Block 1 Day 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Block 1 Day 4 Review Questions Objective 1G & 1H

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

RMF

incorporates strategy, policy, awareness/training, assessment, continuous monitoring, authorization, implementation, and remediation

2
New cards

RMF Step 1, Prepare

carry out essential activities at the org, mission and business process to help prepare the org to manage its security/privacy risks using RMF, includes the 18 task

3
New cards

RMF Step 2, Categorize System

Impact to confidentiality, integrity, and accessibility is categorized

4
New cards

RMF Step 3, Select security Control

Three distinct types of designations to include common, system-specific, and hybrid

5
New cards

RMF Step 4, Implement Security controls

Specified in the security plan in accordance with guidance found o the KS

6
New cards

RMF Step 5, Assess Security Controls

Develop, review,, and approve a plan to assess the security controls

7
New cards

RMF Step 6, Authorize System

Accreditation decisions, authorization to operate (ATO), Interim Authorization to Test (IATT), Denial pf authorization to Operate(DATO) involves CAT I, II, II

8
New cards

Severity Category - CAT I

Shall be corrected before an ATO is granted

9
New cards

Severity Category - CAT II

shall be corrected or satisfactorily mitigate before an ATO can be granted

10
New cards

Severity Category - CAT III

Does not prevent an ATO

11
New cards

Authorization to Connect (ATC)

allows system to connect to the AFIN or DODI

12
New cards

Denial of Authorization to Connect (DATC)

AF-AO determination an IS cannot connect to the Af-GIG because of an inadequate IA design, if already connected, the IS connection must be terminated

13
New cards

RMF Step 7, Monitor Security Controls

Continuously monitor the system for security-relevant events and configuration change that negatively affect security posture

14
New cards

AIM

Protect the Air Force, DoD and Government networks

15
New cards

ESSA

protect information pertaining to airforce, DOD and government operations

16
New cards

CORA

Mitigate the effects of lost air force, DoD and government operations, capabilities, and resources

17
New cards