Knowledge ID: K0734
Knowledge of Risk Management Framework (RMF) requirements
Work roles with this Knowledge
Product Support Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-009Responsible for planning, estimating costs, budgeting, developing, implementing, and managing product support strategies in order to field and maintain the readiness and operational capability of systems and components.
Program Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-010Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational priorities.
Secure Project Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-011Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.
Security Control Assessment
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-012Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Systems Authorization
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-013Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.
Systems Security Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-014Responsible for managing the cybersecurity of a program, organization, system, or enclave.
Technology Portfolio Management
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-015Responsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.
Technology Program Auditing
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-016Responsible for conducting evaluations of technology programs or their individual components to determine compliance with published standards.
Secure Software Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-003Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.
Software Security Assessment
Category: Design and DevelopmentNICE Framework ID: DD-WRL-005Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.
Systems Security Analysis
Category: Implementation and OperationNICE Framework ID: IO-WRL-006Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.
Insider Threat Analysis
Category: Protection and DefenseNICE Framework ID: PD-WRL-005Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.
All-Source Collection Management
Category: Cyberspace IntelligenceNICE Framework ID: CI-WRL-002Responsible for identifying intelligence collection authorities and environment; incorporating priority information requirements into intelligence collection management; and developing concepts to meet leadership's intent. Determines capabilities of available intelligence collection assets; constructs and disseminates intelligence collection plans; and monitors execution of intelligence collection tasks to ensure effective execution of collection plans.
All-Source Collection Requirements Management
Category: Cyberspace IntelligenceNICE Framework ID: CI-WRL-003Responsible for evaluating intelligence collection operations and developing effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of intelligence collection requirements. Evaluates performance of intelligence collection assets and operations.
Exploitation Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-003Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)