Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.
This publication replaces the traditional certification and accreditation process with the six-step risk management framework, including a process of assessment and authorization. According to the publication, effective risk management processes should
- (1) build information security capabilities into information systems through the application of management, operational, and technical security controls;
- (2) maintain awareness of the security state of information systems on an ongoing basis though enhanced monitoring processes; and
- (3) provide essential information to senior leaders to facilitate system authorization decisions regarding the acceptance of risk to organizational operations and assets, individuals, other organizations, and the nation arising from the operation and use of information systems.
- promote the concept of near real-time risk management and ongoing information system authorization through the implementation of robust continuous monitoring processes;
- encourage the use of automation to provide senior leaders the necessary information to make cost-effective, risk-based decisions with regard to the organizational information systems supporting their core missions and business functions;
- integrate information security into the enterprise architecture and system development life cycle;
- provide emphasis on the selection, implementation, assessment, and monitoring of security controls, and the authorization of information systems;
- link risk management processes at the information system level to risk management processes at the organization level through a risk executive (function); and
- establish responsibility and accountability for security controls deployed within organizational information systems and inherited by those systems (i.e., common controls).