answersLogoWhite

0

It will be called RMF.

The newest DoD guidance is DoDI 8500.1, "Cybersecurity", issued March 14, 2014. This reissues and renames DoD Directive (DoDD) 8500.01E as an instruction (DoDI) and incorporates and cancels DoDI 8500.02. The current DIACAP process is to be replaced by National Institute of Standards and Technology (NIST) Special Publication (SP) 800-39 which is titled "Managing

Information Security Risk: Organization, Mission, and Information System View," Committee on National Security Systems (CNSS) Policy (CNSSP) 22 which is titled "Policy on Information Assurance Risk Management for National Security Systems," and DoDI 8510.01 which is titled "Risk Management Framework (RMF) for DoD Information Technology (IT)."

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

What is computer hijacking?

Computer hijacking is a process of accessing someone's database illegal without authorization. This is what is commonly known as hacking.


What is the process of granting an authenticated user a specific degree of access to specific computer or data resources?

Authorization


What is the purpose of process assessment?

what is the purpose of software assessment?


What is the process that states what a user can and cannot do on a system?

Authorization


What are the primary functions of active directory?

To provide authentication and authorization services for hardware and software resources on the network like computer,users,printers groups etc. Authentication would be verifying the user's identity while authorization is the process of granting the user access to only the resources they are permitted to useTo provide authentication and authorization services for hardware and software resources on the network. Authentication would be verifying the user's identity while authorization is the process of granting the user access to only the resources they are permitted to use.


What is CAA?

if you are wanting what is CAA for *information technology or EDPM.. the answer is : Computer Aided Assessment (CAA) covers a range of assessment procedures and is a rapidly developing area as new technologies are harnessed. In essence, CAA refers to any instance in which some aspect of computer technology is deployed as part of the assessment process. Some of the principle examples of CAA in language learning are:


What is Virtual Mapping in computer?

Virtual Mapping is one of Computer architecture concepts which a process thinks that it's only process on the machine ( at least on the memory). the benefit of that to ensure the security of Multitasking systems.


How does the concept of risk assessment apply to the security survey?

Risk assessment is crucial in a security survey as it helps identify potential threats and vulnerabilities within a system or environment. By evaluating risks, security professionals can prioritize areas that require mitigation measures to prevent security breaches, theft, or other incidents. This process helps in developing an effective security strategy that addresses the most critical risks first.


What is Computer Authentication?

Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.


What are the examples of rubrics in the process oriented assessment?

Example of process oriented assessment : Listening Analyzing Understanding Working Etc.


Visas on process in the belgian embassy in yaounde Cameroon?

i want to know employment authorization visa process of cameroon


What is a shake (computer)?

= Computer Handshake = Term used to describe the process of one computer establishing a connection with another computer or device. The handshake is often the steps of verifying the connection, the speed, and/or the authorization of the computer trying to connect to it. An example of handshaking is when a modem connects to another modem; the tones heard after the dialing is the handshake and can be thought of as the computers greeting each other.