Risk Assessment
NIST SP 800-53 Rev 5 Risk Assessment controls.
Policy and Procedures
Develop, document, and disseminate to [parameter]:
Security Categorization
Categorize the system and information it processes, stores, and transmits;
Risk Assessment
Conduct a risk assessment, including:
Risk Assessment Update
Risk Assessment Update
Vulnerability Monitoring and Scanning
Monitor and scan for vulnerabilities in the system and hosted applications [parameter] and when new vulnerabilities potentially affecting the system are identified and reported;
Technical Surveillance Countermeasures Survey
Employ a technical surveillance countermeasures survey at [parameter] [parameter].
Risk Response
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.
Privacy Impact Assessments
Conduct privacy impact assessments for systems, programs, or other activities before:
Criticality Analysis
Identify critical system components and functions by performing a criticality analysis for [parameter] at [parameter].
Threat Hunting
Establish and maintain a cyber threat hunting capability to: