Skip to main content

πŸ’Ό SA-5 INFORMATION SYSTEM DOCUMENTATION

Description​

The organization: SA-5a. Obtains administrator documentation for the information system, system component, or information system service that describes: SA-5a.1. Secure configuration, installation, and operation of the system, component, or service; SA-5a.2. Effective use and maintenance of security functions/mechanisms; and SA-5a.3. Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions; SA-5b. Obtains user documentation for the information system, system component, or information system service that describes: SA-5b.1. User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms; SA-5b.2. Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and SA-5b.3. User responsibilities in maintaining the security of the system, component, or service; SA-5c. Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes [Assignment: organization-defined actions] in response; SA-5d. Protects documentation as required, in accordance with the risk management strategy; and SA-5e. Distributes documentation to [Assignment: organization-defined personnel or roles].

Similar​

  • Internal
    • ID: dec-c-1696a31e

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό ID.RA-1: Asset vulnerabilities are identified and documented1415

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SA-5 (1) FUNCTIONAL PROPERTIES OF SECURITY CONTROLS
πŸ’Ό SA-5 (2) SECURITY-RELEVANT EXTERNAL SYSTEM INTERFACES
πŸ’Ό SA-5 (3) HIGH-LEVEL DESIGN
πŸ’Ό SA-5 (4) LOW-LEVEL DESIGN
πŸ’Ό SA-5 (5) SOURCE CODE