NIST developed the Risk Management Framework (RMF) to provide a more flexible, dynamic, approach for effective management of information system-related security risk in highly diverse environments and throughout the system development life cycle. The RMF identifies six steps that provide a disciplined and structured process for managing mission/business risk associated with the operation and use of federal information systems.
The six RMF steps include:
Purpose:Inform organizational risk management processes and tasks by determining the adverse impact with respect to the loss of confidentiality, integrity, and availability of systems and the information processed, stored, and transmitted by those systems.
Outcomes:
2. Select: An initial set of baseline security controls for the information system based on the security categorization, tailoring, and supplementing the security control baseline as needed based on an organizational assessment of risk and local conditions.
Purpose: Select, tailor, and document the controls necessary to protect the system and organization commensurate with risk.
Outcomes:
3. ImplementThe security controls and describe how the controls are employed within the information system and its environment of operation.
Purpose: Implement the controls in the security and privacy plans for the system and organization
Outcomes:
4. Assess The security controls using appropriate assessment procedures to determine the extent to which the controls are implemented correctly, operating as intended, and meeting the security requirements as described in the system security plan.
Purpose: Determine if the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security and privacy requirements for the system and the organization.
Outcomes:
5. Authorize Information system operation based on a determination of the risk resulting from the operation of the information system, and the decision that this risk is acceptable.
Purpose: Provide accountability by requiring a senior official to determine if the security and privacy risk based on the operation of a system or the use of common controls, is acceptable.
Outcomes:
6. Monitor The security controls in the information system on an ongoing basis, including assessing control effectiveness, documenting changes to the system (or its operating environment), conducting security impact analyses of the associated changes, and reporting the security state of the system to designated organizational officials.
Purpose: Maintain ongoing situational awareness about the security and privacy posture of the system and organization to support risk management decisions
Outcomes: