Dear Dr. RMF

Tony from OSD asks: Dr. RMF, I currently assess a boundary that includes all of our desktops, laptops, network printers, and some local printers. There are a number of devices (i.e. desktop/laptops) that don’t store Personally Identifiable Information (PII) per se, but will disseminate PII to our records management boundary…

Continue Reading

Post Categories: Dr. RMF Tags:

Dear Dr. RMF

Dear Dr. RMF, I have a boundary for a web application.  My SISO wants to move another web application into this approved boundary.  The move is because both have similar operating characteristics, security and privacy requirements, and reside in the same environment of operation.  As the SCA for the receiving…

Continue Reading

Post Categories: Dr. RMF Tags:

Dear Dr. RMF

Dear Dr. RMF, In my research I cannot find any Agency level documentation that states this, however, I have located examples of contracts that have PII guidance pertaining to contractors. So, would it be considered compliant if I have examples of the contracts or should this be documented at Agency…

Continue Reading

Post Categories: Dr. RMF Tags:

Dear Dr. RMF

Dear Dr. RMF, What is the purpose of having all personnel register at the DTIC website to receive update notifications?  If we do not implement this, do we need to submit POA&M for risk acceptance to the AO? Why DTIC, Regarding CA 1.6, the expression “What were they thinking?” comes…

Continue Reading

Post Categories: Dr. RMF Tags:

Dear Dr. RMF

Dear Dr. RMF, In my office we are disputing the intent of RMF Control SA-4(9), i.e., whether it can be inherited or if it is intended to be system-specific. The control description states organization but the compelling evidence call for SSP.  Furthermore, the AP procedures calls for contract / agreements to be inspected. …

Continue Reading

Post Categories: Dr. RMF Tags:

Dear Dr. RMF

Dear Dr. RMF, I am doing an annual review for an information system I have. Originally, this was inherited from our network boundary, but in reviewing this again it speaks specifically to information systems, which from my under-standing this cannot be inherited. If I am reading this control correctly it…

Continue Reading

Post Categories: Dr. RMFUncategorized Tags:

Dear Dr. RMF

Dear Dr. RMF, I have an information system that is current-ly being assessed and authorized and the boundary consists of desktops, laptops, printers, a major OS, and about 10 to 15 applications, which is spread throughout an enterprise. In reviewing the DoDI 8510.01 and the definition of IT products it…

Continue Reading

Post Categories: Dr. RMFUncategorized Tags:

Dear Dr. RMF

Dear Dr. RMF, In my office we are disputing whether RMF Control SA-4 can be inherited, or if it needs to be system-specific. The control description includes the work “Organization”, but the compelling evidence (per eMASS) calls for SSP. Furthermore, the Assessment Procedure calls for the contract/agreement to be inspected….

Continue Reading

Post Categories: Dr. RMFUncategorized Tags:

Ask Dr. RMF

Dear Dr. RMF, We are having a dispute in our office about how to handle security control selection for a “non-National Security System” (non-NSS). We know DoD has mandated that System Categorization and Security Control Selection shall be done “in accordance with CNSSI 1253”. However, the CNSSI 1253 security control…

Continue Reading

Post Categories: Dr. RMF Tags:

Ask Dr. RMF

Dear Dr. RMF, RMF IA-4 Identification Management control is not easy.  It has so many rabbit holes.  I am not sure how to tackle this control.  Could you please simplify this control for me.  Let’s say for IA-4 Identifier Management, the information system is a web application/web server.  For the…

Continue Reading

Post Categories: Dr. RMFRisk Management Framework Tags: