SA-12(12): Inter-organizational Agreements
SA-12(12) requires you to define, document, and manage inter-organizational agreements that govern how your system and external organizations exchange, protect, and support information and services. Operationalize it by inventorying all cross-organization connections, assigning owners, standardizing agreement templates, and keeping dated, assessable evidence that agreements exist and are followed 1.
Key takeaways:
- You need written agreements for every material system-to-external-organization interaction, not just “vendors.”
- Agreements must translate security requirements into enforceable obligations: roles, data handling, interfaces, incident coordination, and support.
- Audit readiness depends on traceability: connection → agreement → control requirements → monitoring and renewal evidence.
The sa-12(12): inter-organizational agreements requirement shows up as a “paperwork” control right until a breach, outage, or disputed responsibility forces you to prove who was supposed to do what. SA-12(12) is about making the boundaries between your organization and another organization explicit, enforceable, and testable. That includes cloud providers, managed service providers, interagency partners, data-sharing partners, and any third party operating a component you depend on.
For a Compliance Officer, CCO, or GRC lead, the fast path is to treat SA-12(12) as a coverage and evidence problem: identify all interconnections and shared services, confirm there is an agreement for each, ensure the agreement contains the security and operational clauses your system needs, and show that the agreement is maintained through change management. The outcome is assessors can pick any external connection and you can produce (1) the governing agreement, (2) mapped requirements, and (3) proof the agreement is current and used in practice 1.
Regulatory text
Control requirement (excerpt): “NIST SP 800-53 control SA-12.12.” 2
What the operator must do: Implement SA-12(12) by establishing and maintaining inter-organizational agreements for system-related relationships with external organizations. In practice, that means:
- You can point to a current, authorized agreement for each external organization that connects to, processes data for, supports, or hosts system components.
- The agreement states security and operational expectations at the boundary (interfaces, responsibilities, protections, and coordination).
- The agreement stays aligned with the system’s security requirements as connections, services, and data flows change 1.
Implementation note: The provided regulatory excerpt is minimal. Assessors will still expect you to demonstrate control intent and operationalization consistent with SA-family supply chain and external dependency governance 1.
Plain-English interpretation
You must have a written, reviewed agreement with each external organization that your system depends on or shares information/services with, and that agreement must clearly assign responsibilities for security and operations at the boundary.
Think of it as: “No shared system boundary without a contract, MOU/MOA, or other binding agreement that security can test.”
Who it applies to (entity and operational context)
Entity types
- Federal information systems.
- Contractor systems handling federal data (including systems supporting federal programs or processing federal information) 1.
Operational contexts where SA-12(12) becomes real
- Cloud hosting and managed platforms: IaaS/PaaS/SaaS relationships where the third party operates infrastructure you rely on.
- Interconnections and data exchanges: APIs, SFTP links, VPNs, federated identity, shared logging pipelines, or data lake sharing with partners.
- Shared services: SOC services, managed detection and response, managed backup, managed network, or shared call center handling sensitive information.
- Downstream dependency chains: A prime contractor relying on subcontractors for system components or operations.
What you actually need to do (step-by-step)
Step 1: Define “inter-organizational agreement” for your program
Decide what counts as acceptable instruments in your environment:
- Contract + security addendum
- MOU/MOA
- Interconnection Security Agreement (ISA)
- Data Sharing Agreement (DSA)
- SLA/OLA with security schedules Then document the decision in your control implementation statement so teams stop debating form over substance during procurement and audits.
Deliverable: A one-page standard stating acceptable agreement types and minimum required clauses mapped to SA-12(12) 1.
Step 2: Build a complete inventory of external relationships tied to the system
Start from technical truth, not procurement:
- Pull current external connections from network diagrams, firewall rules, API gateway catalogs, IAM federation configs, and data integration tooling.
- Cross-check against vendor/third party registers and procurement lists.
- Include “non-traditional” third parties: other agencies, universities, industry consortia, and joint ventures.
Deliverable: “System external dependency register” with: organization, service, connection method, data types, environment, owner, and agreement pointer.
Step 3: Classify each relationship and decide required agreement depth
Use a simple decision matrix to scope effort:
| Relationship type | Examples | Agreement depth you should require |
|---|---|---|
| Data exchange | API feeds, batch file transfers | Data handling + security interface + incident coordination |
| Hosting/processing | Cloud host, managed app ops | Shared responsibility, logging, vuln mgmt, access control, IR, continuity |
| Support service | MDR/SOC, help desk | Access constraints, confidentiality, monitoring, IR handoffs |
| Identity trust | SSO federation, directory sync | AuthN/AuthZ responsibilities, revocation, logging, breach notification |
Step 4: Standardize minimum clauses (make it enforceable)
Create a clause checklist your legal/procurement teams can embed. Your checklist should cover:
- Scope and systems: exact services, environments, and boundaries covered.
- Data handling: allowed data types, storage locations, transmission protections, retention, disposal.
- Access control: who can access what, MFA expectations, privileged access processes.
- Security monitoring and logs: what telemetry is available, retention expectations, access to evidence.
- Vulnerability and patching responsibilities: who patches what, timelines or triggers (your policy can define expectations without putting hard numbers into the agreement if you can’t support them).
- Incident reporting and coordination: notification method, required content, escalation paths, joint investigation expectations.
- Change management: notice and approval process for material changes (architecture, sub-processors, hosting region, cryptography, identity flows).
- Subcontractors/sub-processors: disclosure, flow-down requirements, approval rights if applicable.
- Right to assess / assurance: ability to obtain attestations, reports, or conduct assessments aligned to your program (tailor to your contracting posture).
- Termination and exit: data return/destruction, access revocation, transition support.
Deliverable: “SA-12(12) agreement clause library” plus a redline playbook for procurement negotiations.
Step 5: Map agreements to system requirements and controls
Auditors do not want a stack of PDFs. They want traceability:
- For each external relationship, map agreement sections to your relevant control expectations (example: incident coordination language mapped to your incident response procedures).
- Store mappings in your GRC system or a controlled spreadsheet with version history.
Deliverable: A mapping table: relationship → agreement → clause locations → responsible owner → review date.
Step 6: Operationalize reviews and change triggers
Set triggers that force re-review of the agreement:
- New connection or interface
- New data type shared
- New environment (prod vs non-prod)
- Material change to service scope or subcontractors
- Security incident involving the third party Tie these triggers to your change management process so agreements don’t lag reality.
Deliverable: A documented procedure: “Agreement review required before/after X changes,” with workflow owners.
Step 7: Prove the agreement is used in operations
Assessors look for evidence that the agreement drives behavior:
- IR runbooks reference third-party escalation paths from the agreement.
- Access reviews confirm third-party accounts follow the agreed constraints.
- Service reviews (or QBRs) capture security topics the agreement requires.
Deliverable: Meeting minutes, ticket samples, and runbook excerpts referencing agreement obligations.
Where Daydream fits (earned, not bolted on)
SA-12(12) fails most often on coverage and evidence retrieval. Daydream becomes useful when you need a single place to (1) register every interconnection, (2) attach the governing agreement, (3) map obligations to controls, and (4) generate an assessor-ready evidence packet without chasing emails.
Required evidence and artifacts to retain
Keep evidence in an assessor-friendly package per relationship:
- Signed agreement (contract/MOU/MOA/ISA/DSA) with effective date and parties.
- Statement of work / security addendum / SLA attachments referenced by the agreement.
- System boundary diagram highlighting external connections.
- Data flow diagram or narrative for what is exchanged and where it is stored/processed.
- Clause checklist completed (or deviation log with approvals for exceptions).
- Mapping of agreement clauses to your internal control expectations (SA-12(12) plus related operational controls).
- Review/renewal record (approval email, renewal notice, or governance meeting minutes).
- Change tickets showing re-review after material modifications.
- Evidence of operational use: IR contact lists, escalation procedures, service review notes.
Common exam/audit questions and hangups
Expect these lines of inquiry:
-
“Show me every external organization your system connects to.”
Hangup: technical inventory and procurement list don’t match. -
“For this connection, where is the agreement and what does it say about responsibilities?”
Hangup: agreement exists but lacks security specifics, or the security addendum is missing. -
“How do you ensure agreements stay current after change?”
Hangup: no trigger in change management; agreements are renewed passively. -
“How do you handle sub-processors?”
Hangup: no disclosure requirement, no flow-down of obligations. -
“Who owns the relationship and who validates compliance?”
Hangup: unclear RACI; security assumes procurement owns it, procurement assumes security owns it.
Frequent implementation mistakes and how to avoid them
-
Mistake: Treating SA-12(12) as procurement-only.
Fix: Make the system owner accountable for coverage; procurement supports with contracting mechanics. -
Mistake: One master agreement used as a blanket for all systems.
Fix: Maintain system-specific schedules/attachments that name the system, data types, and interfaces. -
Mistake: Agreements don’t match technical reality.
Fix: Reconcile against network/API inventories at least whenever a material change is proposed; require agreement updates before go-live. -
Mistake: No evidence package per relationship.
Fix: Standardize an “agreement packet” checklist and store it centrally with version control. -
Mistake: Missing operational hooks (IR, access, monitoring).
Fix: Update runbooks and access review procedures to reference the agreement so you can prove it’s used.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so this page does not list case examples.
Risk-wise, SA-12(12) gaps translate into predictable failure modes:
- Disputed incident responsibilities and delayed containment because escalation paths and duties are unclear.
- Data handling drift (new data types, new regions, new sub-processors) without updated commitments.
- Audit findings for incomplete third-party governance and inability to demonstrate control operation 1.
Practical 30/60/90-day execution plan
First 30 days (stabilize coverage)
- Name a control owner and define acceptable agreement types plus minimum clauses.
- Build the external dependency register from technical and procurement sources.
- Prioritize top-risk relationships (hosting, managed ops, broad data exchange) for agreement collection.
Days 31–60 (close agreement gaps)
- Collect, index, and store signed agreements in a central repository.
- Run clause checklist against prioritized agreements and open remediation items.
- Create mapping from each relationship to agreement clauses and internal obligations.
Days 61–90 (make it stick)
- Add agreement review gates to change management for new interfaces, data types, and providers.
- Update IR runbooks with third-party escalation paths and notification duties.
- Conduct one tabletop or service review that tests the agreement-driven coordination path and retain the outputs as evidence.
Frequently Asked Questions
Do we need an inter-organizational agreement for every vendor?
You need agreements for every external organization that connects to the system, processes system data, hosts components, or provides system-relevant services. Some low-impact suppliers may not touch the system boundary, but you should document why they’re out of scope.
What counts as an “inter-organizational agreement” in practice?
Any written instrument that binds both parties and covers the system boundary can count, such as a contract with a security addendum, MOU/MOA, ISA, or DSA. The key is that it includes the security and operational responsibilities your assessors can test 1.
Our master services agreement is enterprise-wide. Is that enough?
Often it is not enough by itself because it may not specify the system, interfaces, and data flows. Add a system-specific schedule or security exhibit that names the system and captures boundary responsibilities.
How do we handle agreements for interagency or partner data sharing where procurement isn’t involved?
Use a formal MOU/MOA or DSA and route it through the same control workflow: inventory the connection, apply the minimum clause checklist, assign an owner, and retain the executed document with review evidence.
What will auditors ask for first?
They usually start with your inventory of external connections and then select a sample to trace from the technical interface to the executed agreement and proof of ongoing maintenance. If you can’t reconcile inventory sources, you will burn time before you even reach agreement content.
How do we prove the agreement is operational, not just signed?
Keep artifacts where teams acted on it: incident escalation runbooks, change tickets that triggered an agreement update, access reviews showing third-party account constraints, and service review notes tied to agreement obligations.
Footnotes
Frequently Asked Questions
Do we need an inter-organizational agreement for every vendor?
You need agreements for every external organization that connects to the system, processes system data, hosts components, or provides system-relevant services. Some low-impact suppliers may not touch the system boundary, but you should document why they’re out of scope.
What counts as an “inter-organizational agreement” in practice?
Any written instrument that binds both parties and covers the system boundary can count, such as a contract with a security addendum, MOU/MOA, ISA, or DSA. The key is that it includes the security and operational responsibilities your assessors can test (Source: NIST SP 800-53 Rev. 5).
Our master services agreement is enterprise-wide. Is that enough?
Often it is not enough by itself because it may not specify the system, interfaces, and data flows. Add a system-specific schedule or security exhibit that names the system and captures boundary responsibilities.
How do we handle agreements for interagency or partner data sharing where procurement isn’t involved?
Use a formal MOU/MOA or DSA and route it through the same control workflow: inventory the connection, apply the minimum clause checklist, assign an owner, and retain the executed document with review evidence.
What will auditors ask for first?
They usually start with your inventory of external connections and then select a sample to trace from the technical interface to the executed agreement and proof of ongoing maintenance. If you can’t reconcile inventory sources, you will burn time before you even reach agreement content.
How do we prove the agreement is operational, not just signed?
Keep artifacts where teams acted on it: incident escalation runbooks, change tickets that triggered an agreement update, access reviews showing third-party account constraints, and service review notes tied to agreement obligations.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream