Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

It's time to embrace OSCAL automation for effective risk management

By Dale Hoak
Two people writing on whiteboard

Image via Unsplash

October 17, 2024

The National Institute of Standards and Technology (NIST) put forward the Open Security Controls Assessment Language (OSCAL) standard in 2021, creating a standardized machine readable language. The goal of the standard is to enable automation and facilitate interoperability between different security assessment tools. It also aims to enable real-time machine to machine data exchange, improving automation and interoperability across various compliance frameworks.

There are a multitude of regulatory standards and frameworks that organizations must adhere to, all periodically updated. Keeping up with all these changes is quite difficult, and many organizations find it challenging to comply quickly with increasingly stringent security requirements. Historically, compliance has often lagged behind security and even further behind new technological advancements. As more organizations work to meet Federal Risk and Authorization Management Program (FedRAMP) requirements for cloud products and services, it’s vital to face these compliance challenges head on. 

In late July, the Office of Management and Budget (OMB) released a new memorandum modernizing FedRAMP to help with these efforts. Part of that memo focused on automation through machine-readable Risk Management Framework (RMF) documents. In other words, compliance as code. This memo is essentially the first compliance as code mandate for OSCAL, recognizing its ability to transform compliance as we know it.

Automate repetitive and time-consuming tasks

OSCAL’s machine-readable representations of security controls, assessment plans and documentation in standardized formats (such as XML, JSON and YAML) enables users to automate the creation, management and updating of compliance documentation. This automation dramatically reduces the amount of manual effort required to comply with multiple regulatory requirements and the inevitable errors that accompany such efforts. In addition, the OSCAL standard facilitates interoperability between different security tools and platforms. This interoperability enables seamless data exchange and integration, which allows organizations to automate the collection and analysis of compliance data across multiple systems and frameworks. 

OSCAL is a machine readable language that supports the automating reporting of continuous monitoring by providing up-to-date information about the security posture of systems. This allows organizations to provide real-time compliance assessments and reduces (or eliminates) the need for periodic manual reviews. It also enables automation of both the validation of security controls and the generation of reports, such as System Security Plans (SSPs) and Security Assessment Plans (SAPs). This level of automation ensures consistency and accuracy in compliance documentation, which frees up the compliance team to focus on more complex tasks. 

Implementing OSCAL-enabled tools provides the technology needed to eliminate the inevitable inconsistencies so common in manually created security documentation as well as improve automation and interoperability across multiple compliance frameworks. To maximize the benefits of adopting the standard, security leaders need to understand the challenges organizations commonly face, identify ways to address those challenges, and ensure that internal training is available to accelerate adoption and minimize the friction involved in adopting the OSCAL framework. 

Initial challenges adopting OSCAL

The biggest initial challenge is change itself. The problem is that most compliance teams are so accustomed to Excel spreadsheets and manual processes that it’s hard to understand and accept the change to machine to machine data exchange. There are a few ways to address these challenges. 

  1. First, clarify that OSCAL is increasingly recognized as an acceptable standard in the cybersecurity community and adoption is growing, particularly given the new OMB guidance. 
  2. Next, evaluate current business practices and determine whether the company would save time by embracing the OSCAL standard. This can be done by documenting the time spent on manual compliance tasks, such as data entry, report generation, control assessments, and analyzing formats. Then estimate how much time may be saved by automating these tasks.
  3. Demonstrate (using a vendor solution or by referencing a case study) how the same information an Authorizing Official might require three to six months to validate manually can be completed in moments with OSCAL-enabled tooling. Using the OSCAL standard, validating Authority to Operate (ATO) formats and data fields is a quick and straightforward process.
  4. Finally, evaluate resource availability. Compliance teams will find immediate business value using OSCAL for machine to machine data exchange because it dramatically reduces the time required to evaluate compliance and prepare for external audits.

To get started, look at the OSCAL section of the NIST website, which spells out exactly what OSCAL is, what the baseline is, and how different components work. Encourage teams to get involved with OSCAL working groups. By participating, compliance teams can help to increase adoption of OSCAL and help the standard develop. Before choosing a new compliance tool, validate that the tool supports OSCAL and meets the specific needs of the company. Make sure to choose a vendor that is involved in developing the standard and is keeping their solutions up to date with the latest changes.

Internal OSCAL training 

There are a lot of videos, presentations and blogs as well as walkthrough tutorials available on the NIST website to help people learn about OSCAL and how to use it. These resources can be used to build the foundation of internal training programs. Consider hosting internal workshops using NIST materials, which should cover the integration of OSCAL-compliant solutions with existing systems, the use of OSCAL models, and what benefits the organization will realize from automating compliance processes. 

Social networking is another helpful way to learn about and become more comfortable with OSCAL. Try to ensure multiple team members are involved in NIST’s OSCAL working groups, where they will learn a lot about how to get started just by listening and asking questions. Engage with the OSCAL community and vendors in the space, who may be able to provide additional support and training sessions tailored to your business requirements. Finally, create an internal community or platform where employees can share their knowledge and ask questions. This might be as simple as a Slack channel, setting up informal Q&A sessions, or creating collaborative projects to encourage peer learning and continuous improvements of compliance efforts. 

Leverage OSCAL to manage risk

While some compliance teams may still be hesitant to adopt the relatively new OSCAL standard, the new OMB guidance on automation through machine-readable RMF documents for FedRAMP certification underscores the many benefits it delivers. This article outlines a few ways you can help your compliance team come to understand and leverage everything OSCAL has to offer. For any business that operates an audit or authorization function, the time has come to embrace OSCAL and leave manual processes behind. This transition will enable organizations to manage risk effectively even in an evolving threat and technological landscape.

KEYWORDS: automation automation and security compliance compliance problems compliance tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dale hoak headshot

Dale Hoak is the Director of Information Security at RegScale. Image courtesy of Hoak

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Whistleblower Word Cloud

    It's Time to Embrace Cybersecurity Whistleblowers

    See More
  • lights coming out of server

    The power of automation for better vendor risk management

    See More
  • computer

    It’s time to assess and mitigate climate risk

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing