Catalog: NIST SP 800-53 Rev 5 | Controls: 23
| Control ID | Title / Statement | Priority | Baseline Impact |
|---|---|---|---|
| SA-01 |
Policy and Procedures
|
P1 | L M H |
| SA-02 |
Allocation of Resources
|
P1 | L M H |
| SA-03 |
System Development Life Cycle
|
P1 | L M H |
| SA-04 |
Acquisition Process
|
P1 | L M H |
| SA-05 |
System Documentation
|
P2 | L M H |
| SA-06 |
Withdrawn
|
P0 | — |
| SA-07 |
Withdrawn
|
P0 | — |
| SA-08 |
Security and Privacy Engineering Principles
|
P1 | L M H |
| SA-09 |
External System Services
|
P1 | L M H |
| SA-10 |
Developer Configuration Management
|
P1 | M H |
| SA-11 |
Developer Testing and Evaluation
|
P1 | M H |
| SA-12 |
Developer Implementation, Testing, and Evaluation
|
P0 | — |
| SA-13 |
Supply Chain Protection
|
P1 | H |
| SA-14 |
Trustworthiness
|
P0 | — |
| SA-15 |
Development Process, Standards, and Tools
|
P2 | M H |
| SA-16 |
Developer-Provided Training
|
P0 | — |
| SA-17 |
Developer Security and Privacy Architecture and Design
|
P1 | H |
| SA-18 |
Tamper Resistance and Detection
|
P0 | — |
| SA-19 |
Component Authenticity
|
P1 | M H |
| SA-20 |
Customized Development of Critical Components
|
P0 | — |
| SA-21 |
Developer Screening
|
P0 | — |
| SA-22 |
Unsupported System Components
|
P1 | L M H |
| SA-23 |
Controlled Use of Interfaces
|
P0 | — |