DoDI 8510.01 PDF
DoDI 8510.01 PDF
INSTRUCTION
NUMBER 8510.01
March 12, 2014
Incorporating Change 2, July 28, 2017
DoD CIO
SUBJECT: Risk Management Framework (RMF) for DoD Information Technology (IT)
a. Reissues and renames DoD Instruction (DoDI) 8510.01 (Reference (a)) in accordance
with the authority in DoD Directive (DoDD) 5144.02 (Reference (b)).
b. Implements References (c) through (f) by establishing the RMF for DoD IT (referred to in
this instruction as “the RMF”), establishing associated cybersecurity policy, and assigning
responsibilities for executing and maintaining the RMF. The RMF replaces the DoD
Information Assurance Certification and Accreditation Process (DIACAP) and manages the life-
cycle cybersecurity risk to DoD IT in accordance with References (g) through (k).
c. Redesignates the DIACAP Technical Advisory Group (TAG) as the RMF TAG.
e. Provides procedural guidance for the reciprocal acceptance of authorization decisions and
artifacts within DoD, and between DoD and other federal agencies, for the authorization and
connection of information systems (ISs).
2. APPLICABILITY
(1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of
Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General
of the Department of Defense (OIG DoD), the Defense Agencies, the DoD Field Activities, and
DoDI 8510.01, March 12, 2014
all other organizational entities within the Department of Defense (referred to collectively in this
instruction as the “DoD Components”).
(2) The United States Coast Guard. The United States Coast Guard will adhere to DoD
cybersecurity requirements, standards, and policies in this instruction in accordance with the
direction in Paragraphs 4a, b, c, and d of the Memorandum of Agreement Between the
Department of Defense and the Department of Homeland Security (Reference (q)).
(2)(3) All DoD IT that receive, process, store, display, or transmit DoD information.
These technologies are broadly grouped as DoD IS, platform IT (PIT), IT services, and IT
products. This includes IT supporting research, development, test and evaluation (T&E), and
DoD-controlled IT operated by a contractor or other entity on behalf of the DoD.
b. Nothing in this instruction alters or supersedes the existing authorities and policies of the
Director of National Intelligence regarding the protection of sensitive compartmented
information (SCI), as directed by Executive Order 12333 (Reference (l)) and other laws and
regulations. The application of the provisions and procedures of this instruction to information
technologies processing SCI is encouraged where they may complement or cover areas not
otherwise specifically addressed.
a. The DoD will establish and use an integrated enterprise-wide decision structure for
cybersecurity risk management (the RMF) that includes and integrates DoD mission areas (MAs)
pursuant to DoDD 8115.01 (Reference (m)) and the governance process prescribed in this
instruction.
c. The RMF must satisfy the requirements of subchapter III of chapter 35 of Title 44, United
States Code (U.S.C.), also known and referred to in this instruction as the “Federal Information
Security Management Act (FISMA) of 2002” (Reference (d)). DoD must meet or exceed the
standards required by the Office of Management and Budget (OMB) and the Secretary of
Commerce, pursuant to FISMA and section 11331 of Title 40, U.S.C. (Reference (n)).
d. All DoD IS and PIT systems must be categorized in accordance with Committee on
National Security Systems Instruction (CNSSI) 1253 (Reference (e)), implement a corresponding
set of security controls from NIST SP 800-53 (Reference (f)), and use assessment procedures
from NIST SP 800-53A (Reference (g)) and DoD-specific assignment values, overlays,
implementation guidance, and assessment procedures found on the Knowledge Service (KS) at
https://rmfks.osd.mil. As supporting reference security control documents are updated, DoD’s
implementation of these updates will be coordinated through the RMF TAG.
Change 2, 07/28/2017 2
DoDI 8510.01, March 12, 2014
e. Resources for implementing the RMF must be identified and allocated as part of the
Defense planning, programming, budgeting, and execution process.
f. Each DoD IS, DoD partnered system, and PIT system must have an authorizing official
(AO) responsible for authorizing the system’s operation based on achieving and maintaining an
acceptable risk posture.
g. Reciprocal acceptance of DoD and other federal agency and department IS and PIT
system authorizations will be implemented to the maximum extent possible. Refusals must be
timely, documented, and reported to the responsible DoD Component senior information security
officer (SISO) (formerly known as the senior information assurance (IA) officer).
h. All DoD IT identified in paragraph 2a(2) must be under the governance of a DoD
Component cybersecurity program in accordance with DoDI 8500.01(Reference (h)).
i. A plan of action and milestones (POA&M) must be developed and maintained to address
known vulnerabilities in the IS or PIT system.
k. The RMF process will inform acquisition processes for all DoD IT, including
requirements development, procurement, and both developmental T&E (DT&E) and operational
T&E (OT&E), but does not replace these processes.
6. RELEASABILITY. Cleared for public release. This instruction is available on the Internet
from the DoD Issuances Website at http://www.dtic.mil/whs/directives. the Directives Division
Website at http://www.esd.whs.mil/DD/.
Change 2, 07/28/2017 3
DoDI 8510.01, March 12, 2014
Enclosures
1. References
2. Responsibilities
3. RMF Procedures
4. RMF Governance
5. Cybersecurity Reciprocity
6. Risk Management of IS and PIT Systems
7. KS
8. RMF Transition
Glossary
Change 2, 07/28/2017 4
DoDI 8510.01, March 12, 2014
TABLE OF CONTENTS
OVERVIEW ........................................................................................................................1214
RISK MANAGEMENT OF IS AND PIT SYSTEMS ........................................................1214
RISK MANAGEMENT OF PRODUCTS, SERVICES, AND PIT ....................................1214
IT Products .....................................................................................................................1214
IT Services .....................................................................................................................1315
PIT..................................................................................................................................1315
RMF GOVERNANCE.........................................................................................................1416
Tier 1 - Organization......................................................................................................1416
Tier 2 - Mission/Business Processes ..............................................................................1618
Tier 3 - IS and PIT Systems ...........................................................................................1719
RMF ROLE APPOINTMENT ............................................................................................2022
OVERVIEW ........................................................................................................................2426
Applicability ..................................................................................................................2426
Considerations for Special System Configurations .......................................................2426
Authorization Approaches .............................................................................................2628
Security Plan ..................................................................................................................2729
RMF STEPS.........................................................................................................................2729
ENCLOSURE 7: KS .................................................................................................................4143
GLOSSARY ..............................................................................................................................4547
TABLES
FIGURES
1. DoD IT ............................................................................................................................1214
2. RMF Governance ............................................................................................................1416
3. RMF for IS and PIT Systems ..........................................................................................2830
4. RMF and the Defense Acquisition Management System ...............................................3941
ENCLOSURE 1
REFERENCES
(a) DoD Instruction 8510.01, “DoD Information Assurance Certification and Accreditation
Process (DIACAP),” November 28, 2007 (hereby cancelled)
(b) DoD Directive 5144.02, “DoD Chief Information Officer (DoD CIO),” November 21, 2014
(c) National Institute of Standards and Technology Special Publication 800-37, “Guide for
Applying the Risk Management Framework to Federal Information Systems: A Security
Life Cycle Approach,” February 2010, as amended
(d) Subchapter III II of chapter 35 of Title 44, United States Code (also known as the “Federal
Information Security Management Modernization Act (FISMA) of 2002 2014”)
(e) Committee on National Security Systems Instruction 1253, “Security Categorization and
Control Selection for National Security Systems,” March 15, 2012 March 27, 2014, as
amended
(f) National Institute of Standards and Technology Special Publication 800-53, “Security and
Privacy Controls for Federal Information Systems and Organizations,” current edition
(g) National Institute of Standards and Technology Special Publication 800-53A, “Guide for
Assessing the Security Controls in Federal Information Systems and Organizations:
Building Effective Security Assessment Plans,” June 2010, as amended
(h) DoD Instruction 8500.01, “Cybersecurity,” March 14, 2014
(i) National Institute of Standards and Technology Special Publication 800-39, “Managing
Information Security Risk: Organization, Mission, and Information System View,” March
2011
(j) National Institute of Standards and Technology Special Publication 800-30, “Guide for
Conducting Risk Assessments,” September 2012, as amended
(k) DoD Directive 8000.01, “Management of the Department of Defense Information
Enterprise (DoD IE),” March 17, 2016
(l) Executive Order 12333, “United States Intelligence Activities,” December 4, 1981, as
amended
(m) DoD Directive 8115.01, “Information Technology Portfolio Management,” October 10,
2005
(n) Section 11331 of Title 40, United States Code
(o) DoD Directive 8140.01, “Cyberspace Workforce Management,” August 11, 2015
(p) DoD Instruction 8581.01, “Information Assurance (IA) Policy for Space Systems Used by
the Department of Defense,” June 8, 2010
(q) DoD Instruction 8320.07, “Implementing the Sharing of Data, Information, and
Information Technology (IT) Services in the Department Of Defense,” August 3, 2015
(r) DoD Instruction 5000.02, “Operation of the Defense Acquisition System,” January 27,
2015, as amended
(s) DoD Chief Information Officer Memorandum, “DoD Enterprise Services Designation –
Collaboration, Content Discovery, and Content Delivery,” February 2, 2009
(t) DoD Chief Information Officer and Intelligence Community Chief Information Officer
Memorandum, “Use of Unified Cross Domain Management Office (UCDMO) Baseline
Cross Domain Solutions (CDSs),” December 1, 2011
(u) Chairman of the Joint Chiefs of Staff Instruction 6211.02D, “Defense Information Systems
Network (DISN) Responsibilities,” January 24, 2012
(v) DoD Instruction 8100.04, “DoD Unified Capabilities (UC),” December 9, 2010
(w) DoD Directive 5105.53, “Director of Administration and Management (DA&M),”
February 26, 2008
(x) DoD Manual 5200.02-R, “Procedures for the DoD Personnel Security Program,” January
1, 1987, as amended April 3, 2017
(y) Public Law 104-191, “Health Insurance Portability and Accountability Act of 1996,”
August 21, 1996
(z) DoD 8570.01-M, “Information Assurance Workforce Improvement Program,”
December 19, 2005, as amended
(aa) Appendix III to Office of Management and Budget Circular No. A-130, “Security of
Federal Automated Information Resources,” November 28, 2000
(ab) Committee on National Security Systems Instruction 4009, “National Information
Assurance (IA)Committee on National Security Systems (CNSS) Glossary,”
April 26, 2010 April 6, 2015
(ac) National Security Presidential Directive-54, “Cyber Security and Monitoring” /Homeland
Security Presidential Directive-23, “Cybersecurity Policy,” January 8, 2008 1
(ad) Memorandum of Agreement Between the Department of Defense and the Department of
Homeland Security Regarding Department of Defense and U.S. Coast Guard Cooperation
on Cybersecurity and Cyberspace Operations, January 19, 2017 2
1
Document is classified TOP SECRET. To obtain a copy, fax a request to the Homeland Security Council
Executive Secretary at 202-456-5158 and the National Security Council’s Senior Director for Records and Access
Management at 202-456-9200.
2
Available at https://dcms.uscg.afpims.mil/Our-Organization/Assistant-Commandant-for-C4IT-CG-6-/The-Office-
of-Information-Management-CG-61/Interagency-Agreements/
ENCLOSURE 2
RESPONSIBILITIES
a. Oversees implementation of this instruction, directs and oversees the cybersecurity risk
management of DoD IT, distributes RMF information standards and sharing requirements, and
manages the transition from the DIACAP to the RMF.
b. In coordination with the Deputy Assistant Secretary of Defense for Developmental Test
and Evaluation (DASD(DT&E)) and the Director, Operational Test and Evaluation (DOT&E),
ensures developmental and OT&E activities and findings are integrated into the RMF.
a. Ensures control correlation identifiers (CCIs), security requirements guides (SRGs), and
security technical implementation guides (STIGs) developed by DISA are consistent with
security controls and assessment procedures used by the DoD.
b. Develops and provides RMF training and awareness products and a distributive training
capability to support the DoD Components in accordance with Reference (h) and DoDD 8140.01
(Reference (o)); posts the training materials on the IA Support Environment Website
(http://iase.disa.mil).
4. DASD(DT&E). Under the authority, direction, and control of the USD(AT&L), the
DASD(DT&E), in coordination with the DoD CIO, ensures integration of DT&E activities into
the RMF and provides the RMF TAG with input as appropriate or required.
a. Reviews plans, execution, and results of operational testing to ensure adequate evaluation
of cybersecurity for all DoD IT acquisitions subject to oversight.
b. In coordination with DoD CIO, ensures integration of OT&E activities into the RMF and
provides the RMF TAG with input as appropriate or required.
a. Ensures IS security engineering services, when provided to the DoD Components, support
the RMF.
b. Develops risk model and risk assessment tools to support authorization decisions.
a. Ensure DoD IS and PIT systems are categorized according to the guidelines provided in
this instruction.
b. Verify that a program manager (PM) or system manager (SM) is appointed for all ISs and
PIT systems.
c. Ensure a trained and qualified AO is appointed in writing for all DoD IS and PIT systems
operating within or on behalf of the DoD Component in accordance with Reference (h) and that
the systems are authorized in accordance with this instruction.
(1) This role must be assigned to government personnel only. This role may not be re-
delegated to personnel that do not also meet these requirements.
(2) Relevant PIT expertise must be a factor in the selection and appointment of AOs
responsible for authorizing PIT systems.
d. Develop and issue guidance for PIT systems that reflects DoD Component-unique
operational and environmental demands as needed.
e Ensure DoD information technologies under their authority comply with the RMF.
f. Operate only authorized ISs and PIT systems (i.e., those with a current authorization to
operate (ATO) or interim authorization to test (IATT)).
h. Ensure personnel engaged in or supporting the RMF are appropriately trained and possess
professional certifications consistent with Reference (o) and supporting issuances.
i. Ensure IS owners (ISOs) appoint user representatives (URs) for DoD IS and PIT systems
under the DoD Component’s purview.
j. Oversee the DoD Component chief information officer (CIO)’s implementation of this
instruction.
l. Ensure that contracts and other agreements include specific requirements in accordance
with this instruction.
8. CJCS. In coordination with the DoD CIO and in addition to the responsibilities in paragraph
7 of this enclosure, the CJCS ensures the Joint Capabilities Integration and Development System
(JCIDS) process supports and documents IS and PIT system categorization consistent with this
instruction.
a. Assigns AOs, issues authorization guidance consistent with this instruction, and resolves
authorization issues for space systems used by the DoD in accordance with DoDI 8581.01
(Reference (p)).
ENCLOSURE 3
RMF PROCEDURES
1. OVERVIEW. The forms of DoD IT, as shown in Figure 1, range in size and complexity from
individual hardware and software products to stand-alone systems to massive computing
environments, enclaves, and networks.
Figure 1. DoD IT
(1) Internal IT services are delivered by DoD ISs. DoD organizations that use internal
IT services must ensure the categorization of the IS delivering the service is appropriate to the
needs of the DoD IS using the service, and that written agreements describing the roles and
responsibilities of both the providing and the receiving organization are in place.
(2) DoD organizations that use external IT services provided by a non-DoD federal
government agency must ensure the categorization of the IS delivering the service is appropriate
to the confidentiality, integrity, and availability needs of the information and mission, and that
the IS delivering the service is operating under a current authorization from that agency. In
accordance with Reference (h), interagency agreements or government statements of work for
these external services must contain requirements for service level agreements (SLAs) that
include the application of appropriate security controls.
(3) DoD organizations that use external IT services provided by a commercial or other
non-federal government entity must ensure the security protections of the IS delivering the
service is appropriate to the confidentiality, integrity, and availability needs of the DoD
organization's information and mission. DoD organizations must perform categorization in
accordance with Reference (e) and tailor appropriately to determine the set of security controls to
be included in requests for proposals. DoD organizations will assess the adequacy of security
proposed by potential service providers, and accept the proposed approach, negotiate changes to
the approach to meet DoD needs, or reject the offer. The accepted security approach must be
documented in the resulting contract or order.
(4) DoD organizations contracting for external IT services in the form of commercial
cloud computing services must comply with DoD cloud computing policy and procedural
guidance as published.
c. PIT. PIT that does not rise to the level of a PIT System may be categorized using
Reference (e) with the resultant security control baselines tailored as needed. Otherwise, the
specific cybersecurity needs of PIT must be assessed on a case-by-case basis and security
controls applied as appropriate.
ENCLOSURE 4
RMF GOVERNANCE
1. RMF GOVERNANCE. The DoD RMF governance structure implements the three-tiered
approach to cybersecurity risk management described in NIST SP 800-39 (Reference (i)),
synchronizes and integrates RMF activities across all phases of the IT life cycle, and spans
logical and organizational entities. These elements are illustrated in Figure 2.
STRATEGIC RISK
TIER 2
MISSION / BUSINESS PROCESSES
WMA, BMA, EIEMA, DIMA PAOS,
DOD COMPONENT CIO/SISO
TIER 3
IS/PIT SYSTEMS
AUTHORIZING OFFICIAL (AO), SYSTEM CYBERSECURITY PROGRAM
a. Tier 1 – Organization. For the purposes of the RMF, the organization described in Tier 1
is the OSD or strategic level, and it addresses risk management at the DoD enterprise level. The
key governance elements in Tier 1 are:
(1) DoD CIO. Directs and oversees the cybersecurity risk management of DoD IT.
(a) DoD Information Security Risk Management Committee (ISRMC) (formerly the
Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel). The
DoD ISRMC performs the DoD Risk Executive Function as described in Reference (i). The
panel provides strategic guidance to Tiers 2 and 3; assesses Tier 1 risk; authorizes information
exchanges and connections for enterprise ISs, cross-MA ISs, cross security domain connections,
and mission partner connections.
(3) DoD SISO. The DoD SISO, in accordance with Reference (h), represents the DoD
CIO and directs and coordinates the DoD Cybersecurity Program, which includes the
establishment and maintenance of the RMF. In addition, the DoD SISO:
(a) Advises and informs the principal authorizing officials (PAOs) and their
representatives.
(5) The RMF TAG. The RMF TAG (formerly known as the DIACAP TAG) provides
implementation guidance for the RMF by interfacing with the DoD Component cybersecurity
programs, cybersecurity communities of interest (COIs), and other entities (e.g., DSAWG) to
address issues that are common across all entities, by:
(a) Providing detailed analysis and authoring support for the KS.
(d) Advising DoD forums established to resolve RMF priorities and cross-cutting
issues.
(e) Developing and managing automation requirements for DoD services that support
the RMF.
(f) Developing guidance for facilitating RMF reciprocity throughout the DoD.
(6) The KS. The KS, a dynamic online knowledge base, supports RMF implementation,
planning, and execution by functioning as the authoritative source for RMF procedures and
guidance. The KS supports RMF practitioners by providing access to DoD security control
baselines, security control descriptions, security control overlays, and implementation guidance
and assessment procedures, all compliant with References (e) and (f). The KS also supports the
RMF TAG by enabling TAG functions and activities, including maintenance of membership;
voting, analysis, and authoring; and configuration control of KS enterprise content and
functionality. See Enclosure 7 for more information on KS capabilities.
(1) PAO. A PAO is appointed for each of the DoD MAs (i.e., the warfighting MA
(WMA), business MA (BMA), enterprise information environment MA (EIEMA), and DoD
portion of the intelligence MA (DIMA)), and their representatives are members of the DoD
ISRMC. PAOs must:
(a) Represent the interests of the MA, as defined in Reference (m), and, as required,
issues authorization guidance specific to the MA, consistent with this instruction.
(b) Resolve authorization issues within their respective MAs and work with other
PAOs to resolve issues among MAs, as needed.
(c) Designate AOs for MA IS and PIT systems supporting MA COIs specified in
DoDI 8320.07 (Reference (q)), in coordination with appropriate DoD Component heads, if
required.
(2) DoD Component CIO. Each DoD Component CIO, supported by the DoD
Component SISO appointed in accordance with Reference (h), is responsible for administration
of the RMF within the DoD Component cybersecurity program; participation in the RMF TAG;
visibility and sharing of the RMF status of assigned ISs and PIT systems; and enforcement of
training requirements for persons participating in the RMF. DoD Component CIOs must:
(b) Verify that a PM or SM is identified for each DoD Component IS and PIT
system.
(c) Establish and maintain processes and procedures to manage DoD Component
POA&Ms.
(d) Appoint a DoD Component SISO to direct and coordinate the DoD Component
cybersecurity program.
(e) Review and document concurrence on all ATOs issued for Component IS and
PIT systems with a level of risk of “Very High” or “High.”
(3) DoD Component SISO. DoD Component SISOs have authority and responsibility
for security controls assessment and must establish and manage a coordinated security
assessment process for information technologies governed by the DoD Component cybersecurity
program. DoD Component SISOs must:
(a) Implement and enforce the RMF within the DoD Component cybersecurity
program.
(b) Perform as the SCA or formally delegate the security control assessment role for
governed information technologies.
(c) Track the assessment and authorization status of IS and PIT systems governed by
the DoD Component cybersecurity program.
(e) Identify and recommend changes and improvements to the security assessment
process, security T&E, and risk assessment methodology, including procedures, risk factors,
assessment approach, and analysis approach to the RMF TAG for inclusion in the KS.
(g) Serve as the single cybersecurity coordination point for joint or DoD-wide
programs that are deploying information technologies to DoD Component enclaves.
(h) Ensure DoD Component RMF guidance is posted to the DoD Component portion
of the KS, and is consistent with DoD policy and guidance.
(1) AO. The DoD Component heads are responsible for the appointment of trained and
qualified AOs for all DoD ISs and PIT systems within their Component. AOs should be
appointed from senior leadership positions within business owner and mission owner
organizations (as opposed to limiting appointments to CIO organizations) to promote
accountability in authorization decisions that balance mission and business needs and security
concerns. In addition to the responsibilities established in Reference (h), AOs must:
(a) Comply with DoD ISRMC direction issued on behalf of the MA PAOs.
(b) Ensure all appropriate RMF tasks are initiated and completed, with appropriate
documentation, for assigned ISs and PIT systems.
(e) Not delegate authorization decisions. Other AO responsibilities and tasks may be
delegated to formally appointed and qualified AO designated representatives (AODRs).
3. Develop, maintain, and track the security plan for assigned IS and PIT
systems. (Common security controls owner performs this function for inherited controls.)
1. Appoint an ISSM for each assigned IS or PIT system with the support,
authority, and resources to satisfy the responsibilities established in this instruction.
4. Ensure the planning and execution of all RMF activities are aligned,
integrated with, and supportive of the system acquisition process.
6. Implement and assist the ISO in the maintenance and tracking of the
security plan for assigned IS and PIT systems.
(c) URs must represent the operational and functional requirements of the user
community in the RMF process.
2. RMF ROLE APPOINTMENT. Table 1 identifies the appropriate authority for the
appointment of RMF roles.
Role Appointed By
AO (formerly designated approving (or DoD Component head; PAO for MA-
accrediting) authority) managed ISs
UR ISO
ENCLOSURE 5
CYBERSECURITY RECIPROCITY
a. IS and PIT systems have only a single valid authorization. Multiple authorizations
indicate multiple systems under separate ownership and configuration control.
b. Deploying systems with valid authorizations (from a DoD organization or other federal
agency) are intended to be accepted into receiving organizations without adversely affecting the
authorizations of either the deployed system or the receiving enclave or site. Deploying system
ISOs and PMs must coordinate system security requirement with receiving organizations or their
representatives early and throughout system development.
c. An authorization decision for IS or PIT system cannot be made without completing the
required assessments and analysis, as recorded in the security authorization package. Deploying
organizations must provide the complete security authorization package to receiving
organizations. PMs/ ISOs deploying systems across DoD Components will post security
authorization documentation to Enterprise Mission Assurance Support Service (eMASS) or other
electronic means to provide visibility of authorization status and documentation to planned
receiving sites.
d. The process for receiving organization to accept IS and PIT systems is:
(2) Determine the security impact of connecting the deploying system within the
receiving enclave or site.
(3) Determine the risk of hosting the deploying system within the enclave or site.
(4) If the risk is acceptable, execute a documented agreement between deploying and
receiving organizations (e.g., memorandum of understanding (MOU), memorandum of
agreement (MOA), SLA) for the maintenance and monitoring of the security posture of the
system (security controls, computer network defense cybersecurity service provider (CNDSP
CSSP), etc.).
(6) Update the receiving enclave or site authorization documentation for inclusion of the
deployed system.
e. Receiving organizations have the right to refuse deploying systems due to a security
authorization package that does not meet sufficiency and completeness requirements as defined
on the KS, or excessive risk to the enclave or site, as determined by the enclave or site AO.
Refusals must be documented by the refusing AO, and provided to the deploying organization’s
ISO or PM, AO, and Component SISO, and to the refusing organization’s Component SISO.
Disputes should be resolved at the lowest possible level. Disputes that cannot be resolved will
be raised to the next appropriate level (e.g., DoD Component, MA PAO, DSAWG, DoD
ISRMC).
2. The cases in paragraph 2a through 2e describe the proper application of DoD policy on
reciprocity in the most frequently occurring scenarios:
(1) The receiving site executes the acceptance process in paragraph 1d of this enclosure.
Issues identified during the acceptance process will be negotiated between the deploying ISO or
PM and the receiving enclave or site ISO or SM. Following resolution of any issues, which may
result in modifications in either the deploying system or the receiving environment, the
deploying system is allowed to be incorporated or connected to the hosting environment. The
nature or magnitude of any modifications to the deploying system or receiving site may result in
additional assessment activities, but the deploying system and receiving environment retain their
own separate authorizations. It is the joint responsibility of the ISOs of deploying systems and
the receiving sites to ensure the system design reflects the security, technical and threat
environment of the planned receiving sites, as well as leveraging any common controls.
Unresolved issues, disputes, and refusals are addressed in accordance with paragraph 1e of this
enclosure. Document the acceptance by the receiving AO.
(2) The DoD ISRMC, supported by the DSAWG, may make an enterprise level risk
acceptance determination for authorized enterprise systems, which will satisfy the requirements
of the first three elements of paragraph 1d of this enclosure. If the DoD ISRMC accepts the risk
on behalf of the DoD Information Enterprise, the receiving organization may not refuse to
deploy the system.
relinquishes configuration and maintenance of the system to the DoD. The receiving enclave or
site will maximize reuse of the external agency’s security authorization package to support the
authorization by the DoD AO. Following the issuance of a DoD authorization, subsequent
deployment of the system by the DoD ISO or PM to DoD receiving sites will follow the review
and acceptance process described in paragraph 1d of this enclosure.
c. A system is authorized by a DoD organization for its own use, and subsequently provided
to another DoD organization for it to use as a separately owned, managed and maintained
system. In this case, the receiving organization becomes the ISO and must authorize the system
in accordance with Enclosure 3 of this instruction. The receiving enclave or site will maximize
reuse of the existing authorization documentation to support the authorization by the receiving
AO. Following the issuance of the authorization, subsequent deployment of the system by the
system owner to other receiving sites will follow the review and acceptance process described in
paragraph 1d of this enclosure.
d. A DoD system is authorized and subsequently deployed for acceptance into receiving
sites authorized by a U.S. Government agency other than DoD. In this case, the DoD system’s
security authorization documentation is made available to the receiving U.S. Government
agency. If the receiving agency determines there is insufficient information in the
documentation or inadequate security measures in place for establishing an acceptable level of
risk, the receiving agency may negotiate with the deploying DoD organization for additional
security measures or security-related information. The additional security measures or security-
related information may be provided by the DoD organization, the system developer, the
receiving agency, some other external third party, or some combination of the above.
e. A DoD organization plans to use an IT service under contract from a commercial entity
that has been authorized by a DoD or other U.S. Government agency (e.g., a commercial cloud
service authorized by the Federal Risk and Authorization Management Program Joint
Authorization Board). In this case, the DoD organization leverages an existing authorization,
and maximizes reuse of the existing authorization documentation to support a new authorization
by a DoD AO. If the DoD organization determines there are inadequate security measures in
place for establishing an acceptable level of risk, the DoD organization may negotiate with IT
service provider for additional security measures or security-related information. Upon
assessment and approval of all newly included security measures and the documentation of all
applicable security measures in the contract agreement with the IT service provider, the DoD
organization AO issues an authorization.
ENCLOSURE 6
1. OVERVIEW. This enclosure describes the DoD process for identifying, implementing,
assessing, and managing cybersecurity capabilities and services, expressed as security controls,
and authorizing the operation of IS and PIT systems. This enclosure is designed to be a
companion guide to Reference (c), providing specific guidance for implementation within DoD.
DoD personnel serving in RMF roles at every level should refer to Reference (c) for a full
description of the process, definitions, roles and responsibilities, and activities. In cases where
Reference (c) conflicts with this instruction, compliance with this instruction takes precedence
and is required. The KS also provides expanded coverage of this subject, as well as tools,
templates, and best practice information.
a. Applicability. This process is applicable to all IS and PIT systems, as well as DoD
partnered systems where it has been agreed that DoD standards will be followed. IT below the
system level (e.g., products, IT services) will not be subjected to the full process described in this
enclosure. However, IT below the system level must be securely configured (in accordance with
applicable DoD policies and security controls), documented in the authorization package and
reviewed by the responsible ISSM (under the direction of the AO) for acceptance or connection
into an authorized computing environment (i.e., an authorized IS or PIT system).
(1) IS and PIT Systems Implementing a cross domain solution (CDS). CDSs are
typically deployed within the IS or PIT system authorization boundary on the system with the
higher classification of the cross domain connection, and are included in the IS or PIT system
authorization. The AO responsible for the IS or PIT system must consider the security impact of
the CDS operation in the overall authorization decision. In addition to the high-side security
requirements and ATO, the security requirements for the integrity of the information transfer
must be considered and implemented on the connecting low-side IS(s). Additional detail and
authoritative guidance is provided in DoD CIO and Intelligence Community CIO Memorandum
(Reference (t)) and CJCS Instruction 6211.02D (Reference (u)).
(2) ISs and PIT Systems Providing Unified Capabilities (UC). DoDI 8100.04 (Reference
(v)) contains DoD policy for UC, and describes the process for the IA cybersecurity certification
of UC products. UC products are implemented inside the authorization boundaries of DoD ISs,
and the UC product IA cybersecurity certification documentation is used to support the overall
system assessment and authorization.
(3) Type Authorization. The type authorization is used to deploy identical copies of an
IS or PIT system in specified environments. This method allows a single security authorization
package to be developed for an archetype (common) version of a system. The system can then
be deployed to multiple locations with a set of installation, security control and configuration
requirements, or operational security needs that will be provided by the hosting enclave.
(4) Stand-Alone IS and PIT System. Stand-alone IS and PIT systems are types of
enclaves that are not interconnected to any other network. Stand-alone IS and PIT systems do
not transmit, receive, route, or exchange information outside of the system’s authorization
boundary. They may range in size from a single workstation to multiple interconnected
subsystems as long as they meet the foregoing criteria. Stand-alone IS and PIT systems are
authorized as any other IS and PIT systems, but assigned security control sets may be tailored as
appropriate with the approval of the AO (e.g., network-related controls may be eliminated).
Stand-alone IS and PIT systems must always be clearly identified as such in the authorization
documentation. Additionally, identical stand-alone IS and PIT systems that have identical
security control implementation and are to be deployed to multiple locations may be type
authorized.
(a) Security responsibilities of the service provider down to the control level must be
made explicit in the contract or other binding agreement, along with any other performance and
service-level parameters by which the DoD entity will measure the cybersecurity performance of
the system for the purpose of authorization.
(c) Responsibility for procedural and administrative security will be shared between
the service provider and the supported DoD entity contracting for the service.
(d) Security requirements for such a system must be determined by the categorization
and control selection process described in paragraphs 2a and 2b of this enclosure, just as for
other DoD ISs. Any required security controls that are not explicit in the contract or otherwise
covered by a SLA must be assessed as non-compliant (NC). All such NC security controls must
be documented in a POA&M with an explanation as to why accepting the risk of operating the
system with that control in an NC status is acceptable.
(6) DoD Partnered Systems. DoD partnered systems are ISs or PIT systems that are
developed jointly by DoD and non-DoD mission partners, comprise DoD and non-DoD ISs, or
contain a mix of DoD and non-DoD information consumers and producers, (e.g., jointly
developed systems, multi-national or coalition environments, or first responder environments).
Security control selection, system authorization, and other risk management considerations for
DoD partnered systems must be clearly defined via a formal partnership agreement, e.g., an
MOA, MOU, or SLA. To the extent possible, the negotiated risk management approach should
be aligned with the RMF. Regardless of the risk management approach employed, a DoD AO
must render an authorization decision for a DoD partnered system prior to DoD use of the
capability.
(7) OSD Systems. Pursuant to DoDD 5105.53 (Reference (w)), the Director of
Administration, Office of the Deputy Chief Management Officer of the Department of Defense,
is responsible for the IT, including IS and PIT systems, supporting the OSD staff in the National
Capital Region.
(1) Authorization with a Single AO. This is the traditional authorization process defined
in this enclosure, where a single official in a senior leadership position is both responsible and
accountable for a system. The official also accepts the system-related security risks that may
impact organizational operations and assets, individuals, other organizations, or the Nation.
(2) Authorization with Multiple AOs. This approach, also known as a joint
authorization, is employed when multiple officials either from the same or different
organizations, have a shared interest in authorizing a system.
(a) The AOs collectively are responsible and accountable for the system and jointly
accept the system-related security risks that may adversely impact organizational operations and
assets, individuals, other organizations, and the Nation.
(d) The specific terms and conditions of the joint authorization are established by the
participating parties in the joint authorization, including for example, the process for ongoing
determination and acceptance of risk.
(e) The joint authorization remains in effect only as long as there is mutual
agreement among AOs and the authorization meets the requirements established by federal or
organizational policies.
Component (referred to in this instruction as the “owning organization”) based on a need to use
the same information resources (e.g., IS or services provided by the system). The DoD
Component AO reviews the owning organization’s security authorization package as the basis
for determining risk to the leveraging organization before accepting the authorization. It is DoD
policy that the reciprocal acceptance of existing DoD and other federal agency and department
system authorizations (i.e., leveraged authorizations), and the artifacts contributing to the
authorization decisions, must be employed to the maximum extent. See Enclosure 5 of this
instruction and the KS for additional procedural guidance regarding reciprocity.
d. Security Plan. DoD IS and PIT systems must have a security plan that provides an
overview of the security requirements for the system and describes the security controls in place
or planned for meeting those requirements. The security plan should include implementation
status, responsible entities, resources, and estimated completion dates. Security plans may also
include, but are not limited to, a compiled list of system characteristics or qualities required for
system registration, key security-related documents such as a risk assessment, privacy impact
assessment, system interconnection agreements, contingency plan, security configurations,
configuration management plan, and incident response plan.
2. RMF STEPS. The RMF consists of the steps depicted in Figure 3. This process parallels the
system life cycle, with the RMF activities being initiated at program or system inception (e.g.,
documented during capabilities identification or at the implementation of a major system
modification). However, failure to initiate the RMF at system or program inception is not a
justification for ignoring or not complying with the RMF. IS and PIT systems without ATOs
must initiate the RMF in accordance with Enclosure 8 of this instruction and Tables 3 and 4, as
appropriate, regardless of the system life-cycle stage (e.g., acquisition, operation). Chapter 3 of
Reference (c) details the steps of the RMF, and paragraphs 2a through 2f provide amplifying
DoD implementation guidance for those steps.
(1) Categorize the system in accordance with Reference (e) and document the results in
the security plan. Categorization of IS and PIT systems is a coordinated effort between the
PM/SM, ISO, IO, mission owner(s), ISSM, AO, or their designated representatives. In the
categorization process, the IO identifies the potential impact (low, moderate, or high) resulting
from loss of confidentiality, integrity, and availability if a security breach occurs. For
acquisition programs, this categorization will be documented as a required capability in the
initial capabilities document, the capability development document, the capabilities production
document, and the cybersecurity strategy within the program protection plan (PPP). Specific
guidance on determining the security category for information types and ISs is included in the
KS.
(2) Describe the system (including system boundary) and document the description in
the security plan.
(3) Register the system with the DoD Component Cybersecurity Program. See DoD
Component implementing policy for detailed procedures for system registration.
(4) Assign qualified personnel to RMF roles. The members of the RMF Team are
required to meet the suitability and fitness requirements established in DoD Manual 5200.02-R
(Reference (x)). RMF Team members must also meet appropriate qualification standards in
accordance with Reference (o). RMF team member assignments must be documented in the
security plan.
(5) To avoid potential conflicts of interest or undue influence in RMF roles, certain
designations or relationships will not be allowed. The AO or SCA cannot be or report to the
PM/SM or program executive officer. The UR cannot be or report to the PM/SM.
(1) Common Control Identification. This task is the responsibility of the DoD CIO,
DoD Component CIOs, and other organizations and entities that provide solutions for
common controls. Common controls are selected as “common” and provided via the KS
based on risk assessments conducted by these entities at the Tier 1 and Tier 2 levels. By
identifying the security controls that are provided by the organization as common solutions
for IS and PIT systems, and documenting the assessment and authorization of the controls in a
security plan (or equivalent document), individual systems within those organizations can
leverage these common controls through inheritance. See the KS for identification of
common controls for DoD and additional information on how they are documented within the
security authorization package.
(2) Security Control Baseline and Overlay Selection. Identify the security control
baseline for the system, as provided in Reference (e), and document in the security plan. The
baselines identified in Reference (e) address the overall threat environment for DoD IS and
PIT systems. In this step, the applicable security controls baseline and relevant overlays for a
system are assigned. See Reference (e) and the KS for detailed procedures. In brief, the
process consists of:
(a) Selecting the applicable initial security control baseline from Reference (e) based
on the IS categorization. These security control baselines identify the specific security controls
from Reference (f) that are applicable to the system categorization.
(b) Identifying overlays that apply to the IS or PIT system due to information
contained within the system or environment of operation. Overlays may add or subtract security
controls, or provide additional guidance regarding security controls, resulting in a set of security
controls applicable to that system that is a combination of the baseline and overlay. The
combination of baselines and overlays address the unique security protection needs associated
with specific types of information or operational requirements. Overlays reduce the need for ad
hoc or case-by-case tailoring by allowing COIs to develop standardized overlays that address
their specific needs and scenarios. Access to the overlays, and guidance regarding how to
determine which overlays may apply, are included in the KS. The KS is the authoritative source
for detailed security control descriptions, implementation guidance and assessment procedures.
Examples of overlays include:
1. Tactical environments.
3. Personally identifiable information (PII) and Public Law 104-191, also known
as the “Health Insurance Portability and Accountability Act” (Reference (y)), requirements.
4. Cross-domain requirements.
5. Classified information.
(c) If necessary, tailor (modify) a control set in response to increased risk from
changes in threats or vulnerabilities, or variations in risk tolerance. The resultant set of security
controls derived from tailoring is referred to as the tailored control set. Tailoring decisions must
be aligned with operational considerations and the environment of the IS or PIT system and
should be coordinated with mission owner(s) and URs. Security controls should be added or
removed only as a function of specified, risk-based determinations. Tailoring decisions,
including the specific rationale (e.g., mapping to risk tolerance) for those decisions, are
documented in the security plan for the system. Every selected control must be accounted for
either by the organization or the ISO or PM/SM. If a selected control is not implemented, then
the rationale for not implementing the controls must be documented in the security plan and
POA&M. The tailoring process may include:
(d) Supplementing the tailored baseline security control set, if necessary, with
additional controls or control enhancements that consider local conditions including environment
of operation, organization-specific security requirements, specific threat information, cost-
benefit analyses, or special circumstances, and are based on risk assessments consistent with
NIST SP 800-30 (Reference (j)).
(e) The resulting set of security controls is documented, along with the supporting
rationale for selection decisions and any system use restrictions, in the security plan. The
security plan must identify all common controls inherited from external providers, and establish
minimum assurance requirements for those controls.
(3) Monitoring Strategy. Develop and document a system-level strategy for the
continuous monitoring of the effectiveness of security controls employed within or inherited
by the system, and monitoring of any proposed or actual changes to the system and its
environment of operation. The strategy must include the plan for annual assessments of a
subset of implemented security controls, and the level of independence required of the
assessor (e.g., ISSM or SCA). The breadth, depth, and rigor of these annual assessments
should be reflective of the security categorization of the system and threats to the system.
The SCA should be integral to the development of this strategy. The system-level continuous
monitoring strategy must conform to all applicable published DoD enterprise-level or DoD
Component-level continuous monitoring strategies.
(4) Security Plan and System-Level Continuous Monitoring Strategy Review and
Approval. The DoD Components will develop and implement processes whereby the AO (or
designee) reviews and approves the security plan and system-level continuous monitoring
strategy submitted by the ISO or PM/SM. By approving the security plan, the AO agrees to
the system categorization, the set of security controls proposed to meet the security
requirements for the system, and the adequacy of the system-level continuous monitoring
strategy. The approval of the security plan also establishes the level of effort required to
successfully complete the remainder of the steps in the RMF and provides the basis of the
security specification for the acquisition of the system, subsystems, or components. For
acquisition programs, approval should be accomplished before Milestone B and the issuance
of the design and development request for proposals. If the security plan is deemed
unacceptable, the AO or designated representative sends the plan back to the ISO or PM/SM
for appropriate action. The AO approval of the security plan must be documented in the
security plan.
(1) Implement the security controls specified in the security plan in accordance with
DoD implementation guidance found on the KS.
(b) Security controls are implemented consistent with DoD and DoD Component IA
cybersecurity architectures and standards, employing system and software engineering
methodologies, security engineering principles, and secure coding techniques. DoD
recommended security control implementation guidance is available on the KS.
(c) The ISO or PM/SM must ensure early and ongoing involvement by IS security
engineers qualified in accordance with DoD 8570.01-M (Reference (z)). Mission owner(s) must
translate security controls into system specifications, ensure the successful integration of those
specifications into the system design, and ensure security engineering trades do not impact the
ability of the system to meet the fundamental mission requirements. This includes ensuring that
technical and performance requirements derived from the assigned security controls are included
in requests for proposals and subsequent contract documents for design, development,
production, and maintenance.
(d) The proposed system security design must be addressed in preliminary and
critical design reviews. System security design should address security controls that may be
(e) PMs for programs acquiring IS or PIT systems in accordance with Reference (r)
must integrate the security engineering of cybersecurity requirements and cybersecurity testing
considerations into the program’s systems engineering, development test and evaluation, and
program protection planning processes.
(3) Security controls that are available for inheritance (e.g. common controls) by IS and
PIT systems will be identified and have associated compliance status provided by hosting or
connected systems.
(1) Develop, review, and approve a plan to assess the security controls. An assessment
methodology consistent with Reference (j) is provided in the KS as a model for use or
adaptation. DoD Components will use this model, or justify the use of another risk assessment
methodology within the Component, to include addressing understanding of the impact on
reciprocity across the federal, Intelligence, and DoD communities. The risk assessment will be
used by the SCA to determine the level of overall system cybersecurity risk and as a basis for a
recommendation for risk acceptance or denial to the AO. The SCA develops the security
assessment plan, and the AO or AODR reviews and approves the plan. PMs of programs
acquiring IS and PIT systems, in concert with the SCA and the program’s T&E, working-level
integrated product team, must:
(a) Ensure security control assessment activities are coordinated with the following:
interoperability and supportability certification efforts; DT&E events; OT&E events.
(2) Assess the security controls in accordance with the security assessment plan and DoD
assessment procedures. Assessment procedures are used to verify that a security control has
been properly implemented. SRG and STIG compliance results will be documented and used as
part of the overall security control assessment. The KS is the authoritative source for security
control assessment procedures. Actual results are recorded in the SAR and POA&M as part of
the security authorization package, along with any artifacts produced during the assessment (e.g.,
output from automated test tools or screen shots that depict aspects of system configuration). For
inherited security controls, assessment test results and supporting documentation are maintained
by the providing system and are made available to SCAs of receiving systems on request. For
common controls inherited from the enterprise, instructions for documenting compliance are
provided on the KS. SCAs will maximize the reuse of existing assessment (i.e., a leveraged
authorization), and T&E documentation in their assessment of the system.
(b) Assign Vulnerability Severity Value for Security Controls. Vulnerability severity
values are assigned to all NC controls by the SCA as part of the security control analysis to
indicate the severity associated with the identified vulnerability. Vulnerability severity values
are identified in Reference (j). Vulnerability severity values for security controls are informed
by assessment at the CCI level. If a control has a STIG or SRG associated through CCIs, the
vulnerabilities identified by STIG or SRG assessments will be used to inform the overall
vulnerability severity value for the security control.
(c) Determine Risk Level for Security Controls. The SCA determines and
documents in the SAR a risk level for every NC security control in the system baseline. NC
controls are subjected to a risk assessment process that considers multiple factors in producing
the risk level. As described in Reference (j), these factors include, but are not limited to:
(d) Assess and Characterize Aggregate Level of Risk to the System. The SCA must
determine and document in the SAR an assessment of overall system level of risk (see levels of
risk in Reference (j)), and identify the key drivers for the assessment. The SCA’s risk
assessment considers threats, vulnerabilities, and potential impacts as well as existing and
planned risk mitigation. The risk assessment must address all NC controls, and clearly
communicate the SCA’s conclusion on system cybersecurity risk, and any recommendations for
special instructions to accompany the authorization decision.
(3) Prepare the SAR, documenting the issues, findings, and recommendations from the
security control assessment. The SAR documents the SCA’s findings of compliance with
assigned security controls based on actual assessment results. It addresses security controls in a
NC status, including existing and planned mitigations. A SAR is always required before an
authorization decision. If a compelling mission or business need requires the rapid introduction
of a new IS or PIT system, assessment activity and a SAR are still required.
(4) Conduct remediation actions on NC security controls based on the findings and
recommendations of the SAR and reassess remediated control(s), as appropriate.
(1) Prepare the POA&M based on the vulnerabilities identified during the security
control assessment. A full discussion and templates for preparing a POA&M is provided in the
KS.
3. Includes milestones for completing tasks and their scheduled completion dates.
(b) POA&Ms are maintained throughout the system life cycle. Once posted to the
POA&M, vulnerabilities will be updated after correction or mitigation actions are completed, but
not removed.
(d) The AOs, or AODRs, must monitor and track overall execution of POA&Ms
under their responsibility.
(e) The ISO or PM/SM must implement the corrective actions identified in the
POA&M. With the support and assistance of the ISSM, they must also provide visibility and
status to the AO and the SISO.
(f) The DoD Component SISOs must monitor and track the overall execution of
system-level POA&Ms across the entire Component until identified security vulnerabilities have
been remediated and the RMF documentation is appropriately adjusted.
(2) Assemble the security authorization package and submit the package to the AO for
adjudication. The ISSM assembles the security authorization package, consisting of the updated
security plan, the SAR, and the POA&M. The security authorization package must also contain,
or provide links to, the appropriate documentation for any security controls that are being
satisfied through inheritance (e.g., security authorization packages, contract documents, MOAs,
and SLAs). The security authorization package is submitted to the AO (via the AODR if
appropriate) for review and final acceptance.
(3) Determine the risk to organizational operations (including mission, functions, image,
or reputation), organizational assets, individuals, other organizations, or the Nation. The AO
considers the current security state of the system (as reflected by the risk assessment and
recommendations provided in the SAR), and weighs this against the operational need for the
system. The AO must also consider any applicable risk-related guidance from the DoD SISO,
PAOs, DoD ISRMC, DSAWG, DoD Component SISO, or mission owner(s). Weighing these
factors, the AO renders a final determination of risk to DoD operations and assets, individuals,
other organizations, and the Nation from the operation and use of the system. The KS provides
additional guidance and tools for conducting system authorization risk assessments.
(a) If overall risk is determined to be acceptable, and there are no NC controls with a
level of risk of “Very High” or “High,” then the authorization decision should be issued in the
form of an ATO. An ATO authorization decision must specify an ATD that is within 3 years of
the authorization date unless the IS or PIT system has a system-level continuous monitoring
program compliant with DoD continuous monitoring policy as issued.
(b) If NC controls with a level of risk of “Very High” or “High” exist that cannot be
corrected or mitigated immediately, but overall system risk is determined to be acceptable due to
mission criticality, then the authorization decision will be issued in the form of an ATO with
conditions and only with permission of the responsible DoD Component CIO. If the system still
requires operation with a level of risk of “Very High” or “High” after 1 year, the DoD
Component CIO must again grant permission for continued operation of the system. This
authority cannot be delegated below the DoD Component CIO. The DoD Component CIO must
concur in writing or through DoD public key infrastructure (PKI)-certified digital signature that
the security risk of continued system operation is acceptable due to mission criticality. The DoD
Component CIO provides a copy of the concurrence and authorization decision document with
supporting rationale to the DoD ISRMC Secretariat and the DoD SISO. This authorization
decision closely manages risk while allowing system operation. The ATOs with conditions
should specify an AO review period that is within 6 months of the authorization date. The
POA&M supporting this ATO documents identified vulnerabilities and specifies corrective
actions to be completed before the review.
(c) If the risk determination is being made to permit testing of the system in an
operational information environment or with live data, and the risk is acceptable, then the
authorization decision should be issued in the form of an IATT.
2. For full and independent operational testing, an ATO (rather than an IATT)
may be required if operational testing and evaluation is being conducted in the operational
environment or on deployed capabilities. In this case, the ATO should be reviewed following
operational testing and evaluation for modification as necessary in consideration of the
operational test results.
3. All applicable security controls should be tested and satisfied before testing in
an operational environment or with live data except for those that can only be tested in an
operational environment. In consultation with the ISO or PM/SM, the AO will determine which
security controls can only be tested in an operational environment.
(1) Determine the security impact of proposed or actual changes to the IS or PIT system
and its environment of operation. Included in the security controls assigned to all IS and PIT
systems are security controls related to configuration and deficiency management, performance
monitoring, and periodic independent evaluations (e.g., penetration testing).
(a) The ISSM, in coordination with other appropriate personnel (e.g., IS security
engineer, system administrators, CNDSP CSSP):
3. Must report any significant change in the security posture of the system, and
recommended mitigations, immediately to the SCA and AO.
(2) Assess a subset of the security controls employed within and inherited by the IS or
PIT system in accordance with the AO-approved system-level continuous monitoring strategy.
(a) The assessor must provide a written and signed (or if digital, DoD PKI-certified
digitally signed) report in the SAR format to the AO that indicates the results of an annual
assessment of selected security controls. Reference (c) provides additional guidance on
conducting annual assessments.
(b) The results of the annual assessment must be documented in an SAR, which will
recommend either no change to the authorization status or downgrade to a DATO. The POA&M
will also be updated as appropriate.
(c) The AO must review the SAR in light of mission and information environment
indicators and determine a course of action that will be provided to the responsible CIO or SISO
for reporting requirements described in FISMA. An AO may downgrade or revoke an
authorization decision at any time if risk conditions or concerns so warrant.
(3) Conduct remediation actions based on the results of ongoing monitoring activities,
assessment of risk, and outstanding items in the POA&M. Systems with a current ATO that are
found to be operating in an unacceptable cybersecurity posture through Director, OT&E IA,
assessments, GAO audits, OIG DoD audits, or other reviews or events (such as an annual
security review or compliance assessment) must have the newly identified vulnerabilities and
associated level of risk added to an existing or newly created POA&M.
(4) The PM/SM ensures the security plan and POA&M are updated based on the results
of the system-level continuous monitoring process. The ISSM may recommend changes or
improvement to the implementation of assigned security controls, the assignment of additional
security controls, or changes or improvements to the design of the system itself to the SCA and
AO at any time.
(5) Report the security status of the system (including the effectiveness of security
controls employed within and inherited by the system) to the AO and other appropriate
organizational officials on an ongoing basis in accordance with the monitoring strategy.
(6) The AO reviews the reported security status of the system (including the
effectiveness of security controls employed within and inherited by the system) on an ongoing
basis in accordance with the monitoring strategy to determine whether the risk to organizational
operations, organizational assets, individuals, other organizations, or the nation remains
acceptable.
(a) In accordance with Appendix III to OMB Circular A-130 (Reference (aa)),
systems must be reassessed and reauthorized once every 3 years. The results of an annual review
or a major change in the cybersecurity posture at any time may also indicate the need for
reassessment and reauthorization of the system.
(b) Systems that have been evaluated as having a sufficiently robust system-level
continuous monitoring program (as defined by emerging DoD continuous monitoring policy)
may operate under a continuous reauthorization. Continuous monitoring does not replace the
security authorization requirement; rather, it is an enabler of ongoing authorization decisions.
ENCLOSURE 7
KS
1. DoD RMF practitioners need ready access to RMF policy and guidance to effectively and
efficiently apply the appropriate methods, standards, and practices required to protect DoD IT.
Implementation guidance must reflect the most up-to-date DoD intent regarding evolving
security objectives and risk conditions. To address this enterprise challenge, the KS was
established as the online, web-based resource that:
a. Provides guidance and tools for implementing and executing the RMF.
b. Is the authoritative source for RMF guidance and the repository for DoD RMF policy.
3. The KS hosts a library of tools, diagrams, process maps, documents, etc., to support and aid
in the execution of the RMF. It is also a collaboration workspace for the RMF user community
to develop, share, and post lessons learned, best practices, cybersecurity news and events, and
other cybersecurity-related information resources.
4. The RMF TAG is responsible for the functional configuration and content management of the
KS, and provides detailed analysis and authoring support for the enterprise portion of the KS
content.
ENCLOSURE 8
RMF TRANSITION
1. DoD IS and PIT systems will transition to the RMF in accordance with Table 2. All IS and
PIT systems must transition to the Reference (e) categorization and security controls selection
methodology, Reference (f) security control catalog, and the RMF.
2. Components are authorized and encouraged to start using RMF immediately. Recognizing
the transition to RMF is complex; Table 2 establishes the timeline for the authorized continued
use of DIACAP.
a. The date the package is submitted to the AO; this date determines the maximum duration
of the ATO.
b. The date the package is signed by the AO (i.e. ATO date); this date starts the clock on the
ATO.
c. The ATD, based on the maximum duration of the ATO, is calculated from the AO
signature date/ATO Date.
4. Table 2 provides a staggered timeline, and ATO duration for IS and PIT systems under the
DIACAP. The timelines apply to new system authorizations as well as existing systems with an
expiring ATO. All IS and PIT systems must comply.
6. Transition to updated versions of Reference (e) will be in accordance with Table 3 for IS and
PIT systems that have transitioned to the RMF.
Or;
GLOSSARY
AO authorizing official
AODR authorizing official designated representative
ATD authorization termination date
ATO authorization to operate
IA information assurance
IATT interim authorization to test
IO information owner
IS information system
ISO information system owner
ISRMC Information Security Risk Management Committee
ISSM information system security manager
ISSO information system security officer
IT information technology
KS Knowledge Service
MA mission area
MOA memorandum of agreement
MOU memorandum of understanding
NA not applicable
NC non-compliant
NIST National Institute of Standards and Technology
UC unified capabilities
UR user representative
U.S.C. United States Code
USD(AT&L) Under Secretary of Defense for Acquisition, Technology, and
Logistics
USSTRATCOM United States Strategic Command
Unless otherwise noted, these terms and their definitions are for the purposes of this instruction.
cybersecurity. Prevention of damage to, protection of, and restoration of computers, electronic
communications systems, electronic communications services, wire communication, and
electronic communication, including information contained therein, to ensure its availability,
integrity, authentication, confidentiality, and nonrepudiation. Defined in National Security
Presidential Directive-54/Homeland Security Presidential Directive-23 (Reference (ac)).
ISO. Defined in Reference (c), but for the purposes of this instruction is not synonymous with
“PM” as indicated in Reference (c).
SAR. Provides a disciplined and structured approach for documenting the findings of the
assessor and the recommendations for correcting any identified vulnerabilities in the security
controls.
security assessment plan. Provides the objectives for the security control assessment and a
detailed roadmap of how to conduct such an assessment. See Reference (g) for additional
information regarding security assessment plans.
type authorization. A method of system authorization that allows a single security authorization
package to be developed for an archetype (common) version of a system, and the issuance of a
single authorization decision that is applicable to multiple deployed instances of the system.