Risk Management Framework Process Map
Risk Management Framework Process Map
November 2018
ME Mylrea MD Watson
SNG Gourisetti JE Castleberry
M Touhiduzzaman
iii
Contents
Acronyms and Abbreviations ...................................................................................................................... iii
1.0 Introduction .......................................................................................................................................... 1
2.0 The Risk Management Framework ...................................................................................................... 1
3.0 RMF Roles and Responsibilities .......................................................................................................... 3
4.0 RMF Step 1—Categorize Information System..................................................................................... 4
5.0 RMF Step 2—Select Security Controls ................................................................................................ 4
6.0 RMF Step 3—Implement Security Controls ........................................................................................ 5
7.0 RMF Step 4—Assess Security Controls ............................................................................................... 6
8.0 RMF Step 5—Authorize Information System ...................................................................................... 7
9.0 RMF Step 6—Monitor Security Controls............................................................................................. 8
10.0 References .......................................................................................................................................... 11
Appendix A – Updates to the Risk Management Framework .................................................................. A.1
iv
Figures
1. RMF for Information and Platform Information Technology Systems .................................................... 1
2. Document Mapping for RMF ................................................................................................................... 2
3. Multi-Tiered Risk Management Strategy ................................................................................................. 2
Tables
1. RMF Step 1 – Categorize Information System ......................................................................................... 4
2. RMF Step 2—Select Security Controls .................................................................................................... 5
3. RMF Step 3—Implement Security Controls ............................................................................................. 6
4. RMF Step 4—Assess Security Controls ................................................................................................... 6
5. RMF Step 5—Authorize Information System .......................................................................................... 7
6. RMF Step 6—Monitor Security Controls ................................................................................................. 9
v
1.0 Introduction
The purpose of this document is to provide an overview of the Risk Management Framework (RMF)
codified in National Institute of Standards & Technology (NIST) Special Publication (SP) 800-37r1 for
the Federal Energy Management Program (FEMP). This document, while accurate, is not an authoritative
source on the management of federal information systems. However, the concepts and process discussed
herein are representative of the data points used to compare the RMF with NIST’s Framework for
Improving Critical Infrastructure Cybersecurity, otherwise known as the cybersecurity framework.
Figure 1. RMF for Information and Platform Information Technology Systems (NIST, 2010)
The RMF is a living, comprehensive process that requires an appropriate amount of due diligence to be
effective. Figure 2 depicts the available NIST authored guidance documents to assist in each step of the
RMF process.
1
Figure 2. Document Mapping for RMF
A core concept to the RMF is risk management. The RMF makes use of NIST SP 800-39, Integrated
Enterprise-Wide Risk Management: Organization, Mission, and Information System View. Enterprise risk
management involves a multitiered approach connecting strategic goals with the daily operations of
information systems. Figure 3 depicts this structured risk management process (NIST 2011b).
Tier 1 frames the organization risk and informs all other activities. This is where leaders set priorities and
create policies to achieve strategic objectives. Tier 1 includes, among other things, governance of the
organization to set priorities; the risk executive function to manage organization-wide risks; determination
of the risk management strategy to provide a common framework at all levels of the organization; and the
investment strategy to achieve mission and risk priorities, anticipate risk response needs, and limit
strategic investments to align with organizational priorities. Tier 1 sets the direction for Tier 2 managers.
2
Tier 2 focuses on developing risk-informed mission processes to meet leadership’s stated goals. Tier 2
includes the identification and development of risk-aware mission processes to achieve strategic goals;
the administration of an enterprise architecture to enable mission processes; and establishment of a
consistent information system architecture to cost-effectively ensure resilience of mission-critical
information system assets. Tier 2 builds an organizational infrastructure conducive to the successful
execution of activities at Tier 3.
Tier 3 uses the mission processes developed in Tier 2 and the goals set in Tier 1 to conduct the day-to-day
activities that make the organization successful. Tier 3 addresses risk from an information system
perspective. These activities are the culmination of the organization’s risk management strategy and
ensure that individual systems are secure, reliable, and available to execute mission processes.
In October 2018, NIST announced the final draft of NIST SP 800-37, revision 2 that modifies the RMF
process. The modification is discussed in Appendix A; however, because most organizations will be slow
to transition to version 2, this paper focuses on the initial version of the RMF.
3
• Information Security Architect—Responsible for ensuring that the information security requirements
necessary to protect the organization’s core missions and business processes are adequately addressed
in all aspects of enterprise architecture.
• Information System Security Manager (ISSM)—Responsible for conducting information system
security management activities as designated by the ISSO. They develop and maintain the system-
level cybersecurity program.
• Security Control Assessor (SCA)—Responsible for conducting a thorough assessment of the
management, operational, and technical security controls of an information system.
4
Table 2. RMF Step 2—Select Security Controls
Supporting Tasks Primary Responsibility Reference Deliverable(s)
Task 2-1—Identify the ISO, ISSM/ISSO, SCA NIST SP 800-30, NIST Document the common
security controls that are SP 800-53, CNSSI 1253, controls in the SSP/
provided by the FIPS 199, FIPS 200 Security Controls
organization as common Traceability Matrix
controls for (SCTM)
organizational
information systems and
document the controls in
the SSP.
Task 2-2—Select the ISO NIST SP 800-30, NIST Document the selected
security controls for the SP 800-53, CNSSI 1253, security controls in the
information system (i.e., FIPS 199, FIPS 200 SSP, draft Risk
baseline, overlays, Assessment Report
tailored) and document (RAR)
the controls in the SSP.
5
Table 3. RMF Step 3—Implement Security Controls
Primary
Supporting Tasks Responsibility References Deliverable(s)
Task 3-1—Implement security controls ISO NIST SP 800-37,
specified in the SSP. NIST SP 800-30,
NIST SP 800-53,
NIST SP 800-53A,
CNSSI 1253, web:
SCAP.NIST.GOV,
FIPS 200
Task 3-2—Document the security control ISO; ISSM/ISSO NIST SP 800-53, Updated SSP with
implementation as appropriate in the SSP, CNSSI 1253 information
providing a functional description of the describing how
control implementation. security controls are
implemented
6
Supporting Tasks Primary Responsibility References Deliverable(s)
Task 4-3—Prepare the NIST SP 800-53A SAR
Security Assessment
Report (SAR),
documenting the issues,
findings, and
recommendations for the
security control
assessment.
Task 4-4 — Conduct ISO, SCA, ISSM/ISSO NIST SP 800-30, NIST Updated RAR
initial remedial actions on SP 800-53A
security controls based on
the findings and
recommendations of the
SAR and reassess
remediated control(s), as
appropriate.
7
Supporting Tasks Primary Responsibility Reference Deliverable(s)
Task 5-3—Determine the AO NIST SP 800-30, NIST SP
risk to organizational 800-39
operations (including
mission, functions, image,
or reputation),
organizational assets,
individuals, other
organizations, or the
nation.
Task 5-4—Determine if AO NIST SP 800-39 Authorization decision
risk to organizational document (e.g.,
operations, organizational Authority to Operate,
assets, individuals, other Denied Authorization
organizations, or the to Operate, and
nation is acceptable. Interim Authorization
to Test)
By the end of RMF Step 5, documents submitted in the Security Authorization Package, at a minimum,
include the following:
• SSP/ SCTM—Provides an overview of security requirements, description of agreed-upon controls,
and other supporting security-related information.
• RAR—Defines the organizationally established level of acceptable risk associated with the operation
of an information technology system at a specific level, identifies risks, and provides an assessed
residual risk level for the system.
• Continuous Monitoring Plan—Provides the strategy to routinely evaluate selected information
assurance controls/metrics. Reference NIST SP 800-137, Information Security Continuous
Monitoring for Federal Information Systems and Organizations (NIST 2011a).
• SAR — Contains security control assessment results and recommended corrective actions for
security-control weaknesses and deficiencies.
• POA&M — Defines plans of action and milestones related to correcting weaknesses or deficiencies
and reducing or eliminating known vulnerabilities and identifies completion dates.
8
Table 6. RMF Step 6—Monitor Security Controls
Primary
Supporting Tasks Responsibility Reference Deliverable(s)
Task 6-1—Determine ISO, ISSO/ISSM NIST SP 800-30, Change Request
the security impact of NIST SP 800-53A
proposed or actual
changes to the
information system
and its environment
of operation.
Task 6-2—Assess a SCA, ISSO/ISSM NIST SP 800-53A, Periodic
selected subset of NIST SP 800-137 Continuous
security controls Monitoring Report
employed within and
inherited by the
information system
in accordance with
the organization-
defined monitoring
strategy.
9
Primary
Supporting Tasks Responsibility Reference Deliverable(s)
Task 6-5—Regularly ISO NIST SP 800-53A Periodic
report the security Continuous
status of the Monitoring Report
information system
(including the
effectiveness of
security controls
employed within and
inherited by the
information system)
to the AO and other
appropriate
organizational
officials, in
accordance with the
monitoring strategy.
Task 6-6—Regularly AO NIST SP 800-30, Authority to
review the reported NIST SP 800-39 Operate
security status of the
information system
(including the
effectiveness of
security controls
employed within and
inherited by the
information system)
in accordance with
the monitoring
strategy to determine
whether there is risk
to organizational
operations,
organizational assets,
individuals, other
organizations, or the
nation.
Task 6-7— ISO NIST SP 800-30, Updated system
Implement an NIST SP 800-53A inventory
information system
decommissioning
strategy, when
needed, that executes
required actions
when a system is
removed from
service.
10
10.0 References
NIST. 2010. NIST Special Publication 800-37, Revision 1, Guide for Applying the Risk Management
Framework to Federal Information Systems: A Security Life Cycle Approach. National Institute of
Standards and Technology, February 2010. http://www.nist.gov/manuscript-publication-
search.cfm?pub_id=904985.
NIST. 2011a. NIST Special Publication 800-137, Information Security Continuous Monitoring (ISCM)
for Federal Information Systems and Organizations. National Institute of Standards and Technology,
September 2011. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf.
NIST. 2011b. NIST Special Publication 800-39, Managing Information Security Risk: Organization,
Mission, and Information System View. National Institute of Standards and Technology, March 2011.
https://csrc.nist.gov/publications/detail/sp/800-39/final
NIST. 2018. NIST Special Publication 800-37, Revision 2, A System Life Cycle Approach for Security
and Privacy. National Institute of Standards and Technology, October 2018.
https://csrc.nist.gov/CSRC/media/Publications/sp/800-37/rev-2/draft/documents/sp800-37r2-draft-fpd.pdf
11
Appendix A
–
Updates to the Risk Management Framework
The National Institute of Standards & Technology (NIST) released the draft of Special Publication (SP)
800-37, Revision 2, Risk Management Framework for Information Systems and Organizations: A System
Life Cycle Approach for Security and Privacy. This update is based on the Executive Order 13800,
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Below are the major
objectives of the update:
• Establish preparatory activities at all risk management levels to provide more effective and efficient
execution in RMF
• Demonstrate how NIST cybersecurity framework aligns with NIST risk management process
• Integrate the privacy risk management process documented in NISTIR 8062 into the RMF to support
the privacy protection needs for which privacy programs are responsible
• Align NIST SP 800-160 to RMF for promoting the development of trustworthy, secure software
systems
In version 2, one of the key changes to the RMF is to add the Prepare step. Preparation is critical at tier 1
(organization) and tier 2 (mission/business process) to execute the RMF efficiently (NIST 2018). This
Prepare step involves the essential activities at the organization, mission and business process, and
information system levels of the enterprise by managing security and privacy risk appropriately
throughout the organization. In version 2, the Prepare step is defined as:
Figure A.1 shows the steps in the RMF according to version 2. Here, the Prepare step is carried-out
iteratively throughout the RMF process.
Table A.1 provides the summary of the Prepare tasks along with their outcomes and also the alignment
domain of NIST cybersecurity framework. This table focuses on both the organization and system levels.
A.1
Table A.1. Prepare Task and Outcome
Level Task Title Outcome CSF align
P-1 Risk management roles Individuals are identified and assigned key ID.AM-6; ID.GV-2
roles for executing the Risk Management
Framework.
P-2 Risk management strategy A risk management strategy for the ID.RM; ID.SC
organization that includes a determination and
Organization expression of organizational risk tolerance is
established
P-3 Risk assessment— An organization-wide risk assessment is ID.RA; ID.SC-2
organization completed or an existing risk assessment is
updated
P-4 Organization-wide tailored Tailored control baselines for organization- Profile
control baselines and wide use are established and made available.
profiles (optional)
P-5 Common control Common controls that are available for
identification inheritance by organizational systems are
identified, documented, and published.
P-6 Impact-level prioritization A prioritization of organizational systems with ID.AM-5
(optional) the same impact level is conducted.
P-7 Continuous monitoring An organization-wide strategy for monitoring DE.CM; ID.SC-4
strategy— organization control effectiveness is developed and
implemented.
P-8 Mission or business focus Missions, business functions, and Profile;
mission/business processes that the system is Implementation
intended to support are identified. Tiers; ID.BE
P-9 System stakeholders The stakeholders having an interest in the ID.AM; ID.BE
system are identified.
System
P-10 Asset identification Stakeholder assets are identified and ID.AM
prioritized.
P-11 Authorization boundary The authorization boundary (i.e., system) is
determined.
P-12 Information types The types of information processed, stored, ID.AM-5
and transmitted by the system are identified.
P-13 Information life cycle Identify and understand all stages of the
information life cycle
P-14 Risk assessment—system A system-level risk assessment is completed or ID.RA; ID.SC-2
an existing risk assessment is updated.
P-15 Security and privacy Security and privacy requirements are defined ID.GV; PR.IP
requirements and prioritized.
P-16 Enterprise architecture The placement of the system within the
enterprise architecture is determined.
P-17 System registration The system is registered for purposes of ID.GV
management, accountability, coordination, and
oversight.
A.2