Under active development Content is continuously updated and improved

RA-1Risk Assessment Policy And Procedures

PBMM (P1)
Secret (P1)
Management

>Control Description

(A) The organization develops, documents, and disseminates to organization-defined personnel or roles: (a) A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls. (B) The organization reviews and updates the current: (a) Risk assessment policy organization-defined frequency; and (b) Risk assessment procedures organization-defined frequency.

>Supplemental Guidance

This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable GC legislation and TBS policies, directives and standards. Security program policies and procedures at the organization level may make system-specific policies and procedures unnecessary.

The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.

>Profile-Specific Parameters

(A) (B) frequency [at a frequency no longer than annually]

Ask AI

Configure your API key to use AI features.