SA-12(13): Critical Information System Components

SA-12(13) requires you to identify which system components are “critical,” then apply stricter supply chain controls so those components are sourced, verified, tracked, and supported in a way that reduces tampering and counterfeit risk. To operationalize it quickly, define “critical,” build a component inventory and approved sources list, and retain evidence that procurement and engineering consistently follow it.

Key takeaways:

  • Define and document what “critical information system components” means for your environment, then scope the control to those items.
  • Put procurement and engineering on one workflow: approved sources, authenticity checks, and traceability from purchase to deployment.
  • Evidence wins audits: inventories, supplier approvals, receiving/inspection records, and exception handling.

The sa-12(13): critical information system components requirement is a supply chain control. It is less about general vendor risk questionnaires and more about preventing a small set of high-impact components from entering or changing in your environment without strong provenance and verification. For most teams, the operational challenge is scoping. If you define “critical” too broadly, the process collapses under overhead. If you define it too narrowly, assessors will challenge whether your definition aligns with system mission impact and threat reality.

Treat SA-12(13) as an engineering-and-procurement control with compliance oversight. Your goals are to (1) identify critical components, (2) constrain how they are acquired and serviced, and (3) prove that constraints are followed. Done well, this control reduces exposure to counterfeit parts, unauthorized substitutions, malicious implants, and untracked end-of-life replacements, especially in environments with federal data and mission-essential workloads.

This page gives requirement-level implementation guidance you can put into motion immediately: roles, workflow steps, concrete artifacts, audit questions, and a practical execution plan.

Regulatory text

Excerpt (control reference): “NIST SP 800-53 control SA-12.13.” (NIST SP 800-53 Rev. 5 OSCAL JSON)
Framework context: NIST SP 800-53 Rev. 5 (NIST SP 800-53 Rev. 5)

Operator interpretation: The control enhancement points you to a specific supply chain outcome: when a component is critical to system operation, security, or mission, you must treat it differently than ordinary IT parts. In practice, that means documented identification of critical components and tighter controls around sourcing, acceptance, change, and support channels. Your assessor will look for a repeatable method plus evidence that the method is followed for those components.

Plain-English interpretation (what SA-12(13) is asking for)

You need a defensible answer to two questions:

  1. Which components are critical?
    “Critical” should mean that compromise, substitution, or untrusted servicing of the component could materially degrade confidentiality, integrity, or availability, or could undermine key security functions.

  2. What extra protections do you apply to them?
    Protections typically include approved sourcing, authenticity verification, chain-of-custody/traceability, controlled substitutions, and validated support/maintenance pathways. The emphasis is on preventing untrusted components and untrusted changes.

Who it applies to

Entity scope

  • Federal information systems implementing NIST SP 800-53 controls. (NIST SP 800-53 Rev. 5)
  • Contractor systems handling federal data where NIST SP 800-53 is a contractual or program requirement. (NIST SP 800-53 Rev. 5)

Operational scope (where it shows up)

  • Hardware and firmware in network/security infrastructure (firewalls, routers, HSMs, secure enclaves).
  • Virtualization and core platform components (hypervisors, base images, golden templates).
  • Identity, key management, and cryptographic components (PKI, KMS, signing services).
  • Components that enforce security boundaries or trusted boot / measured boot.
  • Any component where third-party servicing or replacement is common (field replacements, RMA workflows).

If you are a CCO/GRC lead, your “applies to” decision is less about the org chart and more about which procurement channels, engineering teams, and third parties touch critical components.

What you actually need to do (step-by-step)

1) Name a control owner and lock responsibilities

Assign:

  • Control owner: typically Supply Chain Risk (if you have it), Security Engineering, or GRC with procurement co-ownership.
  • Process owners: Procurement, IT Asset Management/CMDB, Security Architecture, Data Center/Cloud Ops.
  • Approvers for exceptions: CISO (risk) + Procurement lead (commercial) + System owner (mission).

Deliverable: a RACI that ties SA-12(13) to procurement and engineering execution, not only policy.

2) Define “critical component” with objective criteria

Write a one-page standard that says a component is “critical” if it meets criteria such as:

  • Provides or enforces a security boundary or trust anchor (identity, keys, boot).
  • Has privileged position in the environment (network control plane, hypervisor).
  • Cannot be easily monitored/detected if altered (firmware, microcode).
  • Supports a mission-essential or regulated service with low tolerance for compromise.

Deliverable: Critical Component Criteria document with examples and non-examples.

3) Build a Critical Component Register (CCR)

Create an inventory list that includes:

  • Component name, model/SKU, version/firmware, and where deployed.
  • System(s) supported and business/mission impact rationale.
  • Approved suppliers/resellers and approved support channels.
  • Required receiving inspection steps and acceptance checks.
  • Replacement/repair workflow requirements.

Keep it small at first. Start with the components that, if compromised, would defeat your core security controls.

Deliverable: CCR spreadsheet or CMDB view with change history.

4) Establish “approved source” rules and procurement gates

For items in the CCR:

  • Require purchase only through approved sources (manufacturer direct, authorized reseller, or contract vehicle with verified supply chain).
  • Prohibit informal sourcing (secondary marketplaces) unless an exception is approved and documented.
  • Add procurement gates: purchase requests for CCR items must include SKU, approved source, and intended system mapping.

Deliverable: Approved Sources List + procurement workflow configuration (ticketing fields or ERP controls).

5) Add authenticity and integrity checks at receiving and deployment

Define checks appropriate to your environment, such as:

  • Verification of tamper-evident packaging (where applicable).
  • Serial number capture and match to purchase records.
  • Firmware/boot integrity verification steps for relevant platforms.
  • Validation that the delivered item matches the approved BOM/SKU (no silent substitutions).

Deliverable: Receiving/Inspection SOP and completed receiving logs tied to CCR items.

6) Control substitutions, RMAs, and third-party maintenance

Critical components often change through “support events,” not projects. Put controls here:

  • RMAs must return through approved channels, with serial/asset traceability.
  • Third-party field service must be pre-approved and logged, including what was replaced and why.
  • Maintain a “no untracked swaps” rule: replacements require CMDB/CCR updates before the system returns to production (or within your documented emergency change window).

Deliverable: RMA/maintenance records mapped to assets and CCR entries.

7) Define exceptions and compensating controls (and actually use them)

Auditors accept exceptions when they are governed. Build:

  • Exception request template (reason, component, duration, risk, compensating controls).
  • Approval workflow.
  • Review cadence tied to your governance process.

Deliverable: Exception register and evidence of periodic review.

8) Operationalize assessment readiness (map, measure, retain evidence)

Minimum operationalization step: map SA-12(13) to owner, procedure, and recurring evidence artifacts, then run it as a recurring control (Regulatory Best Practices).

If you use Daydream, treat it as the system of record for the requirement mapping, control narrative, and evidence collection schedule so procurement, ITAM, and security can feed one audit-ready trail without chasing screenshots at the last minute.

Required evidence and artifacts to retain

Use this as your audit binder checklist:

  • Critical Component Criteria (definition, thresholds, examples).
  • Critical Component Register (current list plus change history).
  • Approved Sources List for CCR components and how sources are vetted.
  • Procurement records showing CCR purchases used approved sources (POs, invoices, contract references).
  • Receiving/inspection logs (serial numbers, inspection outcomes, date/time, inspector).
  • Configuration/change records for deployments and replacements (change tickets, CMDB updates).
  • RMA and maintenance records including third-party involvement and parts swapped.
  • Exception register with approvals, compensating controls, closure evidence.
  • Training/communications showing procurement/ops know the CCR workflow.

Common exam/audit questions and hangups

Assessors tend to test these pressure points:

  • “Show me your definition of critical.” If it’s vague, they will treat your scope as arbitrary.
  • “Prove you follow approved sourcing.” They will sample purchases and ask for traceability from PO → receiving → deployed asset.
  • “How do you stop silent substitutions?” If procurement can swap SKUs due to availability, you need an explicit approval step for CCR items.
  • “What about emergency replacements?” You need an emergency path that still captures serials and updates inventory.
  • “Who owns this end-to-end?” Splitting responsibility across security and procurement with no single owner leads to control failure.

Frequent implementation mistakes (and how to avoid them)

  1. Inventory exists, but not “critical inventory.”
    Fix: create the CCR as a filtered view with explicit criteria and ownership.

  2. Policy-only control narratives.
    Fix: attach artifacts that show execution: receiving logs, PO samples, RMA tickets.

  3. Approved sources defined, but not enforced.
    Fix: configure procurement tooling so CCR items require an approved source field and documented validation.

  4. Ignoring maintenance channels.
    Fix: treat support vendors and field services as part of the supply chain. Force RMA tracking and post-service verification.

  5. No exception process.
    Fix: create a lightweight exception template and require it for any non-standard sourcing or substitution.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions. Operationally, the risk is straightforward: critical components can become an ingress path that bypasses your software security controls. If a threat actor can introduce an untrusted component or firmware into a trusted position, detection is hard and blast radius is large. For federal and federal-adjacent environments, that translates into contract risk, ATO risk, and incident impact risk.

Practical execution plan (30/60/90-day)

First 30 days (establish scope and ownership)

  • Assign control owner and finalize RACI.
  • Draft Critical Component Criteria and get sign-off from system owners and security architecture.
  • Create the first CCR with a small set of components you can control end-to-end.
  • Identify all procurement channels and third parties that can introduce CCR components.

Days 31–60 (implement gates and evidence)

  • Implement approved source rules in procurement workflow.
  • Stand up receiving/inspection SOP and train receiving staff and IT operations.
  • Start collecting real evidence: PO samples, serial capture, inspection logs.
  • Launch the exception process and test it with one real scenario.

Days 61–90 (extend coverage and harden operations)

  • Expand CCR coverage to additional systems/components based on mission impact.
  • Integrate CCR with CMDB/asset processes so swaps and RMAs update inventory reliably.
  • Run an internal control test: sample CCR items and trace from purchase to deployment to maintenance history.
  • Prepare an assessor-ready control narrative with linked artifacts in a single repository (Daydream can serve as the mapping and evidence backbone).

Frequently Asked Questions

How do we decide what counts as a “critical information system component”?

Use objective criteria tied to trust anchors, security boundaries, privileged position, and mission impact. Document the criteria and maintain a register of components that meet it so your scope is defensible during assessment.

Does SA-12(13) apply to cloud services, or only hardware?

Apply the “critical” concept to whatever components underpin your security and mission functions, including managed services where you rely on a provider’s control plane or key management. If you cannot inspect hardware directly, focus on approved sourcing, support channels, and contractual assurance pathways.

What evidence is most persuasive to an auditor?

Sampling-friendly traceability: purchase records from approved sources, receiving/inspection logs with serial numbers, and change/RMA tickets that map a specific part to a specific deployment. Policies help, but execution artifacts close the loop.

Procurement says they can’t guarantee a specific SKU due to supply constraints. What do we do?

Add a substitution approval step for CCR items, with security review and documented rationale. Track substitutions in the CCR so you can demonstrate deliberate control, not ad hoc changes.

How do we handle emergency replacements without breaking operations?

Define an emergency path that restores service first but still captures serial numbers, updates inventory, and performs post-change verification. Document the timeline and responsibilities in the maintenance SOP so it’s repeatable.

How should we operationalize SA-12(13) in our GRC tool?

Map the requirement to a named owner, a written procedure, and recurring evidence artifacts, then schedule periodic collection and sampling. Daydream is a practical fit when you need one place to link the CCR, procurement proofs, and maintenance records to the control narrative.

Frequently Asked Questions

How do we decide what counts as a “critical information system component”?

Use objective criteria tied to trust anchors, security boundaries, privileged position, and mission impact. Document the criteria and maintain a register of components that meet it so your scope is defensible during assessment.

Does SA-12(13) apply to cloud services, or only hardware?

Apply the “critical” concept to whatever components underpin your security and mission functions, including managed services where you rely on a provider’s control plane or key management. If you cannot inspect hardware directly, focus on approved sourcing, support channels, and contractual assurance pathways.

What evidence is most persuasive to an auditor?

Sampling-friendly traceability: purchase records from approved sources, receiving/inspection logs with serial numbers, and change/RMA tickets that map a specific part to a specific deployment. Policies help, but execution artifacts close the loop.

Procurement says they can’t guarantee a specific SKU due to supply constraints. What do we do?

Add a substitution approval step for CCR items, with security review and documented rationale. Track substitutions in the CCR so you can demonstrate deliberate control, not ad hoc changes.

How do we handle emergency replacements without breaking operations?

Define an emergency path that restores service first but still captures serial numbers, updates inventory, and performs post-change verification. Document the timeline and responsibilities in the maintenance SOP so it’s repeatable.

How should we operationalize SA-12(13) in our GRC tool?

Map the requirement to a named owner, a written procedure, and recurring evidence artifacts, then schedule periodic collection and sampling. Daydream is a practical fit when you need one place to link the CCR, procurement proofs, and maintenance records to the control narrative.

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream