<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Industry%3AProject_Review%2FNIST_SP_800-37r1_FPD_Appendix_H</id>
		<title>Industry:Project Review/NIST SP 800-37r1 FPD Appendix H - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Industry%3AProject_Review%2FNIST_SP_800-37r1_FPD_Appendix_H"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H&amp;action=history"/>
		<updated>2026-05-02T09:53:05Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H&amp;diff=74695&amp;oldid=prev</id>
		<title>Dan Philpott: Initial add for GIC review of NIST SP 800-37r1 FPD</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H&amp;diff=74695&amp;oldid=prev"/>
				<updated>2009-12-04T05:24:42Z</updated>
		
		<summary type="html">&lt;p&gt;Initial add for GIC review of NIST SP 800-37r1 FPD&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX H&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''OPERATIONAL SCENARIOS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
APPLYING THE [http://fismapedia.org/index.php?title=Term:Risk_Management RISK MANAGEMENT] FRAMEWORK IN DIFFERENT ENVIRONMENTS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Managing risk from information systems in modern computing environments with a diverse set of potential business relationships can be challenging for organizations. Relationships are established and maintained in a variety of ways, for example, through joint ventures, business partnerships, outsourcing arrangements (i.e., through contracts, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements, interagency and intra-agency agreements), licensing agreements, and [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges (i.e., [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] collaborations or partnerships).&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides additional guidance on the application and use of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in external environments to include relationships with external service providers.&amp;lt;/ref&amp;gt; The [http://fismapedia.org/index.php?title=Term:Risk_Management Risk Management] Framework ([http://fismapedia.org/index.php?title=AnA:RMF RMF]) applies only to federal information systems. There are two distinct types of operational scenarios that affect how organizations address the [http://fismapedia.org/index.php?title=AnA:RMF RMF] steps and associated tasks:&lt;br /&gt;
&lt;br /&gt;
* Information systems used or operated by federal agencies;&amp;lt;ref&amp;gt;References to federal agencies include organizations that are subordinate to those agencies.&amp;lt;/ref&amp;gt; and&lt;br /&gt;
* Information systems used or operated by other organizations&amp;lt;ref&amp;gt;Organizations that use or operate an information system on behalf of a [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency] or one of its subordinate organizations can include, for example, other federal agencies or their subordinate organizations, state and local government agencies, contractors, and academic institutions.&amp;lt;/ref&amp;gt; on behalf of federal agencies.&lt;br /&gt;
&lt;br /&gt;
SCENARIO 1: For an information system that is used or operated by a [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency], the system [http://fismapedia.org/index.php?title=Term:Boundary boundary] is defined by the agency. The agency conducts all [http://fismapedia.org/index.php?title=AnA:RMF RMF] tasks to include information system authorization. The agency maintains control over the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within and inherited by the information system.&lt;br /&gt;
&lt;br /&gt;
SCENARIO 2: For an information system that is used or operated by another organization on behalf of a [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency], the system [http://fismapedia.org/index.php?title=Term:Boundary boundary] is defined by the agency in collaboration with the other organization and one of the following situations applies:&lt;br /&gt;
&lt;br /&gt;
:-  If the organization is contracted to a [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency], the [http://fismapedia.org/index.php?title=Term:Contractor contractor] can conduct all [http://fismapedia.org/index.php?title=AnA:RMF RMF] tasks except those tasks which must be carried out by the [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency] as part of its inherent governmental responsibilities.&amp;lt;ref&amp;gt;Organizations ensure that requirements for conducting the specific tasks in the [http://fismapedia.org/index.php?title=AnA:RMF RMF] are included in appropriate contractual vehicles, including requirements for independent assessments, when appropriate.&amp;lt;/ref&amp;gt; The agency provides [http://fismapedia.org/index.php?title=AnA:RMF RMF]-related inputs to the [http://fismapedia.org/index.php?title=Term:Contractor contractor], as needed, and maintains strict oversight on all [http://fismapedia.org/index.php?title=Term:Contractor contractor]-executed [http://fismapedia.org/index.php?title=AnA:RMF RMF] tasks. The [http://fismapedia.org/index.php?title=Term:Contractor contractor] provides appropriate evidence in the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] package for the authorization decision by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] from the [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency].&lt;br /&gt;
:-  If the organization is a [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency], the organization can conduct all [http://fismapedia.org/index.php?title=AnA:RMF RMF] tasks to include the information system authorization. The information system authorization can also be a joint authorization if both parties agree to share the authorization responsibilities. In situations where a [http://fismapedia.org/index.php?title=Term:Federal_Agency federal agency] uses or operates an information system on behalf of multiple federal agencies, the joint authorization can include all participating agencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-37-Rev1/SP800-37-rev1-FPD.pdf NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach]&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	</feed>