External System Services
To meet the FedRAMP Moderate “External System Services” requirement, you must contractually require every third party that provides external system services to follow your security and privacy requirements, then document who in your organization oversees those services and what users are allowed to do. Your fastest path is a standard contract addendum, a control inheritance/implementation mapping, and named oversight roles with recurring review.
Key takeaways:
- Put your requirements in writing: contracts must bind external service providers to your security and privacy controls (NIST Special Publication 800-53 Revision 5).
- Document governance: define oversight and user roles/responsibilities for each external system service (NIST Special Publication 800-53 Revision 5).
- Treat this like a control boundary problem: clarify what you own vs. what the external provider owns, then retain evidence.
“External system services” is one of the easiest places for FedRAMP programs to drift into audit pain: data moves outside your boundary, teams buy SaaS quickly, and responsibilities become tribal knowledge. SA-9 fixes that by forcing two things into the open: (1) your providers must be obligated to meet your security and privacy requirements, and (2) your organization must define and document who oversees those providers and how users interact with those services (NIST Special Publication 800-53 Revision 5).
For a Compliance Officer, CCO, or GRC lead, operationalizing SA-9 means translating a control statement into repeatable procurement and governance mechanics. You are building a defensible chain from “we require controls” to “the provider agreed” to “we monitor performance” to “our users follow rules.” This page gives you requirement-level guidance you can implement quickly: what it applies to, concrete steps, what to retain as evidence, and the exam questions that typically expose gaps.
Regulatory text
SA-9 requires you to: “Require that providers of external system services comply with organizational security and privacy requirements and employ organization-defined controls; and define and document organizational oversight and user roles and responsibilities with regard to external system services.” (NIST Special Publication 800-53 Revision 5)
Operator translation (what you must do):
- Make external providers contractually accountable to your security and privacy requirements, including any organization-defined controls that apply to the service.
- Define oversight (who manages the relationship, who approves changes, who reviews reports, who accepts risk).
- Define user roles/responsibilities (who can access the service, what they are allowed to do, and what they must not do).
- Document it so an assessor can trace requirements to agreements, responsibilities, and evidence (NIST Special Publication 800-53 Revision 5).
Plain-English interpretation
SA-9 is a governance-and-contract control for third-party services that connect to, process, store, or transmit your data or support your mission systems. You are not allowed to “assume the provider handles security.” You must (a) tell them what you require, (b) get them to agree, and (c) assign internal owners to oversee the service and control how users interact with it (NIST Special Publication 800-53 Revision 5).
The practical intent: reduce “unknown inherited risk” created by SaaS, hosting, managed services, external APIs, and outsourced IT functions.
Who it applies to
Entities: Cloud Service Providers and Federal Agencies operating in a FedRAMP Moderate context (NIST Special Publication 800-53 Revision 5).
Operational context (what counts as an external system service):
- SaaS used for business functions (ticketing, CRM, HR, logging/monitoring platforms).
- IaaS/PaaS hosting outside your direct administrative control.
- Managed security service providers (MSSPs), SOC providers, managed detection and response.
- External identity, authentication, or email services.
- Third-party platforms that receive your data via API or batch file transfer.
Rule of thumb: if the service is outside your authorization boundary and your data or operational dependency crosses into it, treat it as an external system service and apply SA-9 controls.
What you actually need to do (step-by-step)
Step 1: Build and maintain an inventory of external system services
- Create a single list that includes: provider name, service name, business owner, technical owner, data types, integration points, and whether the service is mission critical.
- Tie each service to a system boundary decision: inside authorization boundary, outside boundary but connected, or fully standalone.
- If your organization already has a third-party inventory, add SA-9-specific fields: “security/privacy requirements flowed down,” “oversight role assigned,” and “user responsibilities documented.”
Execution tip: most programs fail here because procurement and IT asset inventories don’t capture “shadow SaaS.” Require finance/procurement intake and SSO app catalogs to feed this list.
Step 2: Define your organization’s security and privacy requirements for external providers
- Create a baseline “external system services requirements” set that includes:
- Required controls (or control objectives) the provider must meet.
- Required reporting (incident notification, audit/support obligations).
- Data handling requirements (access restrictions, subcontractor controls).
- Keep it organization-defined: you decide which requirements apply based on risk and your system’s needs (NIST Special Publication 800-53 Revision 5).
Practical approach: start with your existing security/privacy policy requirements and turn them into a provider-facing checklist plus contract language.
Step 3: Flow requirements down through contracting and procurement
For each external system service:
- Add contract clauses or an addendum requiring compliance with your security and privacy requirements and specified controls (NIST Special Publication 800-53 Revision 5).
- Ensure contracts cover:
- Scope of services and data flows.
- Right to receive evidence (reports, attestations, security documentation).
- Incident reporting and cooperation.
- Subcontractor obligations (flow-down).
- Termination/exit and data return/destruction expectations.
Common hangup: security reviews occur after purchase. Fix by adding a procurement gate: “no contract signature without security/privacy addendum acceptance or an approved exception.”
Step 4: Map responsibilities (provider vs. you) and document oversight
Create a per-service “oversight and responsibility record”:
- Organizational oversight: name the accountable owner (business), the technical owner, and the risk/compliance reviewer.
- Decision rights: who approves onboarding, who approves major configuration changes, who accepts residual risk, who approves new integrations or data types.
- Monitoring duties: who reviews provider notices, SLAs, security bulletins, and incident communications.
This is the second half of SA-9: “define and document organizational oversight” (NIST Special Publication 800-53 Revision 5).
Make it operational: add oversight tasks to ticketing workflows (change management, access reviews) rather than leaving them in a static document.
Step 5: Define and document user roles and responsibilities
For each service (or service class), document:
- Authorized user roles (admin, standard user, auditor/read-only).
- Access provisioning rules (who can approve access, SSO required, MFA required if applicable).
- Data handling rules (what data can be uploaded, exported, or shared externally).
- Prohibited behaviors (personal accounts, sharing credentials, unmanaged endpoints if disallowed).
SA-9 explicitly requires “user roles and responsibilities” for external services (NIST Special Publication 800-53 Revision 5).
Proof point assessors look for: the rules exist and are enforced through access controls and training/acknowledgment where appropriate.
Step 6: Implement ongoing oversight and exceptions handling
- Establish a recurring review cadence for each provider based on risk.
- Track:
- Contract renewals and scope changes.
- New integrations/data types.
- Security incidents and provider advisories.
- Evidence refresh (updated documentation, changes in controls).
- Create an exception process for “can’t meet requirement” situations:
- Document the gap, compensating controls, risk acceptance, and expiration date for re-evaluation.
Where Daydream fits naturally: Daydream can centralize the external system service inventory, store contracts/evidence, assign named oversight owners, and run task-based reviews so SA-9 stays current instead of becoming a one-time paperwork exercise.
Required evidence and artifacts to retain
Retain evidence in an assessor-ready package per external system service:
Governance and scope
- External system service inventory entry (including owner assignments).
- Boundary/responsibility notes (what’s external, what’s internal).
Flow-down requirements
- Signed contract, MSA, SOW, and security/privacy addendum language showing the provider must comply with your requirements (NIST Special Publication 800-53 Revision 5).
- Provider acknowledgment of obligations, if separate from the contract.
Oversight documentation
- Named roles and responsibilities (RACI or equivalent).
- Meeting notes or tickets showing oversight actions (reviews, approvals, escalations).
User roles/responsibilities
- Role definitions and access approval workflow.
- Evidence of enforcement: SSO configuration screenshots, access review records, admin role approvals.
- User guidance or acceptable use snippets specific to the service where needed.
Exceptions
- Approved risk acceptances with scope, compensating controls, and re-review trigger.
Common exam/audit questions and hangups
Auditors and assessors tend to probe SA-9 in predictable ways:
- “List all external system services in scope.” Hangup: incomplete inventory, especially SaaS bought on cards.
- “Show me where the provider is required to meet your security/privacy requirements.” Hangup: security requirements exist internally but were never incorporated into contracts (NIST Special Publication 800-53 Revision 5).
- “Who oversees this provider, and what do they do?” Hangup: a named owner exists, but there’s no evidence of actual oversight actions (NIST Special Publication 800-53 Revision 5).
- “What are user responsibilities for this tool?” Hangup: generic acceptable use policy, no service-specific restrictions for data export, sharing, or admin access (NIST Special Publication 800-53 Revision 5).
- “How do you handle provider changes or incidents?” Hangup: no documented review trigger for scope changes, new integrations, or subcontractor changes.
Frequent implementation mistakes (and how to avoid them)
-
Treating SA-9 as a one-time contract checkbox.
Fix: pair contract language with an oversight workflow (owner, tasks, recurring reviews) (NIST Special Publication 800-53 Revision 5). -
Using “SOC 2 exists” as the requirement.
Fix: SA-9 requires compliance with your security and privacy requirements. Provider reports can support evidence, but they do not replace explicit flow-down and role definitions (NIST Special Publication 800-53 Revision 5). -
No clear line between access administration and oversight.
Fix: separate “service admin” (technical configuration) from “relationship/risk owner” (scope, renewals, exceptions). -
Overlooking subcontractors and integrations.
Fix: require disclosure/flow-down in contracts and require approval for new integrations or data types.
Enforcement context and risk implications
No public enforcement cases were provided for this requirement in the supplied sources. Practically, SA-9 failures show up as assessment findings because external providers become “control blind spots”: unapproved data sharing, unclear incident responsibilities, and missing contractual authority to demand evidence or corrective action. The risk is operational paralysis during incidents and inability to demonstrate control coverage across your external dependencies (NIST Special Publication 800-53 Revision 5).
Practical 30/60/90-day execution plan
First 30 days (stabilize)
- Stand up an external system services inventory and name owners for each service.
- Publish a standard security/privacy addendum for external system services.
- Identify high-risk services (data sensitivity, privileged access, criticality) and prioritize them for contract remediation.
Days 31–60 (contract and governance)
- Remediate top-priority contracts: add flow-down requirements and evidence rights.
- Create an oversight template (RACI + review tasks) and apply it to prioritized services.
- Document user role definitions and implement access approval rules for admins and high-risk users.
Days 61–90 (operationalize and prove)
- Implement recurring oversight reviews and capture evidence (tickets, meeting notes, approvals).
- Run a tabletop “provider incident” walkthrough for one critical external service: who contacts whom, what evidence is requested, who makes decisions.
- Establish an exceptions register for providers that cannot meet a requirement, with compensating controls and re-review triggers.
Frequently Asked Questions
What counts as an “external system service” for SA-9?
Any third party service outside your authorization boundary that stores, processes, or transmits your data, or that your operations depend on. If data flows to it or it affects your system’s security posture, treat it as in scope (NIST Special Publication 800-53 Revision 5).
Do we need contract language for every SaaS tool?
SA-9 requires you to require providers to comply with your security and privacy requirements, which is most defensible through contract terms or a signed addendum. For low-risk tools, you can scope requirements down, but keep a documented decision and owner (NIST Special Publication 800-53 Revision 5).
Can we rely on the provider’s existing security program instead of specifying our own controls?
You can align your requirements to the provider’s program, but SA-9 still expects you to define organization-required controls and require compliance. The provider’s documentation supports your due diligence; it does not replace your flow-down obligations (NIST Special Publication 800-53 Revision 5).
What evidence is strongest for auditors?
Signed agreements showing the provider is obligated to meet your security/privacy requirements, plus documented oversight roles and user responsibilities. Add operational proof: access approvals, review tickets, and exception approvals tied to the specific service (NIST Special Publication 800-53 Revision 5).
Who should “own” oversight: Security, Procurement, or the business?
Assign accountability to the business owner who depends on the service, with Security/GRC as reviewers and escalation points. SA-9 cares that oversight is defined and documented; it does not require a specific department to own it (NIST Special Publication 800-53 Revision 5).
How do we handle a provider that refuses our addendum?
Document the gap, implement compensating controls under your control, and route a formal risk acceptance with an expiration/re-review trigger. Keep the negotiation record and the approved exception with named approvers (NIST Special Publication 800-53 Revision 5).
Frequently Asked Questions
What counts as an “external system service” for SA-9?
Any third party service outside your authorization boundary that stores, processes, or transmits your data, or that your operations depend on. If data flows to it or it affects your system’s security posture, treat it as in scope (NIST Special Publication 800-53 Revision 5).
Do we need contract language for every SaaS tool?
SA-9 requires you to require providers to comply with your security and privacy requirements, which is most defensible through contract terms or a signed addendum. For low-risk tools, you can scope requirements down, but keep a documented decision and owner (NIST Special Publication 800-53 Revision 5).
Can we rely on the provider’s existing security program instead of specifying our own controls?
You can align your requirements to the provider’s program, but SA-9 still expects you to define organization-required controls and require compliance. The provider’s documentation supports your due diligence; it does not replace your flow-down obligations (NIST Special Publication 800-53 Revision 5).
What evidence is strongest for auditors?
Signed agreements showing the provider is obligated to meet your security/privacy requirements, plus documented oversight roles and user responsibilities. Add operational proof: access approvals, review tickets, and exception approvals tied to the specific service (NIST Special Publication 800-53 Revision 5).
Who should “own” oversight: Security, Procurement, or the business?
Assign accountability to the business owner who depends on the service, with Security/GRC as reviewers and escalation points. SA-9 cares that oversight is defined and documented; it does not require a specific department to own it (NIST Special Publication 800-53 Revision 5).
How do we handle a provider that refuses our addendum?
Document the gap, implement compensating controls under your control, and route a formal risk acceptance with an expiration/re-review trigger. Keep the negotiation record and the approved exception with named approvers (NIST Special Publication 800-53 Revision 5).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream