DODI 8510.01, RISK MANAGEMENT FRAMEWORK (RMF) FOR DOD INFORMATION TECHNOLOGY (IT) Flashcards

1
Q

Who oversees the implementation of DoDI 8510.01 and directs and oversees the cyber security risk management of DoD IT?

A

DoD Chief Information Officer (DoD CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who develops and provides RMF training and awareness products and a distributive training capability to support the DoD Components?

A

Director, Defense Information Systems Agency (DISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is responsible for coordinating with the DoD CIO to ensure RMFs processes are appropriately integrated with Defense Acquisition System processes for DoD IT acquisitions?

A

Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who reviews plans, execution, and results of operational testing to ensure adequate evaluation of cybersecurity for all DoD IT acquisitions subject to oversight?

A

Director, Operational Test and Evaluation (DOT&E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who ensures that IS security engineering services, when provided to the DoD components, support the RMF?

A

Director, National Security Agency/Chief, Central Security Service (DIRNSA/CHCSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DOD Component heads must ensure that a trained and qualified AO is appointed in writing for all DoD IS and PIT systems operating within or on behalf of the DoD Component in accordance with which reference?

A

DoD Instruction 8500.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who is responsible for ensuring the Joint Capabilities Integration and Development System (JCID) process supports and documents IS and PIT system categorization consistent with DoDI 8510.01?

A

Chairman of the Join Chiefs of Staff (CJCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who is responsible for ensuring all products, services, and PIT have completed the appropriate evaluation and configuration processes prior to incorporation into or connection to an IS or PIT system?

A

Information Systems Security Manager (ISSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are product-specific and document the applicable DoD policies and security requirements, as well as best practices and configuration guidelines?

A

Security Technical Implementation Guides (STIGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are developed by DISA to provide general security compliance guidelines as well as serving as source guidance documents for STIGs?

A

Security Requirements Guides (SRGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which approach to cyber security risk management as described in NIST SP 800-39 is implemented by the DoD RMF governance structure?

A

Three-tiered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Tier level in RMF addresses risk management at the DoD enterprise level?

A

Tier I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who directs and oversees the cyber security risk management of DoD IT?

A

Department of Defense Chief of Information Officer (DoD CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What performs the DoD Risk Executive Function?

A

DoD Information Security Risk Management Committee (ISRMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the community forum for reviewing and resolving authorization issues related to the sharing of community risk?

A

Defense IA Security Accreditation Working Group (DSAWG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who oversees the RMF TAG and the online KS?

A

Department of Defense Senior Information Security Officer (DoD SISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What provides implementation guidance for the RMF by interfacing with the DoD component cyber security programs, cyber security communities of interest (COIs), and other entities to address issues that are common across all entities?

A

Risk Management Framework Technical advisory Group (RMF TAG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What supports RMF implementation, planning, and execution by functioning as the authoritative source for RMF procedures and guidance?

A

Knowledge Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who must monitor and track overall execution of system-level POA&Ms?

A

Authorizing Officials (AOs)

20
Q

Who develops, maintains, and racks security plans for assigned IS and PIT systems?

A

Information System Owners (ISOs)

21
Q

PMs must ensure periodic reviews, testing and assessment of assigned IS and PIT systems are conducted at least how often?

A

Annually

22
Q

PMs must ensure T&E of assigned IS and IT systems is planned, resourced, and documented in the program T&E master plan in accordance with which reference?

A

DoDI 5000.02

23
Q

What reduces redundant testing, assessing and documentation, and the associated cost in time and resources?

A

Reciprocity

24
Q

What must PMs and ISOs who are deploying systems across DoD Components post security authorization documentation to in order to provide visibility of authorization status and documentation to planned receiving sites?

A

Enterprise Mission Assurance Support Service (eMASS)

25
Q

Which reference contains DoD policy for Unified Capabilities (UC)?

A

DoDI 8100.04

26
Q

What is used to deploy identical copies of an IS or PIT system in specified environments?

A

Type authorization

27
Q

Which type of systems do not transmit, receive, route, or exchange information outside of the system’s authorization?

A

Platform Information Technology (PIT)

28
Q

How many different approaches are described by NIST SP 800-37 when planning for and conducting security authorizations?

A

3

29
Q

What must all DoD IS and PIT systems have that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements?

A

Security Plan

30
Q

How many steps are in the RMF process?

A

6

31
Q

What is step one of the RMF process?

A

Categorize system

32
Q

What is step two of the RMF process?

A

Select Security Controls

33
Q

What is step three of the RMF process?

A

Implement Security Controls

34
Q

What is step four of the RMF process?

A

Assess Security Controls

35
Q

What is step five of the RMF process?

A

Authorize System

36
Q

What is the final step of the RMF process?

A

Monitor Security Controls

37
Q

RMF Team members are required to meet the suitability and fitness requirements established in which reference?

A

DoD 5200.2-R

38
Q

What is the authoritative source for detailed security control descriptions, implementation guidance and assessment procedures?

A

Knowledge Service

39
Q

Which reference identifies vulnerability severity values?

A

NIST SP 800-30

40
Q

Who determines and documents in the SAR a risk level for every NC security control in the system baseline?

A

Security Control Assessor (SCA)

41
Q

What is used to document the SCA’s findings of compliance with assigned security controls based on actual assessment results?

A

Security Assessment Report (SAR)

42
Q

What is used to identify tasks that need to be accomplished o remediate or mitigate vulnerabilities?

A

POA&M

43
Q

IATTs should be granted only when an operational environment or live data is required to complete specific test objectives and should expire at the completion of testing (normally for a period of less than how many days)?

A

90

44
Q

Who continuously monitors the system or information environment for security-relevant events and configuration changes that negatively affect security posture?

A

Information Systems Security Manager (ISSM)

45
Q

What is the authoritative source for RMF guidance and the repository for DoD RMF policy?

A

Knowledge Service (KS)

46
Q

Who is responsible for the functional configuration and content management of the KS as well as providing detailed analysis and authoring support for the enterprise portion of the KS content?

A

Risk Management Framework Technical Advisory Group (RMF TAG)