// Level 3 · Controls

System and Services Acquisition

NIST SP 800-53 Rev 5 System and Services Acquisition controls.

SA-01Medium

Policy and Procedures

Develop, document, and disseminate to [parameter]:

SA-02Medium

Allocation of Resources

Determine the high-level information security and privacy requirements for the system or system service in mission and business process planning;

SA-03Medium

System Development Life Cycle

Acquire, develop, and manage the system using [parameter] that incorporates information security and privacy considerations;

SA-04Medium

Acquisition Process

Include the following requirements, descriptions, and criteria, explicitly or by reference, using [parameter] in the acquisition contract for the system, system component, or system service:

SA-05Medium

System Documentation

Obtain or develop administrator documentation for the system, system component, or system service that describes:

SA-06Medium

Software Usage Restrictions

Software Usage Restrictions

SA-07Medium

User-installed Software

User-installed Software

SA-08Medium

Security and Privacy Engineering Principles

Apply the following systems security and privacy engineering principles in the specification, design, development, implementation, and modification of the system and system components: [parameter].

SA-09Medium

External System Services

Require that providers of external system services comply with organizational security and privacy requirements and employ the following controls: [parameter];

SA-10Medium

Developer Configuration Management

Require the developer of the system, system component, or system service to:

SA-11Medium

Developer Testing and Evaluation

Require the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to:

SA-12Medium

Supply Chain Protection

Supply Chain Protection

SA-13Medium

Trustworthiness

Trustworthiness

SA-14Medium

Criticality Analysis

Criticality Analysis

SA-15Medium

Development Process, Standards, and Tools

Require the developer of the system, system component, or system service to follow a documented development process that:

SA-16Medium

Developer-provided Training

Require the developer of the system, system component, or system service to provide the following training on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms: [parameter].

SA-17Medium

Developer Security and Privacy Architecture and Design

Require the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that:

SA-18Medium

Tamper Resistance and Detection

Tamper Resistance and Detection

SA-19Medium

Component Authenticity

Component Authenticity

SA-20Medium

Customized Development of Critical Components

Reimplement or custom develop the following critical system components: [parameter].

SA-21Medium

Developer Screening

Require that the developer of [parameter]:

SA-22Medium

Unsupported System Components

Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer; or

SA-23Medium

Specialization

Employ [parameter] on [parameter] supporting mission essential services or functions to increase the trustworthiness in those systems or components.

SA-24Medium

Design For Cyber Resiliency

Design organizational systems, system components, or system services to achieve cyber resiliency by: