Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
Task 1-1 |
Categorized and Document the information system |
|
Task 1-2 |
Describe the System |
|
Task 1-3 |
Register the Information System |
|
Task 2-1 |
Common Controls Identification |
|
Task 2-2
|
Security Controls Selection |
|
Task 2-3 |
Monitoring Strategy |
|
Task 2-4 |
Security Plan Approval |
|
Task 3-1 |
Implement Security Controls |
|
Task 3-2 |
Security Control Documentation |
|
Task 4-1 |
Assessment Preparation |
|
Task 4-2 |
Security Control Assessment |
|
Task 4-3 |
Prepare the Security Assessment Report |
|
Task 4-4 |
Remediation Actions |
|
Task 5-1 |
Plan of Action and Milestones |
|
Task 5-2 |
Security Authorization Package |
|
Task 5-3 |
Risk Determination |
|
Task 5-4 |
Risk Acceptance |
|
Task 6-1 |
Information system and Environment Changes |
|
Task 6-2 |
Ongoing Security Control Assessments |
|
Task 6-3 |
Ongoing Remediation Actions |
|
Task 6-4 |
Key Updates |
|
Task 6-5 |
Security Status Reporting |
|
Task 6-6 |
Ongoing Risk Determination and Acceptance |
|
Task 6-7 |
Information System Removal and Decommissioning |
|
RMF Step 1 SDLC Phase |
Categorization information system Initiation |
|
RMF Step 2 SDLC Phase |
Select Security Controls 2-1-2-3 Initiation 2-4 Development/acquisition |
|
RMF Step 3 SDLC Phase |
Implement Security Controls Development/acquisition |
|
RMF Step 4 SDLC Phase |
Assess Security Controls Development/acquisition |
|
RMF Step 5 SDLC Phase |
Authorization Information System Implementation |
|
RMF Step 6 SDLC Phase |
Monitoring Security Controls 6-1-6-6 Operation/maintenance 6-7 Disposal |