AC-20(1) - Use of External Systems | Limits on Authorized Use

Permit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after: (a) Verification of the implementation of controls on the external system as specified in the organization’s security and privacy policies and security and privacy plans; or (b) Retention of approved system connection or processing agreements with the organizational entity hosting the external system.


ID: AC-20(1)
Enhancement of : AC-20

Space Segment Guidance

Before onboarding external stations or networks, consider how they demonstrate alignment with mission expectations: operator and facility vetting, key custody and revocation practices, RF configuration discipline, time sync, and the ability to honor pass schedules and emergency procedures. Evidence of these capabilities, and how they are maintained, helps ensure the connection behaves predictably under time pressure.