Under active development Content is continuously updated and improved

RA-9Criticality Analysis

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Identify critical system components and functions by performing a criticality analysis for organization-defined systems, system components, or system services at organization-defined decision points in the system development life cycle.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioritization of protection activities. The identification of critical system components and functions considers applicable laws, executive orders, regulations, directives, policies, standards, system functionality requirements, system and component interfaces, and system and component dependencies.

Systems engineers conduct a functional decomposition of a system to identify mission-critical functions and components. The functional decomposition includes the identification of organizational missions supported by the system, decomposition into the specific functions to perform those missions, and traceability to the hardware, software, and firmware components that implement those functions, including when the functions are shared by many components within and external to the system. The operational environment of a system or a system component may impact the criticality, including the connections to and dependencies on cyber-physical systems, devices, system-of-systems, and outsourced IT services.

System components that allow unmediated access to critical system components or functions are considered critical due to the inherent vulnerabilities that such components create. Component and function criticality are assessed in terms of the impact of a component or function failure on the organizational missions that are supported by the system that contains the components and functions. Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded.

If such analysis is performed early in the system development life cycle, organizations may be able to modify the system design to reduce the critical nature of these components and functions, such as by adding redundancy or alternate paths into the system design. Criticality analysis can also influence the protection measures required by development contractors. In addition to criticality analysis for systems, system components, and system services, criticality analysis of information is an important consideration.

Such analysis is conducted as part of security categorization in RA-2.

>Programmatic Queries

Beta

Related Services

AWS Resource Groups
AWS Resilience Hub
AWS Config

CLI Commands

List resources by criticality tag
aws resourcegroupstaggingapi get-resources --tag-filters Key=Criticality,Values=Mission-Critical
Get Resilience Hub app assessment for BIA
aws resiliencehub list-app-assessments --app-arn APP_ARN
List resource groups by business function
aws resource-groups list-groups --filters Name=resource-type,Values=AWS::AllSupported
Get resiliency recommendations for critical systems
aws resiliencehub list-recommendation-templates --assessment-arn ASSESSMENT_ARN

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What is your organization's documented risk assessment policy and how does it address the requirements of RA-9?
  • Who has been designated as responsible for conducting and maintaining risk assessments?
  • How frequently are risk assessments conducted and what triggers an update to the risk assessment?

Technical Implementation:

  • What methodology or framework do you use to conduct risk assessments?
  • How do you identify and categorize threats and vulnerabilities during the risk assessment process?
  • What tools or systems support your risk assessment activities?
  • How do you determine the security categorization of systems and information?

Evidence & Documentation:

  • Can you provide the most recent risk assessment report?
  • What evidence demonstrates that risk assessment findings are communicated to appropriate stakeholders?
  • Where are risk assessment results documented and how long are they retained?
  • Can you show the security categorization documentation for each system in scope?

Ask AI

Configure your API key to use AI features.