Catalog: Electronic (OSCAL) Version of NIST SP 800-53 Rev 5.2.0 Controls and SP 800-53A Rev 5.2.0 Assessment Procedures | Controls: 262
| Control ID | Title / Statement | Priority | Baseline Impact | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| SA-01 |
Policy and Procedures
9 params
a. Develop, document, and disseminate to {{ insert: param, sa-1_prm_1 }}:
1. {{ insert: param, sa-01_odp.03 }} system and services acquisition policy that:
(a) Addresses purpose, scope,...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-02 |
Allocation of Resources
a. Determine the high-level information security and privacy requirements for the system or system service in mission and business process planning;
b. Determine, document, and allocate the res...
|
— | — | ||||||||||||||||||||||||||||||
| SA-03 |
System Development Life Cycle
1 param
a. Acquire, develop, and manage the system using {{ insert: param, sa-03_odp }} that incorporates information security and privacy considerations;
b. Define and document information security an...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-03(01) |
Manage Preproduction Environment
Protect system preproduction environments commensurate with risk throughout the system development life cycle for the system, system component, or system service.
|
— | — | ||||||||||||||||||||||||||||||
| SA-03(02) |
Use of Live or Operational Data
(a) Approve, document, and control the use of live data in preproduction environments for the system, system component, or system service; and
(b) Protect preproduction environments for the sys...
|
— | — | ||||||||||||||||||||||||||||||
| SA-03(03) |
Technology Refresh
Plan for and implement a technology refresh schedule for the system throughout the system development life cycle.
|
— | — | ||||||||||||||||||||||||||||||
| SA-04 |
Acquisition Process
2 params
Include the following requirements, descriptions, and criteria, explicitly or by reference, using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(01) |
Functional Properties of Controls
Require the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(02) |
Design and Implementation Information for Controls
3 params
Require the developer of the system, system component, or system service to provide design and implementation information for the controls that includes: {{ insert: param, sa-04.02_odp.01 }} at {{ ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(03) |
Development Methods, Techniques, and Practices
8 params
Require the developer of the system, system component, or system service to demonstrate the use of a system development life cycle process that includes:
(a) {{ insert: param, sa-04.03_odp.01 }};...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(04) |
Assignment of Components to Systems
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(05) |
System, Component, and Service Configurations
1 param
Require the developer of the system, system component, or system service to:
(a) Deliver the system, component, or service with {{ insert: param, sa-04.05_odp }} implemented; and
(b) Use the co...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(06) |
Use of Information Assurance Products
(a) Employ only government off-the-shelf or commercial off-the-shelf information assurance and information assurance-enabled information technology products that compose an NSA-approved solution ...
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(07) |
NIAP-approved Protection Profiles
(a) Limit the use of commercially provided information assurance and information assurance-enabled information technology products to those products that have been successfully evaluated against ...
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(08) |
Continuous Monitoring Plan for Controls
Require the developer of the system, system component, or system service to produce a plan for continuous monitoring of control effectiveness that is consistent with the continuous monitoring progr...
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(09) |
Functions, Ports, Protocols, and Services in Use
Require the developer of the system, system component, or system service to identify the functions, ports, protocols, and services intended for organizational use.
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(10) |
Use of Approved PIV Products
Employ only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational systems.
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(11) |
System of Records
1 param
Include {{ insert: param, sa-04.11_odp }} in the acquisition contract for the operation of a system of records on behalf of an organization to accomplish an organizational mission or function.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-04(12) |
Data Ownership
1 param
(a) Include organizational data ownership requirements in the acquisition contract; and
(b) Require all data to be removed from the contractor’s system and returned to the organization within {...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-05 |
System Documentation
2 params
a. Obtain or develop administrator documentation for the system, system component, or system service that describes:
1. Secure configuration, installation, and operation of the system, compon...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-05(01) |
Functional Properties of Security Controls
|
— | — | ||||||||||||||||||||||||||||||
| SA-05(02) |
Security-relevant External System Interfaces
|
— | — | ||||||||||||||||||||||||||||||
| SA-05(03) |
High-level Design
|
— | — | ||||||||||||||||||||||||||||||
| SA-05(04) |
Low-level Design
|
— | — | ||||||||||||||||||||||||||||||
| SA-05(05) |
Source Code
|
— | — | ||||||||||||||||||||||||||||||
| SA-06 |
Software Usage Restrictions
|
— | — | ||||||||||||||||||||||||||||||
| SA-07 |
User-installed Software
|
— | — | ||||||||||||||||||||||||||||||
| SA-08 |
Security and Privacy Engineering Principles
3 params
Apply the following systems security and privacy engineering principles in the specification, design, development, implementation, and modification of the system and system components: {{ insert: p...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(01) |
Clear Abstractions
Implement the security design principle of clear abstractions.
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(02) |
Least Common Mechanism
1 param
Implement the security design principle of least common mechanism in {{ insert: param, sa-08.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(03) |
Modularity and Layering
3 params
Implement the security design principles of modularity and layering in {{ insert: param, sa-8.3_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(04) |
Partially Ordered Dependencies
1 param
Implement the security design principle of partially ordered dependencies in {{ insert: param, sa-08.04_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(05) |
Efficiently Mediated Access
1 param
Implement the security design principle of efficiently mediated access in {{ insert: param, sa-08.05_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(06) |
Minimized Sharing
1 param
Implement the security design principle of minimized sharing in {{ insert: param, sa-08.06_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(07) |
Reduced Complexity
1 param
Implement the security design principle of reduced complexity in {{ insert: param, sa-08.07_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(08) |
Secure Evolvability
1 param
Implement the security design principle of secure evolvability in {{ insert: param, sa-08.08_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(09) |
Trusted Components
1 param
Implement the security design principle of trusted components in {{ insert: param, sa-08.09_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(10) |
Hierarchical Trust
1 param
Implement the security design principle of hierarchical trust in {{ insert: param, sa-08.10_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(11) |
Inverse Modification Threshold
1 param
Implement the security design principle of inverse modification threshold in {{ insert: param, sa-08.11_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(12) |
Hierarchical Protection
1 param
Implement the security design principle of hierarchical protection in {{ insert: param, sa-08.12_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(13) |
Minimized Security Elements
1 param
Implement the security design principle of minimized security elements in {{ insert: param, sa-08.13_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(14) |
Least Privilege
1 param
Implement the security design principle of least privilege in {{ insert: param, sa-08.14_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(15) |
Predicate Permission
1 param
Implement the security design principle of predicate permission in {{ insert: param, sa-08.15_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(16) |
Self-reliant Trustworthiness
1 param
Implement the security design principle of self-reliant trustworthiness in {{ insert: param, sa-08.16_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(17) |
Secure Distributed Composition
1 param
Implement the security design principle of secure distributed composition in {{ insert: param, sa-08.17_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(18) |
Trusted Communications Channels
1 param
Implement the security design principle of trusted communications channels in {{ insert: param, sa-08.18_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(19) |
Continuous Protection
1 param
Implement the security design principle of continuous protection in {{ insert: param, sa-08.19_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(20) |
Secure Metadata Management
1 param
Implement the security design principle of secure metadata management in {{ insert: param, sa-08.20_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(21) |
Self-analysis
1 param
Implement the security design principle of self-analysis in {{ insert: param, sa-08.21_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(22) |
Accountability and Traceability
3 params
Implement the security design principle of accountability and traceability in {{ insert: param, sa-8.22_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(23) |
Secure Defaults
1 param
Implement the security design principle of secure defaults in {{ insert: param, sa-08.23_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(24) |
Secure Failure and Recovery
3 params
Implement the security design principle of secure failure and recovery in {{ insert: param, sa-8.24_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(25) |
Economic Security
1 param
Implement the security design principle of economic security in {{ insert: param, sa-08.25_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(26) |
Performance Security
1 param
Implement the security design principle of performance security in {{ insert: param, sa-08.26_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(27) |
Human Factored Security
1 param
Implement the security design principle of human factored security in {{ insert: param, sa-08.27_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(28) |
Acceptable Security
1 param
Implement the security design principle of acceptable security in {{ insert: param, sa-08.28_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(29) |
Repeatable and Documented Procedures
1 param
Implement the security design principle of repeatable and documented procedures in {{ insert: param, sa-08.29_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(30) |
Procedural Rigor
1 param
Implement the security design principle of procedural rigor in {{ insert: param, sa-08.30_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(31) |
Secure System Modification
1 param
Implement the security design principle of secure system modification in {{ insert: param, sa-08.31_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(32) |
Sufficient Documentation
1 param
Implement the security design principle of sufficient documentation in {{ insert: param, sa-08.32_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-08(33) |
Minimization
1 param
Implement the privacy principle of minimization using {{ insert: param, sa-08.33_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09 |
External System Services
2 params
a. Require that providers of external system services comply with organizational security and privacy requirements and employ the following controls: {{ insert: param, sa-09_odp.01 }};
b. Defin...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(01) |
Risk Assessments and Organizational Approvals
1 param
(a) Conduct an organizational assessment of risk prior to the acquisition or outsourcing of information security services; and
(b) Verify that the acquisition or outsourcing of dedicated inform...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(02) |
Identification of Functions, Ports, Protocols, and Services
1 param
Require providers of the following external system services to identify the functions, ports, protocols, and other services required for the use of such services: {{ insert: param, sa-09.02_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(03) |
Establish and Maintain Trust Relationship with Providers
3 params
Establish, document, and maintain trust relationships with external service providers based on the following requirements, properties, factors, or conditions: {{ insert: param, sa-9.3_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(04) |
Consistent Interests of Consumers and Providers
2 params
Take the following actions to verify that the interests of {{ insert: param, sa-09.04_odp.01 }} are consistent with and reflect organizational interests: {{ insert: param, sa-09.04_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(05) |
Processing, Storage, and Service Location
3 params
Restrict the location of {{ insert: param, sa-09.05_odp.01 }} to {{ insert: param, sa-09.05_odp.02 }} based on {{ insert: param, sa-09.05_odp.03 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(06) |
Organization-controlled Cryptographic Keys
Maintain exclusive control of cryptographic keys for encrypted material stored or transmitted through an external system.
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(07) |
Organization-controlled Integrity Checking
Provide the capability to check the integrity of information while it resides in the external system.
|
— | — | ||||||||||||||||||||||||||||||
| SA-09(08) |
Processing and Storage Location — U.S. Jurisdiction
Restrict the geographic location of information processing and data storage to facilities located within in the legal jurisdictional boundary of the United States.
|
— | — | ||||||||||||||||||||||||||||||
| SA-10 |
Developer Configuration Management
3 params
Require the developer of the system, system component, or system service to:
a. Perform configuration management during system, component, or service {{ insert: param, sa-10_odp.01 }};
b. Docum...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(01) |
Software and Firmware Integrity Verification
Require the developer of the system, system component, or system service to enable integrity verification of software and firmware components.
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(02) |
Alternative Configuration Management Processes
Provide an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(03) |
Hardware Integrity Verification
Require the developer of the system, system component, or system service to enable integrity verification of hardware components.
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(04) |
Trusted Generation
Require the developer of the system, system component, or system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions, source code, and object c...
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(05) |
Mapping Integrity for Version Control
Require the developer of the system, system component, or system service to maintain the integrity of the mapping between the master build data describing the current version of security-relevant h...
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(06) |
Trusted Distribution
Require the developer of the system, system component, or system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organi...
|
— | — | ||||||||||||||||||||||||||||||
| SA-10(07) |
Security and Privacy Representatives
6 params
Require {{ insert: param, sa-10.7_prm_1 }} to be included in the {{ insert: param, sa-10.7_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-10a | Perform configuration management during system, component, or service {{ insert: param, sa-10_odp.01 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-10b | Document, manage, and control the integrity of changes to {{ insert: param, sa-10_odp.02 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-10c | Implement only organization-approved changes to the system, component, or service; | — | — | ||||||||||||||||||||||||||||||
| └ sa-10d | Document approved changes to the system, component, or service and the potential security and privacy impacts of such changes; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-10e | Track security flaws and flaw resolution within the system, component, or service and report findings to {{ insert: param, sa-10_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| SA-11 |
Developer Testing and Evaluation
3 params
Require the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to:
a. Develop and implement a plan for ongoing security ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(01) |
Static Code Analysis
Require the developer of the system, system component, or system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(02) |
Threat Modeling and Vulnerability Analyses
8 params
Require the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the sy...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(03) |
Independent Verification of Assessment Plans and Evidence
1 param
(a) Require an independent agent satisfying {{ insert: param, sa-11.03_odp }} to verify the correct implementation of the developer security and privacy assessment plans and the evidence produced...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(04) |
Manual Code Reviews
2 params
Require the developer of the system, system component, or system service to perform a manual code review of {{ insert: param, sa-11.04_odp.01 }} using the following processes, procedures, and/or te...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(05) |
Penetration Testing
4 params
Require the developer of the system, system component, or system service to perform penetration testing:
(a) At the following level of rigor: {{ insert: param, sa-11.5_prm_1 }} ; and
(b) Under ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(06) |
Attack Surface Reviews
Require the developer of the system, system component, or system service to perform attack surface reviews.
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(07) |
Verify Scope of Testing and Evaluation
3 params
Require the developer of the system, system component, or system service to verify that the scope of testing and evaluation provides complete coverage of the required controls at the following leve...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(08) |
Dynamic Code Analysis
Require the developer of the system, system component, or system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.
|
— | — | ||||||||||||||||||||||||||||||
| SA-11(09) |
Interactive Application Security Testing
Require the developer of the system, system component, or system service to employ interactive application security testing tools to identify flaws and document the results.
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-11.2.(a) | Uses the following contextual information: {{ insert: param, sa-11.02_odp.01 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.2.(b) | Employs the following tools and methods: {{ insert: param, sa-11.02_odp.02 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.2.(c) | Conducts the modeling and analyses at the following level of rigor: {{ insert: param, sa-11.2_prm_3 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.2.(d) | Produces evidence that meets the following acceptance criteria: {{ insert: param, sa-11.2_prm_4 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.3.(a) | Require an independent agent satisfying {{ insert: param, sa-11.03_odp }} to verify the correct implementation of the developer security and privac... | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.3.(b) | Verify that the independent agent is provided with sufficient information to complete the verification process or granted the authority to obtain s... | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.5.(a) | At the following level of rigor: {{ insert: param, sa-11.5_prm_1 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-11.5.(b) | Under the following constraints: {{ insert: param, sa-11.05_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-11a | Develop and implement a plan for ongoing security and privacy control assessments; | — | — | ||||||||||||||||||||||||||||||
| └ sa-11b | Perform {{ insert: param, sa-11_odp.01 }} testing/evaluation {{ insert: param, sa-11_odp.02 }} at {{ insert: param, sa-11_odp.03 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-11c | Produce evidence of the execution of the assessment plan and the results of the testing and evaluation; | — | — | ||||||||||||||||||||||||||||||
| └ sa-11d | Implement a verifiable flaw remediation process; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-11e | Correct flaws identified during testing and evaluation. | — | — | ||||||||||||||||||||||||||||||
| SA-12 |
Supply Chain Protection
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(01) |
Acquisition Strategies / Tools / Methods
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(02) |
Supplier Reviews
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(03) |
Trusted Shipping and Warehousing
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(04) |
Diversity of Suppliers
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(05) |
Limitation of Harm
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(06) |
Minimizing Procurement Time
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(07) |
Assessments Prior to Selection / Acceptance / Update
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(08) |
Use of All-source Intelligence
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(09) |
Operations Security
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(10) |
Validate as Genuine and Not Altered
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(11) |
Penetration Testing / Analysis of Elements, Processes, and Actors
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(12) |
Inter-organizational Agreements
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(13) |
Critical Information System Components
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(14) |
Identity and Traceability
|
— | — | ||||||||||||||||||||||||||||||
| SA-12(15) |
Processes to Address Weaknesses or Deficiencies
|
— | — | ||||||||||||||||||||||||||||||
| SA-13 |
Trustworthiness
|
— | — | ||||||||||||||||||||||||||||||
| SA-14 |
Criticality Analysis
|
— | — | ||||||||||||||||||||||||||||||
| SA-14(01) |
Critical Components with No Viable Alternative Sourcing
|
— | — | ||||||||||||||||||||||||||||||
| SA-15 |
Development Process, Standards, and Tools
4 params
a. Require the developer of the system, system component, or system service to follow a documented development process that:
1. Explicitly addresses security and privacy requirements;
2. ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(01) |
Quality Metrics
3 params
Require the developer of the system, system component, or system service to:
(a) Define quality metrics at the beginning of the development process; and
(b) Provide evidence of meeting the qual...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(02) |
Security and Privacy Tracking Tools
Require the developer of the system, system component, or system service to select and employ security and privacy tracking tools for use during the development process.
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(03) |
Criticality Analysis
4 params
Require the developer of the system, system component, or system service to perform a criticality analysis:
(a) At the following decision points in the system development life cycle: {{ insert: p...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(04) |
Threat Modeling and Vulnerability Analysis
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(05) |
Attack Surface Reduction
1 param
Require the developer of the system, system component, or system service to reduce attack surfaces to {{ insert: param, sa-15.05_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(06) |
Continuous Improvement
Require the developer of the system, system component, or system service to implement an explicit process to continuously improve the development process.
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(07) |
Automated Vulnerability Analysis
3 params
Require the developer of the system, system component, or system service {{ insert: param, sa-15.07_odp.01 }} to:
(a) Perform an automated vulnerability analysis using {{ insert: param, sa-15.07_...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(08) |
Reuse of Threat and Vulnerability Information
Require the developer of the system, system component, or system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current develo...
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(09) |
Use of Live Data
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(10) |
Incident Response Plan
Require the developer of the system, system component, or system service to provide, implement, and test an incident response plan.
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(11) |
Archive System or Component
Require the developer of the system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security and pri...
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(12) |
Minimize Personally Identifiable Information
Require the developer of the system or system component to minimize the use of personally identifiable information in development and test environments.
|
— | — | ||||||||||||||||||||||||||||||
| SA-15(13) |
Logging Syntax
3 params
Require the developer of the system or system component to minimize the use of personally identifiable information in development and test environments.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-15.1.(a) | Define quality metrics at the beginning of the development process; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.1.(b) | Provide evidence of meeting the quality metrics {{ insert: param, sa-15.01_odp.01 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.3.(a) | At the following decision points in the system development life cycle: {{ insert: param, sa-15.03_odp.01 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.3.(b) | At the following level of rigor: {{ insert: param, sa-15.3_prm_2 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.7.(a) | Perform an automated vulnerability analysis using {{ insert: param, sa-15.07_odp.02 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.7.(b) | Determine the exploitation potential for discovered vulnerabilities; | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.7.(c) | Determine potential risk mitigations for delivered vulnerabilities; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-15.7.(d) | Deliver the outputs of the tools and results of the analysis to {{ insert: param, sa-15.07_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-15a | Require the developer of the system, system component, or system service to follow a documented development process that: | — | — | ||||||||||||||||||||||||||||||
| └ sa-15a.1 | Explicitly addresses security and privacy requirements; | — | — | ||||||||||||||||||||||||||||||
| └ sa-15a.2 | Identifies the standards and tools used in the development process; | — | — | ||||||||||||||||||||||||||||||
| └ sa-15a.3 | Documents the specific tool options and tool configurations used in the development process; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-15a.4 | Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-15b | Review the development process, standards, tools, tool options, and tool configurations {{ insert: param, sa-15_odp.01 }} to determine if the proce... | — | — | ||||||||||||||||||||||||||||||
| SA-16 |
Developer-provided Training
1 param
Require the developer of the system, system component, or system service to provide the following training on the correct use and operation of the implemented security and privacy functions, contro...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-17 |
Developer Security and Privacy Architecture and Design
Require the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that:
a. Is consistent with the organization’s sec...
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(01) |
Formal Policy Model
3 params
Require the developer of the system, system component, or system service to:
(a) Produce, as an integral part of the development process, a formal policy model describing the {{ insert: param, sa...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(02) |
Security-relevant Components
Require the developer of the system, system component, or system service to:
(a) Define security-relevant hardware, software, and firmware; and
(b) Provide a rationale that the definition for s...
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(03) |
Formal Correspondence
Require the developer of the system, system component, or system service to:
(a) Produce, as an integral part of the development process, a formal top-level specification that specifies the inter...
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(04) |
Informal Correspondence
1 param
Require the developer of the system, system component, or system service to:
(a) Produce, as an integral part of the development process, an informal descriptive top-level specification that spec...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(05) |
Conceptually Simple Design
Require the developer of the system, system component, or system service to:
(a) Design and structure the security-relevant hardware, software, and firmware to use a complete, conceptually simple...
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(06) |
Structure for Testing
Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate testing.
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(07) |
Structure for Least Privilege
Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(08) |
Orchestration
2 params
Design {{ insert: param, sa-17.08_odp.01 }} with coordinated behavior to implement the following capabilities: {{ insert: param, sa-17.08_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-17(09) |
Design Diversity
1 param
Use different designs for {{ insert: param, sa-17.09_odp }} to satisfy a common set of requirements or to provide equivalent functionality.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-17.1.(a) | Produce, as an integral part of the development process, a formal policy model describing the {{ insert: param, sa-17.1_prm_1 }} to be enforced; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.1.(b) | Prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational security and priva... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.2.(a) | Define security-relevant hardware, software, and firmware; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.2.(b) | Provide a rationale that the definition for security-relevant hardware, software, and firmware is complete. | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.3.(a) | Produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant hardwa... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.3.(b) | Show via proof to the extent feasible with additional informal demonstration as necessary, that the formal top-level specification is consistent wi... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.3.(c) | Show via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant hardware, software, ... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.3.(d) | Show that the formal top-level specification is an accurate description of the implemented security-relevant hardware, software, and firmware; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.3.(e) | Describe the security-relevant hardware, software, and firmware mechanisms not addressed in the formal top-level specification but strictly interna... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.4.(a) | Produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.4.(b) | Show via {{ insert: param, sa-17.04_odp }} that the descriptive top-level specification is consistent with the formal policy model; | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.4.(c) | Show via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant hardware, softw... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.4.(d) | Show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant hardware, software, and firmwar... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.4.(e) | Describe the security-relevant hardware, software, and firmware mechanisms not addressed in the descriptive top-level specification but strictly in... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.5.(a) | Design and structure the security-relevant hardware, software, and firmware to use a complete, conceptually simple protection mechanism with precis... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17.5.(b) | Internally structure the security-relevant hardware, software, and firmware with specific regard for this mechanism. | — | — | ||||||||||||||||||||||||||||||
| └ sa-17a | Is consistent with the organization’s security and privacy architecture that is an integral part the organization’s enterprise architecture; | — | — | ||||||||||||||||||||||||||||||
| └ sa-17b | Accurately and completely describes the required security and privacy functionality, and the allocation of controls among physical and logical comp... | — | — | ||||||||||||||||||||||||||||||
| └ sa-17c | Expresses how individual security and privacy functions, mechanisms, and services work together to provide required security and privacy capabiliti... | — | — | ||||||||||||||||||||||||||||||
| SA-18 |
Tamper Resistance and Detection
|
— | — | ||||||||||||||||||||||||||||||
| SA-18(01) |
Multiple Phases of System Development Life Cycle
|
— | — | ||||||||||||||||||||||||||||||
| SA-18(02) |
Inspection of Systems or Components
|
— | — | ||||||||||||||||||||||||||||||
| SA-19 |
Component Authenticity
|
— | — | ||||||||||||||||||||||||||||||
| SA-19(01) |
Anti-counterfeit Training
|
— | — | ||||||||||||||||||||||||||||||
| SA-19(02) |
Configuration Control for Component Service and Repair
|
— | — | ||||||||||||||||||||||||||||||
| SA-19(03) |
Component Disposal
|
— | — | ||||||||||||||||||||||||||||||
| SA-19(04) |
Anti-counterfeit Scanning
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-1a | Develop, document, and disseminate to {{ insert: param, sa-1_prm_1 }}: | — | — | ||||||||||||||||||||||||||||||
| └ sa-1a.1 | {{ insert: param, sa-01_odp.03 }} system and services acquisition policy that: | — | — | ||||||||||||||||||||||||||||||
| └ sa-1a.1.(a) | Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-1a.1.(b) | Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-1a.2 | Procedures to facilitate the implementation of the system and services acquisition policy and the associated system and services acquisition controls; | — | — | ||||||||||||||||||||||||||||||
| └ sa-1b | Designate an {{ insert: param, sa-01_odp.04 }} to manage the development, documentation, and dissemination of the system and services acquisition p... | — | — | ||||||||||||||||||||||||||||||
| └ sa-1c | Review and update the current system and services acquisition: | — | — | ||||||||||||||||||||||||||||||
| └ sa-1c.1 | Policy {{ insert: param, sa-01_odp.05 }} and following {{ insert: param, sa-01_odp.06 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-1c.2 | Procedures {{ insert: param, sa-01_odp.07 }} and following {{ insert: param, sa-01_odp.08 }}. | — | — | ||||||||||||||||||||||||||||||
| SA-20 |
Customized Development of Critical Components
1 param
Reimplement or custom develop the following critical system components: {{ insert: param, sa-20_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-21 |
Developer Screening
3 params
Require that the developer of {{ insert: param, sa-21_odp.01 }}:
a. Has appropriate access authorizations as determined by assigned {{ insert: param, sa-21_odp.02 }} ; and
b. Satisfies the foll...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-21(01) |
Validation of Screening
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-21a | Has appropriate access authorizations as determined by assigned {{ insert: param, sa-21_odp.02 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-21b | Satisfies the following additional personnel screening criteria: {{ insert: param, sa-21_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| SA-22 |
Unsupported System Components
2 params
a. Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer; or
b. Provide the following options for alternative sources for ...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-22(01) |
Alternative Sources for Continued Support
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-22a | Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer; or | — | — | ||||||||||||||||||||||||||||||
| └ sa-22b | Provide the following options for alternative sources for continued support for unsupported components {{ insert: param, sa-22_odp.01 }}. | — | — | ||||||||||||||||||||||||||||||
| SA-23 |
Specialization
2 params
Employ {{ insert: param, sa-23_odp.01 }} on {{ insert: param, sa-23_odp.02 }} supporting mission essential services or functions to increase the trustworthiness in those systems or components.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| SA-24 |
Design For Cyber Resiliency
5 params
a. Design organizational systems, system components, or system services to achieve cyber resiliency by:
1. Defining the following cyber resiliency goals: {{ insert: param, sa-24_odp.01 }}.
...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ sa-24a | Design organizational systems, system components, or system services to achieve cyber resiliency by: | — | — | ||||||||||||||||||||||||||||||
| └ sa-24a.1 | Defining the following cyber resiliency goals: {{ insert: param, sa-24_odp.01 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-24a.2 | Defining the following cyber resiliency objectives: {{ insert: param, sa-24_odp.02 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-24a.3 | Defining the following cyber resiliency techniques: {{ insert: param, sa-24_odp.03 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-24a.4 | Defining the following cyber resiliency implementation approaches: {{ insert: param, sa-24_odp.04 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-24a.5 | Defining the following cyber resiliency design principles: {{ insert: param, sa-24_odp.05 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-24b | Implement the selected cyber resiliency goals, objectives, techniques, implementation approaches, and design principles as part of an organizationa... | — | — | ||||||||||||||||||||||||||||||
| └ sa-2a | Determine the high-level information security and privacy requirements for the system or system service in mission and business process planning; | — | — | ||||||||||||||||||||||||||||||
| └ sa-2b | Determine, document, and allocate the resources required to protect the system or system service as part of the organizational capital planning and... | — | — | ||||||||||||||||||||||||||||||
| └ sa-2c | Establish a discrete line item for information security and privacy in organizational programming and budgeting documentation. | — | — | ||||||||||||||||||||||||||||||
| └ sa-3.2.(a) | Approve, document, and control the use of live data in preproduction environments for the system, system component, or system service; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-3.2.(b) | Protect preproduction environments for the system, system component, or system service at the same impact or classification level as any live data ... | — | — | ||||||||||||||||||||||||||||||
| └ sa-3a | Acquire, develop, and manage the system using {{ insert: param, sa-03_odp }} that incorporates information security and privacy considerations; | — | — | ||||||||||||||||||||||||||||||
| └ sa-3b | Define and document information security and privacy roles and responsibilities throughout the system development life cycle; | — | — | ||||||||||||||||||||||||||||||
| └ sa-3c | Identify individuals having information security and privacy roles and responsibilities; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-3d | Integrate the organizational information security and privacy risk management process into system development life cycle activities. | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.12.(a) | Include organizational data ownership requirements in the acquisition contract; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.12.(b) | Require all data to be removed from the contractor’s system and returned to the organization within {{ insert: param, sa-04.12_odp }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.3.(a) | {{ insert: param, sa-04.03_odp.01 }}; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.3.(b) | {{ insert: param, sa-04.03_odp.02 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.3.(c) | {{ insert: param, sa-04.03_odp.05 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.5.(a) | Deliver the system, component, or service with {{ insert: param, sa-04.05_odp }} implemented; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.5.(b) | Use the configurations as the default for any subsequent system, component, or service reinstallation or upgrade. | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.6.(a) | Employ only government off-the-shelf or commercial off-the-shelf information assurance and information assurance-enabled information technology pro... | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.6.(b) | Ensure that these products have been evaluated and/or validated by NSA or in accordance with NSA-approved procedures. | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.7.(a) | Limit the use of commercially provided information assurance and information assurance-enabled information technology products to those products th... | — | — | ||||||||||||||||||||||||||||||
| └ sa-4.7.(b) | Require, if no NIAP-approved Protection Profile exists for a specific technology type but a commercially provided information technology product re... | — | — | ||||||||||||||||||||||||||||||
| └ sa-4a | Security and privacy functional requirements; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4b | Strength of mechanism requirements; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4c | Security and privacy assurance requirements; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4d | Controls needed to satisfy the security and privacy requirements. | — | — | ||||||||||||||||||||||||||||||
| └ sa-4e | Security and privacy documentation requirements; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4f | Requirements for protecting security and privacy documentation; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4g | Description of the system development environment and environment in which the system is intended to operate; | — | — | ||||||||||||||||||||||||||||||
| └ sa-4h | Allocation of responsibility or identification of parties responsible for information security, privacy, and supply chain risk management; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-4i | Acceptance criteria. | — | — | ||||||||||||||||||||||||||||||
| └ sa-5a | Obtain or develop administrator documentation for the system, system component, or system service that describes: | — | — | ||||||||||||||||||||||||||||||
| └ sa-5a.1 | Secure configuration, installation, and operation of the system, component, or service; | — | — | ||||||||||||||||||||||||||||||
| └ sa-5a.2 | Effective use and maintenance of security and privacy functions and mechanisms; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-5a.3 | Known vulnerabilities regarding configuration and use of administrative or privileged functions; | — | — | ||||||||||||||||||||||||||||||
| └ sa-5b | Obtain or develop user documentation for the system, system component, or system service that describes: | — | — | ||||||||||||||||||||||||||||||
| └ sa-5b.1 | User-accessible security and privacy functions and mechanisms and how to effectively use those functions and mechanisms; | — | — | ||||||||||||||||||||||||||||||
| └ sa-5b.2 | Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual pri... | — | — | ||||||||||||||||||||||||||||||
| └ sa-5b.3 | User responsibilities in maintaining the security of the system, component, or service and privacy of individuals; | — | — | ||||||||||||||||||||||||||||||
| └ sa-5c | Document attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent ... | — | — | ||||||||||||||||||||||||||||||
| └ sa-5d | Distribute documentation to {{ insert: param, sa-05_odp.02 }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-9.1.(a) | Conduct an organizational assessment of risk prior to the acquisition or outsourcing of information security services; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-9.1.(b) | Verify that the acquisition or outsourcing of dedicated information security services is approved by {{ insert: param, sa-09.01_odp }}. | — | — | ||||||||||||||||||||||||||||||
| └ sa-9a | Require that providers of external system services comply with organizational security and privacy requirements and employ the following controls: ... | — | — | ||||||||||||||||||||||||||||||
| └ sa-9b | Define and document organizational oversight and user roles and responsibilities with regard to external system services; and | — | — | ||||||||||||||||||||||||||||||
| └ sa-9c | Employ the following processes, methods, and techniques to monitor control compliance by external service providers on an ongoing basis: {{ insert:... | — | — |