SA-09 External Information System Services

System and Services Acquisition

Low Moderate High Privacy

Description

The organization: (i) requires that providers of external information system services employ adequate security controls in accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, guidance, and established service-level agreements; and (ii) monitors security control compliance.

Supplemental Guidance

An external information system service is a service that is implemented outside of the accreditation boundary of the organizational information system (i.e., a service that is used by, but not a part of, the organizational information system). Relationships with external service providers are established in a variety of ways, for example, through joint ventures, business partnerships, outsourcing arrangements (i.e., through contracts, interagency agreements, lines of business arrangements), licensing agreements, and/or supply chain exchanges. Ultimately, the responsibility for adequately mitigating risks to the organization’s operations and assets, and to individuals, arising from the use of external information system services remains with the authorizing official. Authorizing officials must require that an appropriate chain of trust be established with external service providers when dealing with the many issues associated with information system security. For services external to the organization, a chain of trust requires that the organization establish and retain a level of confidence that each participating service provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered to the organization. Where a sufficient level of trust cannot be established in the external services and/or service providers, the organization employs compensating security controls or accepts the greater degree of risk to its operations and assets, or to individuals. The external information system services documentation includes government, service provider, and end user security roles and responsibilities, and any service-level agreements. Service-level agreements define the expectations of performance for each required security control, describe measurable outcomes, and identify remedies and response requirements for any identified instance of non-compliance. NIST Special Publication 800-35 provides guidance on information technology security services. NIST Special Publication 800-64 provides guidance on the security considerations in the system development life cycle.

Changes from Rev 4

Title changed from 'External Information System Services' Control text adds ‘privacy’ and removes references to federal laws, Executive Orders, directives, etc. and to 'government' Changes parameter text 'security controls' to 'controls' Discussion updated to clarify that external system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness Incorporates external service provider elements of withdrawn App J control AR-03

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.5.19A.5.20A.5.22A.5.23A.8.21A.8.30

ISO 27002:2022

5.195.205.225.236.68.218.30

COBIT 2019

APO08APO09APO10

CIS Controls v8

CIS 15CIS 15.1CIS 15.2CIS 15.3CIS 15.4CIS 15.5CIS 15.6CIS 15.7CIS 8.12

NIST CSF 2.0

DE.CM-06GV.OC-05GV.SC-02ID.AM-04

SOC 2 TSC

CC3.3

PCI DSS v4.0.1

12.812.9

CSA CCM v4

DSP-13DSP-14DSP-19IPY-02IPY-03STA-06STA-09STA-12UEM-14

CSA AICM v1

DSP-13DSP-14DSP-19DSP-23IPY-02IPY-03MDS-12STA-06STA-09STA-12STA-16UEM-14

ISO 42001:2023

A.10.2A.10.4

NIS2 Directive

Art. 21(2)(d)

PRA Operational Resilience

SS1/21-5.2SS1/21-5.3SS1/21-9.1SS2/21-10.1SS2/21-11.1SS2/21-12.1SS2/21-13.1SS2/21-14.1SS2/21-16.1SS2/21-3.1SS2/21-5.1SS2/21-6.1SS2/21-6.2SS2/21-7.1SS2/21-8.1SS2/21-9.1

MAS TRM

16

APRA CPS 234

Para 29-33

ANSSI

Hygiene.26Hygiene.42Hygiene.9SecNumCloud.16.1SecNumCloud.16.2

FINMA Circular 2023/1

IV.F(100)V(101)V(102)V(103)V(104)

OSFI B-13

B-13.4.1B-13.4.2

EU GDPR

Art.28(1)Art.28(3)Art.44Art.46(1)Art.46(2)

EU DORA

Art.28(1)(a)Art.28(2)Art.28(5)Art.30(2)Art.30(3)

BIO2

5.195.205.225.236.68.218.30

RBI CSF

Annex1.11ITGRCA.10

FISC Security Guidelines

FISC.O6FISC.T9

LGPD + BCB 4893

BCB.Art.11BCB.Art.11-SuppBCB.Art.12BCB.Art.13BCB.Art.14BCB.Art.15BCB.Art.16BCB.OpenFinanceLGPD.Art.23-26LGPD.Art.33-36

HKMA TM-E-1

TME1.12.1TME1.12.2TME1.12.3TME1.12.4TME1.3.4

MLPS 2.0

8.1.10.128.1.9.38.1.9.48.1.9.78.2

DNB Good Practice

DNB.14.1DNB.14.2DNB.16.3

EU CRA

CRA.I.2iCRA.Info.8f

SWIFT CSCF

SWIFT.2.8

SAMA CSF

4.14.24.3

NCA ECC

4-14-2

UAE IA

T10

CBB TM

TM-15

Qatar NIA

SD

CBUAE

CR-12

CBE CSF

CTO-11OVM-1

SA JS2

JS2-8.7

CBN CSF

Part2.4Part5.1

BoG CISD

CISD-SDLCCISD-XICISD-XIICISD-XIIICISD-XVI

POPIA

s20s21s72

BoM CTRM

3.103.9

IOSCO Cyber Resilience

GOV-5ID-2PFMI-20PROT-7

BCBS 239

Principle 14

CPMI-IOSCO PFMI

CG.IDPFMI.P17PFMI.P22PFMI.P3

FFIEC IS

II.C.14II.C.20II.C.6

NYDFS 500

500.10500.11

HIPAA Security Rule

§164.308(b)(1)§164.308(b)(3)§164.314(a)(1)§164.314(a)(2)§164.314(b)(1)

ECB CROE

CROE.2.2.2CROE.2.2.3

EBA ICT Guidelines

3.2.3

SEBI CSCRF

GV.SCPR.CS

BOT Cyber Resilience

Ch5.1Ch5.2

NERC CIP

CIP-013-2

10 CFR 73.54

RG5.71-C-SR

FERC CIP Orders

Order 829

DOE C2M2 v2.1

THIRD

API 1164

Sec 12

AWIA

AWWA Sec 7

PCI PTS v6

H

CBEST

CBEST.8

TIBER-EU

TIBER.PROV

Common Criteria

CCRA

ISAE 3402

Clause 7Clause 8

Solvency II

Art.49(1)Art.49(2)Art.49(3)DR.272DR.274EIOPA-Cloud-GL11EIOPA-Cloud-GL3

Lloyd's Minimum Standards

BP2.2MS13.1MS6.1MS8.8MS9.3

NAIC Insurance Data Security

4-personnel4D

FCA SYSC 13

SYSC 13.9.1SYSC 13.9.2SYSC 13.9.3SYSC 13.9.5

HITRUST CSF v11

05.b

FDA Cybersecurity Guidance

TR-3

ISO 27799

14.115.115.2

NHS DSPT

NDG-10.1NDG-10.2NDG-10.3

MiCA

Art.66(1)Art.66(3)

Basel SCO60

SCO60.4SCO60.41SCO60.53SCO60.54SCO60.65SCO60.83SCO60.84

BSSC Standards

GSP-07

SEC Custody (Digital Assets)

SEC-CD-01SEC-CD-09SEC-CD-10SEC-CD-17

ISO 17799 (legacy)

6.2.16.2.310.2.110.2.210.6.2

COBIT 4.1 (legacy)

DS1.6DS2.3ME3.1ME3.3