RA: Risk Assessment

Controls

RA-1: Policy and Procedures

Baseline(s):

  • Low
  • Moderate
  • High
  • Privacy

Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: [Assignment (one or more): organization-level, mission/business process-level, system-level] risk assessment policy that: Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and Procedures to facilitate the implementation…

RA-2: Security Categorization

Baseline(s):

  • Low
  • Moderate
  • High

Categorize the system and information it processes, stores, and transmits; Document the security categorization results, including supporting rationale, in the security plan for the system; and Verify that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.

RA-3: Risk Assessment

Baseline(s):

  • Low
  • Moderate
  • High
  • Privacy

Conduct a risk assessment, including: Identifying threats to and vulnerabilities in the system; Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and Determining the likelihood and impact of adverse effects on individuals arising…

RA-5: Vulnerability Monitoring and Scanning

Baseline(s):

  • Low
  • Moderate
  • High

Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system are identified and reported; Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards…

RA-6: Technical Surveillance Countermeasures Survey

Baseline(s):

(Not part of any baseline)

Employ a technical surveillance countermeasures survey at [Assignment: organization-defined locations] [Assignment (one or more): [Assignment: organization-defined frequency] , when the following events or indicators occur: [Assignment: organization-defined events or indicators] ].

RA-7: Risk Response

Baseline(s):

  • Low
  • Moderate
  • High
  • Privacy

Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.

RA-8: Privacy Impact Assessments

Baseline(s):

  • Privacy

Conduct privacy impact assessments for systems, programs, or other activities before: Developing or procuring information technology that processes personally identifiable information; and Initiating a new collection of personally identifiable information that: Will be processed using information technology; and Includes personally identifiable information permitting the physical or virtual (online) contacting of a specific individual, if identical…

RA-9: Criticality Analysis

Baseline(s):

  • Moderate
  • High

Identify critical system components and functions by performing a criticality analysis for [Assignment: organization-defined systems, system components, or system services] at [Assignment: organization-defined decision points in the system development life cycle].

RA-10: Threat Hunting

Baseline(s):

(Not part of any baseline)

Establish and maintain a cyber threat hunting capability to: Search for indicators of compromise in organizational systems; and Detect, track, and disrupt threats that evade existing controls; and Employ the threat hunting capability [Assignment: organization-defined frequency].