SA-14: Criticality Analysis
SA-14 requires you to perform a criticality analysis that identifies the mission/business functions, system components, and third parties whose failure would cause the greatest impact, then use that ranking to drive security engineering and acquisition decisions. Operationalize it by defining “critical,” building a dependency map, assigning criticality tiers, and keeping repeatable evidence. 1
Key takeaways:
- Define a repeatable criticality method, then apply it to systems, components, and third parties in scope. 1
- Tie results to concrete.SDLC and procurement actions: requirements, architecture decisions, supplier controls, and test depth. 1
- Retain evidence that the analysis happened, was approved, and changed engineering or sourcing outcomes. 1
The sa-14: criticality analysis requirement is an engineering and acquisition control, not a paperwork exercise. You are expected to identify what is most essential to the organization’s mission and services, understand what systems and components enable those functions, and prioritize protection and assurance activities accordingly. SA-14 becomes the rationale for “why we hardened this path,” “why we required this supplier control,” or “why this component gets deeper testing.”
In practice, the fastest way to implement SA-14 is to: (1) define a criticality rubric that a technical team can apply consistently, (2) build a dependency view that includes third parties and upstream components, (3) assign tiers that translate into required security measures, and (4) govern changes so the analysis stays current as architectures and suppliers change. Your outputs should be usable by engineering, procurement, and risk teams, and your evidence should be assessment-ready.
This page gives requirement-level implementation guidance for compliance officers, CCOs, and GRC leads who need to stand up SA-14 quickly and defensibly against NIST SP 800-53 expectations. 1
Regulatory text
Regulatory excerpt: “NIST SP 800-53 control SA-14.” 2
What that means for an operator: You must implement a criticality analysis capability aligned to SA-14 and be able to show how results feed system security engineering and acquisition decisions, consistent with NIST SP 800-53 control intent and assessment expectations. Keep the analysis repeatable, scoped, approved, and connected to actions (requirements, design choices, supplier conditions). 1
Plain-English interpretation (what SA-14 is asking you to do)
SA-14 expects you to answer, with documentation and follow-through:
- What functions are most important? Identify mission/business services whose disruption, compromise, or degradation would create the highest impact.
- What enables those functions? Identify systems, components, data flows, and supporting services (including third parties) that those functions depend on.
- What is “critical” among those dependencies? Rank or tier dependencies by criticality using defined criteria.
- What changes because of the ranking? Apply stronger requirements, assurance, and oversight to the most critical items across SDLC and procurement.
A clean SA-14 program creates a single source of truth that engineering and sourcing teams can use without translating GRC language into technical work. 1
Who it applies to (entity and operational context)
SA-14 is relevant wherever NIST SP 800-53 is the governing security control baseline, including:
- Federal information systems.
- Contractor systems handling federal data, including environments supporting federal contracts where 800-53 controls are flowed down or required by program security plans. 1
Operationally, SA-14 applies most directly to:
- Security architecture and engineering (component selection, trust boundaries, resilience patterns).
- SDLC and DevSecOps (security requirements, test depth, release gating).
- Procurement / third-party risk management (supplier selection criteria, contract clauses, evidence requests).
- System owners and BCP/IR (impact mapping and response prioritization).
If you have a multi-tenant platform, a hybrid cloud footprint, or heavy reliance on SaaS/PaaS, your criticality analysis must explicitly include third-party dependencies, not just internal assets.
What you actually need to do (step-by-step)
Use this sequence to stand up SA-14 in a way auditors can follow and engineers can use.
Step 1: Set the scope and the decision you’re supporting
- Identify the system(s), platform(s), or environment(s) covered (for example: “customer portal production,” “data ingestion pipeline,” “identity stack”).
- Define the decisions SA-14 will drive: security requirements, design review depth, supplier due diligence depth, testing rigor, and change approvals. 1
Output: SA-14 scope statement (systems + boundaries + owners).
Step 2: Define a criticality rubric your teams can apply consistently
Create a rubric with criteria that produce stable results across teams. Keep it simple enough to run repeatedly. Typical criteria:
- Mission/service impact (availability and integrity impact to core services)
- Data sensitivity and privilege (access to regulated or high-value data; control-plane access)
- Blast radius (how many systems/customers/functions depend on it)
- Substitutability (ease of replacement or failover)
- Concentration risk (single points of failure; dependency on a single third party)
Output: Criticality methodology doc with tier definitions and scoring rules.
Step 3: Build a dependency map that includes third parties
For each in-scope mission/service function:
- Map applications, infrastructure, identity, network, and data stores.
- Document external dependencies: SaaS providers, cloud providers, managed service providers, code signing services, CI/CD platforms, payment processors, logging/monitoring providers, and critical open-source components where you rely on a maintainer ecosystem.
A practical approach is to start with your architecture diagrams and production inventory, then validate with engineering leads.
Output: Dependency map artifacts (architecture diagram set + dependency register).
Step 4: Identify “critical components” and assign tiers
Apply the rubric and assign a tier per component/dependency. Use a small number of tiers so the output stays actionable.
Create a table like this:
| Item | Type | Owner | Dependency of (function/system) | Criticality tier | Rationale | Required actions |
|---|---|---|---|---|---|---|
| Identity provider | Third party | IAM lead | AuthN/AuthZ for all apps | High | Control-plane access; broad blast radius | Contract clauses + SSO hardening + enhanced monitoring |
| CI/CD pipeline | Internal service | DevOps | Software release integrity | High | Supply chain integrity | Signing, build provenance, restricted admin, audit logs |
| Customer support SaaS | Third party | Support ops | Ticketing only | Medium | Operational impact, limited data | SSO, access reviews, data minimization |
Output: Criticality register with tiers and rationales.
Step 5: Translate tiers into mandatory engineering and sourcing requirements
This is where many programs fail. Your tiers must have “teeth.” Examples of tier-driven actions:
- Architecture requirements: segmentation, redundant design, privileged access boundaries for high-criticality components.
- Security requirements: stronger authentication, tighter admin controls, stronger logging/monitoring, stricter change control.
- Assurance requirements: deeper testing, more stringent review gates, stronger supplier evidence requests.
- Procurement requirements: add security terms, audit rights (where feasible), incident notification terms, and minimum control expectations appropriate to criticality.
Output: Tier-to-requirements matrix (what “High” vs “Medium” requires).
Step 6: Put governance around it (change triggers and review cadence)
Define triggers that force an update:
- New system or major architectural change
- New third party supporting a critical path
- Material change in a third party relationship (service change, subprocessor change, incident)
- Major incident or near miss in a critical component
Define who approves changes to the criticality register (system owner + security architecture + procurement/TPRM for third parties).
Output: Procedure and RACI for SA-14 updates and approvals.
Step 7: Operationalize in workflows (tickets, SDLC gates, procurement intake)
Make the analysis usable:
- Add a criticality field to your CMDB/service catalog or system inventory.
- Require criticality tier selection in procurement intake for third parties.
- Add criticality-based checks in architecture review and release approval.
Daydream (as a GRC workflow layer) fits naturally here: you can map SA-14 to a control owner, define the implementation procedure, and schedule recurring evidence collection so the control stays “operating,” not “written once.” 1
Required evidence and artifacts to retain
Auditors typically want proof of (a) method, (b) application, (c) governance, and (d) resulting actions.
Retain:
- Criticality analysis methodology (rubric, tier definitions, scoring rules, scope).
- System/service inventory showing which items were assessed and who owns them.
- Dependency maps (diagrams and/or dependency register) including third parties.
- Criticality register with tiers, rationales, and approval metadata.
- Tier-to-requirements matrix showing what controls/process steps are mandatory per tier.
- Change management evidence showing analysis updates after major changes (tickets, PRDs, architecture review notes).
- Procurement/TPRM evidence for high-criticality third parties (due diligence package, contract exhibits, security requirements incorporated).
- Meeting minutes/approvals showing accountable sign-off.
A common assessment failure is having a nice rubric but no evidence that engineering or procurement changed behavior.
Common exam/audit questions and hangups
Expect questions like:
- “Show me your SA-14 methodology and who approved it.” 1
- “Which system components are deemed critical and why?”
- “How do you know you captured third-party dependencies?”
- “Demonstrate how criticality affected security requirements or supplier selection.”
- “What triggers a re-analysis, and show an example where you updated it after a change?”
- “How do you ensure teams don’t self-select ‘low’ criticality to avoid gates?”
Hangups that slow teams down:
- Arguing about perfect scoring instead of agreeing on tier outcomes.
- Treating SaaS dependencies as “out of scope” because they are external.
- Keeping results in slide decks instead of a maintained register tied to real workflows.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Criticality tiers that don’t change anything.
Fix: Publish a tier-to-requirements matrix and enforce it through SDLC and procurement gates. -
Mistake: Missing the “critical path” third parties.
Fix: Start from user journeys and data flows. Validate with incident response and SRE teams who know where outages hurt. -
Mistake: One-time analysis that goes stale.
Fix: Add change triggers and require criticality updates as part of architecture review and third-party onboarding. -
Mistake: No ownership.
Fix: Assign a control owner and establish RACI: system owners maintain entries; security architecture validates; procurement/TPRM owns third-party evidence. -
Mistake: Over-scoping to every component.
Fix: Begin with crown-jewel services and shared platforms, then expand once the workflow runs smoothly.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for SA-14, so you should treat this as an assessment and contract-performance risk rather than a control with a cited enforcement history in this dataset. 2
The practical risk: if you cannot show a defensible criticality analysis, assessors may conclude your security engineering and supplier assurance are not risk-based. That increases the chance of gaps in high-impact areas such as identity, build pipelines, key management, and core third-party services.
Practical execution plan (30/60/90-day)
Exact timelines depend on your system count and architecture complexity. Use these phases as an execution pattern.
First 30 days (Immediate)
- Assign SA-14 control owner and cross-functional working group (security architecture, SRE, procurement/TPRM, system owners). 1
- Publish the criticality rubric and tier definitions.
- Pick a pilot scope: one mission service and its primary dependencies.
- Build the initial criticality register and get sign-off.
Days 31–60 (Near-term)
- Expand dependency mapping to shared services (identity, logging, CI/CD, KMS, network edge) and top third parties.
- Implement tier-to-requirements matrix and embed it in architecture review checklists and procurement intake.
- Create an evidence folder structure (or Daydream evidence tasks) for methodology, register exports, approvals, and change triggers. 1
Days 61–90 (Operationalize)
- Run SA-14 across remaining in-scope systems and high-impact third parties.
- Add a recurring review and change-trigger workflow tied to change management.
- Perform one “prove it” exercise: select a high-criticality dependency and show how SA-14 required a stronger requirement, a contract addendum, or a deeper test plan.
Frequently Asked Questions
How detailed does the dependency map need to be for SA-14?
Detailed enough that you can identify which components and third parties sit on critical mission paths and justify their tiering. If an outage or compromise would materially impact a key service, that dependency should appear in your map and register. 1
Does SA-14 require a quantitative scoring model?
No specific scoring model is required by the excerpt provided, but you need a consistent method that produces defensible tiers. A simple rubric with documented criteria is usually easier to maintain and audit. 1
Do we need to include third parties in the criticality analysis?
Yes in practice, because many critical mission functions depend on third-party services, and SA-14 is meant to drive acquisition and engineering decisions. Treat critical SaaS/PaaS/MSSP dependencies like critical components with tier-driven requirements and evidence. 1
What evidence is the fastest path to assessment readiness?
Keep the methodology, a current criticality register with approvals, and at least one example where a tier decision changed an engineering or procurement outcome. Assessors look for traceability from analysis to action. 1
How do we prevent teams from gaming the tiers to avoid security gates?
Make tier assignment reviewable and require security architecture approval for high-impact systems and shared services. Tie tier selection to objective indicators like blast radius and control-plane access, and audit tier changes through change management. 1
Where should SA-14 live: GRC tool, CMDB, or architecture repository?
Put the “system of record” where teams will maintain it, often a CMDB/service catalog or architecture repository, then mirror key fields into your GRC control evidence. Daydream can manage ownership, procedure, and recurring evidence tasks even if the register lives elsewhere. 1
Footnotes
Frequently Asked Questions
How detailed does the dependency map need to be for SA-14?
Detailed enough that you can identify which components and third parties sit on critical mission paths and justify their tiering. If an outage or compromise would materially impact a key service, that dependency should appear in your map and register. (Source: NIST SP 800-53 Rev. 5)
Does SA-14 require a quantitative scoring model?
No specific scoring model is required by the excerpt provided, but you need a consistent method that produces defensible tiers. A simple rubric with documented criteria is usually easier to maintain and audit. (Source: NIST SP 800-53 Rev. 5)
Do we need to include third parties in the criticality analysis?
Yes in practice, because many critical mission functions depend on third-party services, and SA-14 is meant to drive acquisition and engineering decisions. Treat critical SaaS/PaaS/MSSP dependencies like critical components with tier-driven requirements and evidence. (Source: NIST SP 800-53 Rev. 5)
What evidence is the fastest path to assessment readiness?
Keep the methodology, a current criticality register with approvals, and at least one example where a tier decision changed an engineering or procurement outcome. Assessors look for traceability from analysis to action. (Source: NIST SP 800-53 Rev. 5)
How do we prevent teams from gaming the tiers to avoid security gates?
Make tier assignment reviewable and require security architecture approval for high-impact systems and shared services. Tie tier selection to objective indicators like blast radius and control-plane access, and audit tier changes through change management. (Source: NIST SP 800-53 Rev. 5)
Where should SA-14 live: GRC tool, CMDB, or architecture repository?
Put the “system of record” where teams will maintain it, often a CMDB/service catalog or architecture repository, then mirror key fields into your GRC control evidence. Daydream can manage ownership, procedure, and recurring evidence tasks even if the register lives elsewhere. (Source: NIST SP 800-53 Rev. 5)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream