SA-4(7): NIAP-approved Protection Profiles
SA-4(7) requires you to restrict procurement and deployment of commercial information assurance and IA-enabled IT products to those successfully evaluated against a NIAP-approved Protection Profile for that technology type, when a relevant Protection Profile exists. Operationally, this means embedding NIAP Protection Profile checks into acquisition, architecture approval, and exception handling, with auditable proof. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Key takeaways:
- Build a “NIAP PP required if it exists” gate into purchasing and design review for covered product categories.
- Maintain traceable evidence: PP applicability decision, product evaluation status, and approvals for any exceptions.
- Make it repeatable: defined control owner, intake workflow, and recurring re-checks for product/version changes.
Compliance teams often treat “evaluated products” language as aspirational. SA-4(7) is more operational: if NIAP has an approved Protection Profile (PP) for a specific technology type, you must limit use of commercial information assurance (IA) and IA-enabled IT products to those evaluated against that PP. That requirement lands in procurement and engineering decisions, not in a policy binder. (NIST SP 800-53 Rev. 5 OSCAL JSON)
For a CCO/GRC lead, the fastest path to implement SA-4(7) is to (1) decide which product categories in your environment qualify as IA or IA-enabled, (2) determine whether a NIAP-approved PP exists for each relevant technology type, (3) require proof of successful evaluation for products you buy or deploy, and (4) stand up a controlled exception process when business needs conflict with NIAP availability. The control becomes assessable when you can show consistent decision records, not just “we prefer evaluated products.” (NIST SP 800-53 Rev. 5)
This page gives requirement-level guidance you can hand to procurement, security architecture, and product owners to make SA-4(7) real in intake workflows, contracts, and system authorization evidence.
Requirement overview (what SA-4(7) is asking for)
SA-4(7): NIAP-approved Protection Profiles is an acquisition-focused control enhancement in the System and Services Acquisition (SA) family. The operational thrust is simple: when NIAP has an approved Protection Profile for a technology type, you restrict your use of commercially provided IA and IA-enabled IT products to products that have been successfully evaluated against that PP. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Two practical implications follow:
- You need a repeatable way to determine PP existence and applicability for each covered product category.
- You need proof that your selected product is “successfully evaluated” against the PP, or a documented, approved exception that explains why not.
Regulatory text
“Limit the use of commercially provided information assurance and information assurance-enabled information technology products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile for a specific technology type, if such a profile exists; and” (NIST SP 800-53 Rev. 5 OSCAL JSON)
Operator translation:
- If NIAP has an approved Protection Profile for the kind of product you are buying or deploying, you must treat “evaluated against that PP” as a procurement and deployment condition.
- If no relevant PP exists, SA-4(7) does not create a standalone obligation to force NIAP evaluation, but you still need to document your “no PP exists” determination so an assessor can follow your logic. (NIST SP 800-53 Rev. 5)
Plain-English interpretation (what “good” looks like)
A good SA-4(7) implementation looks like a procurement and architecture gate with three outputs:
- PP applicability decision (does a NIAP-approved PP exist for this technology type, and does it apply to this product’s use case?).
- Evaluation verification (evidence the product is successfully evaluated against the PP).
- Disposition (approve, reject, or approve with an exception and compensating controls).
You are trying to prevent ad hoc buying of security-relevant products without confirming they meet a recognized, technology-specific baseline.
Who it applies to (entity and operational context)
SA-4(7) is most relevant for:
- Federal information systems implementing NIST SP 800-53 controls. (NIST SP 800-53 Rev. 5)
- Contractor systems handling federal data (for example, systems operating under federal contracts that require alignment to NIST SP 800-53). (NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationally, it applies to teams that select, approve, or integrate commercial products that provide security functions or security-relevant capabilities, including:
- Procurement / sourcing
- Security architecture / engineering review boards
- System owners and authorizing officials (AOs)
- Third-party risk management (TPRM) teams when product selection happens through third parties or managed service providers
What you actually need to do (step-by-step)
Step 1: Assign ownership and define the decision point
- Control owner: typically procurement compliance, security architecture, or GRC (pick one accountable owner; others are stakeholders).
- Decision point: define where SA-4(7) is enforced: purchase request intake, architecture review, or authorization boundary approval. Make it a “stop/go” gate, not a best-effort check. (NIST SP 800-53 Rev. 5)
Deliverable: a one-page procedure that states “PP check required for covered product types; evidence required; exception path.”
Step 2: Define “covered product types” for your environment
Create a scoped list of technology categories where NIAP PPs commonly exist and where your organization materially depends on security properties. Don’t boil the ocean; start with product types that are most likely to be assessed and most likely to affect confidentiality/integrity.
Deliverable: “SA-4(7) applicability matrix” with columns:
- Product category (your taxonomy)
- Example products in use
- Owner (team)
- Where decisions are made (procurement, architecture board, etc.)
- NIAP PP check required? (Yes/No/Conditional)
- Rationale for any “No” decision (kept short but specific)
Step 3: Build a repeatable PP existence/applicability check
For each purchase or major version adoption in a covered category, record:
- What technology type the product represents in your environment
- Whether a NIAP-approved PP exists for that technology type
- Whether the PP is applicable to the intended deployment mode (for example, appliance vs. cloud-delivered vs. endpoint agent)
Deliverable: a standardized “NIAP PP determination” form or ticket fields in your intake tool.
Step 4: Verify “successfully evaluated” status for the exact product you will deploy
Your evidence needs to match what you deploy in practice:
- Product name, edition, and relevant version
- PP name/identifier used for evaluation
- Proof of successful evaluation (store the vendor-provided evidence and your verification notes)
Deliverable: a “NIAP evaluation evidence package” attached to the procurement record and the system’s authorization package.
Step 5: Contract and purchasing controls (make it enforceable)
Embed SA-4(7) into acquisition language:
- Require the third party to provide NIAP evaluation evidence upon request.
- Require notification if the evaluated status changes or if the product materially changes in ways that could affect evaluation alignment.
- Require the third party to identify the evaluated configuration if evaluation is configuration-specific.
Deliverable: clause language in templates plus a checklist item for procurement sign-off.
Step 6: Exception handling when you can’t meet NIAP PP alignment
SA-4(7) anticipates that sometimes you will want a product that is not evaluated against an existing PP. Handle this explicitly:
- Document business justification
- Document why evaluated alternatives do not meet mission needs
- Define compensating controls (for example, added monitoring, hardening, boundary protections)
- Obtain approvals (security architecture + system owner + authorizing official or delegated approver)
Deliverable: an “SA-4(7) exception memo” with an expiration/review trigger tied to renewal or major version change.
Step 7: Ongoing operations: keep the determination current
SA-4(7) breaks quietly when:
- You upgrade to a new major product version
- You change deployment model
- A third party swaps an underlying component without telling you
Put a lightweight re-check into:
- Annual product review or supplier review
- Change management for major upgrades
- Renewal cycles for subscriptions
Deliverable: recurring control test with a small sample of covered products and their current evidence.
Required evidence and artifacts to retain
Keep evidence in a way an assessor can follow end-to-end:
Core artifacts
- SA-4(7) procedure and control owner assignment (RACI is fine).
- Covered product category inventory (applicability matrix).
- Procurement/architecture tickets showing PP determination and evaluation verification.
- Vendor/third-party documentation proving successful evaluation against a NIAP-approved PP (as provided to you).
- Exception memos with approvals and compensating controls.
Operational artifacts (high value in audits)
- Meeting notes or decision records from architecture review boards for contentious selections.
- Change records tying product upgrades to re-validation of NIAP status.
- Contract templates/checklists showing SA-4(7) gates are part of intake.
Common exam/audit questions and hangups
Assessors and internal audit commonly probe four areas:
-
“Show me your universe.”
They will ask for the list of IA/IA-enabled products and how you determined which are in scope. Weak inventories cause scope fights. -
“How do you know a PP exists or not?”
If you can’t show a recorded determination, you’ll default to “not implemented” even if you usually pick evaluated products. -
“Does the evidence match what’s deployed?”
Evidence for “a product family” is weaker than evidence for the exact edition/version and deployment model you run. -
“Are exceptions controlled?”
Exceptions without approvals, expirations, or compensating controls read as bypasses.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails | Fix |
|---|---|---|
| Treating SA-4(7) as a policy-only statement | Policies don’t show restriction in practice | Implement a procurement/architecture gate with required fields and a stop/go decision |
| No documented “PP exists / does not exist” determination | Assessors can’t validate applicability | Add a mandatory “NIAP PP check” section to intake tickets |
| Evidence doesn’t match deployment (wrong version/edition/model) | The control is about products you use | Tie evidence to CMDB entries and change management triggers |
| Exceptions become permanent | Risk acceptance becomes invisible | Require explicit approval and a renewal/revalidation trigger |
Enforcement context and risk implications
No public enforcement cases were provided for this requirement in the source data, so this page does not list case examples.
Risk-wise, SA-4(7) is about preventing avoidable security gaps in security-relevant commercial products and demonstrating disciplined acquisition controls. In federal assessments, weak acquisition controls often show up as systemic findings because they affect many systems at once. (NIST SP 800-53 Rev. 5)
Practical 30/60/90-day execution plan
First 30 days (establish the gate)
- Name the SA-4(7) control owner and approvers.
- Draft the one-page procedure: PP check, evidence required, exception path.
- Identify the initial covered categories (keep it manageable).
- Update procurement intake or architecture review templates to include mandatory NIAP PP fields. (NIST SP 800-53 Rev. 5)
Days 31–60 (apply to real purchases and fix the inventory)
- Build the applicability matrix and map current key products to it.
- Pilot the workflow on new purchase requests and one or two renewals.
- Create the exception memo template and route one “hard case” through approvals to prove the path works.
Days 61–90 (operationalize and make it auditable)
- Run a sample-based check across covered products: do you have determinations, evidence, or approved exceptions?
- Add a trigger in change management for major upgrades to re-check NIAP PP evaluation alignment.
- Centralize storage of artifacts (procurement system, GRC repository, or document management) with consistent naming.
Where Daydream fits: if you already track third-party and product due diligence in Daydream, map SA-4(7) to a control owner, implementation procedure, and recurring evidence artifacts so your NIAP PP determinations and exception records stay tied to each purchase and renewal event. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Frequently Asked Questions
What counts as an “information assurance” or “IA-enabled” product for SA-4(7)?
Treat it as a practical scoping exercise: products that provide security functions or materially affect security outcomes (for example, boundary protection, identity, crypto, or hardened platforms). Document your scoping rationale so an assessor can follow it. (NIST SP 800-53 Rev. 5)
If no NIAP-approved Protection Profile exists for a technology type, what do we do?
Record the “no applicable PP exists” determination and keep it with the procurement/architecture decision record. SA-4(7) is conditional on PP existence, so your documentation is what proves you handled the condition correctly. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Do we have to block procurement if the product is not evaluated against an applicable PP?
SA-4(7) says to limit use to successfully evaluated products when a PP exists, so your default posture should be “no” unless an exception is approved. If you allow exceptions, make them explicit, justified, approved, and tied to compensating controls. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Can a reseller or managed service provider satisfy SA-4(7) on our behalf?
They can provide evidence and contractual assurances, but you still need your own records showing the PP determination and the product evaluation status for what you actually deploy. Keep the proof attached to your procurement and authorization artifacts. (NIST SP 800-53 Rev. 5)
How detailed does the evidence need to be for “successfully evaluated”?
Detailed enough that an auditor can connect the dots from the deployed product to the evaluation claim (product/edition/version and the PP referenced). Store the third party’s evidence plus your verification notes in the intake record. (NIST SP 800-53 Rev. 5)
What’s the fastest way to make this assessable without slowing procurement?
Add a short required “NIAP PP check” section to your purchase request workflow, with drop-down outcomes (PP exists and evaluated, PP exists and not evaluated with exception, no PP exists) and required attachments. That creates consistent evidence without extra meetings. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Frequently Asked Questions
What counts as an “information assurance” or “IA-enabled” product for SA-4(7)?
Treat it as a practical scoping exercise: products that provide security functions or materially affect security outcomes (for example, boundary protection, identity, crypto, or hardened platforms). Document your scoping rationale so an assessor can follow it. (NIST SP 800-53 Rev. 5)
If no NIAP-approved Protection Profile exists for a technology type, what do we do?
Record the “no applicable PP exists” determination and keep it with the procurement/architecture decision record. SA-4(7) is conditional on PP existence, so your documentation is what proves you handled the condition correctly. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Do we have to block procurement if the product is not evaluated against an applicable PP?
SA-4(7) says to limit use to successfully evaluated products when a PP exists, so your default posture should be “no” unless an exception is approved. If you allow exceptions, make them explicit, justified, approved, and tied to compensating controls. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Can a reseller or managed service provider satisfy SA-4(7) on our behalf?
They can provide evidence and contractual assurances, but you still need your own records showing the PP determination and the product evaluation status for what you actually deploy. Keep the proof attached to your procurement and authorization artifacts. (NIST SP 800-53 Rev. 5)
How detailed does the evidence need to be for “successfully evaluated”?
Detailed enough that an auditor can connect the dots from the deployed product to the evaluation claim (product/edition/version and the PP referenced). Store the third party’s evidence plus your verification notes in the intake record. (NIST SP 800-53 Rev. 5)
What’s the fastest way to make this assessable without slowing procurement?
Add a short required “NIAP PP check” section to your purchase request workflow, with drop-down outcomes (PP exists and evaluated, PP exists and not evaluated with exception, no PP exists) and required attachments. That creates consistent evidence without extra meetings. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream