RA: Risk Assessment
Controls
RA-1: Policy and Procedures
Baseline(s):
- Low
- Moderate
- High
- Privacy
Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: [Assignment (one or more): organization-level, mission/business process-level, system-level] risk assessment policy that: Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and Procedures to facilitate the implementation…
RA-2: Security Categorization
Baseline(s):
- Low
- Moderate
- High
Categorize the system and information it processes, stores, and transmits; Document the security categorization results, including supporting rationale, in the security plan for the system; and Verify that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.
RA-3: Risk Assessment
Baseline(s):
- Low
- Moderate
- High
- Privacy
Conduct a risk assessment, including: Identifying threats to and vulnerabilities in the system; Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and Determining the likelihood and impact of adverse effects on individuals arising…
RA-5: Vulnerability Monitoring and Scanning
Baseline(s):
- Low
- Moderate
- High
Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system are identified and reported; Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards…
RA-6: Technical Surveillance Countermeasures Survey
Baseline(s):
Employ a technical surveillance countermeasures survey at [Assignment: organization-defined locations] [Assignment (one or more): [Assignment: organization-defined frequency] , when the following events or indicators occur: [Assignment: organization-defined events or indicators] ].
RA-7: Risk Response
Baseline(s):
- Low
- Moderate
- High
- Privacy
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.
RA-8: Privacy Impact Assessments
Baseline(s):
- Privacy
Conduct privacy impact assessments for systems, programs, or other activities before: Developing or procuring information technology that processes personally identifiable information; and Initiating a new collection of personally identifiable information that: Will be processed using information technology; and Includes personally identifiable information permitting the physical or virtual (online) contacting of a specific individual, if identical…
RA-9: Criticality Analysis
Baseline(s):
- Moderate
- High
Identify critical system components and functions by performing a criticality analysis for [Assignment: organization-defined systems, system components, or system services] at [Assignment: organization-defined decision points in the system development life cycle].
RA-10: Threat Hunting
Baseline(s):
Establish and maintain a cyber threat hunting capability to: Search for indicators of compromise in organizational systems; and Detect, track, and disrupt threats that evade existing controls; and Employ the threat hunting capability [Assignment: organization-defined frequency].