Rmf Steps And Tasks
55 community-sourced questions and answers. Free — no login.
Prepare Tasks (Organization Level)
P-1: Risk Management Roles P-2: Risk Management Strategy P-3: Risk Assessment - Organization P-4: Organizationally-Tailored Control Baselines and Cybersecurity Framework Profiles (Optional) P-5: Common Control Identification P-6: Impact-Level Prioritization (Optional) P-7: Continuous Monitoring Strategy - Organization
Prepare Tasks (System Level)
P-8: Mission or Business Focus P-9: System Stakeholders P-10: Asset Identification P-11: Authorization Boundary P-12: Information Types P-13: Information Life Cycle P-14: Risk Assessment - System P-15: Requirements Definition P-16: Enterprise Architecture P-17: Requirements Allocation P-18: System Registration
Categorize Tasks
C-1: System Description C-2: Security Categorization C-3: Security Categorization Review and Approval
Select Tasks
S-1: Control Selection S-2: Control Tailoring S-3: Control Allocation S-4: Documentation of Planned Control Implementations S-5: Continuous Monitoring Strategy - System S-6: Plan Review and Approval
Implement Tasks
I-1: Control Implementation I-2: Update Control Implementation Information
Assess Tasks
A-1: Assessor Selection A-2: Assessment Plan A-3: Control Assessments A-4: Assessment Reports A-5: Remediation Actions A-6: Plan of Action and Milestones
Authorize Tasks
R-1: Authorization Package R-2: Risk Analysis and Determination R-3: Risk Response R-4: Authorization Decision R-5: Authorization Reporting
Monitor Tasks
M-1: System and Environment Changes M-2: Ongoing Assessments M-3: Ongoing Risk Response M-4: Authorization Package Updates M-5: Security and Privacy Reporting M-6: Ongoing Authorization M-7: System Disposal
Task P-1: Risk Management Roles Outcomes
Individuals are identified and assigned key roles for executing the Risk Management Framework.
Task P-2: Risk Management Strategy Outcomes
A risk management strategy for the organization that includes a determination and expression of organizational risk tolerance is established.
Task P-3: Risk Assessment - Organization Outcomes
An organization-wide risk assessment is completed or an existing risk assessment is updated.
Task P-4: Organizationally-Tailored Control Baselines and Cybersecurity Framework Profiles (Optional) Outcomes
Organizationally-tailored control baselines and/or Cybersecurity Framework Profiles are established and made available.
Task P-5: Common Control Identification Outcomes
Common controls that are available for inheritance by organizational systems are identified, documented, and published.
Task P-6: Impact-Level Prioritization (Optional) Outcomes
A prioritization of organizational systems with the same impact level is conducted.
Task P-7: Continuous Monitoring Strategy - Organization Outcomes
An organization-wide strategy for monitoring control effectiveness is developed and implemented.
Task P-8: Mission or Business Focus Outcomes
Missions, business functions, and mission/business processes that the system is intended to support are identified.
Task P-9: System Stakeholders Outcomes
The stakeholders having an interest in the system are identified.
Task P-10: Asset Identification Outcomes
Stakeholder assets are identified and prioritized.
Task P-11: Authorization Boundary Outcomes
The authorization boundary (i.e., system) is determined.
Task P-12: Information Types Outcomes
The types of information processed, stored, and transmitted by the system are identified.
Task P-13: Information Life Cycle Outcomes
All stages of the information life cycle are identified and understood for each information type processed, stored, or transmitted by the system.
Task P-14: Risk Assessment - System Outcomes
A system-level risk assessment is completed or an existing risk assessment is updated.
Task P-15: Requirements Definition Outcomes
Security and privacy requirements are defined and prioritized.
Task P-16: Enterprise Architecture Outcomes
The placement of the system within the enterprise architecture is determined.
Task P-17: Requirements Allocation Outcomes
Security and privacy requirements are allocated to the system and to the environment in which the system operates.
Task P-18: System Registration Outcomes
The system is registered for purposes of management, accountability, coordination, and oversight.
Task C-1: System Description Outcomes
The characteristics of the system are described and documented.
Task C-2: Security Categorization Outcomes
- A security categorization of the system, including the information processed by the system represented by the organization-identified information types, is completed. - Security categorization results are documented in the security, privacy, and SCRM plans. - Security categorization results are consistent with the enterprise architecture and commitment to protecting the organizational missions, business functions, and mission/business processes. - Security categorization results reflect the organization's risk management strategy.
Task C-3: Security Categorization Review and Approval Outcomes
The security categorization results are reviewed and the categorization decision is approved by senior leaders in the organization.
Task S-1: Control Selection Outcomes
Control baselines necessary to protect the system commensurate with risk are selected.
Task S-2: Control Tailoring Outcomes
Controls are tailored producing tailored control baselines.
Task S-3: Control Allocation Outcomes
- Controls are designated as system-specific, hybrid, or common controls. - Controls are allocated to the specific system elements (i.e., machine, physical, or human elements).
Task S-4: Documentation of Planned Control Implementations Outcomes
Controls and associated tailoring actions are documented in security and privacy plans or equivalent documents.
Task S-5: Continuous Monitoring Strategy-System Outcomes
A continuous monitoring strategy for the system that reflects the organizational risk management strategy is developed.
Task S-6: Plan Review and Approval Outcomes
Security and privacy plans reflecting the selection of controls necessary to protect the system and the environment of operation commensurate with risk are reviewed and approved by the authorizing official.
Task I-1: Control Implementation Outcomes
- Controls specified in the security and privacy plans are implemented. - Systems security and privacy engineering methodologies are used to implement the controls in the system security and privacy plans.
Task I-2: Update Control Implementation Information Outcomes
- Changes to the planned implementation of controls are documented. - The security and privacy plans are updated based on information obtained during the implementation of the controls.
Task A-1: Assessor Selection Outcomes
- An assessor or assessment team is selected to conduct the control assessments. - The appropriate level of independence is achieved for the assessor or assessment team selected.
Task A-2: Assessment Plan Outcomes
- Documentation needed to conduct the assessments is provided to the assessor or assessment team. - Security and privacy assessment plans are developed and documented. - Security and privacy assessment plans are reviewed and approved to establish the expectations for the control assessments and the level of effort required.
Task A-3: Control Assessments Outcomes
- Control assessments are conducted in accordance with the security and privacy assessment plans - Opportunities to reuse assessment results from previous assessments to make the risk management process timely and cost-effective are considered. - Use of automation to conduct control assessments is maximized to increase speed, effectiveness, and efficiency of assessments.
Task A-4: Assessment Reports Outcomes
Security and privacy assessment reports that provide findings and recommendations are completed.
Task A-5: Remediation Actions Outcomes
- Remediation actions to address deficiencies in the controls implemented in the system and environment of operation are taken. - Security and privacy plans are updated to reflect control implementation changes made based on the assessments and subsequent remediation actions.
Task A-6: Plan of Action and Milestones Outcomes
A plan of action and milestones detailing remediation plans for unacceptable risks identified in security and privacy assessment reports is developed.
Task R-1: Authorization Package Outcomes
An authorizing package is developed for submission to the authorizing official.
Task R-2: Risk Analysis and Determination Outcomes
A risk determination by the authorizing official that reflects the risk management strategy including risk tolerance, is rendered.
Task R-3: Risk Response Outcomes
Risk responses for determined risks are provided.
Task R-4: Authorization Decision Outcomes
The authorization for the system or the common controls is approved or denied.
Task R-5: Authorization Reporting Outcomes
Authorization decisions, significant vulnerabilities, and risks are reported to organizational officials.
Task M-1: System and Environment Changes Outcomes
The information system and environment of operation are monitored in accordance with the continuous monitoring strategy.
Task M-2: Ongoing Assessments Outcomes
Ongoing assessments of control effectiveness are conducted in accordance with the continuous monitoring strategy.
Task M-3: Ongoing Risk Response Outcomes
The output of continuous monitoring activities is analyzed and responded to appropriately.
Task M-4: Authorization Package Updates Outcomes
Risk management documents are updated based on continuous monitoring activities.
Task M-5: Security and Privacy Reporting Outcomes
A process is in place to report the security and privacy posture to the authorizing official and other senior leaders and executives.
Task M-6: Ongoing Authorization Outcomes
Authorizing officials conduct ongoing authorizations using the results of continuous monitoring activities and communicate changes in risk determination and acceptance decisions.
Task M-7: System Disposal Outcomes
A system disposal strategy is developed and implemented, as needed.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials