Acquisition Process

To meet the FedRAMP Moderate acquisition process requirement, you must build security and privacy requirements into every acquisition contract (or include them by reference) for any system, component, or service you buy. Your contracts must also define required documentation, how that documentation is protected, the target operating environment, and who is responsible for security, privacy, and supply chain risk management (NIST Special Publication 800-53 Revision 5).

Key takeaways:

  • Treat procurement as a security control: contracts must carry explicit security, privacy, assurance, and documentation obligations.
  • “By reference” only works if the referenced standards are identified, versioned, and contractually binding.
  • Assign accountability in writing for security, privacy, and supply chain risk across both parties, not just “the vendor.”

“Acquisition Process” (NIST SP 800-53 Rev. 5 SA-4) is a contract-control requirement disguised as procurement hygiene. For a CCO, GRC lead, or compliance officer supporting FedRAMP Moderate, SA-4 is one of the fastest ways to fail an assessment if your legal templates and buying workflows are not wired into your control set. Auditors typically do not accept “we evaluate vendors” narratives without contract language that makes security requirements enforceable.

Operationally, SA-4 means this: any time your organization purchases a system, system component, or system service that touches the authorization boundary, your acquisition instrument must carry specific categories of requirements. Those categories include security and privacy functional requirements, assurance requirements, controls, required documentation (and protection of that documentation), environmental descriptions, and a clear allocation of responsibility for information security, privacy, and supply chain risk management (NIST Special Publication 800-53 Revision 5).

This page shows how to turn SA-4 into a repeatable intake-to-contract workflow, what artifacts to keep, and what assessors commonly challenge.

Regulatory text

SA-4 requires you to “include the following requirements, descriptions, and criteria, explicitly or by reference, using organization-defined acquisition contracts for the system, system component, or system service: security and privacy functional requirements; strength of mechanism requirements; security and privacy assurance requirements; controls needed to satisfy security and privacy requirements; security and privacy documentation requirements; requirements for protecting security and privacy documentation; description of the system development environment and environment in which the system is intended to operate; and allocation of responsibility or identification of parties responsible for information security, privacy, and supply chain risk management” (NIST Special Publication 800-53 Revision 5).

Operator translation (plain English)

Your contracts must do more than define price and scope. They must:

  • Specify what security/privacy capabilities the third party must provide (functional requirements).
  • Set minimum rigor for security mechanisms (strength of mechanism).
  • Require evidence that controls work (assurance requirements).
  • Call out which controls are required and who implements them (controls needed).
  • List required security/privacy documentation and how it is handled (documentation + protection).
  • Describe where and how the system is built and will run (dev + operating environment).
  • Assign named responsibilities for security, privacy, and supply chain risk management across parties (roles/accountability).

If it isn’t in the contract (or explicitly incorporated by reference), it’s hard to enforce and harder to defend during assessment.

Who it applies to

Entity scope

  • Cloud Service Providers (CSPs) pursuing or maintaining a FedRAMP Moderate authorization.
  • Federal Agencies acquiring systems/services that fall under FedRAMP Moderate expectations (NIST Special Publication 800-53 Revision 5).

Operational scope (what “acquisition contracts” means in practice)

Apply SA-4 to any binding instrument used to obtain:

  • Cloud services (IaaS/PaaS/SaaS), managed services, and hosting.
  • Software licenses, agents, and security tooling that operate in or administer the boundary.
  • System components such as identity services, logging pipelines, encryption modules, CI/CD services, and outsourced development that impacts the boundary.

Include SA-4 in “fast buys” too. Purchase orders, online order forms, DPAs, and click-through terms can create exposure if they override your security exhibits.

What you actually need to do (step-by-step)

Step 1: Define your “acquisition contract” standard and when SA-4 triggers

Create a short internal standard that answers:

  • Which procurement paths are allowed for FedRAMP-bound systems (MSA/SOW, order form, agency template, etc.).
  • What triggers SA-4 review (e.g., boundary impact, privileged access, data processing, hosting, code delivery).
  • Who must sign off (security, privacy, legal, procurement, system owner).

Practical tip: map triggers to your intake form so the workflow routes automatically.

Step 2: Build a contract annex (Security & Privacy Requirements Exhibit)

Implement a reusable exhibit that your legal/procurement team can attach to contracts. It should contain, at minimum, clauses or incorporated references covering each SA-4 category (NIST Special Publication 800-53 Revision 5):

  1. Security and privacy functional requirements
  • Required capabilities (logging, access control, encryption support, tenancy model, data deletion, incident reporting interfaces).
  • Data handling expectations (types of data, permitted processing, location constraints if applicable).
  1. Strength of mechanism requirements
  • Minimum cryptographic and authentication expectations, expressed as requirements your environment can validate.
  • Configuration hardening requirements that match your baseline.
  1. Security and privacy assurance requirements
  • Required assurance activities and deliverables (e.g., control attestation packages, testing support, audit cooperation).
  • Right to request evidence and timelines for responding.
  1. Controls needed to satisfy security and privacy requirements
  • A control responsibility matrix: what the third party does vs. what you do.
  • A requirement to notify you before material control changes (major platform changes, subcontractor changes tied to control performance).
  1. Security and privacy documentation requirements
  • List the artifacts the third party must provide (policies, architecture, data flow, vulnerability management approach, IR procedures, etc.).
  • Format and update expectations.
  1. Requirements for protecting security and privacy documentation
  • Confidentiality handling, access restrictions, storage requirements, onward sharing restrictions, and destruction/return terms.
  1. Description of environments
  • Development environment: where code is developed, tested, and built; how it is isolated; who has access.
  • Intended operating environment: where the service runs, administrative access model, and dependencies that are security-relevant.
  1. Allocation of responsibility / identification of responsible parties
  • Named roles and escalation contacts for security, privacy, and supply chain risk.
  • A clear statement that the third party is accountable for its subcontractors where relevant.

Step 3: Decide what you can “include by reference,” and lock it down

SA-4 permits “explicitly or by reference,” but operationally you need guardrails:

  • Reference specific documents by name and version/date, and state they are incorporated into the agreement (NIST Special Publication 800-53 Revision 5).
  • Prevent a third party from swapping referenced documents unilaterally. Add language requiring written approval for changes to referenced security terms.

Common hangup: contracts that reference a URL that can change without notice. Replace “see our security page” with a controlled, versioned attachment.

Step 4: Integrate SA-4 into the procurement workflow (not a one-off legal exercise)

Embed SA-4 checkpoints into:

  • Third-party intake and risk tiering
  • Security review (architecture + data flow)
  • Privacy review (data processing, retention, disclosures)
  • Legal redlines (MSA/SOW/DPA)
  • Final sign-off gating (no PO, no production access until exhibit is executed)

If you use a third-party risk platform like Daydream, configure a purchase intake workflow that (1) flags boundary-impacting purchases, (2) assigns the right control owners, and (3) stores executed exhibits and referenced documents as assessment-ready evidence.

Step 5: Maintain contract-to-control traceability

Assessors will want to see that your contracts align to your control implementation. Maintain:

  • A contract register for in-scope third parties.
  • A crosswalk from each SA-4 category to the clause/exhibit section where it is satisfied.
  • A responsibility matrix for key controls and a record of deviations/accepted risks.

Step 6: Operate it continuously (renewals, changes, and new subprocessors)

SA-4 breaks quietly during:

  • Renewals that swap paper for click-through terms
  • Product upgrades that introduce new subprocessors
  • Emergency buys that skip security exhibits

Set a process that routes renewals and material scope changes back through the SA-4 contract annex review.

Required evidence and artifacts to retain

Keep these artifacts in a system that supports retrieval by third party and by authorization boundary:

Contractual artifacts

  • Executed MSA/SOW/DPA/order form and Security & Privacy Requirements Exhibit
  • Any referenced security documents incorporated by reference (frozen copies)
  • Redline history or negotiation memo for exceptions and compensating controls

Operational artifacts

  • Third-party intake record (service description, boundary impact)
  • Control responsibility matrix (shared responsibility)
  • Security/privacy documentation received from the third party, plus handling controls for that documentation
  • Approval trail (security, privacy, legal, procurement, system owner)

Change/renewal artifacts

  • Renewal review record and updated exhibit if scope changed
  • Subprocessor/subcontractor notices and your approval/assessment record where relevant

Common exam/audit questions and hangups

Expect questions like:

  • “Show me the executed contract language that requires the third party to meet your security and privacy requirements” (NIST Special Publication 800-53 Revision 5).
  • “Where are assurance requirements defined? What evidence can you compel and how fast?”
  • “What security documentation does the third party have to provide, and how do you protect it?”
  • “Where is the development environment described? How do you know what’s outsourced?”
  • “Who is responsible for supply chain risk management, and how is that responsibility enforced contractually?”

Hangups that slow teams down:

  • Contracts that mention security in general terms but do not state required deliverables.
  • Responsibility matrices that exist internally but are not contractually binding.
  • Referenced documents that are not versioned, or are changeable web links.

Frequent implementation mistakes and how to avoid them

Mistake Why it fails SA-4 Fix
Using a generic NDA as “documentation protection” NDAs rarely specify handling controls for security artifacts Add exhibit language covering access limits, storage, onward sharing, and return/destruction (NIST Special Publication 800-53 Revision 5).
“Vendor will follow industry standard security” Not measurable; not enforceable Specify functional requirements, assurance deliverables, and control responsibilities in writing.
Relying on a SOC report request without contract rights You may not have a right to receive needed evidence Add assurance requirements and audit cooperation terms (NIST Special Publication 800-53 Revision 5).
No description of dev environment Supply chain and build integrity risks remain unaddressed Require a short dev environment description and material change notification.
Procurement bypass during urgent buys Creates untracked, noncompliant commitments Gate production access on execution of the security exhibit and sign-offs.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions.

From a risk perspective, SA-4 exists because your strongest internal controls can be undermined by third-party terms. If you cannot enforce security documentation delivery, incident cooperation, or control responsibilities, you lose practical control over your authorization boundary and inherit unbounded supply chain risk (NIST Special Publication 800-53 Revision 5).

Practical 30/60/90-day execution plan

Use this phased plan to operationalize SA-4 without stalling procurement.

First 30 days (Immediate stabilization)

  • Inventory in-scope third parties that support or touch the FedRAMP boundary.
  • Identify which contracts lack a security/privacy exhibit or have weak “by reference” terms.
  • Publish an SA-4 trigger checklist in procurement intake (boundary impact, privileged access, data processing, hosting, code delivery).
  • Draft your Security & Privacy Requirements Exhibit that covers every SA-4 category (NIST Special Publication 800-53 Revision 5).

Next 60 days (Workflow integration)

  • Update contract templates and playbooks for legal and procurement.
  • Implement approval routing: security, privacy, legal, system owner.
  • Create a contract-to-control crosswalk so assessors can see exactly where each SA-4 element is met.
  • Start remediating high-risk contracts first (privileged access, hosting, core security dependencies).

Next 90 days (Sustainment)

  • Add renewal and change-management hooks so SA-4 is rechecked when scope changes.
  • Build a central evidence repository with frozen copies of incorporated-by-reference documents.
  • Run an internal audit tabletop: pick a third party and prove you can produce the executed clauses, required documentation list, protection requirements, and responsibility assignments on demand.

Frequently Asked Questions

Does SA-4 apply to small purchases like SaaS tools bought on a corporate card?

Yes if the tool is a system, component, or service tied to the authorization boundary or handles in-scope data. You need a workflow that flags these purchases and requires the right contract terms before production use (NIST Special Publication 800-53 Revision 5).

What does “explicitly or by reference” mean in a contract review?

You can either write the requirements directly into the agreement or incorporate a specific, versioned document that contains them. “By reference” should still be binding, identifiable, and protected from silent changes (NIST Special Publication 800-53 Revision 5).

Do we have to include all SA-4 elements in a single exhibit?

No, but you must be able to point to where each required element is satisfied across the contract package. Most teams use one exhibit to reduce negotiation errors and evidence gaps (NIST Special Publication 800-53 Revision 5).

How do we handle third parties that refuse audit rights or detailed assurance terms?

Document the exception, assess the risk, and implement compensating controls where possible, but recognize the residual risk and the assessment exposure. If the third party supports critical boundary functions, consider alternatives or architectural isolation (NIST Special Publication 800-53 Revision 5).

What security documentation should we require from third parties?

Require documentation that proves they can meet your security and privacy requirements and that you can assess and monitor them over time. The contract should also state how those artifacts are protected and who can access them (NIST Special Publication 800-53 Revision 5).

How does SA-4 relate to supply chain risk management?

SA-4 explicitly requires allocation of responsibility for supply chain risk management in acquisition contracts. In practice, that means defining subcontractor accountability, notification duties, and which party owns specific supply chain controls (NIST Special Publication 800-53 Revision 5).

Frequently Asked Questions

Does SA-4 apply to small purchases like SaaS tools bought on a corporate card?

Yes if the tool is a system, component, or service tied to the authorization boundary or handles in-scope data. You need a workflow that flags these purchases and requires the right contract terms before production use (NIST Special Publication 800-53 Revision 5).

What does “explicitly or by reference” mean in a contract review?

You can either write the requirements directly into the agreement or incorporate a specific, versioned document that contains them. “By reference” should still be binding, identifiable, and protected from silent changes (NIST Special Publication 800-53 Revision 5).

Do we have to include all SA-4 elements in a single exhibit?

No, but you must be able to point to where each required element is satisfied across the contract package. Most teams use one exhibit to reduce negotiation errors and evidence gaps (NIST Special Publication 800-53 Revision 5).

How do we handle third parties that refuse audit rights or detailed assurance terms?

Document the exception, assess the risk, and implement compensating controls where possible, but recognize the residual risk and the assessment exposure. If the third party supports critical boundary functions, consider alternatives or architectural isolation (NIST Special Publication 800-53 Revision 5).

What security documentation should we require from third parties?

Require documentation that proves they can meet your security and privacy requirements and that you can assess and monitor them over time. The contract should also state how those artifacts are protected and who can access them (NIST Special Publication 800-53 Revision 5).

How does SA-4 relate to supply chain risk management?

SA-4 explicitly requires allocation of responsibility for supply chain risk management in acquisition contracts. In practice, that means defining subcontractor accountability, notification duties, and which party owns specific supply chain controls (NIST Special Publication 800-53 Revision 5).

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
FedRAMP Moderate Acquisition Process: Implementation Guide | Daydream