[Verse 1] Building blueprints for defense tonight System boundaries drawn precise and tight Description flows from infrastructure core Control implementations behind each door OSCAL formats make the data sing Machine-readable, automated everything [Chorus] Structure, boundary, controls align SSP foundation by design Specific statements, measurable proof Assessors need the documented truth Living document through each phase System Security Plan displays [Verse 2] Leveraged controls from platforms below Hybrid splits the responsibility flow System-specific ones you implement Each statement shows exactly what you meant Reference actual configurations here No vague assertions, make the method clear [Chorus] Structure, boundary, controls align SSP foundation by design Specific statements, measurable proof Assessors need the documented truth Living document through each phase System Security Plan displays [Bridge] Lifecycle changes, update the plan Development cycles, understand OSCAL schemas automate the way Machine consumption saves the day Boundary diagrams reveal the scope Architecture gives assessors hope [Verse 3] Control families organized and clean Implementation details paint the scene Authorization evidence compiled Documentation properly styled From concept through production's door SSP evolves and adapts for more [Final Chorus] Structure, boundary, controls align SSP foundation by design Specific statements, measurable proof Assessors find the documented truth Living document through each phase System Security Plan displays [Outro] OSCAL transforms the ancient art Machine and human, both can parse apart Defense infrastructure needs this frame System Security Plan's the name
← 6 Container Supply Chain Security | 2 Authorization Boundary Definition →