Under active development Content is continuously updated and improved

SA-4(1)Acquisition Process | Functional Properties of Controls

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Require the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Functional properties of security and privacy controls describe the functionality (i.e., security or privacy capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.

>Programmatic Queries

Beta

Related Services

AWS Service Catalog
AWS Config
AWS Security Hub

CLI Commands

Create Service Catalog product with control properties
aws servicecatalog create-product --name 'Secure Service with Controls' --product-type CLOUD_FORMATION_TEMPLATE --provisioning-artifact-parameters file://control-properties.json
Define control properties in CloudFormation
aws cloudformation create-stack --stack-name control-properties --template-body file://control-template.yaml --parameters ParameterKey=EncryptionEnabled,ParameterValue=true
Validate control properties with Config rules
aws configservice put-config-rule --config-rule file://control-validation-rule.json
Get compliance status of control properties
aws configservice describe-compliance-by-config-rule --compliance-types COMPLIANT

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What acquisition policies and procedures address the requirements of SA-4(1)?
  • How are security and privacy requirements integrated into the acquisition process?
  • Who is responsible for ensuring that acquisitions comply with SA-4(1)?

Technical Implementation:

  • How are security requirements defined and documented in acquisition contracts?
  • What mechanisms ensure that acquired systems and services meet security requirements?
  • How do you validate that vendors and service providers comply with specified security controls?
  • What secure coding practices and standards are required for developers?

Evidence & Documentation:

  • Can you provide examples of acquisition documentation that includes security requirements?
  • What evidence demonstrates that acquired systems meet security specifications?
  • Where is acquisition security documentation maintained throughout the system lifecycle?
  • Can you provide code review or static analysis results?

Ask AI

Configure your API key to use AI features.