uuid": "ec59c356-4df9-412c-97df-52880e4c1c2c",
+ "uuid": "20578b35-2a8c-4747-b846-a987de62b7b7",
"type": "Service",
"title": "GitHub",
"description": "GitHub",
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "rule_github_org_member",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "GitHub API returns any supported version.",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "GitHub org is not empty.",
"remarks": "rule_set_0"
},
{
- "name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
+ "name": "Parameter_Id",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "org.gh.orgs",
"remarks": "rule_set_0"
},
{
- "name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "Check whether there are any supported versions.",
+ "name": "Parameter_Description",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "List of organization name",
"remarks": "rule_set_0"
},
{
- "name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
- "remarks": "rule_set_1"
+ "name": "Parameter_Value_Alternatives",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "nasa,esa",
+ "remarks": "rule_set_0"
},
{
- "name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "GitHub org is not empty.",
- "remarks": "rule_set_1"
+ "name": "Check_Id",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
+ "remarks": "rule_set_0"
},
{
- "name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "org.gh.orgs",
- "remarks": "rule_set_1"
+ "name": "Check_Description",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "Check whether the GitHub org is not empty.",
+ "remarks": "rule_set_0"
},
{
- "name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "List of organization name",
+ "name": "Rule_Id",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "rule_github_api_version",
"remarks": "rule_set_1"
},
{
- "name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "nasa,esa",
+ "name": "Rule_Description",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "GitHub API returns any supported version.",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "demo_examples.checks.test_github.GitHubAPIVersionsCheck.test_supported_versions",
"remarks": "rule_set_1"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "Check whether the GitHub org is not empty.",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "Check whether there are any supported versions.",
"remarks": "rule_set_1"
}
],
"control-implementations": [
{
- "uuid": "0c336b5b-9258-4129-8406-805faf2ce198",
+ "uuid": "699ab81d-e2ce-468d-8e0b-027b26734d02",
"source": "https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json",
"description": "NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE",
"set-parameters": [
@@ -97,26 +97,26 @@
],
"implemented-requirements": [
{
- "uuid": "30ed7cc3-b00d-45e0-b885-bd981a93654a",
- "control-id": "cm-2",
+ "uuid": "fe8f85f3-2b3e-48d4-8cb4-9d4f199c8274",
+ "control-id": "ac-2",
"description": "",
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions"
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "rule_github_org_member"
}
]
},
{
- "uuid": "54de05af-90b2-40ac-8a58-84dd3b42e388",
- "control-id": "ac-2",
+ "uuid": "62081469-ff88-4dc7-a779-32a16a02b6ab",
+ "control-id": "cm-2",
"description": "",
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty"
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "rule_github_api_version"
}
]
}
@@ -125,86 +125,49 @@
]
},
{
- "uuid": "b6beb914-7b59-4f87-9a6c-2855052fe7a8",
+ "uuid": "82825ce5-0184-4b76-aaf0-f5cbddaf7a82",
"type": "Validation",
"title": "Auditree",
"description": "Auditree",
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
- "remarks": "rule_set_2"
- },
- {
- "name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "GitHub API returns any supported version.",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "rule_github_org_member",
"remarks": "rule_set_2"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
"remarks": "rule_set_2"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "Check whether there are any supported versions.",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "Check whether the GitHub org is not empty.",
"remarks": "rule_set_2"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
- "remarks": "rule_set_3"
- },
- {
- "name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "GitHub org is not empty.",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "rule_github_api_version",
"remarks": "rule_set_3"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "demo_examples.checks.test_github.GitHubAPIVersionsCheck.test_supported_versions",
"remarks": "rule_set_3"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "Check whether the GitHub org is not empty.",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "value": "Check whether there are any supported versions.",
"remarks": "rule_set_3"
}
],
- "control-implementations": [
- {
- "uuid": "0d6f2a85-ec23-42c3-b678-a54139fd7190",
- "source": "https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json",
- "description": "NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE",
- "implemented-requirements": [
- {
- "uuid": "2a00b1a6-e7c0-4767-b802-71d5831525d3",
- "control-id": "na",
- "description": "",
- "props": [
- {
- "name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions"
- },
- {
- "name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
- "value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty"
- }
- ]
- }
- ]
- }
- ]
+ "control-implementations": []
}
]
}
diff --git a/plugins_public/tests/data/auditree/csv-to-oscal-cd.config b/plugins_public/tests/data/auditree/csv-to-oscal-cd.config
index e2e2076..e972bf1 100644
--- a/plugins_public/tests/data/auditree/csv-to-oscal-cd.config
+++ b/plugins_public/tests/data/auditree/csv-to-oscal-cd.config
@@ -1,7 +1,7 @@
[task.csv-to-oscal-cd]
-title = Sample Component Definition using Auditree as PVP
+title = Component Definition
version = 1.0
csv-file = plugins_public/tests/data/auditree/component-definition.csv
output-dir = plugins_public/tests/data/auditree
diff --git a/plugins_public/tests/data/heterogeneous/component-definition.csv b/plugins_public/tests/data/heterogeneous/component-definition.csv
index 98c8343..1c7257b 100644
--- a/plugins_public/tests/data/heterogeneous/component-definition.csv
+++ b/plugins_public/tests/data/heterogeneous/component-definition.csv
@@ -1,16 +1,16 @@
$$Component_Title,$$Component_Description,$$Component_Type,$$Control_Id_List,$$Rule_Id,$$Rule_Description,$Parameter_Id,$Parameter_Description,$Parameter_Value_Alternatives,$Parameter_Value_Default,$$Profile_Source,$$Profile_Description,$Check_Id,$Check_Description,$$Namespace
A human readable name for the component.,A description of the component including information about its function.,A category describing the purpose of the component. ALLOWED VALUES interconnection:software:hardware:service:physical:process-procedure:plan:guidance:standard:validation:,A list of textual labels that uniquely identify the controls or statements that the component implements.,A textual label that uniquely identifies a policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the policy (desired state) including information about its purpose and scope.,A textual label that uniquely identifies the parameter associated with that policy (desired state) or controls implemented by the policy (desired state).,A description of the parameter including the purpose and use of the parameter.,ONLY for the policy (desired state) parameters: A value or set of values the parameter can take. The catalog parameters values are defined in the catalog. ,"A value recommended by Compliance Team in this profile for the parameter of the control or policy (desired state). If a CIS-benchmark exists, the default default could be the CIS-benchmark recommanded value.",A URL reference to the source catalog or profile for which this component is implementing controls for. A profile designates a selection and configuration of controls from one or more catalogs,A description of the profile.,A textual label that uniquely identifies a check of the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the check of the policy (desired state) including the method (interview or examine or test) and procedure details.,"A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name. Used in conjunction with ""class"" as the ontology concept. "
-GitHub,GitHub,Service,cm-2,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,Check whether there are any supported versions.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-GitHub,GitHub,Service,ac-2,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,GitHub org is not empty.,org.gh.orgs,List of organization name,"nasa,esa","nasa,esa",https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",allowed_baseimages,Allowed baseimages,gcr.io/distroless/static:root,gcr.io/distroless/static:root,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2.1,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,policy-deployment,Ensure deployment configuration is securely set up,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,ac-1,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-disallowed-roles,Ensure roles are set to only allowed values,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-high-scan,Ensure scan is enabled with high level,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Auditree,Auditree,Validation,na,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,Check whether there are any supported versions.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Auditree,Auditree,Validation,na,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,GitHub org is not empty.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Kyverno,Kyverno as Policy Validation Point,Validation,na,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Kyverno,Kyverno as Policy Validation Point,Validation,na,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-OCM,OCM as Policy Validation Point,Validation,na,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-OCM,OCM as Policy Validation Point,Validation,na,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-disallowed-roles,Ensure roles are set to only allowed values,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-OCM,OCM as Policy Validation Point,Validation,na,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-high-scan,Ensure scan is enabled with high level,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
+GitHub,GitHub,Service,cm-2,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,Check whether there are any supported versions.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+GitHub,GitHub,Service,ac-2,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,GitHub org is not empty.,org.gh.orgs,List of organization name,"nasa,esa","nasa,esa",https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",allowed_baseimages,Allowed baseimages,gcr.io/distroless/static:root,gcr.io/distroless/static:root,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2.1,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,policy-deployment,Ensure deployment configuration is securely set up,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,ac-1,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-disallowed-roles,Ensure roles are set to only allowed values,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-high-scan,Ensure scan is enabled with high level,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Auditree,Auditree,Validation,na,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,GitHub API returns any supported version.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_supported_versions,Check whether there are any supported versions.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Auditree,Auditree,Validation,na,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,GitHub org is not empty.,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty,Check whether the GitHub org is not empty.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Kyverno,Kyverno as Policy Validation Point,Validation,na,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Kyverno,Kyverno as Policy Validation Point,Validation,na,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+OCM,OCM as Policy Validation Point,Validation,na,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+OCM,OCM as Policy Validation Point,Validation,na,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-disallowed-roles,Ensure roles are set to only allowed values,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+OCM,OCM as Policy Validation Point,Validation,na,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,policy-high-scan,Ensure scan is enabled with high level,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
diff --git a/plugins_public/tests/data/heterogeneous/component-definition.json b/plugins_public/tests/data/heterogeneous/component-definition.json
index 40ac380..b6e6ee5 100644
--- a/plugins_public/tests/data/heterogeneous/component-definition.json
+++ b/plugins_public/tests/data/heterogeneous/component-definition.json
@@ -16,67 +16,67 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
"remarks": "rule_set_00"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "GitHub API returns any supported version.",
"remarks": "rule_set_00"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
"remarks": "rule_set_00"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Check whether there are any supported versions.",
"remarks": "rule_set_00"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
"remarks": "rule_set_01"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "GitHub org is not empty.",
"remarks": "rule_set_01"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "org.gh.orgs",
"remarks": "rule_set_01"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "List of organization name",
"remarks": "rule_set_01"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "nasa,esa",
"remarks": "rule_set_01"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
"remarks": "rule_set_01"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Check whether the GitHub org is not empty.",
"remarks": "rule_set_01"
}
@@ -103,7 +103,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions"
}
]
@@ -115,7 +115,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty"
}
]
@@ -132,157 +132,157 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_02"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_02"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed_baseimages",
"remarks": "rule_set_02"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Allowed baseimages",
"remarks": "rule_set_02"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "gcr.io/distroless/static:root",
"remarks": "rule_set_02"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_02"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_02"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_03"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",
"remarks": "rule_set_03"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_03"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Adding capabilities beyond those listed in the policy must be disallowed.",
"remarks": "rule_set_03"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_04"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure deployment configuration is securely set up",
"remarks": "rule_set_04"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "minimum_nginx_deployment_replicas",
"remarks": "rule_set_04"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Minimum number of NGINX pod",
"remarks": "rule_set_04"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "3",
"remarks": "rule_set_04"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_04"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure NGINX is deployed and running with given minimum instances",
"remarks": "rule_set_04"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_05"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_05"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_05"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_05"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_06"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_06"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_06"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_06"
}
@@ -314,12 +314,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment"
}
]
@@ -331,7 +331,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities"
}
]
@@ -343,7 +343,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles"
}
]
@@ -355,7 +355,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan"
}
]
@@ -372,49 +372,49 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
"remarks": "rule_set_07"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "GitHub API returns any supported version.",
"remarks": "rule_set_07"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions",
"remarks": "rule_set_07"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Check whether there are any supported versions.",
"remarks": "rule_set_07"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
"remarks": "rule_set_08"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "GitHub org is not empty.",
"remarks": "rule_set_08"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty",
"remarks": "rule_set_08"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Check whether the GitHub org is not empty.",
"remarks": "rule_set_08"
}
@@ -432,12 +432,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_supported_versions"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "demo_examples.checks.test_github.GitHubOrgs.test_members_is_not_empty"
}
]
@@ -454,49 +454,49 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_09"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_09"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_09"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_09"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_10"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",
"remarks": "rule_set_10"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_10"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Adding capabilities beyond those listed in the policy must be disallowed.",
"remarks": "rule_set_10"
}
@@ -514,12 +514,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities"
}
]
@@ -536,73 +536,73 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_11"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure NGINX is deployed and running with given minimum instances",
"remarks": "rule_set_11"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_11"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure NGINX is deployed and running with given minimum instances",
"remarks": "rule_set_11"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_12"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_12"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_12"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_12"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_13"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_13"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_13"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_13"
}
@@ -620,17 +620,17 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan"
}
]
diff --git a/plugins_public/tests/data/kyverno/component-definition.csv b/plugins_public/tests/data/kyverno/component-definition.csv
index ea37134..630a0d6 100644
--- a/plugins_public/tests/data/kyverno/component-definition.csv
+++ b/plugins_public/tests/data/kyverno/component-definition.csv
@@ -1,6 +1,6 @@
$$Component_Title,$$Component_Description,$$Component_Type,$$Control_Id_List,$$Rule_Id,$$Rule_Description,$Parameter_Id,$Parameter_Description,$Parameter_Value_Alternatives,$Parameter_Value_Default,$$Profile_Source,$$Profile_Description,Rule_Actual_State_Data_Request_Evidence_Format_Reference_URL_list,Rule_Actual_State_TimeToLive,$Check_Id,$Check_Description,Fetcher_id,Fetcher_Description,Fix_id,Fix_Description,Rule_implementation_status,Rule_POAM_Reference_URL,$$Namespace
A human readable name for the component.,A description of the component including information about its function.,A category describing the purpose of the component. ALLOWED VALUES interconnection:software:hardware:service:physical:process-procedure:plan:guidance:standard:validation:,A list of textual labels that uniquely identify the controls or statements that the component implements.,A textual label that uniquely identifies a policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the policy (desired state) including information about its purpose and scope.,A textual label that uniquely identifies the parameter associated with that policy (desired state) or controls implemented by the policy (desired state).,A description of the parameter including the purpose and use of the parameter.,ONLY for the policy (desired state) parameters: A value or set of values the parameter can take. The catalog parameters values are defined in the catalog. ,"A value recommended by Compliance Team in this profile for the parameter of the control or policy (desired state). If a CIS-benchmark exists, the default default could be the CIS-benchmark recommanded value.",A URL reference to the source catalog or profile for which this component is implementing controls for. A profile designates a selection and configuration of controls from one or more catalogs,A description of the profile.,A list of URL references that contain the Actual State Data Model (eg schema or swager API or procedure template or terraform schema). Needed by the fetcher developer. ,A TimeToLive value of the duration of time the actual state is valid before it becomes stale or obsolite or overriden. Needed by the fetcher developer. ,A textual label that uniquely identifies a check of the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the check of the policy (desired state) including the method (interview or examine or test) and procedure details.,A textual label that uniquely identifies a collector of the actual state (evidence) associated with the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the collector of the actual state (evidence) associated with the policy (desired state) including the method (interview or examine or API) and questionaire or API details.,A textual label that uniquely identifies the fix of the failed policy.,A description of the fix to remediate the failed policy.,Indicates the degree to which the a given policy is implemented. ALLOWED VALUES: IMPLEMENTED: The control is fully implemented. PARTIAL: The control is partially implemented. PLANNED: There is a plan for implementing the control as explained in the remarks. ALTERNATIVE: There is an alternative implementation for this control as explained in the remarks. NOT-APPLICABLE: This control does not apply to this system as justified in the remarks.,A URL reference to the Plan of Action and Milestones this component may be subjected to for remediation or deviation or mitigation in case of the policy (desired state) non compliance or error or failure. ,"A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name. Used in conjunction with ""class"" as the ontology concept. "
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",allowed_baseimages,Allowed baseimages,gcr.io/distroless/static:root,gcr.io/distroless/static:root,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2.1,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Kyverno,Kyverno as Policy Validation Point,Validation,na,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Kyverno,Kyverno as Policy Validation Point,Validation,na,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",allowed_baseimages,Allowed baseimages,gcr.io/distroless/static:root,gcr.io/distroless/static:root,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2.1,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Kyverno,Kyverno as Policy Validation Point,Validation,na,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,allowed-base-images,"Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Kyverno,Kyverno as Policy Validation Point,Validation,na,disallow-capabilities,"Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,disallow-capabilities,Adding capabilities beyond those listed in the policy must be disallowed.,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
diff --git a/plugins_public/tests/data/kyverno/component-definition.json b/plugins_public/tests/data/kyverno/component-definition.json
index 5aa060f..8682781 100644
--- a/plugins_public/tests/data/kyverno/component-definition.json
+++ b/plugins_public/tests/data/kyverno/component-definition.json
@@ -16,67 +16,67 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_0"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed_baseimages",
"remarks": "rule_set_0"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Allowed baseimages",
"remarks": "rule_set_0"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "gcr.io/distroless/static:root",
"remarks": "rule_set_0"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_0"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_0"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_1"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_1"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Adding capabilities beyond those listed in the policy must be disallowed.",
"remarks": "rule_set_1"
}
@@ -102,7 +102,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images"
}
]
@@ -114,7 +114,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities"
}
]
@@ -131,49 +131,49 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_2"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_2"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images",
"remarks": "rule_set_2"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Building images which specify a base as their origin is a good start to improving supply chain security, but over time organizations may want to build an allow list of specific base images which are allowed to be used when constructing containers. This policy ensures that a container's base, found in an OCI annotation, is in a cluster-wide allow list.",
"remarks": "rule_set_2"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_3"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Images coming from certain registries require authentication in order to pull them, and the kubelet uses this information in the form of an imagePullSecret to pull those images on behalf of your Pod. This policy searches for images coming from a registry called `corp.reg.com` and, if found, will mutate the Pod to add an IimagePullSecret called `my-secret`.",
"remarks": "rule_set_3"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities",
"remarks": "rule_set_3"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Adding capabilities beyond those listed in the policy must be disallowed.",
"remarks": "rule_set_3"
}
@@ -191,12 +191,12 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "allowed-base-images"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "disallow-capabilities"
}
]
diff --git a/plugins_public/tests/data/ocm/component-definition.csv b/plugins_public/tests/data/ocm/component-definition.csv
index 917ed12..58d02f7 100644
--- a/plugins_public/tests/data/ocm/component-definition.csv
+++ b/plugins_public/tests/data/ocm/component-definition.csv
@@ -1,8 +1,8 @@
$$Component_Title,$$Component_Description,$$Component_Type,$$Control_Id_List,$$Rule_Id,$$Rule_Description,$Parameter_Id,$Parameter_Description,$Parameter_Value_Alternatives,$Parameter_Value_Default,$$Profile_Source,$$Profile_Description,Rule_Actual_State_Data_Request_Evidence_Format_Reference_URL_list,Rule_Actual_State_TimeToLive,$Check_Id,$Check_Description,Fetcher_id,Fetcher_Description,Fix_id,Fix_Description,Rule_implementation_status,Rule_POAM_Reference_URL,$$Namespace
A human readable name for the component.,A description of the component including information about its function.,A category describing the purpose of the component. ALLOWED VALUES interconnection:software:hardware:service:physical:process-procedure:plan:guidance:standard:validation:,A list of textual labels that uniquely identify the controls or statements that the component implements.,A textual label that uniquely identifies a policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the policy (desired state) including information about its purpose and scope.,A textual label that uniquely identifies the parameter associated with that policy (desired state) or controls implemented by the policy (desired state).,A description of the parameter including the purpose and use of the parameter.,ONLY for the policy (desired state) parameters: A value or set of values the parameter can take. The catalog parameters values are defined in the catalog. ,"A value recommended by Compliance Team in this profile for the parameter of the control or policy (desired state). If a CIS-benchmark exists, the default default could be the CIS-benchmark recommanded value.",A URL reference to the source catalog or profile for which this component is implementing controls for. A profile designates a selection and configuration of controls from one or more catalogs,A description of the profile.,A list of URL references that contain the Actual State Data Model (eg schema or swager API or procedure template or terraform schema). Needed by the fetcher developer. ,A TimeToLive value of the duration of time the actual state is valid before it becomes stale or obsolite or overriden. Needed by the fetcher developer. ,A textual label that uniquely identifies a check of the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the check of the policy (desired state) including the method (interview or examine or test) and procedure details.,A textual label that uniquely identifies a collector of the actual state (evidence) associated with the policy (desired state) that can be used to reference it elsewhere in this or other documents.,A description of the collector of the actual state (evidence) associated with the policy (desired state) including the method (interview or examine or API) and questionaire or API details.,A textual label that uniquely identifies the fix of the failed policy.,A description of the fix to remediate the failed policy.,Indicates the degree to which the a given policy is implemented. ALLOWED VALUES: IMPLEMENTED: The control is fully implemented. PARTIAL: The control is partially implemented. PLANNED: There is a plan for implementing the control as explained in the remarks. ALTERNATIVE: There is an alternative implementation for this control as explained in the remarks. NOT-APPLICABLE: This control does not apply to this system as justified in the remarks.,A URL reference to the Plan of Action and Milestones this component may be subjected to for remediation or deviation or mitigation in case of the policy (desired state) non compliance or error or failure. ,"A namespace qualifying the property's name. This allows different organizations to associate distinct semantics with the same name. Used in conjunction with ""class"" as the ontology concept. "
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,policy-deployment,Ensure deployment configuration is securely set up,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,ac-1,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-high-scan,Ensure scan is enabled with high level,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-OCM,OCM as Policy Validation Point,Validation,na,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-OCM,OCM as Policy Validation Point,Validation,na,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
-OCM,OCM as Policy Validation Point,Validation,na,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-high-scan,Ensure scan is enabled with high level,,,,,,,http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-2,policy-deployment,Ensure deployment configuration is securely set up,minimum_nginx_deployment_replicas,Minimum number of NGINX pod,3,3,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,ac-1,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+Managed Kubernetes,Managed Kubernetes cluster,Service,cm-6,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-high-scan,Ensure scan is enabled with high level,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+OCM,OCM as Policy Validation Point,Validation,na,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-deployment,Ensure NGINX is deployed and running with given minimum instances,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+OCM,OCM as Policy Validation Point,Validation,na,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-disallowed-roles,Ensure roles are set to only allowed values,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
+OCM,OCM as Policy Validation Point,Validation,na,policy-high-scan,Ensure scan is enabled with high level,,,,,https://github.com/usnistgov/oscal-content/blob/main/nist.gov/SP800-53/rev5/json/NIST_SP-800-53_rev5_HIGH-baseline_profile.json,NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE,,,policy-high-scan,Ensure scan is enabled with high level,,,,,,,http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud
\ No newline at end of file
diff --git a/plugins_public/tests/data/ocm/component-definition.json b/plugins_public/tests/data/ocm/component-definition.json
index 538d755..490a10a 100644
--- a/plugins_public/tests/data/ocm/component-definition.json
+++ b/plugins_public/tests/data/ocm/component-definition.json
@@ -16,91 +16,91 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure deployment configuration is securely set up",
"remarks": "rule_set_0"
},
{
"name": "Parameter_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "minimum_nginx_deployment_replicas",
"remarks": "rule_set_0"
},
{
"name": "Parameter_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Minimum number of NGINX pod",
"remarks": "rule_set_0"
},
{
"name": "Parameter_Value_Alternatives",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "3",
"remarks": "rule_set_0"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_0"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure NGINX is deployed and running with given minimum instances",
"remarks": "rule_set_0"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_1"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_1"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_1"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_2"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_2"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_2"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_2"
}
@@ -126,7 +126,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment"
}
]
@@ -138,7 +138,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles"
}
]
@@ -150,7 +150,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan"
}
]
@@ -167,73 +167,73 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_3"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure NGINX is deployed and running with given minimum instances",
"remarks": "rule_set_3"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment",
"remarks": "rule_set_3"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure NGINX is deployed and running with given minimum instances",
"remarks": "rule_set_3"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_4"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_4"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles",
"remarks": "rule_set_4"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure roles are set to only allowed values",
"remarks": "rule_set_4"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_5"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_5"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_5"
},
{
"name": "Check_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure scan is enabled with high level",
"remarks": "rule_set_5"
}
@@ -251,17 +251,17 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-deployment"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-disallowed-roles"
},
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan"
}
]
diff --git a/pyproject.toml b/pyproject.toml
index b65e6b1..fd21f61 100644
--- a/pyproject.toml
+++ b/pyproject.toml
@@ -52,8 +52,6 @@ dev = [
"black",
"isort",
"pylint",
- ## Security tools
- "detect-secrets@git+https://github.com/ibm/detect-secrets.git@master#egg=detect-secrets"
]
[project.urls]
@@ -88,3 +86,13 @@ disable = ["W1203", "W1201"]
[tool.pylint.format]
max-line-length = 120
+
+[tool.semantic_release]
+version_toml = ["pyproject.toml:project.version"]
+commit_message = "{version}\n\nAutomatically generated by python-semantic-release"
+
+[tool.semantic_release.remote.token]
+env = "GITHUB_TOKEN"
+
+[tool.semantic_release.publish]
+upload_to_vcs_release = false
\ No newline at end of file
diff --git a/tests/data/framework/c2p/assessment-results.json b/tests/data/framework/c2p/assessment-results.json
index 602b742..664b1b3 100644
--- a/tests/data/framework/c2p/assessment-results.json
+++ b/tests/data/framework/c2p/assessment-results.json
@@ -3,7 +3,7 @@
"metadata": {
"title": "TEST Assessment Results",
"last_modified": "2024-03-22T08:28:11.000+00:00",
- "version": "3.3.0",
+ "version": "3.4.0",
"oscal_version": "1.1.2"
},
"import_ap": {
diff --git a/tests/data/framework/c2p/component-definition.json b/tests/data/framework/c2p/component-definition.json
index 06179f3..f0532e1 100644
--- a/tests/data/framework/c2p/component-definition.json
+++ b/tests/data/framework/c2p/component-definition.json
@@ -16,19 +16,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"remarks": "rule_set_0"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure deployment configuration is securely set up",
"remarks": "rule_set_0"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_0"
}
@@ -46,7 +46,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check"
}
]
@@ -63,19 +63,19 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check",
"remarks": "rule_set_1"
},
{
"name": "Rule_Description",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "Ensure deployment configuration is securely set up",
"remarks": "rule_set_1"
},
{
"name": "Check_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "policy-high-scan",
"remarks": "rule_set_1"
}
@@ -93,7 +93,7 @@
"props": [
{
"name": "Rule_Id",
- "ns": "http://ibm.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
+ "ns": "http://oscal-compass.github.io/compliance-trestle/schemas/oscal/cd/ibmcloud",
"value": "test_configuration_check"
}
]