[Verse 1] Download the CLI, validation in your hands JSON to XML, conversion commands Metaschema weaving schemas from the source Generating structures with automated force [Chorus] NIST tools spinning, OSCAL transformation CLI commanding validation station Metaschema magic, repositories gleaming Eight hundred fifty-three controls streaming [Verse 2] Content repository holds the golden keys Reference catalogs and baselines with ease Moderate impact, low impact defined Federal frameworks already refined [Chorus] NIST tools spinning, OSCAL transformation CLI commanding validation station Metaschema magic, repositories gleaming Eight hundred fifty-three controls streaming [Verse 3] CPRT browser opens cybersecurity doors Privacy reference tool with downloadable stores Navigate controls with searchable precision OSCAL downloads fuel every decision [Bridge] Validate syntax, convert between formats Metaschema generates what your code warrants Repository treasures, CPRT explores Four essential weapons in your OSCAL wars [Final Chorus] NIST tools spinning, OSCAL transformation CLI commanding validation station Metaschema magic, repositories gleaming Eight hundred fifty-three controls streaming Tools and resources, mastery achieving [Outro] CLI converts, Metaschema generates Repository serves, CPRT navigates
← 4 The Shared Responsibility Model in OSCAL | 2 Open-Source Tools →