These pages are classified as INTERNAL. All information contained herein is confidential to 38North Security. Do NOT share this information or any subset of it outside of 38North Security without the permission of the 38North Security President and confirmation that a valid NDA is in place.
SA-1 SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES
SA-3 SYSTEM DEVELOPMENT LIFE CYCLE
SA-4 (1) ACQUISITION PROCESS | FUNCTIONAL PROPERTIES OF SECURITY CONTROLS
SA-4 (2) ACQUISITION PROCESS | DESIGN / IMPLEMENTATION INFORMATION FOR SECURITY CONTROLS
SA-4 (8) ACQUISITION PROCESS | CONTINUOUS MONITORING PLAN
SA-4 (9) ACQUISITION PROCESS | FUNCTIONS / PORTS / PROTOCOLS / SERVICES IN USE
SA-4 (10) ACQUISITION PROCESS | USE OF APPROVED PIV PRODUCTS
SA-5 INFORMATION SYSTEM DOCUMENTATION
SA-8 SECURITY ENGINEERING PRINCIPLES
SA-9 EXTERNAL INFORMATION SYSTEM SERVICES
SA-9 (1) EXTERNAL INFORMATION SYSTEMS | RISK ASSESSMENTS / ORGANIZATIONAL APPROVALS
SA-9 (2) EXTERNAL INFORMATION SYSTEMS | IDENTIFICATION OF FUNCTIONS / PORTS / PROTOCOLS / SERVICES
SA-9 (4) EXTERNAL INFORMATION SYSTEMS | CONSISTENT INTERESTS OF CONSUMERS AND PROVIDERS
SA-9 (5) EXTERNAL INFORMATION SYSTEMS | PROCESSING, STORAGE, AND SERVICE LOCATION
SA-10 DEVELOPER CONFIGURATION MANAGEMENT
SA-10 (1) DEVELOPER CONFIGURATION MANAGEMENT | SOFTWARE / FIRMWARE INTEGRITY VERIFICATION
SA-11 DEVELOPER SECURITY TESTING AND EVALUATION
SA-11 (1) DEVELOPER SECURITY TESTING AND EVALUATION | STATIC CODE ANALYSIS
SA-11 (2) DEVELOPER SECURITY TESTING AND EVALUATION | THREAT AND VULNERABILITY ANALYSES
SA-11 (8) DEVELOPER SECURITY TESTING AND EVALUATION | DYNAMIC CODE ANALYSIS
SA-15 DEVELOPMENT PROCESS, STANDARDS, AND TOOLS