SlideShare a Scribd company logo
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Categorize
Select
Implement
Assess
Authorize
Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Categorize
Select
Implement
Assess
Authorize
Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
• Criticality: A measure of the degree to which
an organization depends on the information
or information system for the success of a
mission or of a business function.
• Sensitivity: Used in this guideline to mean a
measure of the importance assigned to
information by its owner, for the purpose of
denoting its need for protection.
• - NIST SP 800-60
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
availability and integrity
confidentiality
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Data Type
Data
Description
Data Sensitivity
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Data Type Confidentiality Integrity Availability
Personal Identity and Authentication Moderate Moderate Moderate
Help Desk Services Low Low Low
Budget & Finance Moderate Moderate Low
Accounting Low Moderate Low
Space Operations Low High High
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Source: 45 C.F.R. Sec. 160.103
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
System Inventory Process
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
1
• Identify General Support Systems and Applications
• Identify Business Functions
• Identify automated information resources & categorize as GSS or application
2
• Classify GSS and applications
• Determine information sensitivity
• Determine mission criticality
3
• Determine what applications qualify as major applications
• Determine major applications support systems
• Non-major application become GSS
4
• Submit to CIO for review
• Business unit executive review
• Publish inventory
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
“The term ‘information system’ means a discrete set of
information resources organized for the collection, processing,
maintenance, transmission and dissemination of information in
accordance with defined procedures, whether automated or
manual.” OMB Circular A-130
General Support System
“An interconnected set of information resources under the same
direct management control that shares common functionality.
It normally includes hardware, software, information, data,
applications, communications, and people.” OMB Circular A-130
Major Application
“An application that requires special attention to security due to
the risk and magnitude of harm resulting from the loss, misuse,
or unauthorized access to or modification of the information in
the application.” OMB Circular A-130
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
NIST SP 800-100
“It is also possible for multiple information systems to be considered as
independent subsystems. A subsystem is a major subdivision of an information
system consisting of information, information technology, and personnel that
perform one or more specific functions.” - NIST SP 800-37 Rev 1
System 1
Subsystem A
Subsystem B
Subsystem C
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize

More Related Content

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
PPTX
RMF Roles and Responsibilities (Part 1)
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
RMF Roles and Responsibilities (Part 1)

What's hot (20)

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PPTX
INFOSECFORCE Risk Management Framework Transition Plan
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PPTX
Continuous Monitoring: Getting Past Complexity & Reducing Risk
PPTX
Achieving Continuous Monitoring with Security Automation
PPTX
Developing a Continuous Monitoring Action Plan
PDF
NIST cybersecurity framework
PDF
SuprTEK Continuous Monitoring
PDF
NIST SP 800 30 Flow Chart
PDF
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
PPTX
Nist 800 53 deep dive 20210813
PPTX
Logging, monitoring and auditing
PPT
It Audit Expectations High Detail
PPTX
NIST Risk Management Framework (RMF)
PPTX
General and Application Control - Security and Control Issues in Informatio...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Introduction to NIST’s Risk Management Framework (RMF)
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Guide for Applying The Risk Management Framework to Federal Information Systems
INFOSECFORCE Risk Management Framework Transition Plan
Information Security Continuous Monitoring within a Risk Management Framework
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Achieving Continuous Monitoring with Security Automation
Developing a Continuous Monitoring Action Plan
NIST cybersecurity framework
SuprTEK Continuous Monitoring
NIST SP 800 30 Flow Chart
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
Nist 800 53 deep dive 20210813
Logging, monitoring and auditing
It Audit Expectations High Detail
NIST Risk Management Framework (RMF)
General and Application Control - Security and Control Issues in Informatio...
Ad

Viewers also liked (16)

PDF
La educación 1812_lapepa
PDF
Sangita Sarkar
PPTX
AP Credentials Presentation DM
PPTX
Ketchupp 29th feb final
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 5: Planning
PPT
Sec 1 Exp - Erosion
DOCX
Trabajo 2
PDF
Puja Sarkar CV
PPTX
CAMBRIDGE AS GEOGRAPHY REVISION: POPULATION - 4.3 POPULATION RELATIONSHIP
PDF
Annual Maze Live Event 2016 – GASB Updates & Best Practices
PDF
Politicas del lenguaje Mexico Postrevolucionario
PPTX
The Constitution- Foundations of Education
PDF
Prezentarea ofertei de organizare a expoziției
PDF
Question 3.
PDF
Teorías Comunicación enfoques y perspectivas
PPTX
Teoria de la imagen 1 pensador
La educación 1812_lapepa
Sangita Sarkar
AP Credentials Presentation DM
Ketchupp 29th feb final
Understanding the Risk Management Framework & (ISC)2 CAP Module 5: Planning
Sec 1 Exp - Erosion
Trabajo 2
Puja Sarkar CV
CAMBRIDGE AS GEOGRAPHY REVISION: POPULATION - 4.3 POPULATION RELATIONSHIP
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Politicas del lenguaje Mexico Postrevolucionario
The Constitution- Foundations of Education
Prezentarea ofertei de organizare a expoziției
Question 3.
Teorías Comunicación enfoques y perspectivas
Teoria de la imagen 1 pensador
Ad

Similar to Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize (20)

PPTX
L3 RMF Phase 2 Categorize.pptx
PPSX
8 Access Control
PPT
SLVA - Security monitoring and reporting itweb workshop
PDF
CISSP -Access Control Domain knowlege.pdf
PDF
internet securityand cyber law Unit3 1
PPT
Information Security
PPSX
4 Operations Security
PPTX
Explain the IAR document and how it should be filled__YASHODA Hospital.pptx
PPTX
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
PDF
1 info sec+risk-mgmt
PPTX
Controls in Audit.pptx
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
PPTX
IEC62443.pptx
PPTX
Tyler Technology Expo
PPTX
Module 3_Lesson 7.pptx
PPTX
Data management
PDF
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
PDF
RSA-Pivotal Security Big Data Reference Architecture
 
L3 RMF Phase 2 Categorize.pptx
8 Access Control
SLVA - Security monitoring and reporting itweb workshop
CISSP -Access Control Domain knowlege.pdf
internet securityand cyber law Unit3 1
Information Security
4 Operations Security
Explain the IAR document and how it should be filled__YASHODA Hospital.pptx
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
1 info sec+risk-mgmt
Controls in Audit.pptx
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
IEC62443.pptx
Tyler Technology Expo
Module 3_Lesson 7.pptx
Data management
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
RSA-Pivotal Security Big Data Reference Architecture
 

More from Donald E. Hester (16)

PDF
Cybersecurity for Local Gov for SAMFOG
PDF
2017 IT Control Environment for Local Gov
PPTX
What you Need To Know About Ransomware
PDF
CNT 54 Administering Windows Client
PDF
2016 Maze Live Fraud Environment
PDF
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
PDF
2016 Maze Live Cyber-security for Local Governments
PDF
GASB 68 and 71 Planning for the Second Year
PDF
Implementing GASB 72: Fair Value Measurement and Application
PDF
2016 Maze Live 1 GASB update
PPTX
Cyber Security for Local Gov SAMFOG
PDF
Payment Card Cashiering for Local Governments 2016
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
PPTX
RMF Roles and Responsibilities (Part 2)
PPTX
Building and Maintaining a Successful RMF Program
Cybersecurity for Local Gov for SAMFOG
2017 IT Control Environment for Local Gov
What you Need To Know About Ransomware
CNT 54 Administering Windows Client
2016 Maze Live Fraud Environment
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Cyber-security for Local Governments
GASB 68 and 71 Planning for the Second Year
Implementing GASB 72: Fair Value Measurement and Application
2016 Maze Live 1 GASB update
Cyber Security for Local Gov SAMFOG
Payment Card Cashiering for Local Governments 2016
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
RMF Roles and Responsibilities (Part 2)
Building and Maintaining a Successful RMF Program

Recently uploaded (20)

PPTX
Proposed Odisha State Highways Authority OSHA Act 2025 Draft
PDF
ISO-9001-2015-internal-audit-checklist2-sample.pdf
PDF
PPT - Primary Rules of Interpretation (1).pdf
PPTX
Vocational Education for educational purposes
PDF
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
PDF
Item # 3 - 934 Patterson Final Review.pdf
PPTX
26.1.2025 venugopal K Awarded with commendation certificate.pptx
PPTX
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
DOCX
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
PPTX
DFARS Part 249 - Termination Of Contracts
PPT
generalgeologygroundwaterchapt11-181117073208.ppt
PDF
NDR Week Motorcade 2025 of Pasig City PDAO (Bambang PWD Association, Inc. Par...
PDF
Storytelling youth indigenous from Bolivia 2025.pdf
PDF
Strategic Planning 2025-2026 (Bambang PWD Association, Inc.)
PDF
PPT Item #s 2&3 - 934 Patterson SUP & Final Review
PDF
Strategic Planning for Child Rights and Protection Programming.pdf
PDF
ISO-9001-2015-gap-analysis-checklist-sample.pdf
PPTX
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
PDF
Item # 4 -- 328 Albany St. compt. review
PDF
Courtesy Meeting NIPA and MBS Australia.
Proposed Odisha State Highways Authority OSHA Act 2025 Draft
ISO-9001-2015-internal-audit-checklist2-sample.pdf
PPT - Primary Rules of Interpretation (1).pdf
Vocational Education for educational purposes
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
Item # 3 - 934 Patterson Final Review.pdf
26.1.2025 venugopal K Awarded with commendation certificate.pptx
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
DFARS Part 249 - Termination Of Contracts
generalgeologygroundwaterchapt11-181117073208.ppt
NDR Week Motorcade 2025 of Pasig City PDAO (Bambang PWD Association, Inc. Par...
Storytelling youth indigenous from Bolivia 2025.pdf
Strategic Planning 2025-2026 (Bambang PWD Association, Inc.)
PPT Item #s 2&3 - 934 Patterson SUP & Final Review
Strategic Planning for Child Rights and Protection Programming.pdf
ISO-9001-2015-gap-analysis-checklist-sample.pdf
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
Item # 4 -- 328 Albany St. compt. review
Courtesy Meeting NIPA and MBS Australia.

Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize

  • 14. • Criticality: A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function. • Sensitivity: Used in this guideline to mean a measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection. • - NIST SP 800-60
  • 33. Data Type Confidentiality Integrity Availability Personal Identity and Authentication Moderate Moderate Moderate Help Desk Services Low Low Low Budget & Finance Moderate Moderate Low Accounting Low Moderate Low Space Operations Low High High
  • 40. Source: 45 C.F.R. Sec. 160.103
  • 48. 1 • Identify General Support Systems and Applications • Identify Business Functions • Identify automated information resources & categorize as GSS or application 2 • Classify GSS and applications • Determine information sensitivity • Determine mission criticality 3 • Determine what applications qualify as major applications • Determine major applications support systems • Non-major application become GSS 4 • Submit to CIO for review • Business unit executive review • Publish inventory
  • 50. “The term ‘information system’ means a discrete set of information resources organized for the collection, processing, maintenance, transmission and dissemination of information in accordance with defined procedures, whether automated or manual.” OMB Circular A-130
  • 51. General Support System “An interconnected set of information resources under the same direct management control that shares common functionality. It normally includes hardware, software, information, data, applications, communications, and people.” OMB Circular A-130 Major Application “An application that requires special attention to security due to the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of the information in the application.” OMB Circular A-130
  • 59. NIST SP 800-100 “It is also possible for multiple information systems to be considered as independent subsystems. A subsystem is a major subdivision of an information system consisting of information, information technology, and personnel that perform one or more specific functions.” - NIST SP 800-37 Rev 1 System 1 Subsystem A Subsystem B Subsystem C