Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SA

SA-20Customized Development of Critical Components

Reimplement or custom develop the following critical system components: {{ insert: param, sa-20_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (0)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-829Inclusion of Functionality from Untrusted Control Sphere254Reimplementing critical components avoids pulling in functionality from untrusted external control spheres.
CWE-506Embedded Malicious Code80In-house development of critical components eliminates the attack surface of vendor-embedded malicious code.
CWE-912Hidden Functionality79Custom reimplementation prevents hidden functionality or backdoors that may exist in commercial or open-source components.
CWE-1104Use of Unmaintained Third Party Components19Custom development replaces unmaintained third-party components with internally controlled code for critical functions.
CWE-1242Inclusion of Undocumented Features or Chicken Bits14Developing critical components internally avoids undocumented features and chicken bits present in vendor hardware or software.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
No CVEs annotated to this control yet — the per-CVE backfill is in progress.

Other controls in family SA

SA-1 SA-10 SA-11 SA-12 SA-13 SA-14 SA-15 SA-16 SA-17 SA-18 SA-19 SA-2 SA-21 SA-22 SA-23 SA-24 SA-3 SA-4 SA-5 SA-6 SA-7 SA-8 SA-9