Under active development Content is continuously updated and improved
Home / Frameworks / ITSG-33 / SA — System and Services Acquisition

SA System and Services Acquisition

97 controls in the System and Services Acquisition family

SA-1System And Services Acquisition Policy And Procedures
SA-2Allocation Of Resources
SA-3System Development Lifecycle
SA-4Acquisition Process
SA-4(1)Acquisition Process
SA-4(2)Acquisition Process
SA-4(3)Acquisition Process
SA-4(4)Acquisition Process
SA-4(5)Acquisition Process
SA-4(6)Acquisition Process
SA-4(7)Acquisition Process
SA-4(8)Acquisition Process
SA-4(9)Acquisition Process
SA-5Information System Documentation
SA-5(1)Information System Documentation
SA-5(2)Information System Documentation
SA-5(3)Information System Documentation
SA-5(4)Information System Documentation
SA-5(5)Information System Documentation
SA-6Software Usage Restrictions
SA-7User-Installed Software
SA-8Security Engineering Principles
SA-8(100)Security Engineering Principles
SA-9External Information System Services
SA-9(1)External Information System Services
SA-9(2)External Information System Services
SA-9(3)External Information System Services
SA-9(4)External Information System Services
SA-9(5)External Information System Services
SA-10Developer Configuration Management
SA-10(1)Developer Configuration Management
SA-10(2)Developer Configuration Management
SA-10(3)Developer Configuration Management
SA-10(4)Developer Configuration Management
SA-10(5)Developer Configuration Management
SA-10(6)Developer Configuration Management
SA-11Developer Security Testing
SA-11(1)Developer Security Testing
SA-11(2)Developer Security Testing
SA-11(3)Developer Security Testing
SA-11(4)Developer Security Testing
SA-11(5)Developer Security Testing
SA-11(6)Developer Security Testing
SA-11(7)Developer Security Testing
SA-11(8)Developer Security Testing
SA-12Supply Chain Protection
SA-12(1)Supply Chain Protection
SA-12(2)Supply Chain Protection
SA-12(3)Supply Chain Protection
SA-12(4)Supply Chain Protection
SA-12(5)Supply Chain Protection
SA-12(6)Supply Chain Protection
SA-12(7)Supply Chain Protection
SA-12(8)Supply Chain Protection
SA-12(9)Supply Chain Protection
SA-12(10)Supply Chain Protection
SA-12(11)Supply Chain Protection
SA-12(12)Supply Chain Protection
SA-12(13)Supply Chain Protection
SA-12(14)Supply Chain Protection
SA-12(15)Supply Chain Protection
SA-13Trustworthiness
SA-14Criticality Analysis
SA-15Development Process, Standards, And Tool
SA-15(1)Development Process, Standards, And Tool
SA-15(2)Development Process, Standards, And Tool
SA-15(3)Development Process, Standards, And Tool
SA-15(4)Development Process, Standards, And Tool
SA-15(5)Development Process, Standards, And Tool
SA-15(6)Development Process, Standards, And Tool
SA-15(7)Development Process, Standards, And Tool
SA-15(8)Development Process, Standards, And Tool
SA-15(9)Development Process, Standards, And Tool
SA-15(10)Development Process, Standards, And Tool
SA-15(11)Development Process, Standards, And Tool
SA-16Developer Provided Training
SA-17Developer Security Architecture And Design
SA-17(1)Developer Security Architecture And Design
SA-17(2)Developer Security Architecture And Design
SA-17(3)Developer Security Architecture And Design
SA-17(4)Developer Security Architecture And Design
SA-17(5)Developer Security Architecture And Design
SA-17(6)Developer Security Architecture And Design
SA-17(7)Developer Security Architecture And Design
SA-18Tamper Resistance And Detection
SA-18(1)Tamper Resistance And Detection
SA-18(2)Tamper Resistance And Detection
SA-19Component Authenticity
SA-19(1)Component Authenticity
SA-19(2)Component Authenticity
SA-19(3)Component Authenticity
SA-19(4)Component Authenticity
SA-20Customized Development Of Critical Components
SA-21Developer Screening
SA-21(1)Developer Screening
SA-22Unsupported System Components
SA-22(1)Unsupported System Components