UNCLASSIFIED - NO CUI

Skip to content
Snippets Groups Projects
oscal-component.yaml 65.6 KiB
Newer Older
          modified, disabled, or removed, or when users are terminated or transferred.
      - uuid: cb4929fc-3685-45e4-8720-405dc5ed9ea3
        control-id: ac-2.13
        description: Keycloak allows the creation of clients that provide login to
          app via Keycloak, allowing account management to be inherited from keycloak.
          There are roughly 30 different event types in keycloak and an event listener
          can be configured and automated via email, external webhook, and logging
          stack monitored by admins to notify when an account is created, enabled,
          modified, disabled, or removed, or when users are terminated or transferred.
      - uuid: b704526e-e18f-46ec-8072-2e361115265a
        control-id: ac-3
        description: Keycloak allows the creation of clients that provide login to
          app via Keycloak, allowing account management to be inherited from keycloak
          and the enforcement of approved authorizaions for logical access to information
          and system resources.
      - uuid: ef73dc31-ab9a-4d67-b5b8-c042e47aba25
        control-id: ac-4
        description: Keycloak is designed and recommended to be deployed in a stand-alone
          BB cluster with TLS passthrough for OIDC/SAML integration. Controls are
          inherited from istio via network policies, virtual services and gateway
          configs.
      - uuid: 34ea5ae5-3525-4a81-974f-a73e1999610f
        control-id: ac-4.4
        description: Keycloak is designed and recommended to be deployed in a stand-alone
          BB cluster with TLS passthrough for OIDC/SAML integration. Controls are
          inherited from istio via network policies, virtual services and gateway
          configs.
      - uuid: 25a717a7-3f1f-4d24-9cc1-701be6f97df9
        control-id: ac-5
        description: Keycloak is designed and recommended to be deployed in a stand-alone
          BB cluster with TLS passthrough for OIDC/SAML integration. Controls are
          inherited from istio via network policies, virtual services and gateway
          configs.
      - uuid: 28fba4bc-e1ae-4164-9673-6ed90d93a7c0
        control-id: ac-6
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: 2f8de149-d07f-4e8a-8baf-5bdbace0cf8d
        control-id: ac-6.1
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: 5a04932c-05cf-489a-932c-cb31b9480b73
        control-id: ac-6.2
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: 337a9b7f-71d0-46ef-aaa2-af5367d9b371
        control-id: ac-6.5
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: 6de217bb-f767-4af0-b813-b54df9baf173
        control-id: ac-6.7
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: 59032e55-f51e-4a0d-9394-7474631005ec
        control-id: ac-6.9
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: ad95419d-4506-48b0-a736-723724acea34
        control-id: ac-6.10
        description: Keycloak as an IDM / IAM provider supports least privilege through
          user / group management (ABAC / RBAC) service offerings
      - uuid: 16088314-7668-41a2-9ee1-a7128d6c209e
        control-id: ac-7
        description: 'Keycloak has brute force protection which has three components:
          max login failures, quick login check (time between failures) & minimum
          quick login check wait (time user will be disabled when multiple login failures
          are detected)'
      - uuid: 35992922-7375-45fc-bac1-1a6b551a76b9
        control-id: ac-8
        description: Keycloak has a standard DOD login banner see https://login.dso.mil
      - uuid: 2a99e48f-6631-4ff7-b955-b73caafdedac
        control-id: ac-10
        description: Keycloak does not suffice this control natively; however, you
          can implement a “only one session per user” behavior with an ```EventListenerProvider```.
          On every LOGIN event, delete all the sessions of a user, except the current
          one.
      - uuid: 77c2aa64-ab6b-4508-b6f6-fcca929de9ab
        control-id: ac-12
        description: Keycloak does not suffice this control natively; however, you
          can implement a session behaviors with an ```EventListenerProvider```.
      - uuid: 3b38e765-41f8-4ea6-90dc-b4a1845b62cc
        control-id: ac-14
        description: Keycloak has the ability to allow anonymous access to resource
          if Client Access Type is set to public.
      - uuid: 9bd24189-a9f7-4ddb-98fb-ba259b46b459
        control-id: ac-17.1
        description: Keycloak manages remote access to other applications through
          IAM.
      - uuid: 3e901895-d5da-48a0-8317-56b456371243
        control-id: ac-17.2
        description: Through EventListeners Keycloak can either ship logs to a SIEM
          which could alert on remote session events, or with custom SPIs Keycloak
          can perform an action directly on events. A VPN client would need to use
          Keycloak as an SSO to generate these events.
      - uuid: 66bc3835-8369-48ec-b54f-ca5ca034e2fd
        control-id: ac-17.3
        description: Keycloak can restrict access to control points through IAM, but
          a VPN solution like Appgate would be better suited working with Keycloak.
      - uuid: f6e0f2a4-c729-4335-97f4-b16fb49d27f9
        control-id: ac-17.4
        description: Keycloak can support a VPN or other remote management system
          as its IAM to support remote access control.
      - uuid: 6a948220-d3ef-4357-989a-38e25f27eb3f
        control-id: au-2
        description: Keycloak captures user and admin events and can ship them out
          to a logging server for analysis or trigger an action on specific event
          via customizable EventListeners.
      - uuid: 4b4d19b0-b8e1-4fdd-b57b-448f4e163342
        control-id: au-3
        description: Keycloak events contain what, when, where, source, and objects/entities
          for policy violations.
      - uuid: 35b33698-d3c5-496e-9cb4-4524c63e2fac
        control-id: au-3.1
        description: Keycloak event logs include Time, Event Type, Details (Client,
          User, IP Address). Events are shipped to logging.
      - uuid: ab565bfa-78a5-43e6-98cc-ba801a16b980
        control-id: au-4
        description: Keycloak events can be both saved to database and shipped to
          logging server. Both systems are external to Keycloaks application server.
      - uuid: 24b14c71-b4bd-402f-aba6-80056e1b6fec
        control-id: au-7
        description: Keycloak provides audit records for compliance that qualify for
          this control.
      - uuid: e528b2ec-6895-432d-acf1-b33e0f8455f5
        control-id: au-7.1
        description: Within Keycloak records, sorting and searching are supported.
      - uuid: ed7026d7-4257-44e6-919c-73e5f8a86be5
        control-id: au-8
        description: Keycloak saves timestamps in event logs
      - uuid: 92b5e2c1-cb7c-4f38-ba5b-22b617b15020
        control-id: au-9
        description: Keycloak provides RBAC to restrict management of logs.
      - uuid: 71c0d1c7-f9a5-4439-829b-8976749481eb
        control-id: au-9.4
        description: Keycloak provides RBAC to restrict management of logs.
      - uuid: 0b7b466e-e33c-4fa0-8979-a82da5fadc32
        control-id: ia-2
        description: Keycloak supports control through its IAM/SSO service.
      - uuid: ff98831e-de87-4f0d-b42f-3af08a6caff6
        control-id: ia-2.1
        description: Keycloak supports MFA using mobile and x509 mTLS for both privileged
          and non-privileged account management.
      - uuid: e0fbd222-d6ae-4729-a262-7c795dd6a628
        control-id: ia-2.2
        description: Keycloak supports MFA using mobile and x509 mTLS for both privileged
          and non-privileged account management.
      - uuid: 441d2bbd-b7ee-46e9-8110-f0fda67a2c90
        control-id: ia-2.5
        description: Keycloak provides build-in functionality to support control.
      - uuid: 5c163729-a954-43ca-a035-6040b0526ccd
        control-id: ia-2.12
        description: Keycloak supports PIV credentials
      - uuid: 084779e8-542d-4def-936b-69fd1fb7f266
        control-id: ia-3
        description: Keycloak provides built-in functionality to support control.
      - uuid: 7a4c2837-a205-4b9c-b850-a8afec580275
        control-id: ia-4
        description: Keycloak provides built-in functionality to support control.
      - uuid: ce397926-ec86-491c-82f6-db7e2e164a0d
        control-id: ia-4.4
        description: Keycloak provides built-in functionality to support control.
      - uuid: 7cee87f8-165f-4631-96f5-b2876df0e88a
        control-id: ia-5.1
        description: Keycloak provides password-policies to support control. https://github.com/keycloak/keycloak-documentation/blob/main/server_admin/topics/authentication/password-policies.adoc
      - uuid: 56d5209f-e279-4f67-b6e9-9a814695dda9
        control-id: ia-5.2
        description: Keycloak supports OCSP checking, and truststore/chain validation
          for x509 PKI access.
      - uuid: 8d858e85-710e-46aa-b6fd-98013480c2b6
        control-id: ia-8.1
        description: Keycloak supports authenicating non-orgaizational users through
          supporting mTLS signed by external certificate authorities.
      - uuid: c2976939-842a-4efc-afd3-11dc9892fb86
        control-id: ia-11
        description: Keycloak supports OIDC/SAML which support expiration dates in
          tokens/assertions.
  back-matter:
    resources:
    - uuid: C322D234-BD2A-4332-B8A9-54D45E7148B8
      title: Big Bang
      rlinks:
      - href: https://repo1.dso.mil/platform-one/big-bang/bigbang