πΌ SA-9 External System Services
Descriptionβ
a. Require that providers of external system services comply with organizational security and privacy requirements and employ the following controls: [Assignment: organization-defined controls];
b. Define and document organizational oversight and user roles and responsibilities with regard to external system services; and
c. Employ the following processes, methods, and techniques to monitor control compliance by external service providers on an ongoing basis: [Assignment: organization-defined processes, methods, and techniques].
Similarβ
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
πΌ FedRAMP High Security Controls β πΌ SA-9 External System Services (L)(M)(H) | 3 | | 1 | |
πΌ FedRAMP Low Security Controls β πΌ SA-9 External System Services (L)(M)(H) | | | | |
πΌ NIST CSF v2.0 β πΌ DE.CM-06: External service provider activities and services are monitored to find potentially adverse events | | | 27 | |
πΌ NIST CSF v2.0 β πΌ GV.OC-05: Outcomes, capabilities, and services that the organization depends on are understood and communicated | | | 4 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-04: Suppliers are known and prioritized by criticality | | | 7 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-05: Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-06: Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-07: The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship | | | 26 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-08: Relevant suppliers and other third parties are included in incident planning, response, and recovery activities | | | 1 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement | | | | |
πΌ NIST CSF v2.0 β πΌ ID.AM-02: Inventories of software, services, and systems managed by the organization are maintained | | | 7 | |
πΌ NIST CSF v2.0 β πΌ ID.AM-04: Inventories of services provided by suppliers are maintained | | | | |
Sub Sectionsβ