Sctm Rmf
55 community-sourced questions and answers. Free — no login.
What is the definition of JSIG?
Joint SAP implementation Guide
What is the NIST Special Publications 800-53?
Supplemental guidance to JSIG
What is the NIST Special Publications 800-53-A?
Guide for assessing security controls
What is CNSSI 1253?
Security Categorization and Control Selection for National Security Systems
What is the definition of RMF?
Risk Management Framework
JSIG term for Certification and Accreditation?
RMF Assessment and Authorization
JSIG term for Accreditation?
Authorization
JSIG term for Requirements?
Controls
What are the three JSIG levels of Accessibility (Protection Levels)?
Baseline Baseline +Accessibility Overlay Baseline + CDS Overlay
What is the JSIG term for Level of Concerns?
Impact Levels
What does SCTM stand for?
Security Controls Traceability Matrix
What is the JSIG term that replaced the Certification Test & Evaluation, and Security Test & Evaluation Report?
Security Assessment Report (SAR)
What is the JSIG term for Designated Accrediting Authority?
Authorizing Official (AO)
Who can the Authorizing Official (AO) delegate to?
Delegated Authorizing Official (DAO)
JSIG term for Information Assurance Manager (IAM)?
Information Systems Security Manager (ISSM)
JSIG term for Information Assurance Officer (IAO)?
Information System Security Officer (ISSO)
JSIG term for Program Manager?
Information System Owner (ISO)
JSIG term for Master System Security Plan?
Information Assurance Standard Operating Procedures (IA SOP)
JSIG term for guest system?
External Information System
What is the definition of ATO?
Approval to Operate
What is the JSIG term for (IATO)?
Authorization to Operate (ATO) with a Plan of Actions and Milestone (POA&M)
Who are the RMF Decision Authorities?
Element Head (SAPCO) Authorizing Official (AO) Delegated Authorizing Official (DAO)
Who are the RMF Assessors and Owners?
Security Control Assessor (SCA) Information Owner/Steward (IO)
Who are the RMF Implementers?
Information System Owner (ISO) Information Systems Security Officer/Manager
What is the role of the Element Head (SAPCO)?
• Bears ultimate responsibility for mission accomplishment and execution of business functions and all decisions made on his/her behalf • Responsible for adequately mitigating risks to the organization, individuals, and the Nation • Designates an Authorizing Official to make authorization decisions on behalf of Element Head (DoDM 5205.07 v1)
What is the role of the Authorizing Official (AO)?
• Shall have a broad and strategic understanding of the SAP Community, his/her organization, and its place/role in the overall SAP Community • Accountable to the Element Head for system authorization and associated risk management decision • Authority to formally assume responsibility for operating an information system at an acceptable level of risk
What is the role of the Delegated Authorizing Official (DAO)?
• Acts on behalf of the authorizing official • Carries out and coordinates the required activities associated with security authorization (DoDM 5205.07, JSIG) • Cannot authorize "HIGH" Impact Level systems
What is the role of the Security Control Assessor (SCA)?
• Designated by the Authorizing Official • Responsible for performing the comprehensive evaluation of the security features of an information system • Responsible for determining the degree to which it meets its security requirements (NIST SP 800-37)
What is the role of the Information Owner/Steward (IO)?
• Has statutory or operational authority for specified information and responsibility for establishing controls for its generation, classification, collection, processing, dissemination, and disposal • Typically, in the case of Stewards of classified information, this role is also the appointed Original Classification Authority (OCA) for that particular information
What is the role of the Information System Owner (ISO)?
• Responsible for overall procurement, development, integration, modification, or operation and maintenance of an IS • Responsible for the development and maintenance of the security plan and ensures that the system is deployed and operated in accordance with the agreed-upon security controls • Appoints the program ISSM/ISSO and ISSE • ISSM/ISSO and ISSE may be the same person
What is the role of the Information Systems Security Officer/Manager (ISSO/ISSM)?
• Responsible for the day-to-day security posture and continuous monitoring for a system • Responsible for the overall information assurance of a program, organization, system, or enclave
What is the Pre-RMF process?
Develop a Risk Assessment Report (RAR) specific to the Information System: • Identify and prioritize risks that inform risk response decisions • Identify asset(s) • Identity threats • Identify vulnerabilities & predisposing conditions • Determine the likelihoods • Identify Impacts • Determine risks & uncertainties • Communicate the results
How many RMF steps are there?
6
What are the six RMF steps?
RMF Step 1: Categorization of the System RMF Step 2: Selecting Security Controls RMF Step 3: Implementing Security Controls RMF Step 4: Assessing Security Controls RMF Step 5: Authorizing Systems RMF Step 6: Monitor Security Controls
How many control families are there?
18
What are the 18 control families?
AC - Access Control AT - Awareness and Training AU - Audit and Accountability CA - Security Assessment and Authorization CM - Configuration Management CP - Contingency Planning IA - Identification and Authentication IR - Incident Response MA - Maintenance MP - Media Protection PE - Physical and Environmental Protection PL - Planning PM - Program Management PS - Person Security RA - Risk Assessment SA - System and Services Acquisition SC - System and Communications Protection SI - System and Information Integrity
Who is responsible for Steps 1-3 of the RMF process (Categorize, Select, Implement)?
ISSO/ISSM
Who is responsible for Step 4 of the RMF process (Assess)?
Security Control Assessor (SCA)
Who is responsible for Step 5 of the RMF process (Authorize)?
AO/DAO
Who is responsible for Step 6 of the RMF process (Monitor)?
ISSO/ISSM
What is the definition of Continuous Monitoring (CONMON)?
Process to ensure ongoing awareness of information security, vulnerabilities, and threats to facilitate risk-based decision making.
What are the three methods of monitoring?
Examine Interview Test
What are the three Authorization Decisions that can be made on an RMF package?
Authorization to Operate Interim Authority to Test Denial of ATO
What are the key artifacts for the RMF Submission Package?
SSP (includes the RAR, SCTM, & CONMON Plan) SAR POA&M
What are the three impact ratings?
Three Impact Ratings Low Moderate High
What are the three impact levels?
Confidentiality (C) Integrity (I) Availability (A)
What is the selection of the (5) Security Controls?
• Common • Baseline • Overlays • Tailor controls • Supplement
What are Common Controls?
A security control that is inherited by one or more organizational information system
What are Compensating Security Controls?
Management, operational, and technical controls implemented by an organization in lieu of recommended controls in the baseline list of controls
Continuous Monitoring (ConMon) Plan
Provides the strategy to routinely evaluate selected IA controls/metrics. Reference NIST SP 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
Overlay
A specification of security controls, control enhancements, supplemental guidance, and other supporting information employed during the tailoring process, that is intended to complement (and further refine) security control baselines.
Plan of Actions and Milestones (POA&M)
Defines plans of action and milestones related to correcting weaknesses or deficiencies, as well as reducing or eliminating known vulnerabilities and identifies completion dates.
Risk Assessment Report (RAR)
Defines the organizationally established level of acceptable risk associated with the operation of an IT system at a specific level; identifies risks; and provides an assessed residual-risk-level for the system
Security Assessment Report (SAR)
Contains security control assessment results and recommended corrective actions for security-control weaknesses and deficiencies
System Security Plan (SSP)/Security Control Traceability Matrix (SCTM)
Provides an overview of security requirements, description of agreed-upon controls and other supporting security-related information
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials