Study Guide: NIST RMF: The Basics
Study Guide: NIST RMF: The Basics
Study Guide
Executive RMF
Created By: Lorenzo Enriquez, Teaching Assistant
● RMF Steps
○ Prepare is to carry out essential activities at all levels; organizational,
mission/business process, and information systems
■ Manage security/Privacy risk using RMF
○ Categorize System; categorize the system and information
processed/stored/transmitted based on impact analysis
○ Select Controls; initial set of baseline security controls, tailor and supplement
security baseline based on the categorization
○ Implement Controls; implement the selected security controls, deploy within
system and operational environment, include workstations, servers, databases,
websites, and custom developed code and applications
○ Assess Controls; assess the implemented security controls using determined
procedures. Ensure implementation is correct, operating as intended, and
produce desired outcome
○ Authorize System (ATO); determine the risk to
operations/assets/individuals/organization is acceptable to the system.
Independent Assessors make recommendation based on assessment
○ Monitor Controls; monitor security control effectiveness and document
procedures, document changes in system or environment, conduct security
impact analysis of changes, and report security state of system to appropriate
management/teams
● RMF Roles
○ Prepare, EVERYONE is part of the preparation
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
● Implement
○ RMF Structure, know the steps
○ Organizational Risk is it; Federal, Private Sector, Healthcare, Critical
Infrastructure, Manufacturing, or Academia
● Implemented RMF from the executive level
○ Take time to get to know the structure
○ Talk with other leaders in the organization
○ Is there already a process in place for new system?
○ Can RMF improve that process?
○ Who do I need to be involved in integrating RMF?
○ What systems are already online? What projects are ongoing?
● How RMF implemented into IT projects
○ Start RMF process at the beginning, if not add steps to project schedule
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
● Preparation Step
○ Carry out essential activities at the organization, mission and business process,
and information system levels of the enterprise to help prepare for using the RMF
○ Consider a Risk Committee
● Integrate Preparation for each step
○ Provide better link between risk management process and C-suite/governance
levels
○ Institutionalize risk management preparatory activities to improve execution of
RMF
○ Demonstrate alignment from RMF to Cybersecurity Framework (CSF)
○ Integrate privacy risk management into RMF
○ Align life cycle based systems engineering tasks to RMF
○ Integrate supply chain risk management (SCRM)
● Preparation Tasks
○ Risk Management Roles (key roles)
○ Risk Management Strategy (risk tolerance)
○ Risk Assessment (organization-wide)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
● Selection controls
○ Select, tailor, and document the controls necessary to protect the information
system and organization
○ Should provide a full picture of the overall risks and address them accordingly
● Selection Tasks
○ Control Selection – Top-Down Approach
○ Control Tailoring
○ Control Allocation
○ Documentation of Planned Controls
○ Continuous Monitoring Strategy -- ConMon
○ Plan Review/Approval
● Executive leadership involvement
○ Use a top-down approach
○ If you have organization standards, it’ll be easier to address each system
individually
○ System Owners have major responsibilities
○ Make sure management involves appropriate people for each task
● Implementing
○ Implement the controls selected
○ Ensure implemented controls are implemented properly
● Implementation Tasks
○ Control Implementation; controls specified in previous step are implemented,
engineering methodologies are used
○ Update Implementation Information; changes to controls are documented,
security and privacy plans are updated
● Example of Implementation
○ Potential Inputs (system plans)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
● Assessment Step
○ Determine if the controls implemented and implemented correctly
○ Determine controls implemented are operating as intended
○ Determine desired outcome of implemented controls
● Assessment Tasks
○ Assessor Selection
○ Assessment Plan
○ Controls Assessments
○ Assessment Reports
○ Remediation Action
○ Plan of Action and Milestones (POA&Ms)
● What Executives can do and need to know
○ Assessment step is a crucial step
○ Choosing the right team can make all the difference
○ Make sure technical people are performing assessments
○ Need to understand risk tolerance level for the system
○ POA&Ms should not be forever, set an actionable date
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6
● Authorization Step
○ Provide organizational accountability
○ Requires senior management official to determine if the security and privacy risk
is acceptable
○ Determination reviews all the previous steps of RMF before making final decision
○ The main goal!
● Authorization Tasks
○ Authorization Package
○ Risk Analysis and Determination
○ Risk Response
○ Authorization Decision
○ Authorization Reporting
● Executive Role
○ Authorizing (or denying) these systems can have an impact on budget/projects
○ Implementing security from the beginning of a project can save additional time at
the end of the project
○ Using RMF steps, systems can be authorized properly and securely
○ Think carefully about Risk Management/Executive groups
● Monitoring Step
○ Maintain an ongoing situation awareness about the security and privacy posture
of the information system and organization
○ Support risk management decisions
● Monitoring Tasks
○ System/Environment Changes
○ Ongoing Assessments
○ Ongoing Risk Response
○ Authorization Package Updates
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
7
○ Security/Privacy Reporting
○ Ongoing Authorization
○ System Disposal
● Executive roles
○ Influence the ConMon strategy at the organizational level
○ Use top-down approach
○ Understand possible impacts on the business strategy
○ Budget for potential monitoring tools or team which may need to perform this step
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
8