Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views13 pages

Federal Cybersecurity Risk Guide

Uploaded by

dylanmao1231
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views13 pages

Federal Cybersecurity Risk Guide

Uploaded by

dylanmao1231
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

NIST Special Publication 800-37

Risk Management Framework (RMF)


Overview

NIST RMF Team


[email protected]
NIST Special Publication (SP) 800-37
Risk Management Framework (RMF) for Information Systems & Organizations

ADDRESSES APPLICABLE TO
HOLLISTIC & FLEXIBLE
7 STEP PROCESS CYBERSECURITY ALL TYPES
TO MANAGE RISK & PRIVACY OF SYSTEMS &
RISK ORGANIZATIONS

3 REVISIONS SINCE DEVELOPED BY THE


JOINT TASK
MANDATED BY
OMB A-130
2004 FORCE FOR FEDERAL AGENCIES

ROBUST FEDERAL
SYSTEM & COMMON PROVIDES LINKS TO IMPLEMENTATION OF THE
CONTROL OTHER KEY
CYBERSECURITY
AUTHORIZATIONS NIST PUBS FRAMEWORK
2
Risk Management Framework Overview

The RMF provides a structured, yet flexible process


for managing cybersecurity and privacy risk
that includes system categorization, control
selection, implementation, assessment,
authorization, and continuous monitoring.

3
Risk Management Framework Steps
Essential activities to prepare the organization to manage
security and privacy risks
Categorize the system and information processed, stored,
and transmitted based on an impact analysis
Select the set of NIST SP 800-53 controls to protect the
system based on risk assessment(s)
Implement the controls and document how controls are
deployed
Assess to determine if the controls are in place, operating as
intended, and producing the desired results
Senior official makes a risk-based decision to authorize the
system (to operate)
Continuously monitor control implementation and risks to
the system
4
RMF Prepare Step
Purpose: carry out essential activities at all three risk management levels to help prepare the organization to manage
its security and privacy risks using the RMF.
Organization-& Mission/Business Process Level Tasks
P-1: Risk Management Roles
P-2: Risk Management Strategy
P-3: Risk Assessment – Organization
P-4: Organizationally-tailored Control Baselines and
Cybersecurity Framework Profiles (optional)
P-5: Common Control Identification
P-6: Impact Level Prioritization (optional)
P-7: Continuous Monitoring Strategy – Organization
P-8: Mission or Business Focus

SP 800-39 SP 800-30 SP 800-137

Related: 39 30
REVISION 1
137
INFORMATION SECURITY
MANAGING INFORMATION SECURITY CONTINUOUS MONITORING (ISCM)
RISK: ORGANIZATION, MISSION, FOR FEDERAL INFORMATION
AND INFORMATION SYSTEM GUIDE FOR CONDUCTING SYSTEMS AND ORGANIZATIONS
VIEW RISK ASSESSMENTS

5
RMF Prepare Step
System Level Tasks
P-9: System Stakeholders
P-10: Asset Identification
P-11: Authorization Boundary
P-12: Information Types
P-13: Information Life Cycle
P-14: Risk Assessment - System
P-15: Requirements Definition
P-16: Enterprise Architecture
P-17: Requirements Allocation
P-18: System Registration

SP 800-30 SP 800-60v1 SP 800-60v2

60 60
SP 800-160v1 SP 800-160v2

Related: 160
VOLUME 1
160 30 VOLUME 1 VOLUME 2
REVISION 1
REVISION 1
REVISION 1 GUIDE FOR MAPPING TYPES OF GUIDE FOR MAPPING TYPES OF
ENGINEERING DEVELOPING CYBER -RESILIENT GUIDE FOR CONDUCTING INFORMATION AND INFORMATION
INFORMATION AND INFORMATION
TRUSTWORTHY SYSTEMS: RISK ASSESSMENTS SYSTEMS TO SECURITY
SYSTEMS TO SECURITY
SECURE SYSTEMS A SYSTEMS SECURITY CATEGORIES:
CATEGORIES
ENGINEERING APPENDICES

6
APPROACH
RMF Categorize Step
Purpose: inform organizational risk management processes and tasks by determining the adverse impact of the loss of
confidentiality, integrity, and availability of organizational systems and information to the organization.

C-1: System Description


C-2: Security Categorization
C-3: Security Categorization Review and Approval

FIPS 199 SP 800-60v1 SP 800-60v2

Related: 199 60
VOLUME 1
60
VOLUME 2
STANDARDS FOR SECURITY
CATEGORIZATION OF FEDERAL GUIDE FOR MAPPING TYPES OF GUIDE FOR MAPPING TYPES OF
INFORMATION AND INFORMATION AND INFORMATION INFORMATION AND INFORMATION
INFORMATION SYSTEMS SYSTEMS TO SECURITY SYSTEMS TO SECURITY
CATEGORIES CATEGORIES:

7
APPENDICES
RMF Select Step
Purpose: select, tailor, and document the controls necessary to protect the information system and organization
commensurate with risk to organizational operations and assets, individuals, and the Nation.

S-1: Control Selection


S-2: Control Tailoring
S-3: Control Allocation
S-4: Documentation of Planned Control Implementations
S-5: Continuous Monitoring Strategy – System
S-6: Plan Review and Approval

FIPS 200

Related:
200
MINIMUM SECURITY REQUIREMENTS
FOR FEDERAL INFORMATION AND
INFORMATION SYSTEMS

8
RMF Implement Step
Purpose: implement the controls as specified in security and privacy plans for the system and for the organization, and
update the plans with the as-implemented details.

I-1: Control Implementation


I-2: Update Control Implementation Information

NIST

RMF
RISK MANAGEMENT FRAMEWORK

nist.gov/rmf

Related:
9
RMF Assess Step
Purpose: determine if the controls selected for implementation are implemented correctly, operating as intended, and
producing the desired outcome with respect to meeting the security and privacy requirements for the system and
organization.

A-1: Assessor Selection


A-2: Assessment Plan

NIST A-3: Control Assessments


A-4: Assessment Report

RMF
RISK MANAGEMENT FRAMEWORK
A-5: Remediation Actions
A-6: Plan of Action and Milestones

nist.gov/rmf
SP 800-53A

53A
Related: REVISION 5
ASSESSING
SECURITY AND PRIVACY CONTROLS
IN INFORMATION SYSTEMS
AND ORGANIZATIONS

10
RMF Authorize Step
Purpose: provide accountability by requiring a senior management official to determine if the security and privacy risk
to organizational operations and assets, individuals, other organizations, or the Nation based on the operation of a
system or the use of common controls, is acceptable.

R-1: Authorization Package


R-2: Risk Analysis and Determination
NIST R-3: Risk Response

RMF
R-4: Authorization Decision
R-5: Authorization Reporting

RISK MANAGEMENT FRAMEWORK

nist.gov/rmf
SP 800-39

Related: MANAGING INFORMATION SECURITY


RISK: ORGANIZATION, MISSION,
AND INFORMATION SYSTEM
VIEW

11
RMF Monitor Step
Purpose: maintain an ongoing situational awareness about the security and privacy posture of the system and the
organization in support of risk management decisions.

M-1: System and Environment Changes


M-2: Ongoing Assessments
M-3: Ongoing Risk Response
M-4: Authorization Package Updates NIST

RMF
M-5: Security and Privacy Reporting
M-6: Ongoing Authorization
M-7: System Disposal RISK MANAGEMENT FRAMEWORK

nist.gov/rmf

Related:
12
STAY IN TOUCH
CONTACT US
nist.gov/RMF [email protected]

@NISTcyber

13

You might also like