AUTHORIZED INFORMATION SYSTEMS

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary terms and definitions related to the authorization of information systems and risk management processes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

10 Terms

1
New cards

Authorization Package

Set of required documents for security authorization including system security plans and risk assessments.

2
New cards

Security Authorization

Official management decision to authorize operation of an information system while accepting risks.

3
New cards

Risk Management Framework (RMF)

Structured process to manage risks associated with information systems, consisting of categorizing, selecting, implementing, assessing, authorizing, and monitoring security controls.

4
New cards

Plan of Action and Milestones (POA&M)

Document outlining the strategy for addressing weaknesses in security controls and establishing timelines for remediation.

5
New cards

System Security Plan (SSP)

Comprehensive overview of the security requirements and controls in place for the information system.

6
New cards

Security Assessment Report (SAR)

Document detailing the security state of an information system, risk posture, and recommendations for improving security.

7
New cards

Risk Determination

Assessment of the risk to organizational operations, assets, individuals, or reputation due to identified vulnerabilities.

8
New cards

Authorize to Operate (ATO)

Authorization issued by the Authorizing Official indicating that the system can operate under specified conditions.

9
New cards

Denial of Authorization to Operate

Decision by the Authorizing Official indicating that the risk is too high for the information system to operate.

10
New cards

Prioritized Approach to Risk Mitigation

Strategy focusing on addressing the most critical security weaknesses that have substantial impacts on the organization.