SA · Plan wizard

System and Services Acquisition Plan

Documents how the system is acquired, developed, documented, engineered, and maintained across the SDLC. Covers resource allocation, acquisition contract language, security-engineering principles, external system services, developer configuration management, developer testing, development process / tooling / standards, system documentation, and the lifecycle treatment of unsupported components. Covers the controls of the SA family in NIST SP 800-53 r5 and aligns with NIST SP 800-160 v1 r1 (Engineering Trustworthy Secure Systems), NIST SP 800-218 (Secure Software Development Framework — SSDF), NIST SP 800-64 r2 (SDLC integration — withdrawn but historically informative), NIST SP 800-161 r1 (SCRM), EO 14028, and OMB M-22-18.

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Frameworks, vehicles, and tooling that anchor the rest of the plan.

SDLC methodology in use (e.g., 'DevSecOps with NIST SSDF integration', 'Agile (Scrum) + SSDF', 'Waterfall with security gates at each phase').
Primary contract vehicles (e.g., 'GSA Schedule 70 + GWAC + agency-specific BPA', 'Open-market FAR Part 12 commercial-item acquisitions', 'CRADAs with academic partners').
Where contract security requirements originate (e.g., 'Org standard contract language at /contracts/security-clauses.md derived from FAR 52.204-21 + DFARS 252.204-7012 + NIST 800-171').
How external services are vetted (e.g., 'FedRAMP authorization required for cloud services; SOC 2 Type II for non-FedRAMP SaaS; org SCRM review for partner integrations').
Repository / pipeline tooling (e.g., 'GitHub Enterprise + GitHub Actions; protected main branch; signed commits required'). Reference the CM Plan for system-side CM.
SAST / DAST / SCA / IAST tools (e.g., 'GitHub CodeQL (SAST) + OWASP ZAP (DAST) + Snyk (SCA); Burp Suite for manual review').
Resource Allocation (SA-2) → §4.x

Security funding and staffing in capital planning.

How security resource needs are captured in capital planning (Exhibit 53 / 300 for federal). Investment-class line items, justification, multi-year planning.
Roles + FTE allocation for security on this system (System Owner, ISSO, ISSM, security engineer, dev-security liaison, etc.).
How often security budget is reviewed against actuals (typically tied to org budget cycle, e.g., 'Quarterly').
Where unfunded security requirements are tracked (so they don't get lost). Often surfaces in the POA&M as risks pending funding.
SDLC Integration (SA-3) → §4.x

Where in the SDLC security activities are integrated.

What security activity happens at each phase. Initiation: categorization + risk assessment. Development: threat modeling, secure coding, testing. Deployment: ATO. Operations: continuous monitoring. Disposal: sanitization + records retention.
Required training cadence for developers (e.g., 'Annual secure-coding training with role-based modules'). Reference AT plan if authored.
Role accountable for SDLC-security adherence (e.g., 'Application Security Lead', 'CISO delegate').
Acquisition Requirements (SA-4) → §4.x

Security clauses and deliverables required in contracts.

How ongoing monitoring is required of vendors. ConMon deliverables, security-event reporting, vulnerability-disclosure obligations.
What an acceptable SBOM looks like (format, depth — direct vs transitive, machine-readable, signing). Reference EO 14028 / OMB M-22-18.
How vendor compliance with Section 889 (no Huawei / ZTE / Hikvision / Dahua / Hytera covered telecom) is collected and recorded.
System Documentation (SA-5) → §4.x

Admin docs, user docs, and architecture documentation.

Authoritative location for system documentation (e.g., 'Confluence space CTLS at /docs.acme/CTLS', '/repo/docs in version control').
How often documentation is reviewed for currency (e.g., 'Annual + on significant change to architecture / configuration').
Security and Privacy Engineering Principles (SA-8) → §4.x

Principles applied during engineering decisions.

How application of these principles is evidenced (e.g., 'Architecture Decision Records (ADRs) in /repo/adr cite which principle each decision aligns with'; 'Threat model captures principle-violation findings').
Role accountable for security-architecture review (e.g., 'Application Security Lead'; 'Security Architecture Review Board').
External System Services (SA-9) → §4.x

Cloud services, SaaS, partner integrations.

Where the inventory of external services in scope is maintained (CMDB section, dedicated SaaS-management tool, /repo/external-services.md).
How data flows between the system and each external service are documented (data classification labels exchanged, encryption-in-transit requirements, retention obligations).
How authorization status is tracked through expiration (FedRAMP ATO sunset, SOC 2 report annual cadence). Renewal tickler process.
Per SA-9(2), the org identifies external service functions, ports, protocols, and other services for each external service in use.
What happens when an external service contract ends (data return, sanitization attestation per MP / SC-28).
Developer Configuration Management (SA-10) → §4.x

How developer-side configuration management is governed.

How developer changes are classified (security-sensitive, normal, hotfix). Mapping to system-side CM-3 change classes.
From merge → release. Tagged releases, build artifacts, signing, deployment promotion through environments. Reference SI-7 for code authentication.
How developer-side baselines (build configurations, dependency lockfiles, container base images) are tracked. Reference CM-2 system-side baselines.
How the build pipeline itself is protected (RBAC on CI, secrets management, ephemeral runners, attestation per SLSA).
Developer Testing and Evaluation (SA-11) → §4.x

SAST, DAST, SCA, IAST, fuzzing, code review.

How often each test type runs. Example: 'SAST + SCA on every PR; DAST nightly against staging; fuzz-testing of parsing libraries weekly; manual pen-test annually + on significant change'.
How developer-test findings are triaged. Severity-to-fix-time mapping (e.g., 'Critical SAST: blocks merge; High SAST: 7 days; Medium: next sprint').
Where developer-test results are recorded and who reviews them. Trends, regressions, exceptions.
Per SA-11(3), independent verification of developer-test results. By a separate team within the org or by an external assessor.
Secure Development Process / Standards / Tools (SA-15) → §4.x

The development process itself, the tooling chain, and standards.

End-to-end tooling: IDE security plugins, version control with branch protection, CI with security gates, artifact signing, attestation generation. Reference SLSA levels if used.
Per SA-15(3), criticality analysis applied during development. Reference RA-9 for system-level. SBOM-based dependency criticality, mission-essential-function tracing.
Unsupported System Components (SA-22) → §4.x

Components past vendor support — replacement, alternative-source, or compensating control.

Where unsupported components are tracked (CMDB flag, dedicated EOL register). Linked to vendor product life-cycle calendars.
Time before vendor EOL by which remediation should be planned (e.g., '12 months').
Examples: network isolation, restricted access, increased monitoring, virtual patching via WAF / IPS rules. Reference RA-7 risk acceptance for the formal decision record.
Acquisition / Development Scope → §2.x

Quantitative scope numbers that anchor metrics later in the plan.

Approximate count of external system services (cloud, SaaS, partner) in scope of SA-9.
Approximate count of active acquisition vehicles supporting the system.
Approximate count of in-scope developers (gov, contractor, vendor staff).
Current count of unsupported or pre-EOL components in the SA-22 register.
Acquisition / Development Metrics & KPIs → §6.x

Metrics tracked to demonstrate SA control effectiveness.

    Suggested:
    External-Service Posture Verification → §6.x

    How the org continuously verifies external services remain authorized.

    How often external-service authorization status is checked (FedRAMP marketplace, SOC 2 receipt, ISO certificate currency).
    What happens when an external service falls out of authorization (immediate suspension, grace-period processing, alternate-service fallback).
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the SA control implementations are summarized (e.g., 'SSP §13.12').
    Convention for SA-related POA&M items (e.g., 'POAM-SA-' for general; 'POAM-SA22-' for unsupported-component-specific).
    How SA-10 developer CM feeds CM-2 system baselines and CM-3 change control. Where the handoff line sits (build → release → deploy).
    How SA-11 testing outputs feed RA-5 vulnerability data. SA-15(3) criticality echo with RA-9 system-level criticality.
    Pointer to the SR plan if authored. SA-4 / SA-9 / SA-15(3) are the primary SA-side hooks into SR.
    How artifacts produced by SA-15 secure tooling (SBOMs, signed packages, attestations) feed SI-7 integrity verification.
    How SA-3-mandated developer / acquisition-staff training is delivered through the AT-3 role-based training program.
    Pointer to the CA-7 monitoring strategy document tying SA continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5