Skip to main content

💼 RA Risk Assessment

  • ID: /frameworks/nist-sp-800-53-r5/ra

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-ad48305b

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 RA-1 Policy and Proceduresno data
💼 RA-2 Security Categorization1no data
 💼 RA-2(1) Security Categorization _ Impact-level Prioritizationno data
💼 RA-3 Risk Assessment41no data
 💼 RA-3(1) Risk Assessment _ Supply Chain Risk Assessmentno data
 💼 RA-3(2) Risk Assessment _ Use of All-source Intelligenceno data
 💼 RA-3(3) Risk Assessment _ Dynamic Threat Awarenessno data
 💼 RA-3(4) Risk Assessment _ Predictive Cyber Analytics1no data
💼 RA-4 Risk Assessment Updateno data
💼 RA-5 Vulnerability Monitoring and Scanning111no data
 💼 RA-5(1) Vulnerability Monitoring and Scanning _ Update Tool Capabilityno data
 💼 RA-5(2) Vulnerability Monitoring and Scanning _ Update Vulnerabilities to Be Scannedno data
 💼 RA-5(3) Vulnerability Monitoring and Scanning _ Breadth and Depth of Coverageno data
 💼 RA-5(4) Vulnerability Monitoring and Scanning _ Discoverable Informationno data
 💼 RA-5(5) Vulnerability Monitoring and Scanning _ Privileged Accessno data
 💼 RA-5(6) Vulnerability Monitoring and Scanning _ Automated Trend Analysesno data
 💼 RA-5(7) Vulnerability Monitoring and Scanning _ Automated Detection and Notification of Unauthorized Componentsno data
 💼 RA-5(8) Vulnerability Monitoring and Scanning _ Review Historic Audit Logsno data
 💼 RA-5(9) Vulnerability Monitoring and Scanning _ Penetration Testing and Analysesno data
 💼 RA-5(10) Vulnerability Monitoring and Scanning _ Correlate Scanning Informationno data
 💼 RA-5(11) Vulnerability Monitoring and Scanning _ Public Disclosure Programno data
💼 RA-6 Technical Surveillance Countermeasures Surveyno data
💼 RA-7 Risk Responseno data
💼 RA-8 Privacy Impact Assessmentsno data
💼 RA-9 Criticality Analysisno data
💼 RA-10 Threat Huntingno data