SR-5(2): Assessments Prior to Selection, Acceptance, Modification, or Update
SR-5(2) requires you to assess any system, system component, or system service before you select it, accept it into your environment, or make changes or updates to it. Operationally, that means your procurement, engineering, and change management workflows must trigger a documented risk-based assessment and an approval decision before the item is introduced or modified. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Key takeaways:
- Gate selection, acceptance, modification, and update events with an assessment step and an explicit approve/deny outcome.
- Scope includes products and services, including cloud services, managed services, and embedded components. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Keep audit-ready evidence: what you assessed, when you assessed it, who approved it, and what conditions you imposed.
The sr-5(2): assessments prior to selection, acceptance, modification, or update requirement is a supply chain control with a simple test: can you prove you assessed the thing before you brought it in, and before you changed it. The “thing” can be a new SaaS tool, a code library, a network appliance, a firmware update, a new managed service provider, or a change to an existing third-party integration. If your process lets teams buy, deploy, or update first and “review later,” you will struggle to defend SR-5(2) in an assessment.
This page translates SR-5(2) into an operational workflow a CCO, GRC lead, or control owner can run: trigger points, minimum assessment content, decision criteria, approvals, and evidence. It also highlights where implementations fail in practice (shadow IT, emergency changes, auto-updates, and decentralized procurement) and how to harden the gates without blocking the business. The goal is fast execution: one intake, one triage, one assessment path, one decision record, and clean linkage to procurement and change tickets.
Regulatory text
Text (excerpt): “Assess the system, system component, or system service prior to selection, acceptance, modification, or update.” (NIST SP 800-53 Rev. 5 OSCAL JSON)
What the operator must do:
You need a repeatable process that performs a documented assessment before four events:
- Selection (choosing a product/service/component),
- Acceptance (allowing it to be used in production or to handle organizational data),
- Modification (changing configuration, integration scope, permissions, hosting model, or architecture), and
- Update (new versions, patches, library upgrades, model updates, firmware updates, or changes pushed by a provider). (NIST SP 800-53 Rev. 5 OSCAL JSON)
SR-5(2) does not prescribe one assessment method. It does require that your method exists, runs on time (before the event), and produces a decision you can defend.
Plain-English interpretation
SR-5(2) is a “no surprises” control for supply chain and technology intake. Before you introduce or change a system/service/component, you assess the risk and security impact, decide whether to proceed, and record conditions (contract clauses, compensating controls, rollout constraints, monitoring) that make the decision acceptable.
A practical reading for operators:
- If engineering can merge a new dependency or enable a new cloud service without a pre-check, you have a gap.
- If procurement can sign for a third party without security/privacy review, you have a gap.
- If auto-updates can materially change behavior without review, you have a gap.
Who it applies to
Entities:
- Federal information systems and organizations implementing NIST SP 800-53 controls. (NIST SP 800-53 Rev. 5)
- Contractors and service providers handling federal data or operating systems in federal contexts where 800-53 is flowed down contractually. (NIST SP 800-53 Rev. 5)
Operational contexts where SR-5(2) shows up:
- Third-party onboarding: SaaS, MSP/MSSP, payment processors, data enrichment providers, call centers, offshore dev shops.
- Technology introduction: endpoints, network gear, EDR agents, CI/CD tooling, LLM/AI services, identity providers.
- Software supply chain: open-source packages, container base images, internal shared libraries, build tools.
- Change management: expanding data scopes, adding new integrations, moving from single-tenant to multi-tenant services, enabling new features that increase data exposure.
What you actually need to do (step-by-step)
1) Define the four SR-5(2) trigger events in your workflows
Create a short “trigger list” that product, procurement, and engineering cannot misinterpret:
- Selection trigger: new third party, new product/service, new component, new dependency class.
- Acceptance trigger: production go-live, first real data, new environment, new business unit rollout.
- Modification trigger: integration changes, permission expansions, new data elements, new regions, new subcontractors, auth method changes.
- Update trigger: version upgrades, patch cycles, model releases, firmware changes, provider-driven feature releases that change controls. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Then hardwire these triggers into:
- procurement intake,
- architecture review,
- change advisory board (CAB) or agile change workflow,
- CI/CD guardrails (where feasible).
2) Stand up a risk-based triage so you assess “enough,” not “everything the same”
You need a triage decision that routes work into a right-sized assessment.
A simple triage matrix that auditors accept because it is explicit:
- Data sensitivity: public, internal, regulated, national security, mission critical.
- Connectivity: isolated, internal-only, internet-facing, privileged network access.
- Privilege level: read-only vs admin, production access vs non-prod.
- Criticality: supports critical operations vs peripheral tooling.
- Update dynamics: frequent automatic updates vs controlled updates.
Output: a tier (for example: low/medium/high) and required assessment depth. SR-5(2) does not mandate the tiers; it mandates that you assess prior to the trigger event. (NIST SP 800-53 Rev. 5 OSCAL JSON)
3) Perform the pre-selection / pre-acceptance assessment
Minimum content to document (keep it tight, but defensible):
- Scope statement: what is being assessed (service/component/version), where it will run, and what data it will handle.
- Supply chain context: who provides it, where it is hosted/manufactured, and whether subcontractors are involved (if known at time of assessment).
- Security baseline review: identity/auth model, encryption approach, logging, incident response touchpoints, vulnerability management, secure development signals (as applicable).
- Privacy and data handling: retention, deletion, access controls, cross-border processing.
- Operational resilience: support model, dependency on upstream services, rollback options for updates.
- Risk decision: approve, approve with conditions, or reject; include rationale and required compensating controls.
Tie the assessment outcome to an explicit decision record that precedes purchase order, contract signature, production deployment, or change implementation. (NIST SP 800-53 Rev. 5 OSCAL JSON)
4) Add “assessment before change” into change management
For modifications and updates, the assessment can be lighter if your triage supports it. What matters is the before and the decision record.
Operational pattern that works:
- Change ticket requires a “SR-5(2) check” field (link to the assessment or the approved assessment type).
- Impact questions embedded in the ticket: does the change increase data scope, privilege, exposure, or introduce new third parties/components.
- Approval routing based on tier: security sign-off for higher tiers; standard CAB approval for lower tiers.
5) Control automatic updates so you still meet “prior to update”
SR-5(2) can be awkward with SaaS and auto-update channels. Your defensible options:
- Pre-authorize an update channel with conditions: document what kinds of updates are acceptable without per-release review (e.g., patch/minor vs major), and what monitoring you rely on.
- Set review triggers for material updates: when scope changes (permissions, data categories, new regions, new subprocessors), require a refreshed assessment before enabling the feature or continuing use.
- Maintain a rollback/disable plan: the assessment should record how you reduce exposure if an update introduces risk.
6) Operationalize ownership and cadence
Assign a control owner who can enforce the gate across procurement and engineering. Then define:
- intake owner,
- security assessor,
- privacy reviewer (if applicable),
- approver (risk owner),
- evidence repository owner.
Daydream (as a workflow system) fits naturally here when you need consistent intake, routing, and evidence packaging across many third parties and components. The control becomes easier to run when the assessment is automatically tied to the purchase request and the change ticket, and the evidence packet is generated without manual chasing.
Required evidence and artifacts to retain
Keep artifacts that prove timing, scope, and decision:
Core evidence (expected in most audits):
- Assessment procedure or SOP mapped to SR-5(2). (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Completed assessment record for a sample of selections/acceptances/modifications/updates.
- Decision record showing approve/deny/conditional approval, approver identity, and date/time.
- Linkage to the triggering event: procurement request, contract ticket, change ticket, release ticket, deployment record.
Supporting evidence (helps resolve examiner hangups):
- Triage rubric and tiering criteria.
- Conditional approval tracking (open conditions and closure evidence).
- Exception register for emergency changes, with after-action review and compensating controls.
Common exam/audit questions and hangups
- “Show me a new third party that went live. Where is the assessment, and is it dated before production?” (NIST SP 800-53 Rev. 5 OSCAL JSON)
- “How do you know engineering doesn’t add components without review?”
- “What events cause reassessment? Who decides an update is ‘material’?”
- “How do you handle SaaS releases you don’t control?”
- “Show me one example of ‘approve with conditions’ and evidence the conditions were met.”
Hangup pattern: teams produce a strong security questionnaire but cannot prove it occurred before signature or go-live.
Frequent implementation mistakes and how to avoid them
-
Assessments happen after procurement commits.
Fix: make the assessment a required field for purchase approval; block PO creation until completed. -
Only third parties are assessed; components are ignored.
Fix: include software dependencies, images, firmware, and managed services in scope. SR-5(2) explicitly includes “system component” and “system service.” (NIST SP 800-53 Rev. 5 OSCAL JSON) -
No reassessment path for modifications/updates.
Fix: add SR-5(2) prompts to change tickets and define “material change” triggers. -
Evidence is scattered across email and chat.
Fix: store the assessment record, decision, and ticket links in one system of record. -
Auto-updates break the “prior to update” expectation.
Fix: document pre-authorization boundaries plus monitoring and rollback for update channels.
Enforcement context and risk implications
No public enforcement cases were provided in the supplied source catalog for this requirement, so this page does not cite specific actions.
Risk-wise, SR-5(2) gaps tend to surface after incidents: a compromised supplier, a malicious update, or an unreviewed integration that exposed sensitive data. Your strongest defense is procedural: a demonstrable gate that prevents unmanaged introduction or change, plus evidence that the gate ran before the event. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Practical execution plan (30/60/90)
You asked for speed; use phases rather than day counts.
First 30 days (Immediate)
- Write a one-page SR-5(2) procedure: triggers, triage tiers, approvers, required artifacts. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Add an intake form (even if basic): what is it, what data, where hosted, who owns it, go-live date.
- Update procurement and change templates to require an assessment link before approval.
By 60 days (Near-term)
- Implement tiered assessments with clear minimum checks per tier.
- Centralize evidence storage and standardize naming (component/service/version + decision date).
- Run a pilot on a handful of new selections and a handful of updates; tune the rubric based on friction points.
By 90 days (Operationalize and scale)
- Expand coverage to software supply chain changes: dependencies, images, build tooling, firmware updates.
- Add exception handling for emergency changes with time-bounded compensating controls and documented review.
- Build reporting: list of all selections/acceptances/changes in period with assessment completion status.
Frequently Asked Questions
Does SR-5(2) apply only to third parties, or also internal changes?
It applies to any “system, system component, or system service” you select, accept, modify, or update, regardless of whether a third party provides it. (NIST SP 800-53 Rev. 5 OSCAL JSON)
What counts as “acceptance” in practice?
Use a concrete rule: acceptance is the point where the item is approved for production use or begins handling real organizational data. Document that acceptance gate and tie it to your deployment/change ticket.
We can’t assess every SaaS update before it happens. How do we comply?
Pre-assess the service and its update channel, set boundaries for acceptable changes, and define what triggers a refreshed assessment before enabling new features or continuing use after a material change.
How detailed does the assessment need to be?
SR-5(2) sets a timing requirement (assess prior to the event), not a specific questionnaire. Use a tiered approach so low-risk tools get a lighter assessment and higher-risk services get deeper review. (NIST SP 800-53 Rev. 5 OSCAL JSON)
What evidence do auditors usually reject?
Screenshots or emails without clear dates, scope, and an approval decision tied to the procurement/change record. Keep a single decision record with links to the triggering ticket.
Who should be the approver for SR-5(2) decisions?
Make the approver the accountable risk owner for the business service, with security and privacy providing review inputs. Auditors look for clear accountability and separation between requester and approver.
Frequently Asked Questions
Does SR-5(2) apply only to third parties, or also internal changes?
It applies to any “system, system component, or system service” you select, accept, modify, or update, regardless of whether a third party provides it. (NIST SP 800-53 Rev. 5 OSCAL JSON)
What counts as “acceptance” in practice?
Use a concrete rule: acceptance is the point where the item is approved for production use or begins handling real organizational data. Document that acceptance gate and tie it to your deployment/change ticket.
We can’t assess every SaaS update before it happens. How do we comply?
Pre-assess the service and its update channel, set boundaries for acceptable changes, and define what triggers a refreshed assessment before enabling new features or continuing use after a material change.
How detailed does the assessment need to be?
SR-5(2) sets a timing requirement (assess prior to the event), not a specific questionnaire. Use a tiered approach so low-risk tools get a lighter assessment and higher-risk services get deeper review. (NIST SP 800-53 Rev. 5 OSCAL JSON)
What evidence do auditors usually reject?
Screenshots or emails without clear dates, scope, and an approval decision tied to the procurement/change record. Keep a single decision record with links to the triggering ticket.
Who should be the approver for SR-5(2) decisions?
Make the approver the accountable risk owner for the business service, with security and privacy providing review inputs. Auditors look for clear accountability and separation between requester and approver.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream