Perform Implementation and Integration
Support Ongoing Systems Security Activities
Develop Security Test Plans
Support System Security Verification
Document Stakeholder Acceptance
100

When implementing security controls based on systems security and privacy engineering best practices, which NIST standard is most commonly referred to?

NIST SP 800-53

100

The process of initially establishing access privileges of an individual and subsequently verifying the acceptability of a request for access.

Authorization

100

The individual with the authority to formally assume responsibility for operating an information system at an acceptable level of risk according to NIST SP 800-37 Rev. 2

Authorizing Official

100

The testing or evaluation of the controls in an information system to determine the extent to which the controls are implemented correctly.

Assessment

100

The grounds for confidence that the set of intended security controls are effective in their applications.

Assurance

200

Which NIST standard is used to provide guidance for conducting risk assessments?

NIST SP 800-30

200

Which NIST standard is integral to the overall process of selecting and implementing security controls and outlines the US Federal Government's risk management framework?

NIST SP 800-37 Rev 2

200

The individual responsible for conducting a comprehensive assessment of the security controls to determine their overall effectiveness.

Security Control Assessor (SCA)

200

The testing and/or evaluation of the administrative, technical, and physical security controls to determine the extent to which they are implemented correctly.

Security Control Assessment

200

Confirmation through the provision of strong, sound, objective evidence that system security requirements have been fulfilled.

Verification

300

Which NIST standard is used to provide guidance for assessing the effectiveness of security controls and is often referred to during implementation?

NIST SP 800-53A

300

Which process includes preparing the facility or site in accordance with the secure installation requirements?

Transition Process

300

What activity signifies the completion of the transition process?

Commissioning the system for secure operations

300

With whom does the ISSE coordinate to ensure the controls are effectively verified and aligned?

Test teams and assessors

300

Confirmation through the provision of strong, sound, objective evidence that stakeholder security requirements have been fulfilled.

Validation

400

According to NIST, which process is designed to ensure that a NEW information system meets the security expectations of systems in its expected operating environment?

Verification

400

Which process includes developing initial user training materials for operation, sustainment, and support?

Implementation process

400

To whom does the ISSE delegate all security responsibility once the system is authorized?

No one.  The ISSE's responsibilities continue into the operational phase, particularly in supporting of ongoing authorization.

400

What has the potential for re-appearing once patches have been applied?

Vulnerabilities

400

What document does the AODR prepare, but does not have signatory authority for ?

Authorization Decision Letter

500

Which process moves the system to operations, but does not directly ensure the security expectations are met?

Transition

500

Which process offers security training to stakeholders?

Transition Process

500

What are essential for ensuring repeatability and traceability in a security test plan?

Detailed test cases

500

Which document requires updating once the authorizing official accepts the system and issues an ATO?

Risk Register

500

According to NIST systems security engineering guidelines, which process is specifically designed to provide objective evidence that a system satisfies it stakeholder security requirements.

Validation

M
e
n
u