0% found this document useful (0 votes)
100 views

Study Guide: NIST RMF: The Basics

This study guide provides an overview of the NIST Risk Management Framework (RMF) in three modules. Module 1 covers the basics of RMF, including its steps, roles, and how to implement a top-down approach. It introduces a new preparation step and discusses integrating RMF into projects. Module 2 will discuss categorizing systems, selecting controls, and implementing controls. Module 3 is not described.

Uploaded by

disney007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views

Study Guide: NIST RMF: The Basics

This study guide provides an overview of the NIST Risk Management Framework (RMF) in three modules. Module 1 covers the basics of RMF, including its steps, roles, and how to implement a top-down approach. It introduces a new preparation step and discusses integrating RMF into projects. Module 2 will discuss categorizing systems, selecting controls, and implementing controls. Module 3 is not described.

Uploaded by

disney007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

 

Study Guide
Executive RMF
Created By​: Lorenzo Enriquez, Teaching Assistant

Module 1: ​NIST RMF: The Basics


Lesson 1.1​: RMF Overview
Skills Learned From This Lesson: RMF Steps, RMF Roles, Integrate RMF

● RMF Steps
○ Prepare is to carry out essential activities at all levels; organizational,
mission/business process, and information systems
■ Manage security/Privacy risk using RMF
○ Categorize System; categorize the system and information
processed/stored/transmitted based on impact analysis
○ Select Controls; initial set of baseline security controls, tailor and supplement
security baseline based on the categorization
○ Implement Controls; implement the selected security controls, deploy within
system and operational environment, include workstations, servers, databases,
websites, and custom developed code and applications
○ Assess Controls; assess the implemented security controls using determined
procedures. Ensure implementation is correct, operating as intended, and
produce desired outcome
○ Authorize System (ATO); determine the risk to
operations/assets/individuals/organization is acceptable to the system.
Independent Assessors make recommendation based on assessment
○ Monitor Controls; monitor security control effectiveness and document
procedures, document changes in system or environment, conduct security
impact analysis of changes, and report security state of system to appropriate
management/teams
● RMF Roles
○ Prepare, EVERYONE is part of the preparation

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

○ Categorize System; ISSO, System Owner, and Technical guidance provided by


the Information System Security Team are part of this step
○ Select Controls; ISSO, System Owner, and Technical guidance provided by the
Information System Security Team are part of this step
○ Implement Controls; Technical POC’s, Developers, System Admins and the
ISSO take a part of this step
○ Assess Controls; the Continuous monitoring team and an independent assessor
is responsible for this step
○ Authorize System (ATO); System owners and CIO/CISO are responsible for this
section. An Authorizing Official is usually already established
○ Monitor Controls; Continuous monitoring team and system administrators should
work with the ISSO and System Owner for monitoring
● Integrate RMF
○ Improve efficiency of adding security into beginning of SDLC
○ Create repeatable processes for systems
○ Adding security into project development saves money
○ Increase speed of projects and reduce additions/changes at the end of a project

Lesson 1.2​: Creating a Top-Down RMF Approach


Skills Learned From This Lesson: Implement, Top-Down, Improve

● Implement
○ RMF Structure, know the steps
○ Organizational Risk is it; Federal, Private Sector, Healthcare, Critical
Infrastructure, Manufacturing, or Academia
● Implemented RMF from the executive level
○ Take time to get to know the structure
○ Talk with other leaders in the organization
○ Is there already a process in place for new system?
○ Can RMF improve that process?
○ Who do I need to be involved in integrating RMF?
○ What systems are already online? What projects are ongoing?
● How RMF implemented into IT projects
○ Start RMF process at the beginning, if not add steps to project schedule
 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

○ Account for potential costs/tools/resources


○ For ongoing projects are any teams implementing security controls/practices
○ Are the ISSO’s involved in the ongoing projects
○ Who manages that system
○ Planning for the future consider what tools will be needed
○ Think about how RMF and security may fit into new projects
○ Weigh the cost of the product vs cost of product plus security
○ Have a Top-Down Approach to RMF
● AI improving RMF
○ Many security software products already leveraging AI
○ Risk management is easier with AI
○ Can adapt AI/ML results to your business and projects
○ Improve speed of projects and decision-making

Lesson 1.3:​ A New Step -- Preparation


Skills Learned From This Lesson: Preparation, Integrate, Prep Tasks

● Preparation Step
○ Carry out essential activities at the organization, mission and business process,
and information system levels of the enterprise to help prepare for using the RMF
○ Consider a Risk Committee
● Integrate Preparation for each step
○ Provide better link between risk management process and C-suite/governance
levels
○ Institutionalize risk management preparatory activities to improve execution of
RMF
○ Demonstrate alignment from RMF to Cybersecurity Framework (CSF)
○ Integrate privacy risk management into RMF
○ Align life cycle based systems engineering tasks to RMF
○ Integrate supply chain risk management (SCRM)
● Preparation Tasks
○ Risk Management Roles (key roles)
○ Risk Management Strategy (risk tolerance)
○ Risk Assessment (organization-wide)
 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

○ Control Baselines and CSF Profiles (optional)


○ Common Control Identification (available for inheritance)
○ Impact-Level Prioritization (optional)
○ Continuous Monitoring Strategy

Module 2: ​Categorize, Select and Implement


Lesson 2.1​: Categorize the System (Including HVA’s)
Skills Learned From This Lesson: Categorization, Tasks, HVA

● Where Categorization step fits


○ Inform organization risk management processes and tasks
○ Determine the adverse impact to organization operations and assets
○ Determine impact the adverse action has on individuals, other organizations, and
the nation with respect to the loss of confidentiality, integrity, and availability of
organization systems
● Categorize Tasks
○ System Description; Characteristics are described and documented
○ Security Categorization; Categorization of system, including information
processed by system
○ Categorization Review and Approval; results are reviewed and decisions are
made by senior leadership
● How can executive leadership support
○ Understand what systems you have, and how to categorize them properly
○ Know which teams and leaders you should have in each sector to address these
tasks
○ Are the systems categorized to ensure value of system is properly defined?
● HVA
○ High Value Assets
○ Federal Information systems, information, and data that if compromised impact
the United States national security
○ DHS, Securing High Value Assets, 2018 describes this

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

Lesson 2.2​: Selecting Controls


Skills Learned From This Lesson: Selection, tailoring, allocating

● Selection controls
○ Select, tailor, and document the controls necessary to protect the information
system and organization
○ Should provide a full picture of the overall risks and address them accordingly
● Selection Tasks
○ Control Selection – Top-Down Approach
○ Control Tailoring
○ Control Allocation
○ Documentation of Planned Controls
○ Continuous Monitoring Strategy -- ConMon
○ Plan Review/Approval
● Executive leadership involvement
○ Use a top-down approach
○ If you have organization standards, it’ll be easier to address each system
individually
○ System Owners have major responsibilities
○ Make sure management involves appropriate people for each task

Lesson 2.3​: Implementing Proper Controls


Skills Learned From This Lesson: Implementation, document, Inputs, Outputs

● Implementing
○ Implement the controls selected
○ Ensure implemented controls are implemented properly
● Implementation Tasks
○ Control Implementation; controls specified in previous step are implemented,
engineering methodologies are used
○ Update Implementation Information; changes to controls are documented,
security and privacy plans are updated
● Example of Implementation
○ Potential Inputs (system plans)

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

○ Expected Outputs (what risks will be mitigated)


○ Primary Responsibility and Supporting Roles (who does what)
○ Real-World Examples (use best practice guides)
○ Common Controls (are controls inherited and/or shared)
● Important information for execs
○ Be adaptable, things change and sometimes controls don’t work as intended
○ Some risk assessment may point out controls which are not applicable to a
certain OS or type of device
○ Seek advice from security professionals on controls
○ A Security Liaison could make this process easy

Module 3: ​Assess, Authorize and Monitor


Lesson 3.1​: Assessing the System
Skills Learned From This Lesson: Assessment, Tasks, documentation

● Assessment Step
○ Determine if the controls implemented and implemented correctly
○ Determine controls implemented are operating as intended
○ Determine desired outcome of implemented controls
● Assessment Tasks
○ Assessor Selection
○ Assessment Plan
○ Controls Assessments
○ Assessment Reports
○ Remediation Action
○ Plan of Action and Milestones (POA&Ms)
● What Executives can do and need to know
○ Assessment step is a crucial step
○ Choosing the right team can make all the difference
○ Make sure technical people are performing assessments
○ Need to understand risk tolerance level for the system
○ POA&Ms should not be forever, set an actionable date

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

Lesson 3.2​: Lets Get that ATO!


Skills Learned From This Lesson: Authorization, Risk Assessment, Reporting

● Authorization Step
○ Provide organizational accountability
○ Requires senior management official to determine if the security and privacy risk
is acceptable
○ Determination reviews all the previous steps of RMF before making final decision
○ The main goal!
● Authorization Tasks
○ Authorization Package
○ Risk Analysis and Determination
○ Risk Response
○ Authorization Decision
○ Authorization Reporting
● Executive Role
○ Authorizing (or denying) these systems can have an impact on budget/projects
○ Implementing security from the beginning of a project can save additional time at
the end of the project
○ Using RMF steps, systems can be authorized properly and securely
○ Think carefully about Risk Management/Executive groups

Lesson 3.3​: Monitoring System, Controls and Changes


Skills Learned From This Lesson: Monitoring, Monitoring Strategy, ConMon, Reporting

● Monitoring Step
○ Maintain an ongoing situation awareness about the security and privacy posture
of the information system and organization
○ Support risk management decisions
● Monitoring Tasks
○ System/Environment Changes
○ Ongoing Assessments
○ Ongoing Risk Response
○ Authorization Package Updates

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

○ Security/Privacy Reporting
○ Ongoing Authorization
○ System Disposal
● Executive roles
○ Influence the ConMon strategy at the organizational level
○ Use top-down approach
○ Understand possible impacts on the business strategy
○ Budget for potential monitoring tools or team which may need to perform this step

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

You might also like