CMMC Practice RA.L2-3.11.1 – Risk Assessments: Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.
Links to Publicly Available Resources
This webinar discusses the means for managing security for information assets and the means for assessing and mitigating the risk to organizational information assets. This link provides information about CIS RAM, an information security risk assessment method. This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2. This example document from the state of Virginia is used to assist each agency in assessing the risks to its sensitive systems and data, and protecting the resources that support the mission. This standard defines the key elements of the Commonwealth’s information security risk assessment model to enable consistent identification, evaluation, response and monitoring of risks facing IT processes. The CRR is a no-cost, voluntary, non-technical assessment to evaluate an organization’s operational resilience and cybersecurity practices. The Cybersecurity Assessment Tool consists of two parts: Inherent Risk Profile and Cybersecurity Maturity. This article from ISACA discusses Enterprise Security Risk Assessment Methodology. This NIST Special Publication is a guide to the basic technical aspects of conducting information security assessments. This NIST Special Publication provides guidance for conducting risk assessments. This SANS provided policy discusses performing periodic information security risk assessments. This SANS whitepaper looks at how a vulnerability management process could be designed and implemented within an organization. This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.
Discussion [NIST SP 800-171 R2]
Clearly defined system boundaries are a prerequisite for effective risk assessments. Such risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations, organizational assets, and individuals based on the operation and use of organizational systems. Risk assessments also consider risk from external parties (e.g., service providers, contractor operating systems on behalf of the organization, individuals accessing organizational systems, outsourcing entities). Risk assessments, either formal or informal, can be conducted at the organization level, the mission or business process level, or the system level, and at any phase in the system development life cycle.
NIST SP 800-30 provides guidance on conducting risk assessments.
Further Discussion
Risk arises from anything that can reduce an organization’s assurance of mission/business success; cause harm to image or reputation; or harm individuals, other organizations, or the Nation.
Organizations assess the risk to their operations and assets at regular intervals. Areas where weakness or vulnerabilities could lead to risk may include:
- poorly designed and executed business processes;
- inadvertent actions of people, such as disclosure or modification of information;
- intentional actions of people inside and outside the organization;
- failure of systems to perform as intended;
- failures of technology; and
- external events, such as natural disasters, public infrastructure and supply chain failures.
When conducting risk assessments use established criteria and procedures. The results of formal risk assessments are documented. It is important to note that risk assessments differ from vulnerability assessments (see RA.L2-3.11.2). A vulnerability assessment provides input to a risk assessment along with other information such as results from likelihood analysis and analysis of potential treat sources.
Risk assessments should be performed at defined regular intervals. Mission risks include anything that will keep an organization from meeting its mission. Function risk is anything that will prevent the performance of a function. Image and reputation risks refer to intangible risks that have value and could cause damage to potential or future trust relationships.
This practice, RA.L2-3.11.1, which requires periodically assessing the risk to organization systems, assets, and individuals, is a baseline Risk Assessment practice. RA.L2-3.11.1 enables other Risk Assessment practices (e.g., RA.L2-3.11.3, Vulnerability Remediation), as well as CA.L2-3.12.2, Plan of Action.