• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

DIARMF Authorization

January 16, 2014 by Bruce Brown 2 Comments

What is Step 5 – Authorization?

DIARMF Authorization
DIARMF Authorization

DIARMF Step 5 is similar to Phase 4 of DIACAP, Make Certification Determination & Authorization Decision.  In fact, the major difference between the two system in this part of the process are the names. DIARMF Step 5 Authorization is where the Authorizing Official Accept the residual risks of the systems.  The residual risks are the remaining risks that could not be fixed with security controls for one reason or another.  Perhaps the organization did not have enough money to implement a specific kind of web proxy or the physical location of a base at the foot of key terrain owned by a private civilian has made it so the vulnerability to the asset cannot be fully mitigated at this time.  The residual risks are addressed in the findings and recommendation are addressed in a Security Assessment Report (SAR).  The SAR highlights the residual risks and what can be done about them.  It is meant to give the decision makers some idea where the biggest risks are to the Asset.  In DIACAP, the equivalent would be the DIACAP Scorecard, similarly the SAR is supposed to give a quick assessment that will help decision maker and/or the Authorizing Official know what kind of risk he or she is expected to accept.   How the findings and recommendations will be handled and when are addressed in the Plan of Action and Milestone (POA&M).  These documents (SAR and POA&M) are the primary responsibility of Information System Owner or Common Control Provider, but supported by Information Owner/Steward and Information System Security Officer, meaning its DONE by the ISSO and delegated by the Information system Owner.   The POA&M addressed the problem, what tasks are needed get to a solution (if any), a date of completion with milestones on the way to accomplishing the solution and resources required.   References: OMB Memorandum 02-01; NIST Special Publications 800-30, 800-53A, 800-37. Authorization Decision and Authorization Package The Authorization Decision is based on supporting evidence that comes from content of the authorization package.  The Authorization package consists of the following:

• System Security plan – Provides a comprehensive view of all security controls and the overall security posture of the system (see NIST SP 800-18)

• Security Assessment Report – a report and addresses the residual risk, remaining weakness of the system.

• Plan of action and milestones – a breakdown of how and when the remaining vulnerabilities will be addressed.

Once the AO is ready to accept the risk, he or she must formally accept the risks of the system and grant it an Authorization to Operate in writing.

Filed Under: DIARMF, diarmf - authorize Tagged With: authorization, authorize, diarmf authorization

Reader Interactions

Trackbacks

  1. risk management framework steps says:
    January 19, 2014 at 6:13 pm

    […] More on DIARMF – Authorization […]

    Log in to Reply
  2. nist risk management framework 800-37 says:
    February 1, 2014 at 11:18 pm

    […] More on DIARMF – Authorization […]

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in