Skip to main content

💼 SA System And Services Acquisition

  • Contextual name: 💼 SA System And Services Acquisition
  • ID: /frameworks/nist-sp-800-53-r5/sa
  • Located in: 💼 NIST SP 800-53 Revision 5

Description

Empty...

Similar

  • Internal
    • ID: dec-b-3e675687

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 SA-1 Policy and Procedures
💼 SA-2 Allocation of Resources
💼 SA-3 System Development Life Cycle3
    💼 SA-3(1) System Development Life Cycle _ Manage Preproduction Environment
    💼 SA-3(2) System Development Life Cycle _ Use of Live or Operational Data
    💼 SA-3(3) System Development Life Cycle _ Technology Refresh
💼 SA-4 Acquisition Process12
    💼 SA-4(1) Acquisition Process _ Functional Properties of Controls
    💼 SA-4(2) Acquisition Process _ Design and Implementation Information for Controls
    💼 SA-4(3) Acquisition Process _ Development Methods, Techniques, and Practices
    💼 SA-4(4) Acquisition Process _ Assignment of Components to Systems
    💼 SA-4(5) Acquisition Process _ System, Component, and Service Configurations
    💼 SA-4(6) Acquisition Process _ Use of Information Assurance Products
    💼 SA-4(7) Acquisition Process _ NIAP-approved Protection Profiles
    💼 SA-4(8) Acquisition Process _ Continuous Monitoring Plan for Controls
    💼 SA-4(9) Acquisition Process _ Functions, Ports, Protocols, and Services in Use
    💼 SA-4(10) Acquisition Process _ Use of Approved PIV Products
    💼 SA-4(11) Acquisition Process _ System of Records
    💼 SA-4(12) Acquisition Process _ Data Ownership
💼 SA-5 System Documentation5
    💼 SA-5(1) System Documentation _ Functional Properties of Security Controls
    💼 SA-5(2) System Documentation _ Security-relevant External System Interfaces
    💼 SA-5(3) System Documentation _ High-level Design
    💼 SA-5(4) System Documentation _ Low-level Design
    💼 SA-5(5) System Documentation _ Source Code
💼 SA-6 Software Usage Restrictions
💼 SA-7 User-installed Software
💼 SA-8 Security and Privacy Engineering Principles33
    💼 SA-8(1) Security and Privacy Engineering Principles _ Clear Abstractions
    💼 SA-8(2) Security and Privacy Engineering Principles _ Least Common Mechanism
    💼 SA-8(3) Security and Privacy Engineering Principles _ Modularity and Layering
    💼 SA-8(4) Security and Privacy Engineering Principles _ Partially Ordered Dependencies
    💼 SA-8(5) Security and Privacy Engineering Principles _ Efficiently Mediated Access
    💼 SA-8(6) Security and Privacy Engineering Principles _ Minimized Sharing
    💼 SA-8(7) Security and Privacy Engineering Principles _ Reduced Complexity
    💼 SA-8(8) Security and Privacy Engineering Principles _ Secure Evolvability
    💼 SA-8(9) Security and Privacy Engineering Principles _ Trusted Components
    💼 SA-8(10) Security and Privacy Engineering Principles _ Hierarchical Trust
    💼 SA-8(11) Security and Privacy Engineering Principles _ Inverse Modification Threshold
    💼 SA-8(12) Security and Privacy Engineering Principles _ Hierarchical Protection
    💼 SA-8(13) Security and Privacy Engineering Principles _ Minimized Security Elements
    💼 SA-8(14) Security and Privacy Engineering Principles _ Least Privilege
    💼 SA-8(15) Security and Privacy Engineering Principles _ Predicate Permission
    💼 SA-8(16) Security and Privacy Engineering Principles _ Self-reliant Trustworthiness
    💼 SA-8(17) Security and Privacy Engineering Principles _ Secure Distributed Composition
    💼 SA-8(18) Security and Privacy Engineering Principles _ Trusted Communications Channels
    💼 SA-8(19) Security and Privacy Engineering Principles _ Continuous Protection
    💼 SA-8(20) Security and Privacy Engineering Principles _ Secure Metadata Management
    💼 SA-8(21) Security and Privacy Engineering Principles _ Self-analysis
    💼 SA-8(22) Security and Privacy Engineering Principles _ Accountability and Traceability1
    💼 SA-8(23) Security and Privacy Engineering Principles _ Secure Defaults
    💼 SA-8(24) Security and Privacy Engineering Principles _ Secure Failure and Recovery
    💼 SA-8(25) Security and Privacy Engineering Principles _ Economic Security
    💼 SA-8(26) Security and Privacy Engineering Principles _ Performance Security
    💼 SA-8(27) Security and Privacy Engineering Principles _ Human Factored Security
    💼 SA-8(28) Security and Privacy Engineering Principles _ Acceptable Security
    💼 SA-8(29) Security and Privacy Engineering Principles _ Repeatable and Documented Procedures
    💼 SA-8(30) Security and Privacy Engineering Principles _ Procedural Rigor
    💼 SA-8(31) Security and Privacy Engineering Principles _ Secure System Modification
    💼 SA-8(32) Security and Privacy Engineering Principles _ Sufficient Documentation
    💼 SA-8(33) Security and Privacy Engineering Principles _ Minimization
💼 SA-9 External System Services8
    💼 SA-9(1) External System Services _ Risk Assessments and Organizational Approvals
    💼 SA-9(2) External System Services _ Identification of Functions, Ports, Protocols, and Services
    💼 SA-9(3) External System Services _ Establish and Maintain Trust Relationship with Providers
    💼 SA-9(4) External System Services _ Consistent Interests of Consumers and Providers
    💼 SA-9(5) External System Services _ Processing, Storage, and Service Location11
    💼 SA-9(6) External System Services _ Organization-controlled Cryptographic Keys
    💼 SA-9(7) External System Services _ Organization-controlled Integrity Checking
    💼 SA-9(8) External System Services _ Processing and Storage Location — U.S. Jurisdiction
💼 SA-10 Developer Configuration Management7
    💼 SA-10(1) Developer Configuration Management _ Software and Firmware Integrity Verification
    💼 SA-10(2) Developer Configuration Management _ Alternative Configuration Management Processes
    💼 SA-10(3) Developer Configuration Management _ Hardware Integrity Verification
    💼 SA-10(4) Developer Configuration Management _ Trusted Generation
    💼 SA-10(5) Developer Configuration Management _ Mapping Integrity for Version Control
    💼 SA-10(6) Developer Configuration Management _ Trusted Distribution
    💼 SA-10(7) Developer Configuration Management _ Security and Privacy Representatives
💼 SA-11 Developer Testing and Evaluation9
    💼 SA-11(1) Developer Testing and Evaluation _ Static Code Analysis
    💼 SA-11(2) Developer Testing and Evaluation _ Threat Modeling and Vulnerability Analyses
    💼 SA-11(3) Developer Testing and Evaluation _ Independent Verification of Assessment Plans and Evidence
    💼 SA-11(4) Developer Testing and Evaluation _ Manual Code Reviews
    💼 SA-11(5) Developer Testing and Evaluation _ Penetration Testing
    💼 SA-11(6) Developer Testing and Evaluation _ Attack Surface Reviews
    💼 SA-11(7) Developer Testing and Evaluation _ Verify Scope of Testing and Evaluation
    💼 SA-11(8) Developer Testing and Evaluation _ Dynamic Code Analysis
    💼 SA-11(9) Developer Testing and Evaluation _ Interactive Application Security Testing
💼 SA-12 Supply Chain Protection15
    💼 SA-12(1) Supply Chain Protection _ Acquisition Strategies / Tools / Methods
    💼 SA-12(2) Supply Chain Protection _ Supplier Reviews
    💼 SA-12(3) Supply Chain Protection _ Trusted Shipping and Warehousing
    💼 SA-12(4) Supply Chain Protection _ Diversity of Suppliers
    💼 SA-12(5) Supply Chain Protection _ Limitation of Harm
    💼 SA-12(6) Supply Chain Protection _ Minimizing Procurement Time
    💼 SA-12(7) Supply Chain Protection _ Assessments Prior to Selection / Acceptance / Update
    💼 SA-12(8) Supply Chain Protection _ Use of All-source Intelligence
    💼 SA-12(9) Supply Chain Protection _ Operations Security
    💼 SA-12(10) Supply Chain Protection _ Validate as Genuine and Not Altered
    💼 SA-12(11) Supply Chain Protection _ Penetration Testing / Analysis of Elements, Processes, and Actors
    💼 SA-12(12) Supply Chain Protection _ Inter-organizational Agreements
    💼 SA-12(13) Supply Chain Protection _ Critical Information System Components
    💼 SA-12(14) Supply Chain Protection _ Identity and Traceability
    💼 SA-12(15) Supply Chain Protection _ Processes to Address Weaknesses or Deficiencies
💼 SA-13 Trustworthiness
💼 SA-14 Criticality Analysis1
    💼 SA-14(1) Criticality Analysis _ Critical Components with No Viable Alternative Sourcing
💼 SA-15 Development Process, Standards, and Tools12
    💼 SA-15(1) Development Process, Standards, and Tools _ Quality Metrics
    💼 SA-15(2) Development Process, Standards, and Tools _ Security and Privacy Tracking Tools
    💼 SA-15(3) Development Process, Standards, and Tools _ Criticality Analysis
    💼 SA-15(4) Development Process, Standards, and Tools _ Threat Modeling and Vulnerability Analysis
    💼 SA-15(5) Development Process, Standards, and Tools _ Attack Surface Reduction
    💼 SA-15(6) Development Process, Standards, and Tools _ Continuous Improvement
    💼 SA-15(7) Development Process, Standards, and Tools _ Automated Vulnerability Analysis
    💼 SA-15(8) Development Process, Standards, and Tools _ Reuse of Threat and Vulnerability Information
    💼 SA-15(9) Development Process, Standards, and Tools _ Use of Live Data
    💼 SA-15(10) Development Process, Standards, and Tools _ Incident Response Plan
    💼 SA-15(11) Development Process, Standards, and Tools _ Archive System or Component
    💼 SA-15(12) Development Process, Standards, and Tools _ Minimize Personally Identifiable Information
💼 SA-16 Developer-provided Training
💼 SA-17 Developer Security and Privacy Architecture and Design9
    💼 SA-17(1) Developer Security and Privacy Architecture and Design _ Formal Policy Model
    💼 SA-17(2) Developer Security and Privacy Architecture and Design _ Security-relevant Components
    💼 SA-17(3) Developer Security and Privacy Architecture and Design _ Formal Correspondence
    💼 SA-17(4) Developer Security and Privacy Architecture and Design _ Informal Correspondence
    💼 SA-17(5) Developer Security and Privacy Architecture and Design _ Conceptually Simple Design
    💼 SA-17(6) Developer Security and Privacy Architecture and Design _ Structure for Testing
    💼 SA-17(7) Developer Security and Privacy Architecture and Design _ Structure for Least Privilege
    💼 SA-17(8) Developer Security and Privacy Architecture and Design _ Orchestration
    💼 SA-17(9) Developer Security and Privacy Architecture and Design _ Design Diversity
💼 SA-18 Tamper Resistance and Detection2
    💼 SA-18(1) Tamper Resistance and Detection _ Multiple Phases of System Development Life Cycle
    💼 SA-18(2) Tamper Resistance and Detection _ Inspection of Systems or Components
💼 SA-19 Component Authenticity4
    💼 SA-19(1) Component Authenticity _ Anti-counterfeit Training
    💼 SA-19(2) Component Authenticity _ Configuration Control for Component Service and Repair
    💼 SA-19(3) Component Authenticity _ Component Disposal
    💼 SA-19(4) Component Authenticity _ Anti-counterfeit Scanning
💼 SA-20 Customized Development of Critical Components
💼 SA-21 Developer Screening1
    💼 SA-21(1) Developer Screening _ Validation of Screening
💼 SA-22 Unsupported System Components1
    💼 SA-22(1) Unsupported System Components _ Alternative Sources for Continued Support
💼 SA-23 Specialization