Shared Flashcard Set

Details

Risk Management Framework Process (RMF)
Risk Management - Information Assurance
6
Other
Not Applicable
02/17/2016

Additional Other Flashcards

 


 

Cards

Term

RMF Process

 

Step 1

Definition

Categorize System

  • Categorize the system in accordance with the CNSSI 1253
  • Initiate the Security Plan
  • Register system with DoD Component Cybersecurity Program
  • Assign qualified personnel to RMF roles
Term

RMF Process

 

Step 2

Definition

Select Security Controls

 

  • Common Control Identification - Common controls are selected as "common" and provided via the Knowledge Service based on risk assessments conducted by these entities at the Tier 1 and Tiew 2 levels
  • Select security controls and Overlay Selection - Identify the security baseline for the system
  • Develop system-level continuous monitoring strategy
  • Review and approve the security plan and continous monitoring strategy - Develope and document a system-level strategy for the continous monitoring of the effectiveness of security controls
  • Apply overlays and tailor 
OVERLAYS - address additional factors beyond impact (baselines only address impact of loss of confidentiality, integrity, and availability)
 
ENTERPRISE Tailoring 
  • Consistent approach and set of security controls by subject area
  • One time resorce expenditure vs. continued expenditures of single system tailoring
  • Promotes reciprocity

 

Term

RMF Process

 

Step 3

Definition

Implement Security Controls

 

  • Implement control solutions consistent with DoD Component Cybersecurity architectures
  • Document security control implementation in the security plan
Term

RMF Process

 

Step 4

Definition

Assess Security Controls

  • Develop and approve Security Assessment Plan
  • Assess security controls
  • SCA prepares Security Assessment Report (SAR)
  • Conduct initial remediation actions
Term

RMF Process

 

Step 5

Definition

Authorize System

 

  • Prepare the POA&M
  • Submit Security Authorization -- Package (security plan, SAR and POA&M) to AO
  • AO conducts final risk determination
  • AO makes authorization decision
Term

RMF Process

 

Step 6

Definition

Monitor Security Controls

 

  • Determine impact of changes to the system and environment
  • Assess selected controls annually
  • Conduct needed remediation
  • Update security plan, SAR, and POA&M
  • Report security status to AO
  • AO reviews reported status
  • Implement system decommissioning strategy
Supporting users have an ad free experience!