Module 1: Introduction to NIST and the RMF

Learning Objectives
Upon completion of this module, participants will be able to:
|
Lesson 1.1: The History of NIST and its Impact on Global Cybersecurity Standards
In this lesson, we’ll introduce the history and role of NIST in cybersecurity, including:
|
NIST’s Evolution in Cybersecurity
|
![]() |
Impact on Global Cybersecurity Standards
|
Contribution to Cybersecurity Best Practices
|
![]() |
Lesson 1.2: An Overview of the RMF Process and its Components
In this lesson, we’ll explain the RMF and its significance, including:
|
The Six Steps of the RMF Process
|
![]() |
Key Components of the RMF
|
![]() |
Lesson 1.3: The Importance of RMF in Various Sectors and its Role in Regulatory Compliance
In this lesson, we’ll demonstrate the application of RMF in achieving compliance and security improvements, including:
|
RMF Across Different Sectors
|
RMF and Regulatory Compliance
|
The Strategic Advantage of RMF
|
Module 2: Understanding the RMF Process

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 2.1: Explanation of the RMF’s Seven-step Process
In this lesson, we’ll detail the steps involved in the RMF process, including:
|
The Seven Steps of the RMF Process
|
Understanding the Process
Each step of the RMF is designed to be iterative and flexible, allowing organizations to adapt the framework to their unique needs and challenges. The RMF process emphasizes the importance of preparation, continuous monitoring, and the integration of security and risk management into every phase of the system lifecycle.
Key Takeaways
-
The RMF process provides a disciplined and structured approach that integrates security, privacy, and risk management activities.
-
By following the RMF, organizations can ensure that security and privacy considerations are not an afterthought but are integrated throughout the system development lifecycle.
-
Continuous monitoring and the iterative nature of the RMF process support organizations in adapting to evolving threats, technologies, and business requirements.
Lesson 2.2: Application of RMF Throughout the System Development Lifecycle
In this lesson, we’ll illustrate RMF’s integration into system development, including:
|
Aligning RMF with the SDLC
|
Enhancing SDLC with RMF
|
Key Takeaways
-
The RMF provides a structured approach to risk management that is complementary to the phases of the SDLC, embedding security and privacy considerations into the fabric of the system development process.
-
The proactive integration of RMF steps into the SDLC enhances the resilience of information systems, enabling organizations to respond swiftly and effectively to changing security requirements and threat landscapes.
-
By following the RMF within the SDLC, organizations can achieve not only technical and operational security benefits but also ensure compliance with relevant laws, regulations, and standards, thereby reducing the risk of security breaches and data privacy violations.
The application of the RMF throughout the system development lifecycle is a best practice that leads to the creation of secure, resilient, and compliant information systems. Organizations that adopt this integrated approach are better equipped to manage the complex cybersecurity challenges of today and tomorrow.
Lesson 2.3: Real-world Applications and Benefits of the RMF Process
In this lesson, we’ll highlight the role of each RMF step in risk mitigation, including:
|
Real-world Applications of RMF
|
Benefits of Implementing the RMF Process
|
Impact of RMF on Organizational Security
|
Module 3: Preparing for RMF

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 3.1: Steps for Organizational and System-level RMF Preparation
In this lesson, we’ll prepare organizations and systems for RMF, including:
|
Organizational Preparation Steps
|
System-Level Preparation Steps
|
Engaging Stakeholders
|
Key Takeaways
|
Lesson 3.2: Overview of Key Roles and Responsibilities in the RMF Process
In this lesson, we’ll outline roles and responsibilities in RMF, including:
|
The Authorizing Official (AO)
|
The Information System Owner
|
The Information Security Officer (ISO)
|
The Security Control Assessor (SCA)
|
Other Stakeholders
|
Key Takeaways
|
Lesson 3.3: Techniques for Establishing and Understanding the Risk Management Context
In this lesson, we’ll establish a risk management, including:
|
Identifying Organizational Objectives and Requirements
|
Assessing the External Environment
|
Analyzing the Internal Environment
|
Defining Risk Criteria
|
Establishing the Risk Management Context
|
Key Takeaways
|
Module 4: Categorizing Information Systems

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 4.1: Criteria and Significance of Information System Categorization
In this lesson, we’ll understand system categorization criteria, including:
|
Criteria for Information System Categorization
|
Significance of Information System Categorization
|
Implementing Effective Categorization
|
Key Takeaways
|
Lesson 4.2: Guidelines for Using FIPS 199 and NIST SP 800-60
In this lesson, we’ll apply FIPS 199 and NIST SP 800-60 for categorization, including:
|
Understanding FIPS 199
|
Utilizing NIST SP 800-60
|
Guidelines for Effective Use
|
Key Takeaways
|
Lesson 4.3: Impact of Categorization on the Selection of Security Controls
In this lesson, we’ll assess the impact of system categorization on security controls, including:
|
The Role of Categorization in Security Control Selection
|
Guiding Principles for Control Selection
|
Impact on Risk Management
|
Key Takeaways
|
Module 5: Selecting Security Controls

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 5.1: Process for Selecting Baseline Security Controls
In this lesson, we’ll identify appropriate security controls, including:
|
Understanding Baseline Security Controls
|
The Selection Process
|
Factors Influencing Control Selection
|
Key Takeaways
|
Lesson 5.2: Strategies for Tailoring and Supplementing Security Controls
In this lesson, we’ll identify appropriate security controls, including:
|
Tailoring Baseline Security Controls
|
Supplementing Security Controls
|
Documenting Tailoring and Supplementing Decisions
|
Key Takeaways
|
Lesson 5.3: Documentation Practices for Security Control Selection
In this lesson, we’ll document control selections effectively, including:
|
Importance of Documentation in RMF
|
Best Practices for Documenting Security Control Selection
|
Documenting Changes and Updates
|
Key Takeaways
|
Module 6: Implementing Security Controls

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 6.1: Best Practices for Security Control Implementation
In this lesson, we’ll strategize effective control implementation, including:
|
Understand the Control Requirements
|
Engage Stakeholders
|
Leverage Automated Tools
|
Test and Validate
|
Document the Implementation
|
Key Takeaways
|
Lesson 6.2: Documentation Guidelines and Tools for Implemented Controls
In this lesson, we’ll meet documentation requirements for control implementation, including:
|
Documentation Guidelines
|
Essential Components of Control Documentation
|
Tools for Documenting Security Controls
|
Best Practices for Documentation Maintenance
|
Key Takeaways
|
Lesson 6.3: Applying Security Engineering Principles in Control Implementation
In this lesson, we’ll incorporate security engineering principles, including:
|
Core Security Engineering Principles
|
Application in Control Implementation
|
Key Takeaways
|
Module 7: Assessing Security Controls

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 7.1: Methodologies for Security Control Assessments
In this lesson, we’ll plan and conduct control assessments, including:
|
Overview of Assessment Methodologies
|
Steps in the Assessment Process
|
Techniques for Effective Assessments
|
Best Practices for Security Control Assessments
|
Key Takeaways
|
Lesson 7.2: Types of Assessments and Evidence Evaluation
In this lesson, we’ll understand assessment types and evidence requirements, including:
|
Types of Security Control Assessments
|
Evidence Evaluation
|
Techniques for Effective Evidence Evaluation
|
Best Practices for Assessments and Evidence Evaluation
|
Key Takeaways
|
Lesson 7.3: Documentation of Assessment Findings and Remediation Planning
In this lesson, we’ll document findings and plan for remediation, including:
|
Documentation of Assessment Findings
|
Developing Remediation Plans
|
Monitoring and Updating Remediation Efforts
|
Key Takeaways
|
Module 8: Authorizing Information Systems

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 8.1: Steps and Documentation Required for ATO
In this lesson, we’ll comprehend the ATO process, including:
|
Steps for Achieving ATO
|
Essential Documentation for ATO
|
Best Practices for ATO Documentation
|
Key Takeaways
|
Lesson 8.2: Risk Determination, Acceptance, and Criteria for Authorization Decisions
In this lesson, we’ll make informed risk determination and acceptance decisions, including:
|
Understanding Risk Determination
|
Risk Acceptance
|
Criteria for Authorization Decisions
|
Best Practices for Authorization Decisions
|
Key Takeaways
|
Lesson 8.3: Insights Into the AO’s Decision-making Process
In this lesson, we’ll understand the AO’s role in system authorization, including:
|
The Role of the Authorizing Official (AO)
|
Factors Influencing the AO’s Decisions
|
The Decision-Making Process
|
Best Practices for AOs
|
Key Takeaways
|
Module 9: Monitoring Security Controls

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 9.1: Implementation of Continuous Monitoring Programs
In this lesson, we’ll master continuous monitoring strategies, including:
|
Establishing the Continuous Monitoring Strategy
|
Developing the Continuous Monitoring Plan
|
Implementing the Continuous Monitoring Program
|
Reviewing and Updating the Continuous Monitoring Program
|
Key Takeaways
|
Lesson 9.2: Adaptation Strategies for Technological and Threat Landscape Changes
In this lesson, we’ll respond effectively to environmental changes, including:
|
Recognizing Changes in the Technological Environment
|
Responding to the Evolving Threat Landscape
|
Adaptation Strategies for Continuous Monitoring
|
Collaboration and Information Sharing
|
Key Takeaways
|
Lesson 9.3: Processes for Ongoing Risk Assessment and System Reauthorization
In this lesson, we’ll conduct ongoing risk assessments and maintain authorization, including:
|
sses involved in continuously assessing risks and determining when and how systems should be reauthorized.
Continuous Risk Assessment
|
Criteria for System Reauthorization
|
Reauthorization Process
|
Best Practices for Ongoing Assessment and Reauthorization
|
Key Takeaways
|
Module 10: RMF Tools and Resources

Learning Objectives
Upon completion of this module, students should be able to: – Overview tools that support RMF. – Identify NIST and other cybersecurity resources. – Integrate third-party tools with RMF processes. |
Lesson 10.1: NIST tools and Popular Third-party Tools for RMF
In this lesson, we’ll overview tools that support RMF, including:
|
NIST Tools for RMF
|
Popular Third-Party Tools for RMF
|
Integrating Tools into the RMF Process
|
Best Practices for Tool Use in RMF
|
Lesson 10.2: Key NIST Publications and Additional Cybersecurity Resources
In this lesson, we’ll identify NIST and other cybersecurity resources, including:
|
Key NIST Publications for RMF
|
Additional Cybersecurity Resources
|
Leveraging NIST Publications and Cybersecurity Resources
|
Key Takeaways
|
Lesson 10.3: Best Practices for Integrating Third-party Tools into RMF
In this lesson, we’ll integrate third-party tools with RMF processes, including:
|
Assessing Tool Compatibility and Compliance
|
Ensuring Interoperability and Integration
|
Security and Privacy Considerations
|
Evaluating Tool Effectiveness and Performance
|
Documentation and Training
|
Key Takeaways
|
Module 11: Case Studies and Real-World Applications

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 11.1: Detailed Analysis of RMF Implementation Case Studies
In this lesson, we’ll analyze real-world RMF applications, including:
|
Government Sector Case Study
|
Healthcare Sector Case Study
|
Financial Sector Case Study
|
Education Sector Case Study
|
Key Takeaways
|
Lesson 11.2: Key Lessons Learned from Real-world RMF Applications
In this lesson, we’ll derive lessons from RMF implementations, including:
|
Importance of Stakeholder Engagement
|
Tailoring Security Controls
|
Documentation and Communication
|
Integrating RMF with Organizational Processes
|
Lessons from Challenges
|
Key Takeaways
|
Lesson 11.3: Group Discussions on Overcoming RMF Challenges
In this lesson, we’ll engage in discussions on RMF challenges and solutions, including:
|
Preparing for Group Discussions
|
Facilitating Discussions
|
Addressing Common RMF Challenges
|
Documenting and Sharing Outcomes
|
Key Takeaways
|
Module 12: Course Conclusion and Next Steps

Learning Objectives
Upon completion of this module, students should be able to:
|
Lesson 12.1: Recap of Key RMF Concepts and the Importance of Each Step
In this lesson, we’ll review RMF concepts and steps, including:
|
Overview of the RMF Steps
|
Importance of Each Step
|
Key Takeaways
|
Lesson 12.2: Overview of certifications and preparation tips.
In this lesson, we’ll prepare for relevant certification exams, including:
|
Relevant Certifications for RMF Practitioners
|
Preparation Tips for Certification Exams
|
Key Takeaways
|
Lesson 12.3: Opportunities for Continued Learning and Professional Development in Cybersecurity
In this lesson, we’ll guide continuing education in cybersecurity, including:
|
Cybersecurity Conferences and Workshops
|
Online Learning Platforms and Courses
|
Professional Certifications
|
Academic Programs
|
Professional Organizations and Communities
|
Research and Publication
|
Key Takeaways
|