Unsupported System Components
The unsupported system components requirement (NIST SP 800-53 Rev. 5 SA-22) means you must replace any system component once the developer, vendor, or manufacturer no longer supports it, and you must pre-plan acceptable alternatives for continued support when replacement cannot happen immediately. Operationally, this is an asset and lifecycle control tied to patching, procurement, and risk acceptance. 1
Key takeaways:
- Maintain an authoritative inventory that records support status and end-of-support dates for software, hardware, and managed services.
- Define a repeatable decision path: replace, obtain alternative support, or formally approve time-bound exceptions with compensating controls.
- Retain evidence that you continuously monitor support status and can prove timely action for every unsupported component.
“Unsupported” is not a technical nuance; it is a compliance and security boundary. The moment a developer, vendor, or manufacturer ends support, you lose reliable security patches, compatibility fixes, and often incident-response help. SA-22 forces you to treat that moment as an operational trigger: replace the component, or document a defensible plan for continued support from an alternative source while you transition. 1
For a Compliance Officer, CCO, or GRC lead, the goal is speed and repeatability. You are not trying to win an argument about whether something is “still working.” You are building a system that (1) detects approaching end-of-support, (2) routes ownership to the right technical and procurement teams, (3) drives timely replacement or alternative support arrangements, and (4) preserves auditable proof.
This page focuses on how to implement SA-22 in a FedRAMP Moderate context for cloud environments, where “components” include operating systems, databases, container base images, network appliances, agents, third-party managed services, and even embedded dependencies that ship inside your platform.
Regulatory text
Requirement (SA-22): “Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer; and provide options for alternative sources for continued support for unsupported components.” 1
Operator interpretation (plain English)
- You cannot run production on components past end-of-support without a controlled response. “Replace” is the default action.
- If you cannot replace immediately, you must have options for continued support. That means documented, feasible alternatives such as extended support contracts, third-party support providers, or migration paths that maintain security patching and operational assistance.
- This is lifecycle governance, not a one-time cleanup. Auditors will look for a living process that prevents end-of-support surprises.
Who it applies to
Entity scope
- Cloud Service Providers operating systems in scope for FedRAMP Moderate authorizations. 1
- Federal Agencies operating or inheriting systems where unsupported components could exist in agency-managed layers or agency-integrated tooling. 1
Operational scope: what counts as a “system component”
Treat “component” broadly so you do not fail on a technicality:
- Infrastructure: hypervisors, host OS, network devices, load balancers, VPN gateways, HSMs.
- Platform/runtime: Kubernetes versions, container runtimes, service meshes, API gateways.
- OS and middleware: Windows/Linux distributions, database engines, web servers, JVM/.NET runtimes.
- Agents and security tools: EDR agents, vulnerability scanners, logging forwarders.
- Third-party managed services: hosted databases, messaging services, CI/CD platforms, IdP services that are part of your authorization boundary.
- Packaged dependencies you ship: base images, embedded libraries, and bundled appliances if you control update cadence.
Rule of thumb for scoping: if it is required to deliver the system’s security or functionality, track its support status and replacement path.
What you actually need to do (step-by-step)
Step 1: Establish an authoritative component inventory with support attributes
Minimum fields to add to your CMDB, asset inventory, or equivalent:
- Component name, version, owner, environment (prod/non-prod), and system boundary mapping
- Vendor/developer/manufacturer
- Support status (supported, extended support, end-of-support, unknown)
- End-of-support date and link to vendor lifecycle notice (or contract term)
- Replacement/migration candidate and target version
- Dependencies (what breaks if you upgrade/replace)
Operational tip: “Unknown” is a risk state. Set ownership and force resolution.
Step 2: Define the “unsupported” trigger and escalation path
Write a short standard that states:
- Support is “available” only if the vendor (or contracted support provider) will provide security fixes and operational support for your version/edition.
- The trigger is the vendor’s published end-of-support/end-of-life date or contractual support end date.
- When triggered, the component must enter a tracked remediation workflow with an assigned due date and decision (replace vs. alternative support vs. exception).
Make it easy to execute: a ticket template, an intake form, and a clear RACI.
Step 3: Build a replacement and upgrade workflow that engineering will actually follow
Your workflow should include:
- Impact analysis: identify affected services, data flows, and change windows.
- Upgrade path selection: supported target versions and intermediate steps if required.
- Testing plan: regression, performance, security (include rollback).
- Deployment execution: infrastructure-as-code updates, golden images, AMIs, container base image rebuilds, etc.
- Post-change validation: vulnerability scan results, service health, and logging verification.
Auditors rarely care about your tooling. They care that you can show repeatable execution and closure.
Step 4: Pre-approve “alternative sources of continued support” options
SA-22 explicitly requires options. Build a short catalog of acceptable choices, for example:
- Extended support from the original vendor (contract addendum, SKU, or subscription tier).
- Third-party support provider (contracted support with scope and SLAs defined).
- Managed service transition where the managed provider remains responsible for supported versions (document shared responsibility boundaries).
- Temporary isolation strategy as a compensating control while replacement proceeds (network segmentation, restricted access paths), paired with an approved plan to regain supported status.
Do not treat “we’ll be careful” as a support option. Support is about patchability and expert assistance.
Step 5: Control exceptions tightly (and make them rare)
You need an exception mechanism for cases where replacement is infeasible in the short term. Your exception package should include:
- Business justification and why replacement is blocked
- Risk assessment: known exposure, exploitability considerations, and operational impact
- Compensating controls (segmentation, allowlisting, hardened configuration, monitoring)
- A dated remediation plan with milestones and accountable owner
- Approver(s): security leadership and system owner; include compliance review
The key is traceability: every unsupported component must map to either a closed replacement or an approved exception with a plan.
Step 6: Continuous monitoring and reporting
Establish ongoing monitoring inputs:
- Vendor lifecycle advisories and product bulletins
- Vulnerability scanner signals that imply end-of-support (for example, “no vendor patches available” flags)
- Internal architecture reviews and change management feeds
Create a recurring report for leadership:
- Unsupported components (current)
- Components approaching end-of-support (upcoming)
- Exceptions and their progress toward closure
Step 7: Tie SA-22 into third-party and procurement controls
Unsupported risk often starts with purchasing decisions. Add procurement guardrails:
- Require lifecycle/support commitments in contracts for third parties providing components inside your boundary
- Require notice periods for end-of-support, and rights to obtain extended support
- Require SBOM-style visibility where applicable for embedded components you cannot directly patch (track as lifecycle risk even if you do not cite SBOM requirements here)
If you use Daydream to manage third-party due diligence, treat vendor lifecycle commitments and end-of-support notice clauses as standard contract and evidence requests, then map resulting artifacts back to your SA-22 inventory and exception workflow.
Required evidence and artifacts to retain
Auditors will ask for proof that this is operational, not aspirational. Retain:
- Component inventory export showing support status and end-of-support dates
- Vendor lifecycle evidence (vendor pages, notices, contract language) for sampled components
- Tickets/change records for replacements: approvals, test evidence, deployment logs, closure notes
- Exception approvals for unsupported components: risk acceptance memo, compensating controls, remediation plan
- Monitoring evidence: meeting minutes, recurring reports, alerts, or runbooks showing how end-of-support is detected
- Policies/standards: lifecycle management standard and exception process documentation
Practical approach: pre-build an “SA-22 evidence packet” folder per quarter with the above artifacts so you are never assembling it during an audit.
Common exam/audit questions and hangups
Expect questions like:
- “Show me all unsupported components in the authorization boundary today.”
- “How do you know a component is approaching end-of-support?”
- “Pick one unsupported component. Walk me from detection through remediation or approved exception.”
- “What are your approved alternative support options, and where are they documented?”
- “How do you ensure third parties that provide managed components keep them supported?”
Hangup that burns teams: an inventory that lists assets but not version and support status. Without those fields, you cannot prove SA-22 control effectiveness.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating SA-22 as an annual spreadsheet exercise.
Fix: integrate lifecycle triggers into change management and vulnerability management workflows so unsupported status creates work automatically. -
Mistake: Assuming “managed service” means “supported.”
Fix: document responsibility boundaries and obtain contractual confirmation that the managed layer remains supported, including versioning policy where possible. -
Mistake: Allowing indefinite exceptions.
Fix: require an accountable owner, dated remediation plan, and periodic re-approval; escalate stale exceptions to leadership. -
Mistake: Missing “hidden” components (base images, embedded libraries, appliances).
Fix: define component categories and require engineering teams to register new runtime/platform dependencies at design review. -
Mistake: No defined alternative support options.
Fix: pre-negotiate acceptable options with procurement and security so teams are not improvising during an incident or audit.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions. Practically, unsupported components correlate with higher exposure because security fixes and vendor guidance stop. In FedRAMP assessments, unsupported components commonly drive POA&Ms, delay authorization timelines, and increase scrutiny of risk acceptance packages.
Practical 30/60/90-day execution plan
First 30 days: Establish visibility and decision rights
- Stand up the inventory fields (support status, end-of-support date, owner).
- Identify authoritative sources for lifecycle status (vendor notices, contracts).
- Draft and approve the SA-22 standard: definitions, trigger, RACI, and exception requirements.
- Run an initial sweep to classify components into supported/unknown/unsupported.
Next 60 days: Drive remediation and lock in alternatives
- Open remediation tickets for unsupported components; prioritize those in production and security-critical paths.
- Create the “alternative support options” catalog and procurement checklist language.
- Implement an exception workflow with required fields and approvers.
- Build a recurring lifecycle report for leadership and system owners.
By 90 days: Prove repeatability and audit readiness
- Close high-risk replacements where feasible; document test and deployment evidence.
- For remaining items, ensure every unsupported component has an approved exception and a tracked remediation plan.
- Run a mock audit: sample components, trace evidence from lifecycle notice to closure.
- Package a quarterly SA-22 evidence bundle for easy assessor review.
Frequently Asked Questions
What exactly counts as “support is no longer available”?
Use the vendor’s published end-of-support/end-of-life statements or the end date in your support contract. If the vendor will not provide security fixes or support for your version, treat it as unsupported. 1
Can we keep an unsupported component if it’s isolated and behind multiple layers of security?
SA-22 still expects replacement, but it allows you to document alternative support options and manage exceptions. Isolation can be a compensating control in an exception package; it is not a substitute for supportability. 1
Does SA-22 apply to open-source software?
The requirement is about whether support is available from the developer/vendor/manufacturer for the component. For open source, define what “support” means in your program (for example, maintained upstream project, commercial support contract, or managed distribution) and document it consistently. 1
How should we handle third-party managed services in our boundary?
Treat the managed service as a component with a support status and documented responsibility boundary. Keep contracts, service descriptions, or provider attestations that show supported versions and lifecycle commitments where available. 1
What evidence do auditors typically want for “alternative sources for continued support”?
They want proof the option is real and in force: contracts, support SKUs, statements of work, or documented provider arrangements. A slide that lists “third-party support” without an agreement usually fails sampling.
Our inventory tool doesn’t track end-of-support dates. Is that a finding?
It becomes a problem if you cannot show a reliable method to detect end-of-support and drive replacement or exceptions. If the tool cannot store the fields, maintain an authoritative lifecycle register and link it to change tickets until the tool catches up. 1
Footnotes
Frequently Asked Questions
What exactly counts as “support is no longer available”?
Use the vendor’s published end-of-support/end-of-life statements or the end date in your support contract. If the vendor will not provide security fixes or support for your version, treat it as unsupported. (Source: NIST Special Publication 800-53 Revision 5)
Can we keep an unsupported component if it’s isolated and behind multiple layers of security?
SA-22 still expects replacement, but it allows you to document alternative support options and manage exceptions. Isolation can be a compensating control in an exception package; it is not a substitute for supportability. (Source: NIST Special Publication 800-53 Revision 5)
Does SA-22 apply to open-source software?
The requirement is about whether support is available from the developer/vendor/manufacturer for the component. For open source, define what “support” means in your program (for example, maintained upstream project, commercial support contract, or managed distribution) and document it consistently. (Source: NIST Special Publication 800-53 Revision 5)
How should we handle third-party managed services in our boundary?
Treat the managed service as a component with a support status and documented responsibility boundary. Keep contracts, service descriptions, or provider attestations that show supported versions and lifecycle commitments where available. (Source: NIST Special Publication 800-53 Revision 5)
What evidence do auditors typically want for “alternative sources for continued support”?
They want proof the option is real and in force: contracts, support SKUs, statements of work, or documented provider arrangements. A slide that lists “third-party support” without an agreement usually fails sampling.
Our inventory tool doesn’t track end-of-support dates. Is that a finding?
It becomes a problem if you cannot show a reliable method to detect end-of-support and drive replacement or exceptions. If the tool cannot store the fields, maintain an authoritative lifecycle register and link it to change tickets until the tool catches up. (Source: NIST Special Publication 800-53 Revision 5)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream