SA-4 - Acquisition Process

Include the following requirements, descriptions, and criteria, explicitly or by reference, using [Selection (one or more): standardized contract language; [Assignment: organization-defined contract language] ] in the acquisition contract for the system, system component, or system service: a. Security and privacy functional requirements; b. Strength of mechanism requirements; c. Security and privacy assurance requirements; d. Controls needed to satisfy the security and privacy requirements. e. Security and privacy documentation requirements; f. Requirements for protecting security and privacy documentation; g. Description of the system development environment and environment in which the system is intended to operate; h. Allocation of responsibility or identification of parties responsible for information security, privacy, and supply chain risk management; and i. Acceptance criteria.


ID: SA-4
Enhancements:  1 | 2 | 3 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12

Space Segment Guidance

Acquisition requirements work best when they pair what functions are needed with how assurance will be shown. Specify security functions (e.g., command authentication, partitioning, telemetry integrity, secure boot) alongside deliverable evidence (design descriptions, verification plans, interface specs, performance bounds). Favor artifacts aligned to mission realities: image/bitstream provenance, key-handling procedures, mode-dependent behavior, and twin/RF-emulation results that show robustness under degraded conditions.