O'Reilly logo

FISMA and the Risk Management Framework by Daniel R. Philpott, Stephen D. Gantz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Risk Management Framework Steps 1 & 2

Information in this chapter:

• Purpose and Objectives for Initial RMF Steps

• Standards and Guidance for Completing RMF Steps 1 & 2

• Tasks in RMF Step 1: Categorize Information System

• Tasks in RMF Step 2: Select Security Controls

Government regulations require all federal agencies to provide adequate security for all information collected, processed, transmitted, stored, or disseminated in federal information systems [1]. Because “adequate” means both risk based and cost effective, the level of security protection implemented for information systems varies across government organizations and, in some cases, within agencies as well. Despite the subjectivity of the adequate security requirement, FISMA ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required