Skip to main content

๐Ÿ’ผ SA SYSTEM AND SERVICES ACQUISITION

  • Contextual name: ๐Ÿ’ผ SA SYSTEM AND SERVICES ACQUISITION
  • ID: /frameworks/nist-sp-800-53-r4/sa
  • Located in: ๐Ÿ’ผ NIST SP 800-53 Revision 4

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-edb9ba48

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ SA-1 SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES
๐Ÿ’ผ SA-2 ALLOCATION OF RESOURCES
๐Ÿ’ผ SA-3 SYSTEM DEVELOPMENT LIFE CYCLE
๐Ÿ’ผ SA-4 ACQUISITION PROCESS10
    ๐Ÿ’ผ SA-4 (1) FUNCTIONAL PROPERTIES OF SECURITY CONTROLS
    ๐Ÿ’ผ SA-4 (2) DESIGN _ IMPLEMENTATION INFORMATION FOR SECURITY CONTROLS
    ๐Ÿ’ผ SA-4 (3) DEVELOPMENT METHODS _ TECHNIQUES _ PRACTICES
    ๐Ÿ’ผ SA-4 (4) ASSIGNMENT OF COMPONENTS TO SYSTEMS
    ๐Ÿ’ผ SA-4 (5) SYSTEM _ COMPONENT _ SERVICE CONFIGURATIONS
    ๐Ÿ’ผ SA-4 (6) USE OF INFORMATION ASSURANCE PRODUCTS
    ๐Ÿ’ผ SA-4 (7) NIAP-APPROVED PROTECTION PROFILES
    ๐Ÿ’ผ SA-4 (8) CONTINUOUS MONITORING PLAN
    ๐Ÿ’ผ SA-4 (9) FUNCTIONS _ PORTS _ PROTOCOLS _ SERVICES IN USE
    ๐Ÿ’ผ SA-4 (10) USE OF APPROVED PIV PRODUCTS
๐Ÿ’ผ SA-5 INFORMATION SYSTEM DOCUMENTATION5
    ๐Ÿ’ผ SA-5 (1) FUNCTIONAL PROPERTIES OF SECURITY CONTROLS
    ๐Ÿ’ผ SA-5 (2) SECURITY-RELEVANT EXTERNAL SYSTEM INTERFACES
    ๐Ÿ’ผ SA-5 (3) HIGH-LEVEL DESIGN
    ๐Ÿ’ผ SA-5 (4) LOW-LEVEL DESIGN
    ๐Ÿ’ผ SA-5 (5) SOURCE CODE
๐Ÿ’ผ SA-6 SOFTWARE USAGE RESTRICTIONS
๐Ÿ’ผ SA-7 USER-INSTALLED SOFTWARE
๐Ÿ’ผ SA-8 SECURITY ENGINEERING PRINCIPLES
๐Ÿ’ผ SA-9 EXTERNAL INFORMATION SYSTEM SERVICES5
    ๐Ÿ’ผ SA-9 (1) RISK ASSESSMENTS _ ORGANIZATIONAL APPROVALS
    ๐Ÿ’ผ SA-9 (2) IDENTIFICATION OF FUNCTIONS _ PORTS _ PROTOCOLS _ SERVICES
    ๐Ÿ’ผ SA-9 (3) ESTABLISH _ MAINTAIN TRUST RELATIONSHIP WITH PROVIDERS
    ๐Ÿ’ผ SA-9 (4) CONSISTENT INTERESTS OF CONSUMERS AND PROVIDERS
    ๐Ÿ’ผ SA-9 (5) PROCESSING, STORAGE, AND SERVICE LOCATION
๐Ÿ’ผ SA-10 DEVELOPER CONFIGURATION MANAGEMENT6
    ๐Ÿ’ผ SA-10 (1) SOFTWARE _ FIRMWARE INTEGRITY VERIFICATION
    ๐Ÿ’ผ SA-10 (2) ALTERNATIVE CONFIGURATION MANAGEMENT PROCESSES
    ๐Ÿ’ผ SA-10 (3) HARDWARE INTEGRITY VERIFICATION
    ๐Ÿ’ผ SA-10 (4) TRUSTED GENERATION
    ๐Ÿ’ผ SA-10 (5) MAPPING INTEGRITY FOR VERSION CONTROL
    ๐Ÿ’ผ SA-10 (6) TRUSTED DISTRIBUTION
๐Ÿ’ผ SA-11 DEVELOPER SECURITY TESTING AND EVALUATION8
    ๐Ÿ’ผ SA-11 (1) STATIC CODE ANALYSIS
    ๐Ÿ’ผ SA-11 (2) THREAT AND VULNERABILITY ANALYSES
    ๐Ÿ’ผ SA-11 (3) INDEPENDENT VERIFICATION OF ASSESSMENT PLANS _ EVIDENCE
    ๐Ÿ’ผ SA-11 (4) MANUAL CODE REVIEWS
    ๐Ÿ’ผ SA-11 (5) PENETRATION TESTING
    ๐Ÿ’ผ SA-11 (6) ATTACK SURFACE REVIEWS
    ๐Ÿ’ผ SA-11 (7) VERIFY SCOPE OF TESTING _ EVALUATION
    ๐Ÿ’ผ SA-11 (8) DYNAMIC CODE ANALYSIS
๐Ÿ’ผ SA-12 SUPPLY CHAIN PROTECTION15
    ๐Ÿ’ผ SA-12 (1) ACQUISITION STRATEGIES _ TOOLS _ METHODS
    ๐Ÿ’ผ SA-12 (2) SUPPLIER REVIEWS
    ๐Ÿ’ผ SA-12 (3) TRUSTED SHIPPING AND WAREHOUSING
    ๐Ÿ’ผ SA-12 (4) DIVERSITY OF SUPPLIERS
    ๐Ÿ’ผ SA-12 (5) LIMITATION OF HARM
    ๐Ÿ’ผ SA-12 (6) MINIMIZING PROCUREMENT TIME
    ๐Ÿ’ผ SA-12 (7) ASSESSMENTS PRIOR TO SELECTION _ ACCEPTANCE _ UPDATE
    ๐Ÿ’ผ SA-12 (8) USE OF ALL-SOURCE INTELLIGENCE
    ๐Ÿ’ผ SA-12 (9) OPERATIONS SECURITY
    ๐Ÿ’ผ SA-12 (10) VALIDATE AS GENUINE AND NOT ALTERED
    ๐Ÿ’ผ SA-12 (11) PENETRATION TESTING _ ANALYSIS OF ELEMENTS, PROCESSES, AND ACTORS
    ๐Ÿ’ผ SA-12 (12) INTER-ORGANIZATIONAL AGREEMENTS
    ๐Ÿ’ผ SA-12 (13) CRITICAL INFORMATION SYSTEM COMPONENTS
    ๐Ÿ’ผ SA-12 (14) IDENTITY AND TRACEABILITY
    ๐Ÿ’ผ SA-12 (15) PROCESSES TO ADDRESS WEAKNESSES OR DEFICIENCIES
๐Ÿ’ผ SA-13 TRUSTWORTHINESS
๐Ÿ’ผ SA-14 CRITICALITY ANALYSIS1
    ๐Ÿ’ผ SA-14 (1) CRITICAL COMPONENTS WITH NO VIABLE ALTERNATIVE SOURCING
๐Ÿ’ผ SA-15 DEVELOPMENT PROCESS, STANDARDS, AND TOOLS11
    ๐Ÿ’ผ SA-15 (1) QUALITY METRICS
    ๐Ÿ’ผ SA-15 (2) SECURITY TRACKING TOOLS
    ๐Ÿ’ผ SA-15 (3) CRITICALITY ANALYSIS
    ๐Ÿ’ผ SA-15 (4) THREAT MODELING _ VULNERABILITY ANALYSIS
    ๐Ÿ’ผ SA-15 (5) ATTACK SURFACE REDUCTION
    ๐Ÿ’ผ SA-15 (6) CONTINUOUS IMPROVEMENT
    ๐Ÿ’ผ SA-15 (7) AUTOMATED VULNERABILITY ANALYSIS
    ๐Ÿ’ผ SA-15 (8) REUSE OF THREAT _ VULNERABILITY INFORMATION
    ๐Ÿ’ผ SA-15 (9) USE OF LIVE DATA
    ๐Ÿ’ผ SA-15 (10) INCIDENT RESPONSE PLAN
    ๐Ÿ’ผ SA-15 (11) ARCHIVE INFORMATION SYSTEM _ COMPONENT
๐Ÿ’ผ SA-16 DEVELOPER-PROVIDED TRAINING
๐Ÿ’ผ SA-17 DEVELOPER SECURITY ARCHITECTURE AND DESIGN7
    ๐Ÿ’ผ SA-17 (1) FORMAL POLICY MODEL
    ๐Ÿ’ผ SA-17 (2) SECURITY-RELEVANT COMPONENTS
    ๐Ÿ’ผ SA-17 (3) FORMAL CORRESPONDENCE
    ๐Ÿ’ผ SA-17 (4) INFORMAL CORRESPONDENCE
    ๐Ÿ’ผ SA-17 (5) CONCEPTUALLY SIMPLE DESIGN
    ๐Ÿ’ผ SA-17 (6) STRUCTURE FOR TESTING
    ๐Ÿ’ผ SA-17 (7) STRUCTURE FOR LEAST PRIVILEGE
๐Ÿ’ผ SA-18 TAMPER RESISTANCE AND DETECTION2
    ๐Ÿ’ผ SA-18 (1) MULTIPLE PHASES OF SDLC
    ๐Ÿ’ผ SA-18 (2) INSPECTION OF INFORMATION SYSTEMS, COMPONENTS, OR DEVICES
๐Ÿ’ผ SA-19 COMPONENT AUTHENTICITY4
    ๐Ÿ’ผ SA-19 (1) ANTI-COUNTERFEIT TRAINING
    ๐Ÿ’ผ SA-19 (2) CONFIGURATION CONTROL FOR COMPONENT SERVICE _ REPAIR
    ๐Ÿ’ผ SA-19 (3) COMPONENT DISPOSAL
    ๐Ÿ’ผ SA-19 (4) ANTI-COUNTERFEIT SCANNING
๐Ÿ’ผ SA-20 CUSTOMIZED DEVELOPMENT OF CRITICAL COMPONENTS
๐Ÿ’ผ SA-21 DEVELOPER SCREENING1
    ๐Ÿ’ผ SA-21 (1) VALIDATION OF SCREENING
๐Ÿ’ผ SA-22 UNSUPPORTED SYSTEM COMPONENTS1
    ๐Ÿ’ผ SA-22 (1) ALTERNATIVE SOURCES FOR CONTINUED SUPPORT