SlideShare a Scribd company logo
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
What is Security Authorization?
Employing an applicable Security
Authorization Process
Roles and Responsibilities
Legal, Regulatory and Other Requirements
Common Controls and Control Inheritance
Risk Management Framework (RMF) Phases
System Development Life Cycle (SDLC)
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
“Certification and accreditation is the methodology
used to ensure that security controls are established
for an information system, that these controls are
functioning appropriately, and that management has
authorized the operation of the system in is current
security posture.”
- Official (ISC)2 Guide to the CAP CBK (1st ed.)
Measures that protect and defend information and
information systems by ensuring their availability,
integrity, authentication, confidentiality, and non
repudiation. These measures include providing for
restoration of information systems by incorporating
protection, detection, and reaction capabilities.
- CNSS Instruction No. 4009
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
• Management
• Operational
• Technical
• Implemented correctly
• Operating as intended
• Producing the desired outcome
official management decision to operate
budget and business
operations
“The official management decision given by a senior
organizational official to authorize operation of an
information system and to explicitly accept the risk to
organizational operations (including mission, functions,
image, or reputation), organizational assets, individuals,
other organizations, and the Nation based on the
implementation of an agreed-upon set of security
controls.”
- NIST SP 800-37 rev 1
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Why are Agencies riddled with security holes?
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
http://gcn.com/articles/2011/07/06/cyber-attacks-take-2-energy-labs-offline.aspx
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
What are some key factors in creating a
successful RMF program?
business enabler
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
• Need consistent management
support
• Without management support
people will not fulfill their obligations
to the project
• Without management support you
will not have access to needed
resources and funding
• The Senior Information Security
Officer (SISO) can keep the program
visible by giving regular updates to
c-level management
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Reference: http://www.tess-llc.com/Certification%20&%20Accreditation%20PolicyV4.pdf
Life-cycle for the development of the documentation for the RMF process
• Awareness
• Monitoring
• Enforcement
• Maintenance
• Retirement
• Communication
• Compliance
• Exceptions
• Creation
• Review
• Approval
Development Implementation
MaintenanceDisposal
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction

More Related Content

PPTX
RMF Roles and Responsibilities (Part 1)
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PDF
Enterprise Security Architecture
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Rothke secure360 building a security operations center (soc)
PDF
ISO 27001 How to accelerate the implementation.pdf
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
ISO 27001 2002 Update Webinar.pdf
RMF Roles and Responsibilities (Part 1)
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Enterprise Security Architecture
DTS Solution - Building a SOC (Security Operations Center)
Rothke secure360 building a security operations center (soc)
ISO 27001 How to accelerate the implementation.pdf
INCIDENT RESPONSE NIST IMPLEMENTATION
ISO 27001 2002 Update Webinar.pdf

What's hot (20)

PPTX
Enterprise Security Architecture Design
PDF
Isms awareness presentation
PPTX
ISO 27005 - Digital Trust Framework
PDF
IC-ISO-27001-Checklist-10838_PDF.pdf
PDF
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
PPTX
Iso 27001 isms presentation
PPTX
NIST Risk Management Framework (RMF)
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
ISO 27001:2022 What has changed.pdf
PDF
ISO 27005:2022 Overview 221028.pdf
PPT
Risk Assessment Process NIST 800-30
PPTX
Adaptive Enterprise Security Architecture
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
PDF
Enterprise Security Architecture: From access to audit
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PPTX
Rothke rsa 2012 building a security operations center (soc)
PPTX
Implementing ISO27001 2013
PPTX
Symantec Portfolio - Sales Play
PPSX
Next-Gen security operation center
PPT
Disaster recovery & business continuity
Enterprise Security Architecture Design
Isms awareness presentation
ISO 27005 - Digital Trust Framework
IC-ISO-27001-Checklist-10838_PDF.pdf
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Iso 27001 isms presentation
NIST Risk Management Framework (RMF)
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
ISO 27001:2022 What has changed.pdf
ISO 27005:2022 Overview 221028.pdf
Risk Assessment Process NIST 800-30
Adaptive Enterprise Security Architecture
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Enterprise Security Architecture: From access to audit
Introduction to NIST’s Risk Management Framework (RMF)
Rothke rsa 2012 building a security operations center (soc)
Implementing ISO27001 2013
Symantec Portfolio - Sales Play
Next-Gen security operation center
Disaster recovery & business continuity
Ad

Similar to Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction (20)

DOCX
Risk Assessment
DOCX
R.a 1
PPTX
L1_Introduction.pptx
PPT
5757912.ppt
PPT
Information Security
PPTX
Overview on Information Security Awareness.pptx
PPTX
Controls in Audit.pptx
PDF
ISACA Cybersecurity Audit course brochure
PDF
A Monitor System in Data Redundancy in Information System
PPTX
800-37.pptx
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
PPT
Security Manager - Slides - Module 10.ppt
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PDF
1 info sec+risk-mgmt
PDF
CCISO_Certification_Training_Course-Outline.pdf
PDF
Cyber Security Risk Mitigation Checklist
PPTX
Shivani shukla_B38_KnowledgeManagement
DOCX
Risk Assessment Famework
Risk Assessment
R.a 1
L1_Introduction.pptx
5757912.ppt
Information Security
Overview on Information Security Awareness.pptx
Controls in Audit.pptx
ISACA Cybersecurity Audit course brochure
A Monitor System in Data Redundancy in Information System
800-37.pptx
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Security Manager - Slides - Module 10.ppt
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
1 info sec+risk-mgmt
CCISO_Certification_Training_Course-Outline.pdf
Cyber Security Risk Mitigation Checklist
Shivani shukla_B38_KnowledgeManagement
Risk Assessment Famework
Ad

More from Donald E. Hester (20)

PDF
Cybersecurity for Local Gov for SAMFOG
PDF
2017 IT Control Environment for Local Gov
PPTX
What you Need To Know About Ransomware
PDF
CNT 54 Administering Windows Client
PDF
2016 Maze Live Fraud Environment
PDF
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
PDF
2016 Maze Live Cyber-security for Local Governments
PDF
GASB 68 and 71 Planning for the Second Year
PDF
Implementing GASB 72: Fair Value Measurement and Application
PDF
2016 Maze Live 1 GASB update
PPTX
Cyber Security for Local Gov SAMFOG
PDF
Annual Maze Live Event 2016 – GASB Updates & Best Practices
PDF
Payment Card Cashiering for Local Governments 2016
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Cybersecurity for Local Gov for SAMFOG
2017 IT Control Environment for Local Gov
What you Need To Know About Ransomware
CNT 54 Administering Windows Client
2016 Maze Live Fraud Environment
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Cyber-security for Local Governments
GASB 68 and 71 Planning for the Second Year
Implementing GASB 72: Fair Value Measurement and Application
2016 Maze Live 1 GASB update
Cyber Security for Local Gov SAMFOG
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Payment Card Cashiering for Local Governments 2016
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...

Recently uploaded (20)

PDF
buyers sellers meeting of mangoes in mahabubnagar.pdf
PPTX
Weekly Report 17-10-2024_cybersecutity.pptx
PDF
Environmental Management Basics 2025 for BDOs WBCS by Samanjit Sen Gupta.pdf
PDF
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
PDF
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
PPTX
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
PPTX
GSA Q+A Follow-Up To EO's, Requirements & Timelines
DOCX
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
PDF
Courtesy Meeting NIPA and MBS Australia.
PDF
Item # 3 - 934 Patterson Final Review.pdf
PPTX
STG - Sarikei 2025 Coordination Meeting.pptx
PPTX
11Sept2023_LTIA-Cluster-Training-Presentation.pptx
PDF
मुख्यमंत्राी सामूहिक विवाह कार्यक्रम, जनपद बाँदा
PDF
Strategic Planning for Child Rights and Protection Programming.pdf
PPTX
DFARS Part 249 - Termination Of Contracts
PDF
Item # 2 - 934 Patterson Specific Use Permit (SUP)
PDF
2026 RMHC Terms & Conditions agreement - updated 8.1.25.pdf
PPTX
The DFARS - Part 250 - Extraordinary Contractual Actions
PDF
ISO-9001-2015-internal-audit-checklist2-sample.pdf
PDF
Contributi dei parlamentari del PD - Contributi L. 3/2019
buyers sellers meeting of mangoes in mahabubnagar.pdf
Weekly Report 17-10-2024_cybersecutity.pptx
Environmental Management Basics 2025 for BDOs WBCS by Samanjit Sen Gupta.pdf
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
GSA Q+A Follow-Up To EO's, Requirements & Timelines
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
Courtesy Meeting NIPA and MBS Australia.
Item # 3 - 934 Patterson Final Review.pdf
STG - Sarikei 2025 Coordination Meeting.pptx
11Sept2023_LTIA-Cluster-Training-Presentation.pptx
मुख्यमंत्राी सामूहिक विवाह कार्यक्रम, जनपद बाँदा
Strategic Planning for Child Rights and Protection Programming.pdf
DFARS Part 249 - Termination Of Contracts
Item # 2 - 934 Patterson Specific Use Permit (SUP)
2026 RMHC Terms & Conditions agreement - updated 8.1.25.pdf
The DFARS - Part 250 - Extraordinary Contractual Actions
ISO-9001-2015-internal-audit-checklist2-sample.pdf
Contributi dei parlamentari del PD - Contributi L. 3/2019

Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction

  • 2. What is Security Authorization? Employing an applicable Security Authorization Process Roles and Responsibilities Legal, Regulatory and Other Requirements Common Controls and Control Inheritance Risk Management Framework (RMF) Phases System Development Life Cycle (SDLC)
  • 11. “Certification and accreditation is the methodology used to ensure that security controls are established for an information system, that these controls are functioning appropriately, and that management has authorized the operation of the system in is current security posture.” - Official (ISC)2 Guide to the CAP CBK (1st ed.)
  • 12. Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. - CNSS Instruction No. 4009
  • 15. • Management • Operational • Technical • Implemented correctly • Operating as intended • Producing the desired outcome
  • 16. official management decision to operate budget and business operations
  • 17. “The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.” - NIST SP 800-37 rev 1
  • 21. Why are Agencies riddled with security holes?
  • 27. What are some key factors in creating a successful RMF program?
  • 32. • Need consistent management support • Without management support people will not fulfill their obligations to the project • Without management support you will not have access to needed resources and funding • The Senior Information Security Officer (SISO) can keep the program visible by giving regular updates to c-level management
  • 36. Life-cycle for the development of the documentation for the RMF process • Awareness • Monitoring • Enforcement • Maintenance • Retirement • Communication • Compliance • Exceptions • Creation • Review • Approval Development Implementation MaintenanceDisposal