X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 118 / 158

584 views

0 shares

0 downloads

0 comments

118 / 158

U.S. Department of Health and Human Services

The RMF process includes categorizing the information system, selecting security controls, implementing security controls, assessing security controls, authorizing the information system, and  continuous monitoring.

IT Administrators are most likely to be involved in continuous monitoring after a system has been received an authorization to operate.

Page 1 of 8

System Security Authorization

The Purpose of Risk Management Framework (RMF)

Document info
Document views584
Page views584
Page last viewedSat Jan 21 18:13:05 UTC 2017
Pages158
Paragraphs2058
Words16945

Comments