Use of External Systems | Limits on Authorized Use
To meet the “Use of External Systems | Limits on Authorized Use” requirement, you must block users from accessing your FedRAMP-authorized system (or handling your controlled data) from any external system until you have verified that the external system’s controls meet your documented security and privacy requirements. Operationally, this means an approval workflow, defined control checks, technical enforcement, and auditable evidence of verification. 1
Key takeaways:
- “External system” access is conditional: no verification, no access. 1
- Verification must be tied to what your own policies and plans require, not ad hoc “looks fine” decisions. 1
- Auditors will expect both technical enforcement (how you block/allow) and governance evidence (how you approve/review/exceptions). 1
This requirement (NIST SP 800-53 Rev. 5 AC-20(1)) addresses a common failure mode in cloud and regulated environments: people can touch organization-controlled information from devices, networks, or third-party environments you don’t manage. “External systems” include contractor laptops, partner networks, personal devices, third-party SaaS tenants, and developer environments outside the authorization boundary. If you allow those systems to connect to your production environment or handle controlled data, you inherit their weaknesses unless you verify their controls first. 1
For a Compliance Officer, CCO, or GRC lead, the fastest path to operationalizing AC-20(1) is to translate it into: (1) a clear definition of what counts as an external system and what use-cases are in scope, (2) a verification standard mapped to your security and privacy policies and security/privacy plans, (3) an access path that enforces the decision (SSO, device posture checks, network allowlists, VDI, or equivalent), and (4) durable evidence that approvals and re-verifications happened. FedRAMP assessors will test both the procedure and whether you can prove it operated as written. 2
Regulatory text
Requirement (verbatim): “Permit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after verification of the implementation of controls on the external system as specified in the organization's security and privacy policies and security and privacy plans.” 1
What the operator must do:
- Identify external systems and external use paths that could access your system or handle your controlled information.
- Define the specific controls that must exist on those external systems (your standard comes from your own policies and security/privacy plans).
- Verify those controls are implemented before allowing access or data handling, and re-verify on a defined cadence or when risk changes.
- Enforce the decision technically so “not verified” cannot quietly become “still connected.” 1
Plain-English interpretation (requirement intent)
You are allowed to let approved people work from outside environments, but only if you have checked that the outside environment meets your security and privacy bar. This is a gate: verification is the prerequisite for access or for processing/storing/transmitting organization-controlled information. A manager saying “they’re trusted” does not satisfy AC-20(1) unless it’s backed by defined control expectations and verification evidence aligned to your documented program. 1
Who it applies to (entity and operational context)
Applies to:
- Cloud Service Providers (CSPs) operating a FedRAMP-authorized cloud service offering and managing access to systems/data within the authorization boundary. 1
- Federal Agencies consuming the service, when agency personnel/contractors access the system or handle controlled information via external systems. 1
Operational contexts in scope (typical examples):
- Contractors connecting from their corporate endpoint to your admin consoles or support tools.
- Developers connecting from non-managed workstations to production, staging, or CI/CD systems that touch controlled data.
- External SaaS or analytics platforms receiving exports of organization-controlled information.
- Partners or agencies connecting over federated access from an identity provider outside your control. 1
What you actually need to do (step-by-step)
Step 1: Define “external system” and in-scope data/actions
Create a short standard that answers, in one page:
- What counts as an external system (examples: non-corporate endpoints, third-party networks, third-party SaaS tenants, unmanaged VMs).
- What actions are covered: access to the system; processing/storing/transmitting organization-controlled information. 1
Deliverable: “External System Access Standard” mapped to your security and privacy policies and security/privacy plans. 1
Step 2: Set minimum verification criteria (control checklist)
Build a checklist of controls required on the external system based on your policies/plans. Keep it practical and testable. Example categories:
- Identity and access controls (MFA, strong authentication, session timeout expectations).
- Endpoint security (supported OS, patching, EDR/anti-malware, disk encryption).
- Data protections (no local storage of controlled data unless encrypted and approved; secure transfer methods).
- Monitoring/logging expectations relevant to the external system’s role.
- Administrative restrictions (no local admin, secure configuration baseline).
Tip: Write criteria in pass/fail form with acceptable evidence types (screenshot, MDM report, SOC 2 report, attestation, technical test output). 1
Step 3: Implement an approval workflow (“verification before access”)
Define a workflow that cannot be skipped:
- Requestor submits: external system type, owner, use-case, data types, duration, and access method.
- Security/GRC validates: checklist evidence, third-party assurances (if applicable), and policy alignment.
- System owner authorizes: explicit allow decision tied to the verified system and use-case.
- Access is provisioned only after approval; exceptions follow a separate documented path.
Make it measurable: every approved external system gets an approval record ID and an expiration/review trigger. 1
Step 4: Enforce it technically (don’t rely on policy alone)
Auditors will ask how you prevent access from unknown/unverified systems. Common enforcement patterns:
- Device posture-based access via IdP/conditional access (allow only managed/healthy devices).
- Network restrictions (VPN with device certificates; IP allowlists only when paired with identity controls).
- Jump hosts / VDI for admins: external endpoints never directly touch production; they connect to a controlled intermediary.
- CASB/DLP controls for exports to external SaaS destinations.
- Service controls: restrict API tokens, require approved OAuth apps, restrict admin actions to hardened workstations.
Pick one or combine. The key is that the enforcement maps to your “verification” decision. 1
Step 5: Define re-verification and revocation triggers
Set re-verification rules that are event-driven, not calendar-only:
- Change of device owner or management status.
- Material OS/version change.
- Security incident involving the external system or third party.
- Policy/control baseline change.
- Contract end, role change, or access no longer needed.
Also define automatic revocation for: failed verification, stale verification, or inability to produce evidence. 1
Step 6: Document it in FedRAMP system artifacts
Make sure your implementation is reflected in the system’s documentation set and your continuous monitoring approach. Use FedRAMP templates to keep narratives consistent across SSP/process descriptions and evidence packages. 3
Required evidence and artifacts to retain
Keep evidence tight and retrievable. Examiners commonly want a trail from policy → verification standard → approvals → enforcement proof.
Minimum evidence set (practical):
- External System Access Standard and associated procedures (approved, versioned). 1
- Verification checklist/control criteria mapped to policy and security/privacy plans. 1
- Access requests and approvals (ticket/workflow records), including approver identity and date. 1
- Verification results (MDM compliance report, device posture log, attestation, third-party assessment excerpt where permitted).
- Exception records: business justification, compensating controls, expiration, and sign-offs. 1
- Technical enforcement configuration evidence (conditional access rules, VPN/device certificate requirements, VDI/jump box architecture, DLP policies).
- Periodic review outputs: lists of authorized external systems/users, review notes, and removal actions. 1
Where Daydream fits: Daydream can act as the system of record for third-party and external-system approvals, retaining request/approval/review evidence and linking it back to the exact control requirement and SSP narrative your assessor will test. 3
Common exam/audit questions and hangups
Expect assessors to probe these areas:
- “Define external system in your environment. Show examples that are in scope.” 1
- “Show me the verification criteria and where it’s required in policy/plan.” 1
- “Pick three users who access from external systems. Prove verification happened before access was granted.” 1
- “What prevents a user from signing in from a non-verified device today?” 1
- “How do you handle contractors and third parties? Who owns the risk decision?” 1
- “Show exceptions and prove they expire or get re-approved.” 1
Frequent implementation mistakes (and how to avoid them)
- Policy-only control with no enforcement. Fix: require conditional access/device compliance or controlled access paths (VDI/jump host) so “unverified” can’t connect. 1
- Vague verification (“reviewed by security”). Fix: a checklist with objective evidence types and explicit pass/fail outcomes. 1
- Treating third-party SaaS as “not an external system.” Fix: if it processes/stores/transmits organization-controlled information, it is in scope; verify controls through your third-party due diligence and technical restrictions. 1
- No re-verification triggers. Fix: event-driven triggers plus periodic review as a backstop, with defined revocation rules. 1
- Approvals not tied to a specific system and use-case. Fix: approve a named device/tenant/environment for a defined purpose and duration; don’t approve “contractor access” broadly. 1
Risk implications (why this fails in real incidents)
External systems expand your attack surface in ways your boundary controls may not catch: compromised contractor endpoints, unmanaged devices with weak patching, third-party SaaS misconfiguration, or identity federation weaknesses. Under FedRAMP scrutiny, the operational risk becomes an authorization risk: if you cannot show verification and enforcement, assessors can record control failures that delay authorization or trigger continuous monitoring findings. 2
Practical 30/60/90-day execution plan
First 30 days (stabilize and stop the bleeding)
- Inventory external access paths: admin access, support access, developer access, data exports, federated identity.
- Publish the External System Access Standard with a short definition and scope.
- Stand up an interim approval workflow (tickets) with required fields and designated approvers.
- Implement one hard technical gate for high-risk access (admin access via VDI/jump host or device-compliant conditional access). 1
Days 31–60 (make verification repeatable)
- Convert verification criteria into a checklist with evidence requirements and exception handling.
- Build a register of approved external systems and their verification status (owner, purpose, expiration).
- Add event-driven triggers into IAM/ITSM processes (role change, contract end, device no longer managed).
- Align documentation to FedRAMP artifacts and evidence packaging conventions. 3
Days 61–90 (scale and prepare for testing)
- Expand enforcement to remaining access paths (API, data export, partner connectivity).
- Run an internal “assessor-style” sample test: select users and prove verification-before-access with evidence.
- Operationalize recurring reviews and revocations; verify exceptions are time-bound and re-approved.
- Move records and evidence into a system that survives staff turnover and produces audit-ready exports (Daydream can serve as that audit system of record). 1
Frequently Asked Questions
What counts as an “external system” for AC-20(1)?
Any system outside your direct authorization boundary or organizational control that a person uses to access your system or handle your organization-controlled information can be an external system. Treat endpoints, networks, and third-party SaaS environments as in scope if they touch the data or the system. 1
Does this apply to personal devices (BYOD)?
Yes if a personal device is used to access the system or process/store/transmit organization-controlled information. If you can’t verify required controls on BYOD, block it and provide a controlled alternative like VDI. 1
What does “verification” need to look like in practice?
Verification should be objective and evidence-based (for example, MDM compliance state, device encryption status, EDR presence, or a third-party assurance artifact for a SaaS environment). The key is that your verification matches what your policies and security/privacy plans require. 1
How do we handle contractors working from their company laptops?
Require either (a) device compliance checks that you can verify, or (b) a controlled access path where the contractor laptop only reaches a managed jump host/VDI and cannot directly access production. Document approvals, verification evidence, and revocation triggers in the contractor onboarding/offboarding flow. 1
Are exports to third-party SaaS (analytics, ticketing, collaboration) covered?
If the third-party system will process/store/transmit organization-controlled information, it is covered. Verification typically runs through third-party due diligence plus technical controls that restrict what data can be sent and by whom. 1
What evidence is most persuasive to a FedRAMP assessor?
A clean chain: policy/standard → checklist criteria → dated approval record → dated verification evidence → technical configuration showing the gate. FedRAMP templates help keep this consistent across SSP narratives and assessment packages. 3
Footnotes
Frequently Asked Questions
What counts as an “external system” for AC-20(1)?
Any system outside your direct authorization boundary or organizational control that a person uses to access your system or handle your organization-controlled information can be an external system. Treat endpoints, networks, and third-party SaaS environments as in scope if they touch the data or the system. (Source: NIST Special Publication 800-53 Revision 5)
Does this apply to personal devices (BYOD)?
Yes if a personal device is used to access the system or process/store/transmit organization-controlled information. If you can’t verify required controls on BYOD, block it and provide a controlled alternative like VDI. (Source: NIST Special Publication 800-53 Revision 5)
What does “verification” need to look like in practice?
Verification should be objective and evidence-based (for example, MDM compliance state, device encryption status, EDR presence, or a third-party assurance artifact for a SaaS environment). The key is that your verification matches what your policies and security/privacy plans require. (Source: NIST Special Publication 800-53 Revision 5)
How do we handle contractors working from their company laptops?
Require either (a) device compliance checks that you can verify, or (b) a controlled access path where the contractor laptop only reaches a managed jump host/VDI and cannot directly access production. Document approvals, verification evidence, and revocation triggers in the contractor onboarding/offboarding flow. (Source: NIST Special Publication 800-53 Revision 5)
Are exports to third-party SaaS (analytics, ticketing, collaboration) covered?
If the third-party system will process/store/transmit organization-controlled information, it is covered. Verification typically runs through third-party due diligence plus technical controls that restrict what data can be sent and by whom. (Source: NIST Special Publication 800-53 Revision 5)
What evidence is most persuasive to a FedRAMP assessor?
A clean chain: policy/standard → checklist criteria → dated approval record → dated verification evidence → technical configuration showing the gate. FedRAMP templates help keep this consistent across SSP narratives and assessment packages. (Source: FedRAMP documents and templates)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream