SA-21 Developer Screening

System and Services Acquisition

High

Description

Require that the developer of [Assignment: organization-defined parameters]: Has appropriate access authorizations as determined by assigned [Assignment: organization-defined parameters] ; and Satisfies the following additional personnel screening criteria: [Assignment: organization-defined parameters].

Supplemental Guidance

Developer screening is directed at external developers. Internal developer screening is addressed by PS-03 . Because the system, system component, or system service may be used in critical activities essential to the national or economic security interests of the United States, organizations have a strong interest in ensuring that developers are trustworthy. The degree of trust required of developers may need to be consistent with that of the individuals who access the systems, system components, or system services once deployed. Authorization and personnel screening criteria include clearances, background checks, citizenship, and nationality. Developer trustworthiness may also include a review and analysis of company ownership and relationships that the company has with entities that may potentially affect the quality and reliability of the systems, components, or services being developed. Satisfying the required access authorizations and personnel screening criteria includes providing a list of all individuals who are authorized to perform development activities on the selected system, system component, or system service so that organizations can validate that the developer has satisfied the authorization and screening requirements.

Changes from Rev 4

No significant title changes from Rev 4.

Compliance Mappings

ISO 27002:2022

8.30

COBIT 2019

BAI03

NIS2 Directive

Art. 21(2)(d)

PRA Operational Resilience

SS2/21-5.1

MAS TRM

166

APRA CPS 234

Para 29-33

ANSSI

Hygiene.42SecNumCloud.15.1SecNumCloud.16.1

FINMA Circular 2023/1

IV.F(100)V(101)V(103)VII.A(113)

OSFI B-13

B-13.4.1

EU DORA

Art.28(5)

BIO2

8.30

RBI CSF

Annex1.6

FISC Security Guidelines

FISC.O10FISC.O6

HKMA TM-E-1

TME1.12.1TME1.3.2

SAMA CSF

3.24.14.2

UAE IA

T10

CBB TM

TM-15TM-7

Qatar NIA

SD

CBUAE

CR-12CR-6

CBE CSF

CTO-4OVM-1

SA JS2

JS2-8.7

CBN CSF

Part2.4

BoG CISD

CISD-SDLC

BoM CTRM

3.113.9

IOSCO Cyber Resilience

PROT-7

EBA ICT Guidelines

3.6.2

SEBI CSCRF

GV.SCPR.AS

BOT Cyber Resilience

Ch2.5Ch5.1

PCI PTS v6

H

CBEST

CBEST.8

TIBER-EU

TIBER.PROV

Solvency II

Art.49(1)

Lloyd's Minimum Standards

MS8.8

FCA SYSC 13

SYSC 13.9.2