RMF & The Context
The ISCM Process
Configuration Management (CM)
The 7 Key Monitoring Tasks
Tools, Roles & Trends
100

This NIST Special Publication is the primary guide used for the "Monitor Security State" phase.

What is SP 800-137?

100

The ISCM process is described as this because it is a repeating management loop.

What is a cyclical process?

100

Configuration Management is the process of maintaining system integrity through this. 

What is controlled change?

100

Task 7 involves these procedures, such as data sanitization and removing network connections.

What are Information System Disposal Procedures?

100

This person is accountable for the system security posture and ensures the monitoring strategy is implemented.

Who is the System Owner?

200

Within the Risk Management Framework (RMF), "Monitor" is officially designated as this step.

What is Step 6?

200

This first stage of the ISCM cycle involves creating a strategy based on organizational risk tolerance.

What is Define?

200

This analysis is required to determine if proposed changes like software upgrades alter the security state.

What is a Security Impact Analysis (SIA)?

200

Task 5 requires reporting security status to this specific official on an ongoing basis.

Who is the Authorizing Official (AO) (or CIO)?

200

This tool collects and analyzes logs and is used to report system security posture.

What is a SIEM?

300

In Step 1, this task is performed to define the system and the impact level of its information.

What is Categorize?

300

This stage involves determining metrics, monitoring frequencies, and technical architecture.

What is Establish?

300

This management activity ensures that documentation like the SSP accurately reflects the current system state.

What is Baseline Management?

300

Task 2 involves recurring assessments of these to verify their ongoing effectiveness.

What are Security Controls?

300

This type of analysis uses empirical data to determine if monitoring frequencies need to be modified.

What is Trend Analysis?

400

In Step 5, senior leadership reviews the risk to grant this specific authorization.

What is an ATO (Authority to Operate)?

400

In the "Respond" stage, an organization must determine if they will mitigate, avoid, or do this with a risk.

What is Accept (or Transfer/Share)?

400

Corrective actions must be initiated and these documents updated if changes affect the system's security state.

What are the SSP and POA&Ms?

400

Task 1 involves evaluating changes to the system and this other factor.

What is the Environment (of operation)?

400

To support continuous awareness, monitoring uses these automated technical visuals.

What are dashboards?

500

The goal of Step 6 is to maintain this type of awareness to support risk-based decisions.

What is ongoing awareness?

500

This final stage of the cycle involves maturing measurement capabilities and adjusting the strategy.

What is Review & Update?

500

CM focuses on initializing, changing, and monitoring configurations throughout this entire period.

What is the system life cycle?

500

Task 3 prioritizes these based on risk, impact, and remediation feasibility.

What are vulnerabilities?

500

This specific role independently assesses control effectiveness and identifies residual risk.

Who is the Security Control Assessor (SCA)?

M
e
n
u