RMF Task v Description Flashcards
Task 1-1
Security Categorization - Categorize the information system and document the results of the security categorization in the security plan.
- Initiation
- ISO and IO/Steward
Task 1-2
Information System Description - Describe the information system (including system boundary) and document the description in the security plan.
- Initiation
- ISO
Task 1-3
Information System Registration - Register the information system with appropriate organizational program/management offices.
- Initiation
- ISO
Task 2-1
Common Control Identification - Identify the security controls that are provided by the organization as common controls for organizational information systems and document the controls in a security plan (or equivalent document).
- Initiation
- CIO, SISO, CCP, ISA
Task 2-2
Security Control Selection - Select the security controls for the information system and document the controls in the security plan.
- Initiation
- ISO and ISA
Task 2-3
Continuous Monitoring Strategy - Develop a strategy for the continuous monitoring of security control effectiveness and any proposed or actual changes to the information system and its environment of operation.
- Initiation
- CCP and ISO
Task 2-4
Security Plan Approval - Review and approve the security plan.
- Development
- AO and AODR
Task 3-1
Security Control Implementation - Implement the security controls specified in the security plan.
- Development and Implementation
- CCP and ISO
Task 3-2
Security Control Documentation - Document the security control implementation, as appropriate, in the security plan, providing a functional description of the control implementation (including planned inputs, expected behavior, and expected outputs).
- Development and Implementation
- CCP and ISO
Task 4-1
Assessment Preparation - Develop, review, and approve a plan to assess the security controls.
- Development and Implementation
- SCA
Task 4-2
Security Control Assessment - Assess the security controls in accordance with the assessment procedures defined in the security assessment plan.
- Development and Implementation
- SCA
Task 4-3
Security Assessment Report (SAR) - Prepare the security assessment report documenting the issues, findings, and recommendations from the security control assessment.
- Development and Implementation
- SCA
Task 4-4
Remediation Actions - Conduct initial remediation actions on security controls based on the findings and recommendations of the security assessment report and reassess remediated control(s), as appropriate.
- Development and Implementation
- SCA, CCP and ISO
Task 5-1
Plan of Actions and Milestones (POAMs) - Prepare the plan of action and milestones based on the findings and recommendations of the security assessment report excluding any remediation actions taken.
- Implementation
- CCP and ISO
Task 5-2
Security Authorization Package - Assemble the security authorization package and submit the package to the authorizing official for adjudication.
- Implementation
- CCP and ISO