What is RMF?
RMF (Risk Management Framework) is a process used by the DoD to manage risk by applying security controls, assessing them, and continuously monitoring systems to maintain an ATO.
What are the 6 RMF steps?
Categorize → Select → Implement → Assess → Authorize → Monitor
What happens in the Categorize step?
The system is assigned an impact level (Low, Moderate, High) based on data sensitivity and mission importance.
What happens in the Select step?
Security controls are chosen from NIST 800-53 based on system impact level.
What happens in the Implement step?
Security controls are applied (STIGs, configurations, access controls, patching).
What happens in the Assess step?
Controls are tested and validated using scans, audits, and reviews.
What happens in the Authorize step?
Leadership grants an ATO (Authorization to Operate) after reviewing risk.
What happens in the Monitor step?
Continuous monitoring through patching, scanning, logging, and remediation.
What is an ATO?
Authorization to Operate—formal approval for a system to run after risk is accepted.
What is a STIG?
Security Technical Implementation Guide—DoD baseline security configurations for systems.
What is ACAS?
Assured Compliance Assessment Solution—DoD vulnerability scanning tool (uses Nessus).
What is Nessus?
A vulnerability scanner used to identify security weaknesses in systems.
What is a vulnerability?
A weakness in a system that could be exploited.
What are CAT I Vulnerability
Critical
What are CAT II Vulnerability
Medium
What are CAT III Vulnerability
Low
What is least privilege?
Users only get the minimum access needed to perform their job.
What does an ISSO do daily?
Reviews scans, tracks vulnerabilities, ensures compliance, supports ATO, works with admins to fix issues.
How does system hardening relate to RMF?
It is part of the Implement step.
How do vulnerability scans relate to RMF?
They are part of Assess and Monitor steps.
What role does patching play in the Risk Management Framework (RMF)?
It supports continuous monitoring and remediation of system vulnerabilities.
How are access controls categorized within the RMF process?
They are part of the control implementation phase, specifically identified as AC controls.
What is NIST?
The National Institute of Standards and Technology—an organization that creates cybersecurity standards used to secure federal systems.
What does “SP” mean in NIST SP 800-53?
Special Publication
This designation indicates that it is a formal publication by NIST.