RIST RMF Controls Flashcards
AC-1
Access Control - Policy and Procedures
AC-2
Access Control - Account Management
AC-3
Access Control - Access Enforcement
AC-4
Access Control - Information Flow Enforcement
AC-5
Access Control - Separation of Duties
AC-6
Access Control - Least Privilege
AC-7
Access Control - Unsuccessful Logon Attempts
AC-8
Access Control - System Use Notification
AC-9
Access Control - Previous Logon Notification
AC-10
Access Control - Concurrent Session Control
AC-11
Access Control - Device Lock
AC-12
Access Control - Session Termination
AC-13
Access Control - Supervision and Review
AC-14
Access Control - Permitted Actions Without Identification or Authentication
AC-15
Access Control - Automated Marking
AC-16
Access Control - Security and Privacy Attributes
AC-17
Access Control - Remote Access
AC-18
Access Control - Wireless Access
AC-19
Access Control - Access Control for Mobile Devices
AC-20
Access Control - Use of External Systems
AC-21
Access Control - Information Sharing
AC-22
Access Control - Publicly Accessible Content
AC-23
Access Control - Data Mining Protection
AC-24
Access Control - Access Control Decisions
AC-25
Access Control - Reference Monitor
AT-1
Awareness and Training - Policy and Procedures
AT-2
Awareness and Training - Literacy Training and Awareness
AT-3
Awareness and Training - Role-based Training
AT-4
Awareness and Training - Training Records
AT-5
Awareness and Training - Contacts with Security Groups and Associations
AT-6
Awareness and Training - Training Feedback
AU-1
Audit and Accountability - Policy and Procedures
AU-2
Audit and Accountability - Event Logging
AU-3
Audit and Accountability - Content of Audit Records
AU-4
Audit and Accountability - Audit Log Storage Capacity
AU-5
Audit and Accountability - Response to Audit Logging Process Failures
AU-6
Audit and Accountability - Audit Record Review, Analysis, and Reporting
AU-7
Audit and Accountability - Audit Record Reduction and Report Generation
AU-8
Audit and Accountability - Time Stamps
AU-9
Audit and Accountability - Protection of Audit Information
AU-10
Audit and Accountability - Non-repudiation
AU-11
Audit and Accountability - Audit Record Retention
AU-12
Audit and Accountability - Audit Record Generation
AU-13
Audit and Accountability - Monitoring for Information Disclosure
AU-14
Audit and Accountability - Session Audit
AU-15
Audit and Accountability - Alternate Audit Logging Capability
AU-16
Audit and Accountability - Cross-organizational Audit Logging
CA-1
Assessment, Authorization, and Monitoring - Policy and Procedures
CA-2
Assessment, Authorization, and Monitoring - Control Assessments
CA-3
Assessment, Authorization, and Monitoring - Information Exchange
CA-4
Assessment, Authorization, and Monitoring - Security Certification
CA-5
Assessment, Authorization, and Monitoring - Plan of Action and Milestones
CA-6
Assessment, Authorization, and Monitoring - Authorization
CA-7
Assessment, Authorization, and Monitoring - Continuous Monitoring
CA-8
Assessment, Authorization, and Monitoring - Penetration Testing
CA-9
Assessment, Authorization, and Monitoring - Internal System Connections
CM-1
Configuration Management - Policy and Procedures
CM-2
Configuration Management - Baseline Configuration
CM-3
Configuration Management - Configuration Change Control
CM-4
Configuration Management - Impact Analyses
CM-5
Configuration Management - Access Restrictions for Change
CM-6
Configuration Management - Configuration Settings
CM-7
Configuration Management - Least Functionality
CM-8
Configuration Management - System Component Inventory
CM-9
Configuration Management - Configuration Management Plan
CM-10
Configuration Management - Software Usage Restrictions
CM-11
Configuration Management - User-installed Software
CM-12
Configuration Management - Information Location
CM-13
Configuration Management - Data Action Mapping
CM-14
Configuration Management - Signed Components
CP-1
Contingency Planning - Policy and Procedures
CP-2
Contingency Planning - Contingency Plan
CP-3
Contingency Planning - Contingency Training
CP-4
Contingency Planning - Contingency Plan Testing
CP-5
Contingency Planning - Contingency Plan Update
CP-6
Contingency Planning - Alternate Storage Site
CP-7
Contingency Planning - Alternate Processing Site
CP-8
Contingency Planning - Telecommunications Services
CP-9
Contingency Planning - System Backup
CP-10
Contingency Planning - System Recovery and Reconstitution
CP-11
Contingency Planning - Alternate Communications Protocols
CP-12
Contingency Planning - Safe Mode
CP-13
Contingency Planning - Alternative Security Mechanisms
IA-1
Identification and Authentication - Policy and Procedures
IA-2
Identification and Authentication - Identification and Authentication (Organizational Users)
IA-3
Identification and Authentication - Device Identification and Authentication
IA-4
Identification and Authentication - Identifier Management
IA-5
Identification and Authentication - Authenticator Management
IA-6
Identification and Authentication - Authentication Feedback
IA-7
Identification and Authentication - Cryptographic Module Authentication
IA-8
Identification and Authentication - Identification and Authentication (Non-organizational Users)
IA-9
Identification and Authentication - Service Identification and Authentication
IA-10
Identification and Authentication - Adaptive Authentication
IA-11
Identification and Authentication - Re-authentication
IA-12
Identification and Authentication - Identity Proofing
IR-1
Incident Response - Policy and Procedures
IR-2
Incident Response - Incident Response Training
IR-3
Incident Response - Incident Response Testing
IR-4
Incident Response - Incident Handling
IR-5
Incident Response - Incident Monitoring
IR-6
Incident Response - Incident Reporting
IR-7
Incident Response - Incident Response Assistance
IR-8
Incident Response - Incident Response Plan
IR-9
Incident Response - Information Spillage Response
IR-10
Incident Response - Integrated Information Security Analysis Team
MA-1
Maintenance - Policy and Procedures
MA-2
Maintenance - Controlled Maintenance
MA-3
Maintenance - Maintenance Tools
MA-4
Maintenance - Nonlocal Maintenance
MA-5
Maintenance - Maintenance Personnel
MA-6
Maintenance - Timely Maintenance
MA-7
Maintenance - Field Maintenance
MP-1
Media Protection - Policy and Procedures
MP-2
Media Protection - Media Access
MP-3
Media Protection - Media Marking
MP-4
Media Protection - Media Storage
MP-5
Media Protection - Media Transport
MP-6
Media Protection - Media Sanitization
MP-7
Media Protection - Media Use
MP-8
Media Protection - Media Downgrading
PE-1
Physical and Environmental Protection - Policy and Procedures
PE-2
Physical and Environmental Protection - Physical Access Authorizations
PE-3
Physical and Environmental Protection - Physical Access Control
PE-4
Physical and Environmental Protection - Access Control for Transmission
PE-5
Physical and Environmental Protection - Access Control for Output Devices
PE-6
Physical and Environmental Protection - Monitoring Physical Access
PE-7
Physical and Environmental Protection - Visitor Control
PE-8
Physical and Environmental Protection - Visitor Access Records