Congress later passed the Federal Information Security Modernization Act of 2014 (FISMA 2014) to enhance the original legislation by granting the Department of Homeland Security (DHS) greater authority over federal information security and defining the Office of Management and Budget's (OMB) duties in managing federal agency information security practices.
FISMA mandates the protection of information and information systems against unauthorized access, use, disclosure, disruption, modification, or destruction, ensuring confidentiality, integrity, and availability. Title III of FISMA 2002 tasked NIST with developing information security and risk management standards, guidelines, and requirements.
The RMF, outlined in NIST Special Publication 800-37 and first published in February 2010, is designed to help organizations manage cybersecurity risks and comply with various U.S. laws and regulations, including the Federal Information Security Modernization Act of 2014, the Privacy Act of 1974, and Federal Information Processing Standards, among others. In December 2019, revision 2 of the NIST Special Publication 800-37 was published, introducing a Prepare step to the overall process.
External risks are factors beyond the information system's control that can impact the system's security. Strategic risks are associated with the need for information system functions to align with the business strategy that the system supports.
Revision 2 also introduced a new "Prepare" step (step 0) to enhance the effectiveness, efficiency, and cost-effectiveness of the security and privacy risk management processes.
Joint Task Force (December 2018), SP 800-37 Rev. 2 - Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, NIST, doi:10.6028/NIST.SP.800-37r2 /wiki/NIST
Joint Task Force (September 2020), SP 800-53 Rev. 5 - Security and Privacy Controls for Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-53r5 /wiki/NIST
Joint Task Force (December 2018), SP 800-37 Rev. 2 - Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, NIST, doi:10.6028/NIST.SP.800-37r2 /wiki/NIST
Joint Task Force (February 2010), SP 800-37 Rev. 1 - Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach, NIST, doi:10.6028/NIST.SP.800-37r1 /wiki/NIST
Joint Task Force Transformation Initiative (September 2012), SP 800-30 Rev. 1 - Guide for Conducting Risk Assessments, NIST, doi:10.6028/NIST.SP.800-30r1 /wiki/NIST
Dempsey, Kelley; Chawla, Nirali; Johnson, L.; Johnston, Ronald; Jones, Alicia; Orebaugh, Angela; Scholl, Matthew; Stine, Kevin (September 2011), SP 800-137 - Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-137 /wiki/NIST
Stine, Kevin; Kissel, Richard; Barker, William; Fahlsing, Jim; Gulick, Jessica (August 2008), SP 800-60 Vol. 1 Rev. 1 - Guide for Mapping Types of Information and Information Systems to Security Categories, NIST, doi:10.6028/NIST.SP.800-60v1r1 /wiki/NIST
Stine, Kevin; Kissel, Richard; Barker, William; Lee, Annabelle; Fahlsing, Jim (August 2008), SP 800-60 Vol. 2 Rev. 1 - Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices, NIST, doi:10.6028/NIST.SP.800-60v2r1 /wiki/NIST
NIST (February 2004), FIPS 199 - Standards for Security Categorization of Federal Information and Information Systems, doi:10.6028/NIST.FIPS.199 /wiki/NIST
Joint Task Force (September 2020), SP 800-53 Rev. 5 - Security and Privacy Controls for Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-53r5 /wiki/NIST
NIST (March 2006), FIPS 200 - Minimum Security Requirements for Federal Information and Information Systems, doi:10.6028/NIST.FIPS.200 /wiki/NIST
Joint Task Force (September 2020), SP 800-53 Rev. 5 - Security and Privacy Controls for Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-53r5 /wiki/NIST
Joint Task Force (January 2022), SP 800-53A Rev. 5 - Assessing Security and Privacy Controls in Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-53Ar5 /wiki/NIST
Joint Task Force (December 2018), SP 800-37 Rev. 2 - Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, NIST, doi:10.6028/NIST.SP.800-37r2 /wiki/NIST
Dempsey, Kelley; Chawla, Nirali; Johnson, L.; Johnston, Ronald; Jones, Alicia; Orebaugh, Angela; Scholl, Matthew; Stine, Kevin (September 2011), SP 800-137 - Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-137 /wiki/NIST
Pub. L. 107–347 (text) (PDF) /wiki/Act_of_Congress#Public_law,_private_law,_designation
"Federal Information Security Modernization Act". CISA. Retrieved 26 July 2024. https://www.cisa.gov/federal-information-security-modernization-act
Pub. L. 113–283 (text) (PDF) /wiki/Act_of_Congress#Public_law,_private_law,_designation
Stine, Kevin; Kissel, Richard; Barker, William; Fahlsing, Jim; Gulick, Jessica (August 2008), SP 800-60 Vol. 1 Rev. 1 - Guide for Mapping Types of Information and Information Systems to Security Categories, NIST, doi:10.6028/NIST.SP.800-60v1r1 /wiki/NIST
Stine, Kevin; Kissel, Richard; Barker, William; Lee, Annabelle; Fahlsing, Jim (August 2008), SP 800-60 Vol. 2 Rev. 1 - Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices, NIST, doi:10.6028/NIST.SP.800-60v2r1 /wiki/NIST
NIST (February 2004), FIPS 199 - Standards for Security Categorization of Federal Information and Information Systems, doi:10.6028/NIST.FIPS.199 /wiki/NIST
NIST (March 2006), FIPS 200 - Minimum Security Requirements for Federal Information and Information Systems, doi:10.6028/NIST.FIPS.200 /wiki/NIST
Joint Task Force (December 2018), SP 800-37 Rev. 2 - Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, NIST, doi:10.6028/NIST.SP.800-37r2 /wiki/NIST
Samejima, M.; Yajima, H. (2012). IT risk management framework for business continuity by change analysis of information system. IEEE International Conference on Systems, Man and Cybernetics (SMC). pp. 1670–1674. doi:10.1109/ICSMC.2012.6377977. /wiki/IEEE
Ji, Zhigang (2009). An empirical study on the risk framework based on the enterprise information system. 2009 International Conference on Future BioMedical Information Engineering (FBIE). pp. 187–190. doi:10.1109/FBIE.2009.5405879. /wiki/Doi_(identifier)
Computer Security Division, Information Technology Laboratory (2018-12-18). "RMF Update: NIST Publishes SP 800-37 Rev. 2 | CSRC". CSRC | NIST. Retrieved 2021-07-26. https://csrc.nist.gov/News/2018/rmf-update-nist-publishes-sp-800-37-rev-2
Ross, Ron; McEvilley, Michael; Winstead, Mark (November 2022), SP 800-160 Vol. 1 Rev. 1 - Engineering Trustworthy Secure Systems, doi:10.6028/NIST.SP.800-160v1r1 /wiki/Doi_(identifier)
Joint Task Force (September 2020), SP 800-53 Rev. 5 - Security and Privacy Controls for Information Systems and Organizations, NIST, doi:10.6028/NIST.SP.800-53r5 /wiki/NIST
Computer Security Division, Information Technology Laboratory (2018-12-18). "RMF Update: NIST Publishes SP 800-37 Rev. 2 | CSRC". CSRC | NIST. Retrieved 2021-07-26. https://csrc.nist.gov/News/2018/rmf-update-nist-publishes-sp-800-37-rev-2