NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION
SA-4(4) — Assignment of Components to Systems
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
When integrating components from different vendors into a single system, document which components belong to which systems and ensure that security boundaries are clear between them.
Example 1: Maintain a system component inventory that maps each hardware and software component to the system it belongs to. Document the security boundary — where one system's responsibility ends and another begins — especially at integration points where data flows between systems.
Example 2: In your network diagrams, clearly label which components are part of which system's authorization boundary. When a shared component (like a database server) serves multiple systems, document the shared responsibility and ensure both system owners agree on who is responsible for its security.