3.17 SYSTEM AND SERVICES ACQUISITION
Quick link to System and Services Acquisition Summary Table
Table of contents
- -- SA-1 POLICY AND PROCEDURES
- -- SA-2 ALLOCATION OF RESOURCES
- -- SA-3 SYSTEM DEVELOPMENT LIFE CYCLE
- -- SA-4 ACQUISITION PROCESS
- -- SA-5 SYSTEM DOCUMENTATION
- -- SA-6 SOFTWARE USAGE RESTRICTIONS
- -- SA-7 USER-INSTALLED SOFTWARE
- -- SA-8 SECURITY AND PRIVACY ENGINEERING PRINCIPLES
- -- SA-9 EXTERNAL SYSTEM SERVICES
- -- SA-10 DEVELOPER CONFIGURATION MANAGEMENT
- -- SA-11 DEVELOPER TESTING AND EVALUATION
- -- SA-12 SUPPLY CHAIN PROTECTION
- -- SA-13 TRUSTWORTHINESS
- -- SA-14 CRITICALITY ANALYSIS
- -- SA-15 DEVELOPMENT PROCESS, STANDARDS, AND TOOLS
- -- SA-16 DEVELOPER-PROVIDED TRAINING
- -- SA-17 DEVELOPER SECURITY AND PRIVACY ARCHITECTURE AND DESIGN
- -- SA-18 TAMPER RESISTANCE AND DETECTION
- -- SA-19 COMPONENT AUTHENTICITY
- -- SA-20 CUSTOMIZED DEVELOPMENT OF CRITICAL COMPONENTS
- -- SA-21 DEVELOPER SCREENING
- -- SA-22 UNSUPPORTED SYSTEM COMPONENTS
- -- SA-23 SPECIALIZATION