πΌ RA-3 Risk Assessment
- Contextual name: πΌ RA-3 Risk Assessment
- ID:
/frameworks/nist-sp-800-53-r5/ra/03
- Located in: πΌ RA Risk Assessment
Descriptionβ
a. Conduct a risk assessment, including:
- Identifying threats to and vulnerabilities in the system;
- Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and
- Determining the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; b. Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments; c. Document risk assessment results in [Selection: security and privacy plans; risk assessment report; [Assignment: organization-defined document]]; d. Review risk assessment results [Assignment: organization-defined frequency]; e. Disseminate risk assessment results to [Assignment: organization-defined personnel or roles]; and f. Update the risk assessment [Assignment: organization-defined frequency] or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.
Similarβ
- Internal
- ID:
dec-c-b1346030
- ID:
Similar Sections (Give Policies To)β
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ RA-3(1) Risk Assessment _ Supply Chain Risk Assessment | ||||
πΌ RA-3(2) Risk Assessment _ Use of All-source Intelligence | ||||
πΌ RA-3(3) Risk Assessment _ Dynamic Threat Awareness | ||||
πΌ RA-3(4) Risk Assessment _ Predictive Cyber Analytics |