DODI 8510.01, RISK MANAGEMENT FRAMEWORK (RMF) FOR DOD INFORMATION TECHNOLOGY (IT) Flashcards
Who oversees the implementation of DoDI 8510.01 and directs and oversees the cyber security risk management of DoD IT?
DoD Chief Information Officer (DoD CIO)
Who develops and provides RMF training and awareness products and a distributive training capability to support the DoD Components?
Director, Defense Information Systems Agency (DISA)
Who is responsible for coordinating with the DoD CIO to ensure RMFs processes are appropriately integrated with Defense Acquisition System processes for DoD IT acquisitions?
Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L))
Who reviews plans, execution, and results of operational testing to ensure adequate evaluation of cybersecurity for all DoD IT acquisitions subject to oversight?
Director, Operational Test and Evaluation (DOT&E)
Who ensures that IS security engineering services, when provided to the DoD components, support the RMF?
Director, National Security Agency/Chief, Central Security Service (DIRNSA/CHCSS)
DOD Component heads must ensure that a trained and qualified AO is appointed in writing for all DoD IS and PIT systems operating within or on behalf of the DoD Component in accordance with which reference?
DoD Instruction 8500.01
Who is responsible for ensuring the Joint Capabilities Integration and Development System (JCID) process supports and documents IS and PIT system categorization consistent with DoDI 8510.01?
Chairman of the Join Chiefs of Staff (CJCS)
Who is responsible for ensuring all products, services, and PIT have completed the appropriate evaluation and configuration processes prior to incorporation into or connection to an IS or PIT system?
Information Systems Security Manager (ISSM)
What are product-specific and document the applicable DoD policies and security requirements, as well as best practices and configuration guidelines?
Security Technical Implementation Guides (STIGs)
What are developed by DISA to provide general security compliance guidelines as well as serving as source guidance documents for STIGs?
Security Requirements Guides (SRGs)
Which approach to cyber security risk management as described in NIST SP 800-39 is implemented by the DoD RMF governance structure?
Three-tiered
Which Tier level in RMF addresses risk management at the DoD enterprise level?
Tier I
Who directs and oversees the cyber security risk management of DoD IT?
Department of Defense Chief of Information Officer (DoD CIO)
What performs the DoD Risk Executive Function?
DoD Information Security Risk Management Committee (ISRMC)
What is the community forum for reviewing and resolving authorization issues related to the sharing of community risk?
Defense IA Security Accreditation Working Group (DSAWG)
Who oversees the RMF TAG and the online KS?
Department of Defense Senior Information Security Officer (DoD SISO)
What provides implementation guidance for the RMF by interfacing with the DoD component cyber security programs, cyber security communities of interest (COIs), and other entities to address issues that are common across all entities?
Risk Management Framework Technical advisory Group (RMF TAG)
What supports RMF implementation, planning, and execution by functioning as the authoritative source for RMF procedures and guidance?
Knowledge Service