NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION
SA-12(13) — Critical Information System Components
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Identify and apply enhanced protections to critical information system components — the parts of your infrastructure that, if compromised, would have the most severe impact on your mission.
Example 1: Identify your critical components (domain controllers, certificate authorities, key management servers, core network switches) and apply enhanced supply chain protections: buy only from authorized resellers, verify authenticity before deployment, and monitor them more closely during operation.
Example 2: Maintain a critical components registry that lists each critical component, its vendor, supply chain risk rating, and the enhanced protections applied. Review this registry semiannually and update it when your infrastructure changes or new threats emerge.