181k views
4 votes
The six-step _____ includes security categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring.

User Adam Szabo
by
7.6k points

1 Answer

5 votes

Final answer:

The six-step process mentioned is the Risk Management Framework (RMF), developed by NIST to improve the security posture of IT systems through a systematic process integrated into the system development life cycle.

Step-by-step explanation:

Six-Step Risk Management Framework (RMF)

The six-step process you are referring to is known as the Risk Management Framework (RMF), which is a set of criteria that dictates how United States government IT systems must be architected, secured, and monitored. The steps are:

  1. Security Categorization
  2. Security Control Selection
  3. Security Control Implementation
  4. Security Control Assessment
  5. Information System Authorization
  6. Security Control Monitoring

The RMF was developed by the National Institute of Standards and Technology (NIST) and is detailed in special publication 800-37. The goal of the RMF is to improve the security posture of IT systems by systematically applying a series of processes that integrate security considerations into the system development life cycle.

User Zelene
by
8.2k points