ARTIFACTS

SA: SYSTEM & SERVICES ACQUISITION

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for System & Services Acquisition (SA); and documents that are widely used in the assessment of controls and control enhancements in the System & Services Acquisition (SA) family. Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR SYSTEM & SERVICES ACQUISITION
SYSTEM & SERVICES ACQUISITIONN POLICY & PROCEDURES (SA)
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
ACCESS CONTROL POLICY & PROCEDURES (AC)
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of System & Services Acquisition (SA) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
Configuration management policy SA-12 (5)
Enterprise architecture policy SA-17
SA-17 (1)
SA-17 (2)
SA-17 (3)
SA-17 (4)
SA-17 (5)
SA-17 (6)
SA-17 (7)
Incident response policy SA-19
SA-19 (1)
Media disposal policy SA-19
SA-19 (1)
SA-19 (3)
Media protection policy SA-17
SA-17 (1)
SA-17 (2)
SA-17 (3)
Personnel security POLICY & PROCEDURES SA-21
SA-21 (1)
Anti-counterfeit POLICY & PROCEDURES SA-19
SA-19 (1)
SA-19 (2)
SA-19 (3)
SA-19 (4)
Procedures address the integration of information security requirements into the acquisition process SA-12 (10)
Procedures addressing attack surface reduction SA-15 (5)
Procedures addressing capital planning and investment control SA-2
Procedures addressing configuration management SA-10 (2)
Procedures addressing criticality analysis requirements for information systems, security plan SA-14
Procedures addressing criticality analysis requirements for the information system, system component, or information system service SA-15 (3)
Procedures addressing customized development of critical information system components SA-20
Procedures addressing developer continuous monitoring plans SA-4 (8)
Procedures addressing developer security architecture and design specification for the information system SA-17
SA-17 (1)
SA-17 (2)
SA-17 (3)
SA-17 (4)
SA-17 (5)
SA-17 (6)
SA-17 (7)
Procedures addressing developer-provided training SA-16
Procedures addressing development process, standards, and tools SA-15
SA-15 (1)
SA-15 (2)
SA-15 (3)
SA-15 (4)
SA-15 (5)
SA-15 (6)
SA-15 (7)
SA-15 (8)
SA-15 (9)
SA-15 (10)
SA-15 (11)
Procedures addressing external information system services SA-9
SA-9 (1)
SA-9 (2)
SA-9 (3)
SA-9 (4)
SA-9 (5)
Procedures addressing flaw remediation SA-11
SA-11 (1)
SA-11 (8)
Procedures addressing information system documentation SA-5
Procedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services SA-9
Procedures addressing personnel screening SA-21
SA-21 (1)
Procedures addressing replacement or continued use of unsupported information system components SA-22
Procedures addressing security engineering principles used in the specification, design, development, implementation, and modification of the information system SA-8
Procedures addressing supply chain protection SA-12
SA-12 (1)
SA-12 (2)
SA-12 (5)
SA-12 (7)
SA-12 (8)
SA-12 (9)
SA-12 (10)
SA-12 (11)
SA-12 (12)
SA-12 (13)
SA-12 (14)
SA-12 (15)
Procedures addressing support for unsupported information system components SA-22 (1)
Procedures addressing system developer configuration management SA-10
SA-10 (1)
SA-10 (2)
SA-10 (3)
SA-10 (4)
SA-10 (5)
SA-10 (6)
Procedures addressing system developer security testing "SA-11
SA-11 (1)
SA-11 (2)
SA-11 (3)
SA-11 (4)
SA-11 (5)
SA-11 (6)
SA-11 (7)
SA-11 (8)"
Procedures addressing tamper resistance and detection SA-18
SA-18 (1)
SA-18 (2)
Procedures addressing the allocation of resources to information security requirements SA-2
Procedures addressing the baseline configuration of the information system SA-12 (5)
Procedures addressing the integration of acquisition strategies, contract tools, and procure methods into the acquisition process SA-12 (1)
Procedures addressing the integration of information security into the system development life cycle process SA-3
Procedures addressing the integration of information security requirements into the acquisition process SA-12
SA-12 (1)
SA-12 (2)
SA-12 (5)
SA-12 (7)
SA-12 (14)
Procedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process SA-4
SA-4 (1)
SA-4 (2)
SA-4 (3)
SA-4 (5)
SA-4 (6)
SA-4 (7)
SA-4 (8)
SA-4 (9)
SA-4 (10)
Procedures addressing the integration of security requirements during the development process SA-15
SA-15 (1)
SA-15 (2)
Procedures addressing trustworthiness requirements for the information system, system component, or information system service SA-13
Procedures addressing weaknesses or deficiencies in supply chain elements SA-12 (15)
Processes, procedures, and/or techniques for performing manual code reviews SA-11 (4)
System and services acquisition POLICY & PROCEDURES SA-1

Evidence, Records & Artifacts

Here you'll find a catalog of System & Services Acquisition (SA) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Acceptance criteria for evidence produced from threat modeling and vulnerability analysis SA-15 (4)
Acquisition contracts SA-12 (15)
SA-22 (1)
Acquisition contracts for information systems or services SA-4 (9)
SA-12 (1)
Acquisition contracts for the information system SA-10 (1)
SA-10 (2)
SA-10 (6)
Acquisition contracts for the information system, or information system service SA-15 (5)
SA-15 (10
SA-15 (11)
Acquisition contracts, service-level agreements. XXX SA-9
Acquisition documentation SA-22 (1)
Approval records for acquisition or outsourcing of dedicated information security services SA-9 (1)
Assessment reports/results SA-18 (2)
Assessments performed on external service providers SA-9 (4)
Business impact analysis documentation SA-14
SA-15 (3)
Change control records SA-10
SA-10 (1)
SA-10 (4)
SA-10 (5)
SA-10 (6)
SA-15
Configuration control audit records SA-10 (4)
Configuration control records SA-15
Configuration control records for components awaiting service/repair SA-19 (2)
Configuration control records for serviced/repaired components awaiting return to service SA-19 (2)
Configuration management records SA-10
SA-10 (1)
SA-10 (4)
SA-10 (5)
SA-10 (6)
SA-20
Criticality analysis documentation SA-14
SA-15 (3)
Design and implementation information for security controls employed in the information system, system component, or information system service SA-4 (2)
Design specification and security architecture documentation for the system SA-17
SA-17 (1)
Developer continuous monitoring plans SA-4 (8)
Developer documentation describing design and structure of security-relevant hardware, software, and firmware components SA-17 (5)
Developer documentation describing design and structure of security-relevant hardware, software, and firmware components to facilitate controlling access with least privilege SA-17 (7)
Developer documentation describing design and structure of security-relevant hardware, software, and firmware components to facilitate testing SA-17 (6)
Developer incident response plan SA-15 (10)
SA-15 (11)
Developer-provided training materials SA-16
Disposal records for information system components SA-19 (3)
Documentation authorizing use of live data in development and test environments SA-15 (9)
Documentation describing security-relevant hardware, software and firmware mechanisms not addressed in the formal top-level specification documentation SA-17 (3)
SA-17 (4)
Documentation evidence of meeting quality metrics SA-15 (1)
SA-15 (2)
Documentation evidence of meeting quality metrics SA-15 (2)
Documentation of disposal techniques and methods employed for information system components SA-19 (3)
Documentation of trust relationships with external service providers SA-9 (3)
Documented approvals (including justification) for continued use of unsupported information system components SA-22
Documented evidence of replacing unsupported information system components SA-22
Documented rationale of completeness regarding definitions provided for security-relevant hardware, software, and firmware SA-17 (2)
Documented reviews of development process, standards, tools, and tool options/configurations SA-15
Evidence of organizational analysis, independent third-party analysis, organizational penetration testing, and/or independent third-party penetration testing SA-12 (11)
Evidentiary documentation (including applicable configurations) indicating the information system, system component, or information system service are genuine and have not been altered SA-12 (10)
FIPS-validation information for cryptographic functionality SA-4 (7)
Formal policy model SA-17 (3)
SA-17 (4)
Formal top-level specification documentation SA-17 (3)
Hardware integrity verification records SA-10 (3)
Independent verification and validation reports SA-11 (3)
Informal descriptive top-level specification documentation SA-17 (4)
Information processing, information/data, and/or information system services to be maintained in restricted locations SA-9 (5)
Information security requirements and specifications for the information system SA-8
Information security risk management strategy/program documentation SA-3
Information system architecture and associated configuration documentation SA-12 (5)
Information system configuration settings and associated documentation establishing/enforcing organization-defined thresholds for reducing attack surfaces SA-15 (5)
Information system development life cycle documentation SA-3
Information system documentation including administrator and user guides SA-5
Information system documentation including functions, ports, protocols, and services intended for organizational use SA-4 (9)
Information system maintenance records SA-19 (2)
Information system risk assessment reports SA-11 (2)
Information system security architecture and design documentation SA-17 (3)
SA-17 (4)
Information system security architecture documentation SA-17 (5)
Information system security architecture documentation SA-17 (6)
SA-17 (7)
Information/data and/or information system services SA-9 (5)
Inspection reports/results SA-18 (2)
Integrity verification records between master copies of security-relevant hardware, software, and firmware (including designs and source code) SA-10 (5)
Inter-organizational agreements and procedures SA-12 (12)
Inventory management records SA-19 (2)
Inventory records of critical information system components SA-12 (13)
NAIP-approved protection profiles SA-4 (7)
Network diagram SA-15 (5)
Organizational programming and budgeting documentation SA-2
Organizational risk assessment results SA-12 (7)
Organizational risk assessments SA-15 (4)
Organizational security requirements and security specifications for external provider services SA-9
Organizational security requirements and security specifications for external service providers SA-9 (2)
Organizational security requirements or conditions for external providers SA-9 (5)
Organizational security requirements, descriptions, and criteria for developers of information systems, system components, and information system services SA-4 (9)
Organizational security requirements, properties, factors, or conditions defining acceptable trust relationships SA-9 (3)
Organizational security requirements/safeguards for external service providers SA-9 (4)
Penetration testing results SA-12 (7)
Personnel screening criteria and associated documentation SA-21
SA-21 (1)
Personnel security policies for external service providers SA-9 (4)
Physical inventory of critical information system components SA-12 (13)
Plans of action and milestones for improving system development process SA-15 (6)
Purchase orders/requisitions for the information system; system component; or information system service from suppliers SA-12 (1)
Quality goals and metrics for improving system development process SA-15 (6)
Records documenting attempts to obtain unavailable or nonexistent information system documentation SA-5
Records of all-source intelligence analyses SA-12 (8)
SA-12 (9)
Records of attack surface reviews SA-11 (6)
Records of developer security testing results for the information system, system component, or information system service SA-11
Records of developer security testing results for the information system, system component, or information system service SA-11 (2)
Records of manual code reviews SA-11 (4)
Records of random inspections SA-18 (2)
Records of supplier due diligence reviews SA-12 (2)
Reports notifying developers/manufacturers/vendors/ contractors and/or external reporting organizations of counterfeit information system components SA-19
Restricted locations for information processing SA-9 (5)
Results of independent or organizational assessments of supply chain controls and processes SA-12 (15)
Risk assessment reports SA-9 (1)
SA-15 (7)
Risk management strategy documentation SA-5
Risk mitigation strategy documentation SA-15 (7)
Scanning results SA-19 (4)
Scanning tools and associated documentation SA-19 (4)
Security assessments and/or quality control reviews of system development process SA-15 (6)
Security authorization package for the information system, system component, or information system service SA-13
Security categorization documentation/results SA-13
Security configurations to be implemented by developer of the information system, system component, or information system service SA-4 (5)
Security configurations to be implemented by developer of the information system, system component, or information system service SA-4 (6)
Security control assessment evidence from external providers of information system services SA-9
Security flaw and flaw resolution tracking records SA-10
Security flaw and remediation tracking records SA-11
SA-11 (1)
SA-11 (8)
Security test and evaluation plans SA-11 (3)
Security test and evaluation results SA-11 (8)
SA-12 (7)
Security test and evaluation results for the information system, system component, or information system service SA-11 (3)
Software and firmware integrity verification records SA-10 (1)
Software development life cycle documentation SA-15 (3)
Solicitation documents SA-4 (1)
SA-4 (2)
SA-4 (3)
SA-4 (5)
SA-4 (6)
SA-4 (7)
System change authorization records SA-10
SA-10 (1)
SA-10 (4)
SA-10 (5)
SA-10 (6)
SA-15
System change authorization records SA-10
SA-10 (1)
System component, or information system service XXX SA-10 (1)
SA-10 (2)
SA-10 (6)
System developer documentation listing tool options/configuration guides, configuration management records SA-15
System developer penetration testing and evaluation plans SA-11 (5)
System developer penetration testing and evaluation results SA-11 (5)
System developer security test and evaluation plans SA-11 (8)
System developer security test plans SA-11
SA-11 (1)
SA-11 (2)
System developer security testing and evaluation plans SA-11 (4)
SA-11 (6)
SA-11 (7)
System developer security testing and evaluation results SA-11 (4)
SA-11 (6)
SA-11 (7)
System developer security testing results SA-11 (1)
System development life cycle documentation SA-12
SA-14
SA-18 (1)
System development life cycle documentation addressing custom development of critical information system components SA-20
Tamper protection program documentation SA-18
SA-18 (1)
Tamper protection tools and techniques documentation SA-18
SA-18 (1)
Tamper resistance and detection tools (technologies) and techniques documentation SA-18 (1)
Tamper resistance and detection tools and techniques documentation SA-18
Threat and vulnerability analysis reports SA-11 (2)
Threat modeling and vulnerability analyses from similar information systems, system components, or information system service SA-15 (8)
Threat modeling documentation SA-15 (4)
Training materials addressing counterfeit information system components SA-19
SA-19 (1)
Training records SA-16
Training records on detection and prevention of counterfeit components from entering the information system SA-19
Training records on detection of counterfeit information system components SA-19 (1)
Version control change/update records SA-10 (5)
Vulnerability analysis results SA-15 (4)
SA-15 (7)
Vulnerability analysis tools and associated documentation SA-15 (7)
Vulnerability assessment results SA-12 (7)
Vulnerability mitigation reports SA-15 (7)
Vulnerability scanning results SA-11 (2)

System & Services Acquisition Related Lists

These are the System & Services Acquisition (SA) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
List of actions ensuring required access authorizations and screening criteria are satisfied SA-21 (1)
List of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation SA-5
List of appropriate access authorizations required by developers of the information system SA-21
SA-21 (1)
List of code requiring manual reviews SA-11 (4)
List of critical information system components and functions identified by criticality analyses SA-14
List of information systems, information system components, or information system services requiring criticality analyses SA-14
List of quality control processes to be included in developer's system development life cycle process SA-4 (3)
List of quality metrics SA-15 (1)
SA-15 (2)
List of required functions, ports, protocols, and other services SA-9 (2)
List of restricted ports, protocols, functions and services SA-15 (5)
List of security safeguards ensuring adequate supply of critical information system components SA-12 (13)
List of security safeguards to be taken against supply chain threats SA-12
List of security safeguards to be taken to protect organizational supply chain against potential supply chain threats SA-12 (5)
List of security-relevant hardware, software, and firmware components SA-17 (2)
List of software development methods to be included in developer's system development life cycle process SA-4 (3)
List of supply chain elements, processes, and actors (associated with the information system, system component, or information system service) requiring implementation of unique identification processes, procedures, tools, mechanisms, equipment, techniques and/or configurations SA-12 (14)
List of supply chain elements, processes, and actors (associated with the information system, system component, or information system service) subject to analysis and/or testing SA-12 (11)
List of supply chain threats SA-12
List of system/security engineering methods to be included in developer's system development life cycle process SA-4 (3)
List of testing/evaluation/validation techniques to be included in developer's system development life cycle process SA-4 (3)
Go to The List of Lists