Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
30 views16 pages

Mastering NIST RMF 800-37

NIST Special Publication 800-37 Revision 2 provides a structured process for managing cybersecurity and privacy risks across federal information systems, emphasizing the integration of privacy considerations and supply chain risk management. The framework consists of seven steps: Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor, aimed at ensuring security and privacy are integral throughout the system development life cycle. While primarily designed for U.S. federal agencies, its principles can be applied by any organization seeking to enhance their cybersecurity posture.

Uploaded by

pravkumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views16 pages

Mastering NIST RMF 800-37

NIST Special Publication 800-37 Revision 2 provides a structured process for managing cybersecurity and privacy risks across federal information systems, emphasizing the integration of privacy considerations and supply chain risk management. The framework consists of seven steps: Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor, aimed at ensuring security and privacy are integral throughout the system development life cycle. While primarily designed for U.S. federal agencies, its principles can be applied by any organization seeking to enhance their cybersecurity posture.

Uploaded by

pravkumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Luv Johar

GRC Mentor

WhatsApp at
+91 971 860 3114

Mastering NIST
RMF 800-37
Complete Guide to the 7-Step
Risk Management Framework
with Real-World Examples
NIST Special Publication 800-37 Revision 2 (SP 800-37 Rev.
2), titled “Risk Management Framework for Information
Systems and Organizations: A System Life Cycle Approach
for Security and Privacy,” is a comprehensive guide
developed by the National Institute of Standards and
Technology (NIST). It outlines a structured process for
managing cybersecurity and privacy risks across federal
information systems and organizations. This framework is
pivotal for organizations aiming to integrate security and
privacy considerations throughout the system
development life cycle (SDLC).
Luv Johar | GRC Mentor

Overview of NIST SP
800-37 Rev. 2

Published in December 2018, SP 800-37 Rev. 2 introduces


significant enhancements over its predecessor, including

Integration of Privacy Alignment with the


Risk Management NIST Cybersecurity
Incorporates privacy Framework (CSF)
considerations alongside Facilitates the implementation
security, ensuring a holistic of the CSF within the Risk
approach to risk management Management Framework
(RMF), promoting consistency
across security practices

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

Emphasis on Supply
Chain Risk
Management (SCRM)
Addresses risks associated
with external suppliers and
service providers,
acknowledging the
complexities of modern
supply chains

Introduction of the
"Prepare" Step
Adds a preparatory phase
to enhance organizational
readiness for executing the
RMF effectively These
updates aim to improve
communication between
organizational leadership
and operational staff,
promote cost-effective risk
management, and ensure
that security and privacy
are integral to all stages of
system development and
operation

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

The Seven Steps of the Risk


Management Framework (RMF)

01
Prepare
Establishes organisational context, risk
management roles, and strategies to
ensure readiness for executing the RM.

02
Categorise
Determines the impact level of information
systems based on confidentiality, integrity,
and availability, guiding the selection of
appropriate security control.

03
Select
Deploys the selected controls within the
system, ensuring they are integrated into
the operational environmen.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

04
Implement
Deploys the selected controls within the
system, ensuring they are integrated into
the operational environmen.

05
Assess
Evaluates the effectiveness of the implemented
controls, verifying that they function as intended
and meet security and privacy requirement.

06
Authorise
A senior official reviews the assessment results to
determine if the risk levels are acceptable,
granting or denying authorization to operat.

07
Select
Continuously observes the system and its
environment to detect changes, assess control
effectiveness, and respond to emerging risk. This
cyclical process ensures that risk management is
an ongoing activity, adapting to changes in the
system and its operational contex.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

Key Enhancements
in Revision

*Integration **Supply Chain Risk


with NIST CSF Management (SCRM)*
Aligns the RMF with the NIST Emphasizes the importance of
Cybersecurity Framework, assessing and managing risks
enabling organizations to apply associated with external
a unified approach to managing suppliers and service provides.
cybersecurity riss.

*Privacy Risk Management *Preparation Activities


Incorporates privacy The new "Prepare" step focuses on
considerations into each step of establishing a strong foundation
the RMF, ensuring that privacy for risk management by defining
risks are identified and addressed roles, responsibilities, and risk
alongside security riss. management strategis.

These enhancements aim to provide a more comprehensive


and flexible framework that addresses the evolving
landscape of cybersecurity and privacy riss.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

Applicability and Compliance


While SP 800-37 Rev. 2 is primarily designed for U.S. federal agencies, its
principles are applicable to any organization seeking to manage information
system risks effectivl. Compliance with the RMF is mandatory for federal
agencies under the Federal Information Security Modernization Act (FISMA)
and is often required for contractors and partners handling federal dt.
Organizations outside the federal sphere can adopt the RMF to enhance their
cybersecurity posture and align with best practies.

If you require further assistance or have specific


questions about implementing the RMF in your
organization, feel free to ask!

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

BONUS
Sure! Let’s dive deeper into the Seven Steps of the NIST Risk
Management Framework (RMF) from NIST SP 800-37 Rev. 2. For each
step, I’ll give a detailed explanation and practical examples to help clarify
how it works in real-world scenarios.
Luv Johar | GRC Mentor

01 Prepare

Goal
Establish the organization’s
context, governance, and
readiness for managing security
and privacy risks.

Key Activities
Define risk tolerance and
acceptable risk levels.
Identify key stakeholders
(e.g., authorizing officials, Example
system owners).
A federal agency is planning a new
Conduct enterprise risk online tax filing system. Before
assessments and business anything is built, the CIO’s office
impact analysis. establishes who will be responsible
for system security, sets the
Establish policies, acceptable risk level (e.g., “no
procedures, and critical PII data can be exposed”),
frameworks for ongoing and creates a formal risk
risk management. governance strategy.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

02 Categorise

Example
Goal The tax filing system handles
Determine the impact level of sensitive personal and
the information system in terms financial data. The agency
of confidentiality, integrity, and categorizes it as:
availability (CIA triad).
Confidentiality: High
(exposure could cause
serious harm)

Integrity: High (incorrect data


could lead to erroneous tax
assessments)
Key Activities
Availability: Moderate
Categorize information
(some tolerance for
types using FIPS 199 and
downtime)
NIST SP 800-60.

Document categorization This categorisation helps guide


results in the system which security controls must
security plan (SSP). be implemented.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

03 Select

Example
Goal Based on the “High” impact
Choose appropriate categorization, the agency
baseline security and selects controls such as:
privacy controls based
on system Multi-factor
categorization. authentication (IA-2)
Encryption for data at rest
Key Activities and in transit (SC-12, SC-13)
Continuous monitoring (CA-7)
Select baseline controls
from NIST SP 800-53.
They might also tailor controls
Tailor the controls based
— e.g., requiring biometric
on the organisation’s
authentication only during
environment.
high-risk transactions.
Document controls
in the SSP.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

04 Implement

Document how each


Goal control is implemented.
Deploy and configure
selected controls and
integrate them into the
information system.
Example
Key Activities Developers implement secure
coding practices and integrate
Implement technical encryption libraries. System
and procedural administrators configure
security/privacy controls. firewalls, access control lists,
and install antivirus. The project
Ensure controls are team documents the use of TLS
operating as intended. 1.3 for all data transmission.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

06 Authorise

Goal
Make a risk-based decision Example
to approve or deny system The Authorising Official (AO)
operation. reviews all documentation. Most
controls are working, but there’s
a medium-risk vulnerability in
third-party software. The AO
Key Activities accepts the residual risk (with a
POA&M to fix it within 60 days)
Review the SAR, SSP, and and issues an ATO.
Plan of Action and
Milestones (POA&M).

Determine if the risk is


acceptable.

Issue an Authorisation to
Operate (ATO), Denial, or
Interim Authorization.

MASTERING NIST RMF 800-37


Luv Johar | GRC Mentor

Putting It All
Together (Flow)

Prepare Know your environment and risks

Categorise Know your data and what’s at stake.

Select Choose controls that protect your system.

Implement Put the controls into action.

Assess Test if the controls actually work.

Authorise Decide if the system is safe to run.

Monitor Keep watching and improving.

MASTERING NIST RMF 800-37


Learn
to Lead

Luv Johar | GRC Mentor

Need help Message at


Implementing
NIST RMF 800-37? +91 971 860 3114

You might also like