NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION

SA-8(30)Procedural Rigor

Implement the security design principle of procedural rigor in {{ insert: param, sa-08.30_odp }}.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Supplemental Guidance

The principle of procedural rigor states that the rigor of a system life cycle process is commensurate with its intended trustworthiness. Procedural rigor defines the scope, depth, and detail of the system life cycle procedures. Rigorous system life cycle procedures contribute to the assurance that the system is correct and free of unintended functionality in several ways. First, the procedures impose checks and balances on the life cycle process such that the introduction of unspecified functionality is prevented. Second, rigorous procedures applied to systems security engineering activities that produce specifications and other system design documents contribute to the ability to understand the system as it has been built rather than trusting that the component, as implemented, is the authoritative (and potentially misleading) specification. Finally, modifications to an existing system component are easier when there are detailed specifications that describe its current design instead of studying source code or schematics to try to understand how it works. Procedural rigor helps ensure that security functional and assurance requirements have been satisfied, and it contributes to a better-informed basis for the determination of trustworthiness and risk posture. Procedural rigor is commensurate with the degree of assurance desired for the system. If the required trustworthiness of the system is low, a high level of procedural rigor may add unnecessary cost, whereas when high trustworthiness is critical, the cost of high procedural rigor is merited.

Practitioner Notes

Procedural rigor means that security procedures are followed precisely and completely, not approximated or shortcut. When you cut corners on security procedures, you introduce the very risks the procedures were designed to prevent.

Example 1: Implement checklists for critical security procedures and require them to be completed in full. For system hardening, use a STIG checklist where each item must be verified and signed off. For incident response, use a structured playbook where each step is documented as completed.

Example 2: Conduct periodic compliance audits where you verify that procedures are being followed as written. Spot-check a sample of account provisioning requests to verify all steps were completed. Review a sample of change management tickets to ensure security reviews were conducted before changes were implemented. Document and correct deviations.