NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION
SA-12(5) — Limitation of Harm
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Limit the potential harm from a supply chain compromise by reducing the access and privileges granted to vendor-supplied components and services.
Example 1: Run vendor-supplied software with minimum privileges. If a monitoring agent only needs read access to system metrics, do not give it administrator access. Apply the principle of least privilege to vendor service accounts, network access, and data permissions.
Example 2: Segment vendor-supplied systems on your network so that a compromise of one vendor's product does not give the attacker access to your entire environment. Place vendor management consoles and agent communication channels on a dedicated management VLAN with restricted access to production systems.