NIST Risk Management Framework (RMF): A Complete Guide
This guide covers everything you need to know about the 7-step NIST RMF, how the core standards work together, and how to apply it to information systems.

This guide covers everything you need to know about the 7-step NIST RMF, how the core standards work together, and how to apply it to information systems.

Published 18 May 2026
Article by
8 min read
The NIST Risk Management Framework (RMF) is a structured, 7-step process for integrating security and privacy controls into the lifecycle of an information system. Published by the National Institute of Standards and Technology, it gives organizations a consistent, repeatable way to identify, select, implement, and monitor security controls based on risk.
The NIST RMF is mandatory for US federal agencies and all federal information systems under the Federal Information Security Modernization Act (FISMA). That covers civilian executive branch agencies, defense departments, and any contractor operating federal systems.
Beyond federal mandates, many regulated industries follow it as a risk management strategy or as part of contractual requirements:
Defense contractors — Organizations in the Defense Industrial Base apply RMF principles as part of Cybersecurity Maturity Model Certification alignment
Healthcare organizations — Those operating under federal programs or handling federal health data frequently align with NIST RMF to meet HIPAA security requirements
Financial services — Regulated institutions often use RMF to structure their information security governance alongside frameworks like FFIEC and SOC 2
Cloud service providers — Any CSP seeking FedRAMP authorization must complete an RMF-based assessment process
Essentially, if your organization processes, stores, or transmits federal information, or if you're building security programs that need to align with federal standards, the NIST RMF is likely relevant to your work.
The NIST RMF breaks down into seven sequential steps. Each step has defined inputs, outputs, and responsible roles. Together, they move a system from initial preparation through ongoing monitoring.
Prepare is the newest step in the framework, recently added as an investment before any system-specific work begins. It exists at two levels:
Organization level:
Define the risk management strategy and risk tolerance
Establish the RMF team and key roles
Identify common controls that can be inherited across systems
Build the system inventory
System level:
Identify the system's stakeholders and mission requirements
Document the system boundary and operational environment
Identify key risks specific to the system
The Prepare step generates a risk management strategy, organization risk tolerance statement, and a preliminary system description. Doing this work upfront reduces the risk of downstream rework and makes every subsequent step faster.
Categorize determines the security impact level of the information system using FIPS 199, the Federal Information Processing Standard for categorizing information and information systems.
Each system receives a security category based on three factors:
Confidentiality — What happens if the information is disclosed without authorization?
Integrity — What happens if the information or system is modified without authorization?
Availability — What happens if the information or system is unavailable?
Each factor is rated Low, Moderate, or High. The overall system categorization (Low, Moderate, or High) is the highest impact level across all three.
With the system's impact level established, the next step is to select a set of security controls from NIST SP 800-53 that match the risk profile.
Each impact level maps to a starting baseline:
Low baseline — Controls essential for systems with limited adverse impact if compromised
Moderate baseline — Controls for systems where compromise would have serious adverse effects
High baseline — Controls for systems with severe or catastrophic potential consequences
From there, organizations tailor the baseline by adding controls where specific risks warrant it, removing controls where they're not applicable, and adjusting parameters to fit the operational context.
With controls selected, the system owner implements them and documents how each control has been put in place. This is where abstract policy becomes operational reality.
Key documentation produced at this stage includes:
System Security Plan (SSP) — The comprehensive document describing the system, its environment, and how each control is implemented. The SSP is the central artifact of the entire RMF process.
Privacy Plan — For systems processing personally identifiable information
System-level Risk Assessment — Formal assessment of residual risks after controls are in place
A well-written SSP makes the next step significantly easier. Assessors use it as their primary reference point. Gaps in implementation documentation during implementation often show up as findings during assessment.
The Assess step verifies whether the implemented controls are working as intended. A Security Control Assessor (SCA), who should be independent of the system development and implementation team, evaluates each control to determine if it's:
Implemented correctly — The control exists and works as described in the SSP
Operating as intended — The control functions consistently under normal operating conditions
Producing the desired outcome — The control actually reduces risk as planned
The assessment uses a combination of examination, interviews, and testing to determine whether findings need to be addressed and how to effectively mitigate any issues.
Authorization is a formal risk acceptance decision made by the Authorizing Official (AO). This person reviews the complete authorization package, which includes:
The System Security Plan
The Security Assessment Report
The Plan of Action and Milestones
Based on this package, the AO makes one of three decisions:
Authority to Operate (ATO) — The system is authorized to operate, with any residual risks formally accepted
Interim Authority to Operate (IATO) — The system may operate for a limited period while specific risks are addressed
Denial of Authorization — The system cannot operate until identified risks are remediated
The authorization decision is not a technical judgment — it's a business and mission risk decision made by an executive. The AO is accountable for accepting the residual risk on behalf of the organization. This framing shifts authorization from a compliance checkbox to a governance activity with real accountability.
Seamlessly identify and proactively mitigate risks to enhance organizational resilience and decision-making.
An ATO is not the end of the RMF. Rather, it's the beginning of the monitoring phase. This step establishes ongoing visibility into the system's security posture through a formal continuous monitoring program.
Key activities in the Monitor step include:
Continuous monitoring of controls — Automated and manual checks to confirm controls remain effective as the system evolves
Security status reporting — Regular reports to the AO on the system's security posture, open findings, and remediation progress
POA&M management — Tracking and closing open weaknesses over time
Change management — Assessing how changes to the system (patches, new functionality, architecture changes) affect the security baseline
Organizations implementing ISCM (Information Security Continuous Monitoring) use automated tools to collect and analyze security data in near-real time. Platforms like SafetyCulture support audit checklists, incident tracking, and risk assessment documentation with cybersecurity checklists designed for ongoing compliance checks and simplified monitoring.
Two NIST publications form the backbone of any RMF implementation. Understanding what each one does and how they work together is the first step toward applying the framework correctly.
NIST SP 800-37 Rev. 2 is the procedural guide. It defines the 7-step RMF process, the roles involved, and how risk management activities integrate with the system development lifecycle.
If SP 800-37 is the rulebook for how to run the process, then SP 800-53 is the catalog you draw from. NIST SP 800-53 Rev. 5 is the security and privacy controls catalog. During the Select step of the RMF, practitioners use SP 800-53 to choose a baseline of controls appropriate to their system's risk level.
SP 800-37 Rev. 2 | SP 800-53 Rev. 5 | |
Purpose | Defines the RMF process and steps | Defines the security and privacy controls catalog |
Answers | How do I manage risk for this system? | Which controls do I select and implement? |
Used in | All 7 RMF steps | Primarily in Steps 3 (Select) and 5 (Assess) |
Applies to | Federal agencies and systems | Federal agencies; widely used in private sector |
A common point of confusion: SP 800-37 tells you what to do. SP 800-53 tells you what to select. Neither replaces the other — you need both to run the RMF.
The RMF assigns specific responsibilities to defined roles. Understanding who does what is critical for practitioners managing the authorization process.
Role | Responsibility |
Authorizing Official (AO) | Senior executive who accepts organizational risk and makes the ATO/IATO/denial decision |
Information System Owner (ISO) | Accountable for the day-to-day operations and security of the system; manages the SSP |
Information System Security Officer (ISSO) | Ensures the system's security posture complies with organizational policies; supports the ISO |
Security Control Assessor (SCA) | Independently assesses the effectiveness of security controls; produces the SAR |
Common Control Provider | Responsible for controls inherited by multiple systems (e.g., network-level controls) |
Risk Executive | Organization-wide role that ensures consistent risk management across all systems |
In smaller organizations, some of these roles may be combined. In federal agencies, role separation — particularly between the system owner and the assessor — is a key integrity requirement. An assessor who also implemented the controls they're assessing is a common audit finding.
SafetyCulture is a workplace operations platform adopted across industries such as manufacturing, mining, construction, retail, and hospitality. It’s designed to equip leaders and working teams with the knowledge and tools to do their best work—to the safest and highest standard.
Promote a culture of accountability and transparency within your organization where every member takes ownership of their actions. Align governance practices, enhance risk management protocols, and ensure compliance with legal requirements and internal policies by streamlining and standardizing workflows through a unified platform.
✓ Save time and reduce costs
✓ Stay on top of risks and incidents
✓ Boost productivity and efficiency
✓ Enhance communication and collaboration
✓ Discover improvement opportunities
✓ Make data-driven business decisions
In this article