X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 118 / 158

441 views

0 shares

0 downloads

0 comments

118 / 158

U.S. Department of Health and Human Services

The RMF process includes categorizing the information system, selecting security controls, implementing security controls, assessing security controls, authorizing the information system, and  continuous monitoring.

IT Administrators are most likely to be involved in continuous monitoring after a system has been received an authorization to operate.

Page 1 of 8

System Security Authorization

The Purpose of Risk Management Framework (RMF)

Document info
Document views441
Page views441
Page last viewedFri Dec 09 05:00:51 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments