Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: SA-FAMILY: SYSTEM AND SERVICES ACQUISITION

SA-8 SECURITY ENGINEERING PRINCIPLES

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

sa-8

security engineering principles

 

assessment objective:

Determine if the organization applies information system security engineering principles in:

sa-8[1]

the specification of the information system;

sa-8[2]

the design of the information system;

sa-8[3]

the development of the information system;

sa-8[4]

the implementation of the information system; and

sa-8[5]

the modification of the information system.

potential assessment methods and objects:

Examine: [select from: System and services acquisition policy; procedures addressing security engineering principles used in the specification, design, development, implementation, and modification of the information system; information system design documentation; information security requirements and specifications for the information system; other relevant documents or records].

Interview: [select from: Organizational personnel with acquisition/contracting responsibilities; organizational personnel with responsibility for determining information system security requirements; organizational personnel with information system specification, design, development, implementation, and modification responsibilities; information system developers; organizational personnel with information security responsibilities].

Test: [select from: Organizational processes for applying security engineering principles in information system specification, design, development, implementation, and modification; automated mechanisms supporting the application of security engineering principles in information system specification, design, development, implementation, and modification].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056