RA · Plan wizard

Risk Assessment Plan

Documents how the system categorizes information, identifies threats and vulnerabilities, assesses likelihood and impact, responds to risk, performs criticality analysis, and conducts threat hunting. Covers the controls of the RA family in NIST SP 800-53 r5 and aligns with FIPS 199 (Categorization), FIPS 200 (Minimum Security Requirements), NIST SP 800-30 r1 (Risk Assessment Guide), NIST SP 800-37 r2 (RMF), NIST SP 800-39 (Managing Information Security Risk), and NIST SP 800-161 r1 (Supply Chain Risk Management).

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Methodology references and tooling that anchor the rest of the plan.

How information is categorized per FIPS 199 (e.g., 'FIPS 199 + CNSSI 1253 overlay', 'FIPS 199 with NIST SP 800-60 v2 information-type guide').
Methodology used to assess risk (e.g., 'NIST SP 800-30 r1 likelihood × impact', 'OCTAVE Allegro', 'FAIR (quantitative)').
Where the risk register is maintained (e.g., 'GRC tool — Archer / ServiceNow GRC', 'eMASS', 'Spreadsheet under /repo/risk/register.xlsx with version control').
Primary scanner (typically the same tool referenced in the SI plan: e.g., 'Tenable.sc', 'Qualys VMDR', 'Rapid7 InsightVM').
How often proactive hunts are conducted (e.g., 'Quarterly hypothesis-driven hunts; continuous SOAR-assisted micro-hunts').
Role that performs hunts (e.g., 'Enterprise SOC Threat Intelligence Team', 'External MDR retainer + internal IR lead').
Security Categorization (RA-2) → §4.x

FIPS 199 process and information-type analysis.

The Confidentiality / Integrity / Availability impact levels (Low / Moderate / High) and how they were determined. Reference NIST SP 800-60 v2 information-type guide for the rationale.
Per FIPS 199, system categorization is the high-water mark across information types. Document the deciding information type and any moderation per CNSSI 1253 if applicable.
    Suggested:
    Per RA-2(1), how individual data elements within an information type are prioritized when impact varies. Often required at moderate / high baselines.
    What events cause categorization to be revisited (e.g., 'Significant change per CM-4', 'New information type onboarded', 'Annual ATO review').
    Risk-Assessment Methodology (RA-3) → §4.x

    How likelihood, impact, and risk are computed.

    How often the system risk assessment is refreshed. RA-3 ODV — common values: 'Annually + on significant change', 'Every 3 years + on significant change'.
    Roles / personnel to whom risk-assessment results are distributed (System Owner, ISSO, ISSM, AO, ITRM committee, etc.).
    Format / template used (e.g., 'NIST SP 800-30 r1 Appendix L worksheets', 'Internal Risk Assessment Report template', 'eMASS-generated Security Assessment Report').
    Risk Register Management → §4.x

    How identified risks are tracked, prioritized, and aged.

    How long risks may sit at each status before re-evaluation (e.g., 'Open risks reviewed quarterly; accepted risks re-validated annually; mitigated risks closed when controls verified').
    Thresholds at which risks escalate beyond System Owner (e.g., 'High residual → ISSM brief; Very High residual → AO immediate notification').
    Vulnerability Scanning (RA-5) → §4.x

    Scan scope, cadence, and coordination with SI-2 remediation.

    Cadence by scope (e.g., 'External: continuous; Internal authenticated: weekly; Container images: on build; Web app DAST: monthly'). RA-5 ODV.
    Posture on authenticated scans (preferred for accuracy). Service-account credential management.
    How scanner signatures are kept current (auto-update, daily plugin pulls). Required by RA-5(2) — system is scanned with current information.
    Where scan findings land. Typically a remediation queue feeding SI-2. Severity classification mapping.
    Per RA-5(11), how vulnerability information is shared with stakeholders (System Owner, ISSO, ISSM, downstream consumers, partner systems).
    Per RA-5(5), how scanner privileged access is controlled. Service-account vault, JIT credential, MFA on scanner console.
    Risk Response (RA-7) → §4.x

    Decision framework and authority for risk disposition.

    Who can accept risk at each level (e.g., 'Low: System Owner; Moderate: ISSM; High: AO; Very High: AO with CIO concurrence'). Reference any organizational risk-tolerance statement.
    Documentation required for risk acceptance (e.g., 'Signed risk-acceptance memo + entry in risk register + POA&M for periodic re-validation').
    How often accepted risks are re-validated to ensure conditions haven't changed.
    Criticality Analysis (RA-9) → §4.x

    Identification of critical components for prioritized protection.

    Approach to identifying critical components (e.g., 'NIST SP 800-161 r1 § 2.4 supply-chain criticality; NIST SP 800-30 r1 Appendix F asset value; FMEA for failure-impact analysis').
    How often the analysis is refreshed (e.g., 'Annual + on architecture change').
    How criticality drives architecture choices, redundancy investments, monitoring prioritization, supplier vetting depth.
    Supply Chain Risk (RA-3(1)) → §4.x

    Supply-chain-specific risk assessment, separate from generic RA-3.

    Vendors / components whose compromise would disable the system. Single-source items, foreign-sourced components per FAR / DFARS, key open-source projects.
    How RA-3(1) outputs feed the SR family controls. If SR plan exists, reference its location.
    Threat Hunting (RA-10) → §4.x

    Proactive search for previously undetected threats.

    Hypothesis-driven hunts based on threat intelligence, MITRE ATT&CK techniques, anomaly-driven hunts. Tooling (SIEM, EDR query, custom queries).
    What happens when a hunt finds something (incident escalation per IR plan, control gap → POA&M, detection-rule creation feeding SI-4).
    Privacy Risk Assessment (RA-8) → §4.x

    Privacy Impact Assessment if applicable to information categorization.

    Methodology used (e.g., 'NIST IR 8062 privacy risk model', 'OMB M-03-22 PIA template', 'Internal privacy-impact framework based on FIPPs').
    When PIA is refreshed (e.g., 'Annually; on significant change to information collection or use'). Reference PT family if authored.
    Risk-Assessment Scope and Coverage → §2.x

    Quantitative scope numbers that anchor metrics later in the plan.

    Order-of-magnitude count to anchor the metric tracking.
    Approximate count of hosts / containers / images covered by vulnerability scans.
    Count of components classified as critical.
    Count of vendors / open-source projects in the supply-chain register.
    Risk-Assessment Metrics & KPIs → §6.x

    Metrics tracked to demonstrate RA control effectiveness.

      Suggested:
      Scan Coverage Verification → §6.x

      How the org continuously verifies RA-5 scanning is correctly deployed.

      How often the asset inventory (CMDB) is reconciled against scanned-asset roster. Detects shadow / unscanned hosts.
      How the org verifies scan signatures are current (e.g., 'Daily plugin-update verification report'). Required by RA-5(2).
      Cross-references to other RMF artifacts → §7

      Where this plan plugs into the broader RMF package.

      Where in the SSP the RA control implementations are summarized (e.g., 'SSP §13.11').
      Convention for RA-related POA&M items (e.g., 'POAM-RA-' for general; 'POAM-RA5-' for vuln-specific).
      How RA-5 findings flow into the SI-2 remediation queue. Tooling, ticket-creation automation, owner assignment.
      How RA-3 outputs inform CM-4 / CM-3 change-impact analysis. Reference the CM Plan.
      Pointer to the CA-7 monitoring strategy document tying RA continuous-monitoring metrics to the broader ConMon plan.
      How incidents trigger risk-register revisits. Closed incidents that introduced new risk get entries in the register.
      Pointer to the SR (Supply Chain Risk Management) plan if authored. RA-3(1) is the gateway control; SR formalizes the program.
      4

      Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

      5