SA-22: Unsupported System Components

CSF v2.0 References:

Baselines:

  • Low
    • SA-22
  • Moderate
    • SA-22
  • High
    • SA-22
  • Privacy

    N/A

Previous Version:

Info icon.

Incorporates the following control from the previous version of the control set: SA-22(1): Alternative Sources For Continued Support.

Control Statement

  1. Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer; or
  2. Provide the following options for alternative sources for continued support for unsupported components [Assignment (one or more): in-house support, [Assignment: organization-defined support from external providers] ].

Supplemental Guidance

Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide critical software patches or product updates, which can result in an opportunity for adversaries to exploit weaknesses in the installed components. Exceptions to replacing unsupported system components include systems that provide critical mission or business capabilities where newer technologies are not available or where the systems are so isolated that installing replacement components is not an option.

Alternative sources for support address the need to provide continued support for system components that are no longer supported by the original manufacturers, developers, or vendors when such components remain essential to organizational mission and business functions. If necessary, organizations can establish in-house support by developing customized patches for critical software components or, alternatively, obtain the services of external providers who provide ongoing support for the designated unsupported components through contractual relationships. Such contractual relationships can include open-source software value-added vendors. The increased risk of using unsupported system components can be mitigated, for example, by prohibiting the connection of such components to public or uncontrolled networks, or implementing other forms of isolation.