STIGhub
STIGs
RMF Controls
Compare
← All Controls
SA-22
System and Services Acquisition
Rev 5
Unsupported System Components
CCI Identifiers (5)
CCI-003372
Define the support from external providers to be provided for alternative sources for continued support for unsupported system components.
CCI-003373
Provide in-house support and/or organization-defined support from external providers for alternative sources for continued support for unsupported components.
CCI-003374
The organization documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
CCI-003375
The organization provides justification for the continued use of unsupported system components required to satisfy mission/business needs.
CCI-003376
Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer.
Linked STIG Checks (40)
Across 38 STIGs. Click to expand.
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
3 checks
▶
Application Server Security Requirements Guide
1 check
▶
Central Log Server Security Requirements Guide
1 check
▶
Cisco ASA NDM Security Technical Implementation Guide
1 check
▶
Container Platform Security Requirements Guide
1 check
▶
Crunchy Data Postgres 16 Security Technical Implementation Guide
1 check
▶
Crunchy Data PostgreSQL Security Technical Implementation Guide
1 check
▶
Database Security Requirements Guide
1 check
▶
Domain Name System (DNS) Security Requirements Guide
1 check
▶
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
1 check
▶
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
1 check
▶
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
1 check
▶
HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide
1 check
▶
Infoblox 7.x DNS Security Technical Implementation Guide
1 check
▶
Mainframe Product Security Requirements Guide
1 check
▶
MariaDB Enterprise 10.x Security Technical Implementation Guide
1 check
▶
MarkLogic Server v9 Security Technical Implementation Guide
1 check
▶
Microsoft SQL Server 2022 Instance Security Technical Implementation Guide
1 check
▶
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
1 check
▶
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
1 check
▶
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
1 check
▶
MS SQL Server 2014 Database Security Technical Implementation Guide
1 check
▶
MS SQL Server 2014 Instance Security Technical Implementation Guide
1 check
▶
MS SQL Server 2016 Instance Security Technical Implementation Guide
1 check
▶
Network Device Management Security Requirements Guide
1 check
▶
Oracle Database 11.2g Security Technical Implementation Guide
1 check
▶
Oracle Database 12c Security Technical Implementation Guide
1 check
▶
Oracle Database 19c Security Technical Implementation Guide
1 check
▶
Oracle MySQL 8.0 Security Technical Implementation Guide
1 check
▶
PostgreSQL 9.x Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
1 check
▶
Redis Enterprise 6.x Security Technical Implementation Guide
1 check
▶
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
1 check
▶
Unified Endpoint Management Server Security Requirements Guide
1 check
▶
Virtual Machine Manager Security Requirements Guide
1 check
▶
Web Server Security Requirements Guide
1 check