myctrl.tools
Compare

SA-4(1)Functional Properties Of Controls

MODERATE
HIGH

>Control Description

Require the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.

>Cross-Framework Mappings

>Programmatic Queries

Beta

Related Services

AWS Service Catalog
AWS Config
AWS Security Hub

CLI Commands

Create Service Catalog product with control properties
aws servicecatalog create-product --name 'Secure Service with Controls' --product-type CLOUD_FORMATION_TEMPLATE --provisioning-artifact-parameters file://control-properties.json
Define control properties in CloudFormation
aws cloudformation create-stack --stack-name control-properties --template-body file://control-template.yaml --parameters ParameterKey=EncryptionEnabled,ParameterValue=true
Validate control properties with Config rules
aws configservice put-config-rule --config-rule file://control-validation-rule.json
Get compliance status of control properties
aws configservice describe-compliance-by-config-rule --compliance-types COMPLIANT

>Supplemental Guidance

Functional properties of security and privacy controls describe the functionality (i.e., security or privacy capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What acquisition policies and procedures address the requirements of SA-4(1)?
  • How are security and privacy requirements integrated into the acquisition process?
  • Who is responsible for ensuring that acquisitions comply with SA-4(1)?

Technical Implementation:

  • How are security requirements defined and documented in acquisition contracts?
  • What mechanisms ensure that acquired systems and services meet security requirements?
  • How do you validate that vendors and service providers comply with specified security controls?
  • What secure coding practices and standards are required for developers?

Evidence & Documentation:

  • Can you provide examples of acquisition documentation that includes security requirements?
  • What evidence demonstrates that acquired systems meet security specifications?
  • Where is acquisition security documentation maintained throughout the system lifecycle?
  • Can you provide code review or static analysis results?

Ask AI

Configure your API key to use AI features.