SlideShare a Scribd company logo
1 of 7
Phase 6: Authorize
AUTHORIZE TASKS
AUTHORIZATION PACKAGE
Task R-1: Assemble the authorization package and submit the package to the
authorizing official for an authorization decision.
โ—ฆ Potential Inputs: Security and privacy plans; security and privacy assessment reports; plan of action and
milestones; supporting assessment evidence or other documentation, as required.
โ—ฆ Expected Outputs: Authorization package (with an executive summary), which may be generated from a
security or privacy management tool94 for submission to the authorizing official.
Discussion
โ—ฆ Package
โ—ฆ SSP
โ—ฆ Assessment
โ—ฆ POAMs
โ—ฆ Executive Summary
RISK ANALYSIS AND DETERMINATION
Task R-2: Analyze and determine the risk from the operation or use of the system or the provision of
common controls.
โ—ฆ Potential Inputs: Authorization package; supporting assessment evidence or other documentation as
required; information provided by the senior accountable official for risk management or risk executive
(function); organizational risk management strategy and risk tolerance; organization- and system-level
risk assessment results.
โ—ฆ Expected Outputs: Risk determination.
Discussion
โ—ฆ Determination of Risk
โ—ฆ Risk Tolerance
โ—ฆ Control Providers
RISK RESPONSE
Task R-3: Identify and implement a preferred course of action in response to the
risk determined.
โ—ฆ Potential Inputs: Authorization package; risk determination; organization- and system-level risk
assessment results.
โ—ฆ Expected Outputs: Risk responses for determined risks.
Discussion
โ—ฆ Risk Assessment Report (RAR)
โ—ฆ Response
โ—ฆ Critical/Non-Critical
โ—ฆ Do not Change
AUTHORIZATION DECISION
Task R-4: Determine if the risk from the operation or use of the information
system or the provision or use of common controls is acceptable.
โ—ฆ Potential Inputs: Risk responses for determined risks.
โ—ฆ Expected Outputs: Authorization to operate, authorization to use, common control authorization;
denial of authorization to operate, denial of authorization to use, denial of common control
authorization.
Discussion
โ—ฆ AO โ€“ Acceptance (only)
โ—ฆ Authorization
AUTHORIZATION REPORTING
Task R-5: Report the authorization decision and any deficiencies in controls that
represent significant security or privacy risk.
โ—ฆ Potential Inputs: Authorization decision.
โ—ฆ Expected Outputs: A report indicating the authorization decision for a system or set of common
controls; annotation of authorization status in the organizational system registry.
Discussion
โ—ฆ Component Reports to OMB

More Related Content

Similar to L7 RMF Phase 6 Authorize.pptx

Fussell.louis
Fussell.louisFussell.louis
Fussell.louis
NASAPMC
ย 
Domain management methdology
Domain management methdologyDomain management methdology
Domain management methdology
Rob Mattison
ย 
Risk minor major critical
Risk minor major criticalRisk minor major critical
Risk minor major critical
yasser mekky
ย 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
ย 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
George Delikouras
ย 
L5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptxL5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptx
StevenTharp2
ย 

Similar to L7 RMF Phase 6 Authorize.pptx (20)

Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
ย 
Fussell.louis
Fussell.louisFussell.louis
Fussell.louis
ย 
Domain management methdology
Domain management methdologyDomain management methdology
Domain management methdology
ย 
Fisma FedRAMP Drupal
Fisma FedRAMP DrupalFisma FedRAMP Drupal
Fisma FedRAMP Drupal
ย 
Risk minor major critical
Risk minor major criticalRisk minor major critical
Risk minor major critical
ย 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Process
ย 
Risk Presentation
Risk PresentationRisk Presentation
Risk Presentation
ย 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
ย 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
ย 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ย 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
ย 
L5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptxL5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptx
ย 
Monitoring
MonitoringMonitoring
Monitoring
ย 
Risk management in pharmaceutical Industry
Risk management in pharmaceutical IndustryRisk management in pharmaceutical Industry
Risk management in pharmaceutical Industry
ย 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
ย 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
ย 
ch14.ppt
ch14.pptch14.ppt
ch14.ppt
ย 
Lesson 3
Lesson 3Lesson 3
Lesson 3
ย 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
ย 
Hazop analysis complete report
Hazop analysis complete reportHazop analysis complete report
Hazop analysis complete report
ย 

Recently uploaded

VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
SUHANI PANDEY
ย 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 

Recently uploaded (20)

1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
ย 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
ย 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'IsraรซlAntisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
Antisemitism Awareness Act: pรฉnaliser la critique de l'Etat d'Israรซl
ย 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
ย 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
ย 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
ย 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
ย 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
ย 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
ย 
Top Rated Pune Call Girls Hadapsar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Se...
ย 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
ย 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
ย 
Top Rated Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Ser...
ย 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
ย 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
ย 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
ย 

L7 RMF Phase 6 Authorize.pptx

  • 3. AUTHORIZATION PACKAGE Task R-1: Assemble the authorization package and submit the package to the authorizing official for an authorization decision. โ—ฆ Potential Inputs: Security and privacy plans; security and privacy assessment reports; plan of action and milestones; supporting assessment evidence or other documentation, as required. โ—ฆ Expected Outputs: Authorization package (with an executive summary), which may be generated from a security or privacy management tool94 for submission to the authorizing official. Discussion โ—ฆ Package โ—ฆ SSP โ—ฆ Assessment โ—ฆ POAMs โ—ฆ Executive Summary
  • 4. RISK ANALYSIS AND DETERMINATION Task R-2: Analyze and determine the risk from the operation or use of the system or the provision of common controls. โ—ฆ Potential Inputs: Authorization package; supporting assessment evidence or other documentation as required; information provided by the senior accountable official for risk management or risk executive (function); organizational risk management strategy and risk tolerance; organization- and system-level risk assessment results. โ—ฆ Expected Outputs: Risk determination. Discussion โ—ฆ Determination of Risk โ—ฆ Risk Tolerance โ—ฆ Control Providers
  • 5. RISK RESPONSE Task R-3: Identify and implement a preferred course of action in response to the risk determined. โ—ฆ Potential Inputs: Authorization package; risk determination; organization- and system-level risk assessment results. โ—ฆ Expected Outputs: Risk responses for determined risks. Discussion โ—ฆ Risk Assessment Report (RAR) โ—ฆ Response โ—ฆ Critical/Non-Critical โ—ฆ Do not Change
  • 6. AUTHORIZATION DECISION Task R-4: Determine if the risk from the operation or use of the information system or the provision or use of common controls is acceptable. โ—ฆ Potential Inputs: Risk responses for determined risks. โ—ฆ Expected Outputs: Authorization to operate, authorization to use, common control authorization; denial of authorization to operate, denial of authorization to use, denial of common control authorization. Discussion โ—ฆ AO โ€“ Acceptance (only) โ—ฆ Authorization
  • 7. AUTHORIZATION REPORTING Task R-5: Report the authorization decision and any deficiencies in controls that represent significant security or privacy risk. โ—ฆ Potential Inputs: Authorization decision. โ—ฆ Expected Outputs: A report indicating the authorization decision for a system or set of common controls; annotation of authorization status in the organizational system registry. Discussion โ—ฆ Component Reports to OMB