SA-4(1)—Acquisition Process | Functional Properties of Controls
IL4 Mod
IL4 High
IL5
IL6
>Control Description
Require the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Functional properties of security and privacy controls describe the functionality (i.e., security or privacy capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.
>Programmatic Queries
Beta
Related Services
AWS Service Catalog
AWS Config
AWS Security Hub
CLI Commands
Create Service Catalog product with control properties
aws servicecatalog create-product --name 'Secure Service with Controls' --product-type CLOUD_FORMATION_TEMPLATE --provisioning-artifact-parameters file://control-properties.jsonDefine control properties in CloudFormation
aws cloudformation create-stack --stack-name control-properties --template-body file://control-template.yaml --parameters ParameterKey=EncryptionEnabled,ParameterValue=trueValidate control properties with Config rules
aws configservice put-config-rule --config-rule file://control-validation-rule.jsonGet compliance status of control properties
aws configservice describe-compliance-by-config-rule --compliance-types COMPLIANT>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What acquisition policies and procedures address the requirements of SA-4(1)?
- •How are security and privacy requirements integrated into the acquisition process?
- •Who is responsible for ensuring that acquisitions comply with SA-4(1)?
Technical Implementation:
- •How are security requirements defined and documented in acquisition contracts?
- •What mechanisms ensure that acquired systems and services meet security requirements?
- •How do you validate that vendors and service providers comply with specified security controls?
- •What secure coding practices and standards are required for developers?
Evidence & Documentation:
- •Can you provide examples of acquisition documentation that includes security requirements?
- •What evidence demonstrates that acquired systems meet security specifications?
- •Where is acquisition security documentation maintained throughout the system lifecycle?
- •Can you provide code review or static analysis results?
Ask AI
Configure your API key to use AI features.