Part 18: System and Services Acquisition (SA)
When all the I’s are dotted and T’s crosed, have you ensured the SOW include details to validate the use of ports, protocols and functions? What about system documentation for the custom app -users guides, testing? Check out our 2-minute review of three SA controls that should be on your radar in the NIST SP 800-53 Rev 5 cybersecurity framework (CSF).
#cybersecurity #InfoSec #nistnotes #nistcyber