§ Archive
Month

October 2023

SR

SR-9: Tamper Resistance and Detection

RMF Control SR-9: Tamper Resistance and Detection requires organizations to implement anti-tamper technologies and techniques to protect systems and system components from unauthorized modification or disruption. This is important for protecting information systems from unauthorized access and ensuring that systems are performing as expected. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework …

·
SI

SI-15: Information Output Filtering

RMF Control SI-15: Information Output Filtering requires organizations to validate information before it is output to users or systems. This is important for protecting information systems from unauthorized access and disclosure. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework that provides a process for managing cybersecurity risk to systems and organizations. RMF …

·
SC

SC-40: Wireless Link Protection

RMF Control SC-40: Wireless Link Protection requires organizations to protect external and internal wireless communication links that may be visible to individuals who are not authorized information system users. Adversaries can exploit the signal parameters of wireless links if such links are not adequately protected. There are many ways to exploit the signal parameters of …

·
SA

SA-10: Developer Configuration Management

RMF Control SA-10: Developer Configuration Management requires organizations to ensure that software and firmware components distributed to the organization are exactly as specified by the master copies. This is important for protecting information systems from unauthorized changes and ensuring that systems are performing as expected. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity …

·
RA

RA-4: Risk Assessment Update

RMF Control RA-4: Risk Assessment Update requires organizations to update their risk assessments on a regular basis to ensure that they are accurate and up-to-date. This is important because cybersecurity risks are constantly changing, and organizations need to be aware of the latest threats and vulnerabilities in order to protect their systems and data. Supplemental …

·
PT

PT-3: Personally Identifiable Information Processing Purposes

RMF Control PT-3: Personally Identifiable Information Processing Purposes requires organizations to identify and document the purpose(s) for processing personally identifiable information (PII), describe the purpose(s) in the public privacy notices and policies of the organization, restrict the processing of PII to only that which is compatible with the identified purpose(s), and monitor changes in processing …

·
PS

PS-6: Access Agreements

RMF Control PS-6: Access Agreements requires organizations to establish and implement access agreements for all individuals with access to information systems. Access agreements should specify the types of access that are authorized, the purposes for which access is granted, and the conditions that must be met in order to maintain access. Supplemental Guidance The Risk …

·
PM

PM-3: Information Security and Privacy Resources

RMF Control PM-3: Information Security and Privacy Resources requires organizations to ensure that all capital planning and investment requests include the resources needed to implement the information security and privacy programs, and documents all exceptions to this requirement. Organizations should also prepare documentation required for addressing information security and privacy programs in capital planning and …

·
PL

PL-6: Security-Related Activity Planning

RMF Control PL-6: Security-Related Activity Planning requires organizations to plan and coordinate security-related activities affecting information systems before conducting such activities in order to reduce the impact on organizational operations (i.e., mission, functions, image, and reputation), organizational assets, and individuals. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework that provides a process …

·
PE

PE-14: Environmental Controls

RMF Control PE-14: Environmental Controls requires organizations to implement controls to protect information systems from environmental hazards. Environmental hazards can include temperature, humidity, dust, power outages, and natural disasters. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework that provides a process for managing cybersecurity risk to systems and organizations. RMF Control PE-14: …

·