NIST 800-37_ Risk Management Flashcards

(10 cards)

1
Q

What is the Risk Management Framework (RMF) and what is its purpose?

A

The Risk Management Framework (RMF) is a systematic process for managing cybersecurity risk. It provides a structured approach to identifying Risk Management assessing

and responding to risks in order to protect organizational assets and ensure compliance with applicable laws and regulations. The purpose of the RMF is to ensure that organizations have the necessary controls in place to protect their systems and data from potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

as outlined in NIST 800-37? The six steps of the Risk Management Framework (RMF) process Risk Management What are the six steps of the RMF process

A

as outlined in NIST 800-37

are:
(1) Categorize Information System;
(2) Select Security Controls;
(3) Implement Security Controls;
(4) Assess Security Controls;
(5) Authorize Information System; and
(6) Monitor Security Controls.

Each step is designed to ensure that an organization’s information systems are secure and compliant with applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Management What are the key differences between the RMF and the previous certification and accreditation (C&A) process?

A

The key difference between the Risk Management Framework (RMF) and the previous Certification and Accreditation (C&A) process is that RMF is a more comprehensive approach to security that focuses on continuous monitoring and risk management. RMF also requires organizations to develop a formalized system security plan which C&A did not. Additionally RMF requires organizations to conduct regular vulnerability scans and assessments

whereas C&A was more focused on initial security compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Management What is the role of the system owner in the RMF process?

A

The system owner is responsible for providing the necessary resources and support to ensure the successful implementation of the Risk Management Framework (RMF) process. They are also responsible for ensuring that all security controls are in place and maintained throughout the system’s lifecycle. Finally they must ensure that all stakeholders are aware of their roles and responsibilities in relation to the RMF process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Management What are the key documents produced during each step of the RMF process?

A

The Risk Management Framework (RMF) process involves six steps: Categorize

Select
Implement

Assess

Authorize

and Monitor. Each step produces key documents that are used to ensure the security of the system. The Categorize step produces a System Security Plan (SSP)

which outlines the security requirements for the system. The Select step produces a Security Control Baseline document that details the security controls to be implemented. The Implement step produces a Security Assessment Plan (SAP) and a Test Plan that outlines how the security controls will be tested. The Assess step produces an Assessment Report that details any findings from testing. The Authorize step produces an Authorization Package that is used to gain approval for the system to operate in its environment. Finally

the Monitor step produces a Continuous Monitoring Plan that outlines how the system will be monitored on an ongoing basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Management What is the difference between a security control and a security control baseline?

A

The main difference between a security control and a security control baseline is that a security control is an action taken to protect an asset while a security control baseline is the set of standards that must be met in order to ensure the effectiveness of the security control. Security controls are typically specific actions taken to protect an asset such as implementing firewalls or encrypting data

while security control baselines are more general guidelines that define the minimum acceptable level of protection for an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Management What is the role of the Information System Security Officer (ISSO) in the RMF process?

A

The Information System Security Officer (ISSO) is responsible for ensuring that the organization’s information systems are compliant with security requirements and regulations. The ISSO is responsible for developing implementing and maintaining the Risk Management Framework (RMF) process. This includes creating system security plans

conducting security assessments

and providing guidance on security controls. The ISSO also provides oversight of the RMF process to ensure that all security requirements are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Management What is the purpose of the Security Assessment Report (SAR) and what information does it contain?

A

The purpose of the Security Assessment Report (SAR) is to provide an overview of the security posture of an organization. It contains information such as identified risks vulnerabilities

and recommended mitigation strategies. Additionally

it can include details on the security controls in place and any compliance requirements that must be met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Management What is the difference between a vulnerability assessment and a penetration test?

A

The main difference between a vulnerability assessment and a penetration test is that a vulnerability assessment is an automated process that identifies potential security weaknesses in a system while a penetration test is an active attempt to exploit those weaknesses to gain access to the system. A vulnerability assessment typically involves scanning for known vulnerabilities while a penetration test may involve manual testing of the system and its components. Additionally

a vulnerability assessment is typically used to identify potential issues before they can be exploited

while a penetration test is used to validate the effectiveness of existing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the RMF process help organizations to manage risk more effectively and efficiently?

A

The Risk Management Framework (RMF) is a systematic approach to managing risk that helps organizations identify assess and mitigate risks associated with their IT systems. It provides a structured process for assessing the security posture of an organization’s IT systems and ensuring that appropriate security controls are in place. The RMF process also helps organizations to more effectively and efficiently manage risk by providing a consistent

repeatable process for evaluating and addressing potential risks. This helps organizations to ensure that their IT systems remain secure and compliant with applicable regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly