RMF Flashcards

Learn RMF (39 cards)

1
Q

What is RMF?

A

RMF (Risk Management Framework) is a process used by the DoD to manage risk by applying security controls, assessing them, and continuously monitoring systems to maintain an ATO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 RMF steps?

A

Categorize → Select → Implement → Assess → Authorize → Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens in the Categorize step?

A

The system is assigned an impact level (Low, Moderate, High) based on data sensitivity and mission importance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens in the Select step?

A

Security controls are chosen from NIST 800-53 based on system impact level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens in the Implement step?

A

Security controls are applied (STIGs, configurations, access controls, patching).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens in the Assess step?

A

Controls are tested and validated using scans, audits, and reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in the Authorize step?

A

Leadership grants an ATO (Authorization to Operate) after reviewing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens in the Monitor step?

A

Continuous monitoring through patching, scanning, logging, and remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an ATO?

A

Authorization to Operate—formal approval for a system to run after risk is accepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a STIG?

A

Security Technical Implementation Guide—DoD baseline security configurations for systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ACAS?

A

Assured Compliance Assessment Solution—DoD vulnerability scanning tool (uses Nessus).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Nessus?

A

A vulnerability scanner used to identify security weaknesses in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a vulnerability?

A

A weakness in a system that could be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are CAT I Vulnerability

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are CAT II Vulnerability

A

Medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are CAT III Vulnerability

17
Q

What is least privilege?

A

Users only get the minimum access needed to perform their job.

18
Q

What does an ISSO do daily?

A

Reviews scans, tracks vulnerabilities, ensures compliance, supports ATO, works with admins to fix issues.

19
Q

How does system hardening relate to RMF?

A

It is part of the Implement step.

20
Q

How do vulnerability scans relate to RMF?

A

They are part of Assess and Monitor steps.

21
Q

What role does patching play in the Risk Management Framework (RMF)?

A

It supports continuous monitoring and remediation of system vulnerabilities.

22
Q

How are access controls categorized within the RMF process?

A

They are part of the control implementation phase, specifically identified as AC controls.

23
Q

What is NIST?

A

The National Institute of Standards and Technology—an organization that creates cybersecurity standards used to secure federal systems.

24
Q

What does “SP” mean in NIST SP 800-53?

A

Special Publication

This designation indicates that it is a formal publication by NIST.

25
What is **NIST SP 800-53**?
A catalog of security controls used to secure information systems. ## Footnote It provides guidelines for selecting and specifying security controls.
26
What do **NIST 800-53 controls** define?
What needs to be secured in a system: * access * logging * configuration ## Footnote These controls help organizations manage risk effectively.
27
What is **NIST SP 800-37**?
The RMF guide that defines the process for managing risk. ## Footnote RMF stands for Risk Management Framework.
28
What is **NIST SP 800-30**?
A guide for conducting risk assessments. ## Footnote It outlines a systematic approach to identifying and evaluating risks.
29
What is **NIST SP 800-53A**?
A guide for assessing/testing security controls. ## Footnote It provides methods for evaluating the effectiveness of security controls.
30
What is **NIST SP 800-171**?
Guidelines for protecting Controlled Unclassified Information (CUI). ## Footnote It is aimed at federal contractors and other organizations handling CUI.
31
What is a **security control**?
A safeguard or measure used to protect systems and reduce risk. ## Footnote Security controls can be technical, administrative, or physical.
32
Do you need to memorize all **NIST controls**?
No—you need to understand categories and how they apply. ## Footnote Focus on the principles behind the controls rather than rote memorization.
33
How do **STIGs** relate to NIST 800-53?
STIGs are technical implementations of NIST security controls. ## Footnote STIGs provide specific configuration settings for security compliance.
34
How does your experience relate to **NIST controls**?
Through system hardening, patching, access control, and vulnerability remediation. ## Footnote Practical experience helps in understanding the application of controls.
35
Which NIST publication defines **RMF**?
NIST SP 800-37 ## Footnote This publication outlines the Risk Management Framework process.
36
Which NIST publication defines **security controls**?
NIST SP 800-53 ## Footnote It serves as a comprehensive catalog of security controls.
37
Which NIST publication focuses on **risk assessment**?
NIST SP 800-30 ## Footnote This guide provides a structured approach to assessing risks.
38
Difference between Vulnerability, Threat, and Risk. Individual
Vulnerability - A weakness (The door is unlocked) Threat - The attacker (Someone trying the door) Risk - The chance of occurrence and potential loss or danger (What happens if they get in?)
39
Interview - Difference between Vulnerability, Threat, and Risk. Individual
A vulnerability is a weakness in a system, a threat is anything that can exploit that weakness, and risk is the likelihood and impact of that exploitation occurring.