78.2k views
3 votes
How many different approaches are described by NIST SP 800-37 when planning for and conducting security authorizations?

User JLamkin
by
7.7k points

1 Answer

4 votes

Final answer:

NIST SP 800-37 describes the Risk Management Framework (RMF) which is a structured process for security authorizations, integrating security into the system development life cycle with six steps, emphasizing a continuous monitoring approach.

Step-by-step explanation:

The National Institute of Standards and Technology (NIST) Special Publication 800-37, 'Guide for Applying the Risk Management Framework to Federal Information Systems,' describes a process for planning and conducting security authorizations. Specifically, NIST SP 800-37 outlines the Risk Management Framework (RMF), which provides a disciplined and structured process that integrates information security and risk management activities into the system development life cycle. The RMF consists of six steps which include preparation; categorization of information systems; selection of security controls; implementation of controls; assessment of controls; authorization of the information system; and continuous monitoring of security controls.

The RMF approaches security from a comprehensive viewpoint, embedding it throughout the lifecycle of the system, from design and procurement to decommissioning. Moreover, it emphasizes the importance of continuous monitoring for maintaining an acceptable security posture and for updating the risk assessment and security controls as the system, threats, and technologies evolve.

User Isubuz
by
7.8k points