NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION

SA-5(2)Security-relevant External System Interfaces

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Documentation must describe how the system interfaces with external systems from a security perspective — what data flows across the boundary, what protocols are used, and what security measures protect those interfaces.

Example 1: Create interface documentation for each external system connection: the remote system name, data exchanged, protocol and port, authentication method, encryption used, and the security agreement (ISA/MOU) governing the connection. Include this in your system security plan.

Example 2: In your network diagrams, label every external interface with its security properties. A connection to a cloud API should show: HTTPS/TLS 1.3, OAuth 2.0 authentication, data classification of traffic, and bandwidth/rate limiting. This makes it easy to audit and assess interface security.