Cybersecurity and Risk Management Framework

cyber professional sitting at desk with multiple moniors watcing them carefully

Cybersecurity Defined

The official definition of cybersecurity is, “Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.” – DoDI 8500.01

Mission
Prevent damage, protect, restore
Cyber Items
Computers, electronic communications and services, wire communications, electronic communication info
To Ensure
Confidentiality, integrity, availability (non-repudiation and authentication)

DoDI 5000.90 requires that program protection planning include cybersecurity. It also identifies two cybersecurity activities, Assess and Authorize, that are applicable within the Defense Acquisition System. DoDI 8500.01, Cybersecurity, defines cybersecurity and describes types of DoD information technology (IT). The DoD IT descriptions are used to determine the scope and applicability of the two cybersecurity activities identified by DoDI 5000.82. A Cybersecurity Strategy is required for all acquisitions of systems containing IT and is included as an appendix to the Program Protection Plan (PPP). The cybersecurity risk management framework for DoD systems, referred to as “the RMF,” is required for all acquisitions containing IT.

DoDI 8510.01, Risk Management Framework (RMF) for DoD Systems, details policies and procedures for implementing the RMF.

Foundational Pillars of Cybersecurity

Cybersecurity has five foundational pillars. The key triad is known as “CIA” – Confidentiality, Integrity, and Availability.

Confidentiality

Information is not disclosed to system entities (users, processes, devices) unless they have been authorized to access the information.

Integrity

The property whereby an entity has not been modified in an unauthorized manner.

Availability

Being accessible and usable upon demand by an authorized entity.

Non-Repudiation

Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information.

Authentication

Verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data.

The RMF

According to DoDI 8510.01, Technology (PIT) systems. Each step feeds into the program’s cybersecurity risk assessment that should occur throughout the acquisition lifecycle process. It should be noted that there is an organizational-level RMF step, Prepare, that precedes execution of the RMF at the system-level that sets organization-wide, organizationally-tailored risk management roles, risk management strategy, risk assessment, control baselines, cybersecurity framework (CSF) profiles, common controls, impact level prioritization, and continuous monitoring strategy.

black andn white image with the seven steps in the RMF Process- step 1: prepare, step 2:categorize, step 3:select, step 4: implement, step 5: assess, step 6: authorize, and step 7, monitor.

Step 1: Prepare

to execute the RMF from the system-level perspective by leveraging the organizational-level Prepare step to set the context and priorities for privacy and security risk management at the mission and business process and system level of the organization. At the system-level, this step includes:

Step 2: Categorize

the system in accordance with CNSSI No. 1253 based on the information analyzed, stored, and relayed by the system and an analysis of the impact of potential loss of confidentiality, integrity, and availability to organizational operations and assets, individuals, other organizations, and the Nation with respect to the loss of confidentiality, integrity, and availability of organizational systems. This step includes:

Step 3: Select

an initial set of system security and privacy controls and tailor the controls as necessary to reduce risk to the system to an acceptable level based on a risk assessment. This step includes:

Step 4: Implement

the controls and describe how the controls are employed within the system and its operating environment. This step includes implementing and changing the controls in the system’s security and privacy plans as required, using applicable systems security and privacy engineering methodologies, and updating those plans as required to reflect the implementation

Step 5: Assess

the controls to determine whether they are being correctly implemented, operating as intended, and producing the desired outcomes in meeting the requirements for security and privacy. This step includes:

Step 6: Authorize

the system based on a determination of whether the risk to organizational operations and assets, individuals, agencies, commands, and the Nation is acceptable, and cyberspace operational commanders’ requirements are met. Final risk determination and authorization decision definitions, e.g., interim authorization to test (IATT), authorization to operate (ATO), ATO with conditions, and denial ATO, and examples are on the RMF Knowledge Service (KS). This step includes:

Step 7: Monitor

the system and associated controls on an ongoing basis in accordance with the continuous monitoring strategy, including monitoring the effectiveness of controls and ongoing testing, documenting system and operating environment changes, conducting control and risk assessments and impact analyses, and reporting on system security, privacy and supply chain risk management posture to the AO and other senior leaders and executives. This step also includes:

Cybersecurity RMF Conclusion

As noted above, there are specific documents that are required to support RMF decisions that are in addition to those required by program protection, e.g., Program Protection Plan, Cybersecurity Strategy, etc. However, the analysis supporting the RMF must be aligned to the analysis done by the system security engineer (SSE) and all the SSE specialists, e.g., software and hardware assurance, supply chain risk management, anti-tamper, defense exportability features, physical security, personnel security, etc., for technology and program protection.

Per DoDI 5000.02, cybersecurity applies to all six acquisition pathways of the Adaptive Acquisition Framework (AAF). According to DoDI 5000.90, cybersecurity activities should be initiated as early as possible and fully integrated into the DoD acquisition process, including requirements management, systems engineering, and test and evaluation.

As the integrating process for managing all security risks to a program, technology and program protection and cybersecurity must be aligned. The system security engineer leading program protection efforts must ensure that the security controls that are selected and implemented to fulfill the RMF requirements have a strong engineering basis and are implemented as part of the program's overall technology and program protection program.

For more information about cybersecurity for DoD systems, please consult the DAU Cybersecurity Training page.


References

Key Terms

Policy and Guidance

DAU Training

DAU Resources

On this page

  1. Cybersecurity Defined
  2. Foundational Pillars of Cybersecurity
  3. The RMF
  4. References

Related Topics

Back to top