Skip to main content

๐Ÿ’ผ RA Risk Assessment

  • Contextual name: ๐Ÿ’ผ RA Risk Assessment
  • ID: /frameworks/nist-sp-800-53-r5/ra
  • Located in: ๐Ÿ’ผ NIST SP 800-53 Revision 5

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-ad48305b

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ RA-1 Policy and Procedures
๐Ÿ’ผ RA-2 Security Categorization1
ย ย ย ย ๐Ÿ’ผ RA-2(1) Security Categorization _ Impact-level Prioritization
๐Ÿ’ผ RA-3 Risk Assessment4
ย ย ย ย ๐Ÿ’ผ RA-3(1) Risk Assessment _ Supply Chain Risk Assessment
ย ย ย ย ๐Ÿ’ผ RA-3(2) Risk Assessment _ Use of All-source Intelligence
ย ย ย ย ๐Ÿ’ผ RA-3(3) Risk Assessment _ Dynamic Threat Awareness
ย ย ย ย ๐Ÿ’ผ RA-3(4) Risk Assessment _ Predictive Cyber Analytics
๐Ÿ’ผ RA-4 Risk Assessment Update
๐Ÿ’ผ RA-5 Vulnerability Monitoring and Scanning11
ย ย ย ย ๐Ÿ’ผ RA-5(1) Vulnerability Monitoring and Scanning _ Update Tool Capability
ย ย ย ย ๐Ÿ’ผ RA-5(2) Vulnerability Monitoring and Scanning _ Update Vulnerabilities to Be Scanned
ย ย ย ย ๐Ÿ’ผ RA-5(3) Vulnerability Monitoring and Scanning _ Breadth and Depth of Coverage
ย ย ย ย ๐Ÿ’ผ RA-5(4) Vulnerability Monitoring and Scanning _ Discoverable Information
ย ย ย ย ๐Ÿ’ผ RA-5(5) Vulnerability Monitoring and Scanning _ Privileged Access
ย ย ย ย ๐Ÿ’ผ RA-5(6) Vulnerability Monitoring and Scanning _ Automated Trend Analyses
ย ย ย ย ๐Ÿ’ผ RA-5(7) Vulnerability Monitoring and Scanning _ Automated Detection and Notification of Unauthorized Components
ย ย ย ย ๐Ÿ’ผ RA-5(8) Vulnerability Monitoring and Scanning _ Review Historic Audit Logs
ย ย ย ย ๐Ÿ’ผ RA-5(9) Vulnerability Monitoring and Scanning _ Penetration Testing and Analyses
ย ย ย ย ๐Ÿ’ผ RA-5(10) Vulnerability Monitoring and Scanning _ Correlate Scanning Information
ย ย ย ย ๐Ÿ’ผ RA-5(11) Vulnerability Monitoring and Scanning _ Public Disclosure Program
๐Ÿ’ผ RA-6 Technical Surveillance Countermeasures Survey
๐Ÿ’ผ RA-7 Risk Response
๐Ÿ’ผ RA-8 Privacy Impact Assessments
๐Ÿ’ผ RA-9 Criticality Analysis
๐Ÿ’ผ RA-10 Threat Hunting