System and Services Acquisition (SA)

Require providers of the following external system services to identify the functions, ports, protocols, and other services required for the use of such services: [Assignment: organization-defined external system services].


Login

System and Services Acquisition (SA)

Establish, document, and maintain trust relationships with external service providers based on the following requirements, properties, factors, or conditions: [Assignment: organization-defined security and privacy requirements, properties, factors, or conditions defining acceptable trust relationships].


Login

System and Services Acquisition (SA)

Take the following actions to verify that the interests of [Assignment: organization-defined external service providers] are consistent with and reflect organizational interests: [Assignment: organization-defined actions].


Login

System and Services Acquisition (SA)

Restrict the location of [Selection (one or more): information processing; information or data; system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].


Login

System and Services Acquisition (SA)

Maintain exclusive control of cryptographic keys for encrypted material stored or transmitted through an external system.


Login

System and Services Acquisition (SA)

Provide the capability to check the integrity of information while it resides in the external system.


Login

System and Services Acquisition (SA)

Restrict the geographic location of information processing and data storage to facilities located within in the legal jurisdictional boundary of the United States.


Login

System and Services Acquisition (SA)

Require the developer of the system, system component, or system service to: a. Perform configuration management during system, component, or service [Selection (one or more): design; development; implementation; operation; disposal]; b. Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management]; c. Implement only organization-approved changes to the system, component, or service; d. Document approved changes to the system, component, or service and the potential security and privacy impacts of such changes; and e. Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].


Login

System and Services Acquisition (SA)

Require the developer of the system, system component, or system service to enable integrity verification of software and firmware components.


Login

System and Services Acquisition (SA)

Provide an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.


Login