SlideShare a Scribd company logo
Phase 5: Assess
Assess Tasks
ASSESSOR SELECTION
• Task A-1: Select the appropriate assessor or assessment team for the type of control assessment
to be conducted.
• Potential Inputs: Security, privacy, and SCRM plans; program management control information; common control
documentation; organizational security and privacy program plans; SCRM strategy; system design documentation; enterprise,
security, and privacy architecture information; security, privacy, and SCRM policies and procedures applicable to the system.
• Expected Outputs: Selection of assessor or assessment team responsible for conducting the control assessment.
• Discussion
• Assessor Selection – CISO
• Audits
• Self-Assessment
• Control Effectiveness
ASSESSMENT PLAN
• Task A-2: Develop, review, and approve plans to assess implemented controls.
• Potential Inputs: Security, privacy, and SCRM plans; program management control information;
common control documentation; organizational security and privacy program plans; SCRM strategy;
system design documentation; supply chain information; enterprise, security, and privacy architecture
information; security, privacy, and SCRM policies and procedures applicable to the system.
• Expected Outputs: Security and privacy assessment plans approved by the authorizing official.
• Discussion
• Assessment Plan Development
• When, What, Where and How
• Rules of Engagement – POCs; Tools Techniques; Approvals
• Scope
ASSESSMENT PLAN
• Assessment Plan provides objectives
• Two purposes
• Establishes expectations
• Binds the Assessor to a predetermined level of effort
• Types ofAssessments
• DevelopmentalTest and Evaluation
• IV&V
• Assessments supporting authorization or reauthorization; the continuous monitoring
assessment; and remediation, or regression, assessments.
CONTROL ASSESSMENTS
• Task A-3: Assess the controls in accordance with the assessment procedures
described in assessment plans.
• Potential Inputs: Security and privacy assessment plans; security and privacy plans; external
assessment or audit results (if applicable).
• Expected Outputs: Completed control assessments and associated assessment evidence.
• Discussion
• SDLC (Early – Development Phase)
• Cost
• Common Controls (Inherited)
CONTROL ASSESSMENTS
• Tools
• Manual
• Steps taken
• Automated
• Document the settings
• Types of Tests
• The examine method is the process of reviewing, inspecting, observing, studying, or analyzing
one or more assessment objects (i.e., specifications, mechanisms, or activities). The purpose of
the examine method is to facilitate assessor understanding, achieve clarification, or obtain
evidence.
• The interview method is the process of holding discussions with individuals or groups of
individuals within an organization to once again, facilitate assessor understanding, achieve
clarification, or obtain evidence.
• The test method is the process of exercising one or more assessment objects (i.e., activities or
mechanisms) under specified conditions to compare actual with expected behavior
CONTROL ASSESSMENTS
• Example AC-3(6), Access
• Enforcement, which is listed in SP 800-53A, is quoted here:
• ASSESSMENT OBJECTIVE: Determine if:
• (i) the organization defines the user and/or system information to be encrypted or stored offline in a
secure location; and
• (ii) the organization encrypts, or stores off-line in a secure location, organization-defined user and/or
system information.
• Potential assessment methods and objects:
• Examine: [SELECT FROM: Access control policy; procedures addressing access enforcement; information
system design documentation; information system configuration settings and associated documentation;
information system audit records; other relevant documents or records].
• Interview: [SELECT FROM: Organizational personnel with access enforcement responsibilities].
• Test: [SELECT FROM: Automated mechanisms implementing access enforcement functions].
CONTROL ASSESSMENTS
• Input: Test Plan
• Test Leader/Director
• Responsible for the SAR
• Freeze the System
• Look at Annual Assessments
• Incremental Assessments during the SDLC
• SSP Review from Phase 2
CONTROL ASSESSMENTS
• Requirements
• Required Access
• Documentation
• POCs for interviews
ASSESSMENT REPORTS
• Task A-4: Prepare the assessment reports documenting the findings and recommendations
from the control assessments.
• Potential Inputs: Completed control assessments and associated assessment evidence.
• Expected Outputs: Completed security and privacy assessment reports detailing the assessor findings and
recommendations.
• Discussion
• Assessment Report (Findings)
• SAR
• Documents the results of the testing
• Bring forward previous assessments
REMEDIATION ACTIONS
• Task A – 5: Conduct initial remediation actions on the controls and reassess remediated
controls.
• Potential Inputs: Completed security and privacy assessment reports with findings and recommendations; security
and privacy plans; security and privacy assessment plans; organization- and system-level risk assessment results.
• Expected Outputs: Completed initial remediation actions based on the security and privacy assessment reports;
changes to implementations reassessed by the assessment team; updated security and privacy assessment reports;
updated security and privacy plans including changes to the control implementations.
• Discussion
• During Development/Post-Development
• Meeting on Findings
REMEDIATION ACTIONS
• System Owner
• Reviews the findings
• False Positives
• ISSO assists in this process
• Meeting
• Assessor
• SO and ISSO
• Determines applicable findings
• Unacceptable Risk – Fix Now
• Addendum
PLAN OF ACTION AND MILESTONES
• Task A-6: Prepare the plan of action and milestones based on the findings and
recommendations of the assessment reports.
• Potential Inputs: Updated security and privacy assessment reports; updated security and privacy plans; organization-
and system-level risk assessment results; organizational risk management strategy and risk tolerance.
• Expected Outputs: A plan of action and milestones detailing the findings from the security and privacy assessment
reports that are to be remediated.
• Discussion
• Correct the deficiencies
• Residual Risk
• Process to fix

More Related Content

Similar to L6 RMF Phase 5 Assess.pptx

Test Management.pptx
Test Management.pptxTest Management.pptx
Test Management.pptx
MAshok10
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
dotco
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
Hafiz Sheikh Adnan Ahmed
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
SOFTWARE MAINTAINANCE AND ITS KEY ASPECTS .pptx
SOFTWARE MAINTAINANCE AND ITS KEY ASPECTS  .pptxSOFTWARE MAINTAINANCE AND ITS KEY ASPECTS  .pptx
SOFTWARE MAINTAINANCE AND ITS KEY ASPECTS .pptx
SONUKUMAR213838
 
Policy, Process, Procedure, Guidelines
Policy, Process, Procedure, GuidelinesPolicy, Process, Procedure, Guidelines
Fundamentals of Auditing PTC
Fundamentals of Auditing PTCFundamentals of Auditing PTC
Fundamentals of Auditing PTCcarroll sams
 
Fundamentaltestprocess windirohmaheny11453205427 kelase
Fundamentaltestprocess windirohmaheny11453205427 kelaseFundamentaltestprocess windirohmaheny11453205427 kelase
Fundamentaltestprocess windirohmaheny11453205427 kelase
windi rohmaheny
 
Internal_Audit_Presentation.pptx
Internal_Audit_Presentation.pptxInternal_Audit_Presentation.pptx
Internal_Audit_Presentation.pptx
kamallochanpalei
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
Karthikeyan Dhayalan
 
Audit procedure and standard 500
Audit procedure and standard 500Audit procedure and standard 500
Audit procedure and standard 500
HarisShahid13
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Sam Bowne
 
Auditing Principles
Auditing PrinciplesAuditing Principles
Auditing Principles
RASHID MAHMOOD
 
Webinar-ISO-9001-Back-to-Basics-Internal-Auditing
Webinar-ISO-9001-Back-to-Basics-Internal-AuditingWebinar-ISO-9001-Back-to-Basics-Internal-Auditing
Webinar-ISO-9001-Back-to-Basics-Internal-Auditing
mufajzaposh
 
Internal Audit Training with different .pptx
Internal Audit Training with different .pptxInternal Audit Training with different .pptx
Internal Audit Training with different .pptx
BonAlexisGuatato
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
RajanVerma67117
 
Software development o & c
Software development o & cSoftware development o & c
Software development o & c
Amit Patil
 
mod 4.pdf ppt about the safety at industries
mod 4.pdf ppt about the safety at industriesmod 4.pdf ppt about the safety at industries
mod 4.pdf ppt about the safety at industries
Midhundas31
 
Preparing for validity audits
Preparing for validity auditsPreparing for validity audits
Preparing for validity audits
Ofqual Slideshare
 
ASQ CQA Part 1: Auditing Fundamentals
ASQ CQA Part 1: Auditing FundamentalsASQ CQA Part 1: Auditing Fundamentals
ASQ CQA Part 1: Auditing Fundamentals
Seetharam Kandarpa ASQ CMQ/OE, CPGP, CQA
 

Similar to L6 RMF Phase 5 Assess.pptx (20)

Test Management.pptx
Test Management.pptxTest Management.pptx
Test Management.pptx
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
SOFTWARE MAINTAINANCE AND ITS KEY ASPECTS .pptx
SOFTWARE MAINTAINANCE AND ITS KEY ASPECTS  .pptxSOFTWARE MAINTAINANCE AND ITS KEY ASPECTS  .pptx
SOFTWARE MAINTAINANCE AND ITS KEY ASPECTS .pptx
 
Policy, Process, Procedure, Guidelines
Policy, Process, Procedure, GuidelinesPolicy, Process, Procedure, Guidelines
Policy, Process, Procedure, Guidelines
 
Fundamentals of Auditing PTC
Fundamentals of Auditing PTCFundamentals of Auditing PTC
Fundamentals of Auditing PTC
 
Fundamentaltestprocess windirohmaheny11453205427 kelase
Fundamentaltestprocess windirohmaheny11453205427 kelaseFundamentaltestprocess windirohmaheny11453205427 kelase
Fundamentaltestprocess windirohmaheny11453205427 kelase
 
Internal_Audit_Presentation.pptx
Internal_Audit_Presentation.pptxInternal_Audit_Presentation.pptx
Internal_Audit_Presentation.pptx
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
Audit procedure and standard 500
Audit procedure and standard 500Audit procedure and standard 500
Audit procedure and standard 500
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Auditing Principles
Auditing PrinciplesAuditing Principles
Auditing Principles
 
Webinar-ISO-9001-Back-to-Basics-Internal-Auditing
Webinar-ISO-9001-Back-to-Basics-Internal-AuditingWebinar-ISO-9001-Back-to-Basics-Internal-Auditing
Webinar-ISO-9001-Back-to-Basics-Internal-Auditing
 
Internal Audit Training with different .pptx
Internal Audit Training with different .pptxInternal Audit Training with different .pptx
Internal Audit Training with different .pptx
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
 
Software development o & c
Software development o & cSoftware development o & c
Software development o & c
 
mod 4.pdf ppt about the safety at industries
mod 4.pdf ppt about the safety at industriesmod 4.pdf ppt about the safety at industries
mod 4.pdf ppt about the safety at industries
 
Preparing for validity audits
Preparing for validity auditsPreparing for validity audits
Preparing for validity audits
 
ASQ CQA Part 1: Auditing Fundamentals
ASQ CQA Part 1: Auditing FundamentalsASQ CQA Part 1: Auditing Fundamentals
ASQ CQA Part 1: Auditing Fundamentals
 

More from StevenTharp2

L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
L3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptxL3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptx
StevenTharp2
 
L2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptxL2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptx
StevenTharp2
 
L4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxL4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptx
StevenTharp2
 
L13 SDLC and Risk Management.pptx
L13 SDLC and Risk Management.pptxL13 SDLC and Risk Management.pptx
L13 SDLC and Risk Management.pptx
StevenTharp2
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
StevenTharp2
 
L8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptxL8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptx
StevenTharp2
 
L7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptxL7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptx
StevenTharp2
 
L12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptxL12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptx
StevenTharp2
 

More from StevenTharp2 (9)

L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
L3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptxL3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptx
 
L2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptxL2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptx
 
L4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxL4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptx
 
L13 SDLC and Risk Management.pptx
L13 SDLC and Risk Management.pptxL13 SDLC and Risk Management.pptx
L13 SDLC and Risk Management.pptx
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
 
L8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptxL8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptx
 
L7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptxL7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptx
 
L12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptxL12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptx
 

Recently uploaded

PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
Revenue Department Kerala State
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
Andrew Griffith
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 

Recently uploaded (20)

PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 

L6 RMF Phase 5 Assess.pptx

  • 3. ASSESSOR SELECTION • Task A-1: Select the appropriate assessor or assessment team for the type of control assessment to be conducted. • Potential Inputs: Security, privacy, and SCRM plans; program management control information; common control documentation; organizational security and privacy program plans; SCRM strategy; system design documentation; enterprise, security, and privacy architecture information; security, privacy, and SCRM policies and procedures applicable to the system. • Expected Outputs: Selection of assessor or assessment team responsible for conducting the control assessment. • Discussion • Assessor Selection – CISO • Audits • Self-Assessment • Control Effectiveness
  • 4. ASSESSMENT PLAN • Task A-2: Develop, review, and approve plans to assess implemented controls. • Potential Inputs: Security, privacy, and SCRM plans; program management control information; common control documentation; organizational security and privacy program plans; SCRM strategy; system design documentation; supply chain information; enterprise, security, and privacy architecture information; security, privacy, and SCRM policies and procedures applicable to the system. • Expected Outputs: Security and privacy assessment plans approved by the authorizing official. • Discussion • Assessment Plan Development • When, What, Where and How • Rules of Engagement – POCs; Tools Techniques; Approvals • Scope
  • 5. ASSESSMENT PLAN • Assessment Plan provides objectives • Two purposes • Establishes expectations • Binds the Assessor to a predetermined level of effort • Types ofAssessments • DevelopmentalTest and Evaluation • IV&V • Assessments supporting authorization or reauthorization; the continuous monitoring assessment; and remediation, or regression, assessments.
  • 6. CONTROL ASSESSMENTS • Task A-3: Assess the controls in accordance with the assessment procedures described in assessment plans. • Potential Inputs: Security and privacy assessment plans; security and privacy plans; external assessment or audit results (if applicable). • Expected Outputs: Completed control assessments and associated assessment evidence. • Discussion • SDLC (Early – Development Phase) • Cost • Common Controls (Inherited)
  • 7. CONTROL ASSESSMENTS • Tools • Manual • Steps taken • Automated • Document the settings • Types of Tests • The examine method is the process of reviewing, inspecting, observing, studying, or analyzing one or more assessment objects (i.e., specifications, mechanisms, or activities). The purpose of the examine method is to facilitate assessor understanding, achieve clarification, or obtain evidence. • The interview method is the process of holding discussions with individuals or groups of individuals within an organization to once again, facilitate assessor understanding, achieve clarification, or obtain evidence. • The test method is the process of exercising one or more assessment objects (i.e., activities or mechanisms) under specified conditions to compare actual with expected behavior
  • 8. CONTROL ASSESSMENTS • Example AC-3(6), Access • Enforcement, which is listed in SP 800-53A, is quoted here: • ASSESSMENT OBJECTIVE: Determine if: • (i) the organization defines the user and/or system information to be encrypted or stored offline in a secure location; and • (ii) the organization encrypts, or stores off-line in a secure location, organization-defined user and/or system information. • Potential assessment methods and objects: • Examine: [SELECT FROM: Access control policy; procedures addressing access enforcement; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records]. • Interview: [SELECT FROM: Organizational personnel with access enforcement responsibilities]. • Test: [SELECT FROM: Automated mechanisms implementing access enforcement functions].
  • 9. CONTROL ASSESSMENTS • Input: Test Plan • Test Leader/Director • Responsible for the SAR • Freeze the System • Look at Annual Assessments • Incremental Assessments during the SDLC • SSP Review from Phase 2
  • 10. CONTROL ASSESSMENTS • Requirements • Required Access • Documentation • POCs for interviews
  • 11. ASSESSMENT REPORTS • Task A-4: Prepare the assessment reports documenting the findings and recommendations from the control assessments. • Potential Inputs: Completed control assessments and associated assessment evidence. • Expected Outputs: Completed security and privacy assessment reports detailing the assessor findings and recommendations. • Discussion • Assessment Report (Findings) • SAR • Documents the results of the testing • Bring forward previous assessments
  • 12. REMEDIATION ACTIONS • Task A – 5: Conduct initial remediation actions on the controls and reassess remediated controls. • Potential Inputs: Completed security and privacy assessment reports with findings and recommendations; security and privacy plans; security and privacy assessment plans; organization- and system-level risk assessment results. • Expected Outputs: Completed initial remediation actions based on the security and privacy assessment reports; changes to implementations reassessed by the assessment team; updated security and privacy assessment reports; updated security and privacy plans including changes to the control implementations. • Discussion • During Development/Post-Development • Meeting on Findings
  • 13. REMEDIATION ACTIONS • System Owner • Reviews the findings • False Positives • ISSO assists in this process • Meeting • Assessor • SO and ISSO • Determines applicable findings • Unacceptable Risk – Fix Now • Addendum
  • 14. PLAN OF ACTION AND MILESTONES • Task A-6: Prepare the plan of action and milestones based on the findings and recommendations of the assessment reports. • Potential Inputs: Updated security and privacy assessment reports; updated security and privacy plans; organization- and system-level risk assessment results; organizational risk management strategy and risk tolerance. • Expected Outputs: A plan of action and milestones detailing the findings from the security and privacy assessment reports that are to be remediated. • Discussion • Correct the deficiencies • Residual Risk • Process to fix