Skip to main content

💼 RA Risk Assessment

  • Contextual name: 💼 RA Risk Assessment
  • ID: /frameworks/nist-sp-800-53-r5/ra
  • Located in: 💼 NIST SP 800-53 Revision 5

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-ad48305b

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 RA-1 Policy and Procedures
💼 RA-2 Security Categorization1
    💼 RA-2(1) Security Categorization _ Impact-level Prioritization
💼 RA-3 Risk Assessment4
    💼 RA-3(1) Risk Assessment _ Supply Chain Risk Assessment
    💼 RA-3(2) Risk Assessment _ Use of All-source Intelligence
    💼 RA-3(3) Risk Assessment _ Dynamic Threat Awareness
    💼 RA-3(4) Risk Assessment _ Predictive Cyber Analytics
💼 RA-4 Risk Assessment Update
💼 RA-5 Vulnerability Monitoring and Scanning11
    💼 RA-5(1) Vulnerability Monitoring and Scanning _ Update Tool Capability
    💼 RA-5(2) Vulnerability Monitoring and Scanning _ Update Vulnerabilities to Be Scanned
    💼 RA-5(3) Vulnerability Monitoring and Scanning _ Breadth and Depth of Coverage
    💼 RA-5(4) Vulnerability Monitoring and Scanning _ Discoverable Information
    💼 RA-5(5) Vulnerability Monitoring and Scanning _ Privileged Access
    💼 RA-5(6) Vulnerability Monitoring and Scanning _ Automated Trend Analyses
    💼 RA-5(7) Vulnerability Monitoring and Scanning _ Automated Detection and Notification of Unauthorized Components
    💼 RA-5(8) Vulnerability Monitoring and Scanning _ Review Historic Audit Logs
    💼 RA-5(9) Vulnerability Monitoring and Scanning _ Penetration Testing and Analyses
    💼 RA-5(10) Vulnerability Monitoring and Scanning _ Correlate Scanning Information
    💼 RA-5(11) Vulnerability Monitoring and Scanning _ Public Disclosure Program
💼 RA-6 Technical Surveillance Countermeasures Survey
💼 RA-7 Risk Response
💼 RA-8 Privacy Impact Assessments
💼 RA-9 Criticality Analysis
💼 RA-10 Threat Hunting