Part 18: System and Services Acquisition (SA)

When all the I’s are dotted and T’s crosed,  have you ensured the SOW include details to validate the use of ports, protocols and functions? What about system documentation for the custom app -users guides, testing? Check out our 2-minute review of three SA controls that should be on your radar in the NIST SP 800-53 Rev 5 cybersecurity framework (CSF).

#cybersecurity #InfoSec #nistnotes #nistcyber 

Previous
Previous

Part 19: Systems and Communications Protection (SC)

Next
Next

Part 17: Risk Assessment (RA)