Navigation : Feature Overview Installation and Configuration Using the On-Demand Service Using the Multi-Tenant Service Security and Compliance Information Crunchy Compliance Suite Report - STIG Compliance - NIST 800-53 Compliance -- AC - Access Control -- AT - Awareness And Training -- AU - Audit And Accountability -- CA - Security Assessment And Authorization -- CM - Configuration Management -- CP - Contingency Planning -- IA - Identification And Authentication -- IR - Incident Response -- MA - Maintenance -- MP - Media Protection -- NIST 800-53 Baseline -- PE - Physical And Environmental Protection -- PL - Planning -- PM - Program Management -- PS - Personnel Security -- RA - Risk Assessment -- SA - System And Services Acquisition -- SC - System And Communications Protection -- SI - System And Information Integrity -- NIST 800-53 Controls --- AC - Access Control --- AT - Awareness And Training --- AU - Audit And Accountability --- CA - Security Assessment And Authorization --- CM - Configuration Management --- CP - Contingency Planning --- IA - Identification And Authentication --- IR - Incident Response --- MA - Maintenance --- MP - Media Protection --- PE - Physical And Environmental Protection --- PL - Planning --- PM - Program Management --- PS - Personnel Security --- RA - Risk Assessment --- SA - System And Services Acquisition ---- SA-1: System And Services Acquisition Policy And Procedures ---- SA-2: Allocation Of Resources ---- SA-3: System Development Life Cycle ---- SA-4: Acquisition Process ---- SA-5: Information System Documentation ---- SA-6: Software Usage Restrictions ---- SA-7: User-Installed Software ---- SA-8: Security Engineering Principles ---- SA-9: External Information System Services ---- SA-10: Developer Configuration Management ---- SA-11: Developer Security Testing And Evaluation ---- SA-12: Supply Chain Protection ---- SA-13: Trustworthiness ---- SA-14: Criticality Analysis ---- SA-15: Development Process, Standards, And Tools ---- SA-16: Developer-Provided Training ---- SA-17: Developer Security Architecture And Design ---- SA-18: Tamper Resistance And Detection ---- SA-19: Component Authenticity ---- SA-20: Customized Development Of Critical Components ---- SA-21: Developer Screening ---- SA-22: Unsupported System Components --- SC - System And Communications Protection --- SI - System And Information Integrity Data Migration Disaster Recovery Cluster Metrics Data Loading Tools Lab Release Notes Support Administrator Runbooks Crunchy PostgreSQL for Pivotal Cloud Foundry > Crunchy Compliance Suite Report > NIST 800-53 Compliance > NIST 800-53 Controls > SA - System And Services Acquisition > SA-6: Software Usage Restrictions SA-6: Software Usage Restrictions Generated 2019-05-20 15:48:11.984914 Status Skipped Statements [Withdrawn: Incorporated into CM-10 and SI-7]. SA-5: Information System Documentation SA-7: User-Installed Software