Bash, the Crucial Exams Chat Bot
AI Bot

Risk Management Framework (ISC2 CGRC)  Flashcards

ISC2 Governance, Risk and Compliance (CGRC) Flashcards

FrontBack
How often should security controls be assessed for effectivenessRegularly and as part of the continuous monitoring process
What activities are included in continuous monitoringOngoing assessments, vulnerability scanning, and incident tracking
What category under NIST 800-53 emphasizes privacy controlsPrivacy controls are addressed in Appendix J
What document defines roles and responsibilities for RMF participantsNIST Special Publication 800-37
What does FIPS 199 provideStandards for security categorization of federal information and information systems
What framework is typically used to select security controlsNIST Special Publication 800-53
What is a common type of risk assessment methodologyNIST Special Publication 800-30
What is a Security Control BaselineA predefined set of controls for systems with a particular impact level
What is POAM in the context of RMFPlan of Actions and Milestones, used to track remediation efforts
What is the fifth step in the RMF processAuthorize the System
What is the first step in the RMF processCategorize the Information System
What is the fourth step in the RMF processAssess Security Controls
What is the goal of continuous monitoringTo maintain an up-to-date security posture and address new risks as they arise
What is the main focus of Step 1 (Categorization)Identifying system characteristics and potential impacts of risks
What is the primary objective of the Risk Management FrameworkA structured approach to manage security and privacy risks in organizational systems
What is the primary purpose of an Authorization to Operate (ATO)To formally accept risk and allow system operation
What is the purpose of assessing security controlsTo verify that the controls have been implemented correctly, operate as intended, and meet security requirements
What is the purpose of categorizing an information systemTo determine the level of impact a potential security breach would have on the organization
What is the role of a Security CategorizationIdentifies impact levels for confidentiality, integrity, and availability
What is the role of the Information System Owner (ISO) in RMFOversees the system's overall security posture
What is the second step in the RMF processSelect Security Controls
What is the sixth step in the RMF processMonitor Security Controls
What is the third step in the RMF processImplement Security Controls
What is typically created to document the implementation of security controlsSystem Security Plan (SSP)
What NIST guideline aids in the selection of security controlsNIST Special Publication 800-53
What NIST publication outlines the RMF processNIST Special Publication 800-37
What principle emphasizes integrating RMF tasks into the system development lifecycleEarly and ongoing integration
What publication provides guidelines for categorizing information and systemsNIST Special Publication 800-60
What step involves reviewing the system's security and privacy documentationAssess Security Controls
What type of threat data informs the RMF processThreat intelligence and risk assessments
Who typically grants the Authority to Operate (ATO)Authorizing Official (AO)
This deck covers the steps and core principles of the RMF, focusing on each phase from categorization to monitoring, as defined in NIST guidelines.
Share on...
Follow us on...