SA-01 System And Services Acquisition Policy And Procedures

System and Services Acquisition

Low Moderate High Privacy

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, system and services acquisition policy that includes information security considerations and that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.

Supplemental Guidance

The system and services acquisition policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The system and services acquisition policy can be included as part of the general information security policy for the organization. System and services acquisition procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publication 800-12 provides guidance on security policies and procedures.

Changes from Rev 4

Title changed from 'System and Services Acquisition Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level system and services acquisition policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance Addresses responsibilities elements of withdrawn App J control AR-03

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.5.1

ISO 27002:2022

5.1

SOC 2 TSC

CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC5.2CC5.3CC5.3-POF1CC5.3-POF6CC7.2-POF1P1.1-POF5PI1.1PI1.2PI1.3PI1.4PI1.5

PCI DSS v4.0.1

12.16.1

CSA CCM v4

AIS-01IPY-01IVS-01STA-01

CSA AICM v1

AIS-01I&S-01IPY-01STA-01

ISO 42001:2023

A.6.1.2

ANSSI

Hygiene.2Hygiene.36SecNumCloud.15.1SecNumCloud.6.1

FINMA Circular 2023/1

IV.A(23)IV.A(36)IV.F(100)

OSFI B-13

B-13.2.2B-13.2.3

EU GDPR

Art.25(1)Rec.78

EU DORA

Art.7(1)Art.9(1)

BIO2

5.1

RBI CSF

Annex1.6ITGRCA.12

LGPD + BCB 4893

BCB.Art.2

HKMA TM-E-1

TME1.2.5

DNB Good Practice

DNB.1.2

EU CRA

CRA.I.1

SAMA CSF

1.2

NCA ECC

1-31-6

UAE IA

T10T3

Qatar NIA

GVSD

BoG CISD

CISD-SDLC

IOSCO Cyber Resilience

GOV-1

CPMI-IOSCO PFMI

PFMI.P2

FFIEC IS

I.CII.C.1

NYDFS 500

500.3

HIPAA Security Rule

ยง164.316(a)

EBA ICT Guidelines

3.4.13.6.1

Solvency II

Art.41(3)DR.266

Lloyd's Minimum Standards

MS8.2

FCA SYSC 13

SYSC 13.7.1

HITRUST CSF v11

04.a10.a

ISO 27799

5.1

MiCA

Art.62(1)Art.62(7)

SEC Custody (Digital Assets)

SEC-CD-01SEC-CD-14SEC-CD-17

ISO 17799 (legacy)

12.115.1.1

COBIT 4.1 (legacy)

AI2.5AI5.1PC5