Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.


The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy



Ronald S. Ross


This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; and continuous monitoring. The RMF includes activities to prepare organizations to execute the framework at appropriate risk management levels. The RMF also promotes near real-time risk management and ongoing information system and common control authorization through the implementation of continuous monitoring processes; provides senior leaders and executives with the necessary information to make efficient, cost-effective, risk management decisions about the systems supporting their missions and business functions; and incorporates security and privacy into the system development life cycle. Executing the RMF tasks links essential risk management processes at the system level to risk management processes at the organization level. In addition, it establishes responsibility and accountability for the controls implemented within an organization's information systems and inherited by those systems.
Special Publication (NIST SP) - 800-37 Rev. 2
Report Number
800-37 Rev. 2


assess, authorization to operate, authorization to use, authorizing official, categorize, common control, common control authorization, common control provider, continuous monitoring, control assessor, control baseline, cybersecurity framework profile, hybrid control, information owner or steward, information security, monitor, ongoing authorization, plan of action and milestones, privacy, privacy assessment report, privacy control, privacy plan, privacy risk, risk assessment, risk executive function, risk management, risk management framework, security, security assessment report, security control, security engineering, security plan, security risk, senior agency information security officer, senior agency official for privacy, supply chain risk management, system development life cycle, system owner, system privacy officer, system security officer, system-specific control.
Created December 20, 2018, Updated January 27, 2020