NIST Risk Management Framework (RMF)
Standards as implemented within the Department of Defense (DoD) and Intelligence Community (IC)
ARECyber offers the most in-depth course available for students looking to learn about the Risk Management Framework for DoD Information Technology. Risk Management Framework (RMF) describes the DoD process for identifying, implementing, assessing, and managing cybersecurity capabilities and services, expressed as security controls, and authorizing the operation of Information Systems (IS) and Platform Information Technology (PIT) systems.
RMF brings a risk-based approach to the implementation of cybersecurity, supports cybersecurity integration early and throughout the system lifecycle, promotes reciprocity to the maximum extent possible and stresses continuous monitoring. RMF replaces the DoD Information Assurance Certification and Accreditation Process (DIACAP) and adopts the term cybersecurity in place of information assurance.
Objectives
After completing the ARECyber’s DoD RMF Course, participants will be able to:
This boot camp course blends lecture, discussion, and hands-on exercises to educate students on RMF methodology. Students will be prepared to implement the Risk Management Framework for their IT systems as prescribed in the updated DoD series of publications, as well as the related NIST and CNSS publications. The workshop covers the transition from the DoD C&A process (DIACAP) to RMF and explains the methodology for categorizing information systems, selecting and implementing applicable security controls, and establishing a Continuous Monitoring program. This workshop breaks down the DoD Instruction 8510.01 (RMF for DoD IT) into steps, tasks, outputs, and responsible entities and includes informative lectures, discussions, and exercises which provide a functional understanding of Cybersecurity, Risk Management, and the proper selection, implementation, and validation of the new Security Controls as outlined on the RMF Knowledge Service and corresponding NIST Special Publications
RMF Chapter 1 Introduction
RMF Chapter 2 Cybersecurity Policy Regulations and Framework
RMF Chapter 3 RMF Roles and Responsibilities
RMF Chapter 4 Risk Analysis Process
RMF Chapter 5 Step 1 Categorize
RMF Chapter 6 Step 2 Select
RMF Chapter 7 Step 3 Implement
RMF Chapter 8 Step 4 Assess
RMF Chapter 9 Step 5 Authorize
RMF Chapter 10 Step 6 Monitor
Michael Redman
This is the most comprehensive review of the RMF process. Delivered by one of the industries foremost Subject Matter Expert