Risk Management Framework Final PDF
Risk Management Framework Final PDF
NIST SP 800-18, Guide for Developing Security Plans for Federal Information Systems,
discusses the development of security plans that provide an overview of the security
requirements of the system and that describe the controls needed to meet those
requirements. The security plan for a system also describes the responsibilities of all
individuals who access the system and documents a structured process for planning for
adequate, cost-effective security protection for a system.
Federal agencies implementing risk-based planning and management also must consider
effectiveness, efficiency, and other requirements incorporated in current laws, directives,
Executive Orders, policies, standards, or regulations. One consideration for federal
agencies is the Federal Enterprise Architecture (FEA), which was established by the
Office of Management and Budget (OMB) and the federal government’s Chief
Information Officer (CIO) Council to improve the performance of IT resources and
agency investment strategies. The FEA is a business-based framework that helps agencies
analyze and identify duplicative investments, gaps, and opportunities for collaboration
among agencies. Information about the FEA is available from the OMB Web page
http://www.whitehouse.gov/omb/e-gov/fea/.
Risk management is the process that information system managers apply to balance the
operational and economic costs of protective measures for their information and
information systems with the gains in capabilities and improved support of organizational
mission that result from the use of efficient protection procedures. As part of the risk
management process, organizations select and apply security controls for their
information and information systems. The security controls are assessed and monitored to
assure continued efficiency and effectiveness.
The following activities compose the Risk Management Framework. These activities,
which are fundamental to the management of organizational risk, can be applied to both
new and legacy information systems within the context of the SDLC and the FEA:
· Categorize the information system and the information being processed, stored,
and transmitted by the system, based on the potential impact to the organization should
events occur to put the system and its information at risk. The organization assigns a
security impact value (low, moderate, high) for the security objectives of confidentiality,
integrity, or availability for the information and information systems that are needed by
the organization to accomplish its mission, protect its assets and individuals, fulfill its
legal responsibilities, and maintain its day-to-day functions.
NIST SP 800-60, Revision 1, Guide for Mapping Types of Information and Information
Systems to Security Categories, (Volumes 1 and 2), assists federal organizations in
applying appropriate levels of information security based on the levels of impact or
consequences that might result from the unauthorized disclosure, modification, or use of
the information or information system.
· Select an appropriate set of security controls for the information system after
determining the security categorizations as specified in FIPS 199 and the minimum
security requirements as defined in FIPS 200, Minimum Security Requirements for
Federal Information and Information Systems. FIPS 200 specifies minimum security
requirements for federal information and information systems for seventeen security-
related areas that represent a broad-based, balanced information security program. The
seventeen security-related areas encompass the management, operational, and technical
aspects of protecting federal information and information systems. Further, FIPS 200
specifies that organizations meet the minimum security requirements by selecting an
appropriately tailored set of baseline security controls based on an assessment of risk and
local conditions, including the organization’s specific security requirements, threat
information, cost-benefit analyses, or special circumstances.
Many other NIST publications dealing with the implementation of security controls are
available from the NIST Web page http://csrc.nist.gov/index.html.
NIST SP 800-53A is a companion guide for NIST SP 800-53 and covers both the security
control assessment and continuous monitoring steps in the Risk Management Framework.
This guide helps organizations with the security assessment process, including how to
build effective security assessment plans and how to manage assessment results. The
procedures discussed give organizations flexibility in tailoring and supplementing the
basic assessment processes to match the characteristics of the information system being
assessed. While allowing for flexibility in the development of security assessment plans,
NIST SP 800-53A also helps agencies achieve consistency of assessments through the
application of a formal assessment framework and uniform assessment procedures.
A chart of the six steps of the process is reproduced below. This chart is available from
the NIST Web page
http://csrc.nist.gov/groups/SMA/fisma/Risk-Management-Framework/index.html.
Users accessing the online version of this six-step chart can link to FIPS, SPs, Frequently
Asked Questions (FAQs), Roles and Responsibilities, and Quick Start Guide documents
for each step of the RMF. To access the respective documents for each step, users can
place their cursor over the document and click the mouse button to link to that document.
A menu appearing on the left side of the page, but not reproduced here, can also be used
to access the FAQs, Roles and Responsibilities, and the Quick Start Guides for each step
in the Risk Management Framework.
These steps provide a structured, yet flexible approach for managing the risks that result
from the incorporation of information systems into the mission and business processes of
the organization. The risk management concepts presented are broad in scope with the
specific details of assessing risk and employing appropriate risk mitigation strategies
provided by the supporting NIST security standards and guidelines. The FAQs, Roles and
Responsibilities, and Quick Start Guides build on the standards and guidance, consolidate
information from various NIST publications, and provide examples of ways that
organizations can implement the standards and guidelines.
The revision of SP 800-53 will include management, operational, and technical controls
to be implemented in federal information systems that process, store, and transmit both
national security and nonnational security information. The revised security control
catalog will also include safeguards and countermeasures that are needed by
organizations to address advanced cyber threats to vulnerabilities in federal information
systems. The focus is on the management of risks in information systems on an
enterprise-wide and near real-time basis. Systems that are operating in dynamic
environments can be adversely affected by threats to organizational operations and assets,
individuals, other organizations, and the Nation.
Additional information about NIST’s security programs is available from the Computer
Security Resource Center http://csrc.nist.gov/.
The NIST contact for more information about the Risk Management Framework: