NIST Risk Management Framework (RMF): A Complete Guide

This guide covers everything you need to know about the 7-step NIST RMF, how the core standards work together, and how to apply it to information systems.

A staff member is checking the NIST risk management framework.

Published 18 May 2026

Article by

What is the NIST Risk Management Framework?

The NIST Risk Management Framework (RMF) is a structured, 7-step process for integrating security and privacy controls into the lifecycle of an information system. Published by the National Institute of Standards and Technology, it gives organizations a consistent, repeatable way to identify, select, implement, and monitor security controls based on risk.

Who Needs to Follow the NIST RMF?

The NIST RMF is mandatory for US federal agencies and all federal information systems under the Federal Information Security Modernization Act (FISMA). That covers civilian executive branch agencies, defense departments, and any contractor operating federal systems.

Beyond federal mandates, many regulated industries follow it as a risk management strategy or as part of contractual requirements:

  • Defense contractors — Organizations in the Defense Industrial Base apply RMF principles as part of Cybersecurity Maturity Model Certification alignment

  • Healthcare organizations — Those operating under federal programs or handling federal health data frequently align with NIST RMF to meet HIPAA security requirements

  • Financial services — Regulated institutions often use RMF to structure their information security governance alongside frameworks like FFIEC and SOC 2

  • Cloud service providers — Any CSP seeking FedRAMP authorization must complete an RMF-based assessment process

Essentially, if your organization processes, stores, or transmits federal information, or if you're building security programs that need to align with federal standards, the NIST RMF is likely relevant to your work.

The 7 Steps of the NIST Risk Management Framework

The NIST RMF breaks down into seven sequential steps. Each step has defined inputs, outputs, and responsible roles. Together, they move a system from initial preparation through ongoing monitoring.

Step 1: Prepare

Prepare is the newest step in the framework, recently added as an investment before any system-specific work begins. It exists at two levels:

Organization level:

  • Define the risk management strategy and risk tolerance

  • Establish the RMF team and key roles

  • Identify common controls that can be inherited across systems

  • Build the system inventory

System level:

  • Identify the system's stakeholders and mission requirements

  • Document the system boundary and operational environment

  • Identify key risks specific to the system

The Prepare step generates a risk management strategy, organization risk tolerance statement, and a preliminary system description. Doing this work upfront reduces the risk of downstream rework and makes every subsequent step faster.

Step 2: Categorize

Categorize determines the security impact level of the information system using FIPS 199, the Federal Information Processing Standard for categorizing information and information systems.

Each system receives a security category based on three factors:

  • Confidentiality — What happens if the information is disclosed without authorization?

  • Integrity — What happens if the information or system is modified without authorization?

  • Availability — What happens if the information or system is unavailable?

Each factor is rated Low, Moderate, or High. The overall system categorization (Low, Moderate, or High) is the highest impact level across all three.

Step 3: Select

With the system's impact level established, the next step is to select a set of security controls from NIST SP 800-53 that match the risk profile.

Each impact level maps to a starting baseline:

  • Low baseline — Controls essential for systems with limited adverse impact if compromised

  • Moderate baseline — Controls for systems where compromise would have serious adverse effects

  • High baseline — Controls for systems with severe or catastrophic potential consequences

From there, organizations tailor the baseline by adding controls where specific risks warrant it, removing controls where they're not applicable, and adjusting parameters to fit the operational context.

Step 4: Implement

With controls selected, the system owner implements them and documents how each control has been put in place. This is where abstract policy becomes operational reality.

Key documentation produced at this stage includes:

  • System Security Plan (SSP) — The comprehensive document describing the system, its environment, and how each control is implemented. The SSP is the central artifact of the entire RMF process.

  • Privacy Plan — For systems processing personally identifiable information

  • System-level Risk Assessment — Formal assessment of residual risks after controls are in place

A well-written SSP makes the next step significantly easier. Assessors use it as their primary reference point. Gaps in implementation documentation during implementation often show up as findings during assessment.

Step 5: Assess

The Assess step verifies whether the implemented controls are working as intended. A Security Control Assessor (SCA), who should be independent of the system development and implementation team, evaluates each control to determine if it's:

  • Implemented correctly — The control exists and works as described in the SSP

  • Operating as intended — The control functions consistently under normal operating conditions

  • Producing the desired outcome — The control actually reduces risk as planned

The assessment uses a combination of examination, interviews, and testing to determine whether findings need to be addressed and how to effectively mitigate any issues.

Step 6: Authorize

Authorization is a formal risk acceptance decision made by the Authorizing Official (AO). This person reviews the complete authorization package, which includes:

  • The System Security Plan

  • The Security Assessment Report

  • The Plan of Action and Milestones

Based on this package, the AO makes one of three decisions:

  • Authority to Operate (ATO) — The system is authorized to operate, with any residual risks formally accepted

  • Interim Authority to Operate (IATO) — The system may operate for a limited period while specific risks are addressed

  • Denial of Authorization — The system cannot operate until identified risks are remediated

The authorization decision is not a technical judgment — it's a business and mission risk decision made by an executive. The AO is accountable for accepting the residual risk on behalf of the organization. This framing shifts authorization from a compliance checkbox to a governance activity with real accountability.

Take Control of Your Risk Landscape

Seamlessly identify and proactively mitigate risks to enhance organizational resilience and decision-making.

Step 7: Monitor

An ATO is not the end of the RMF. Rather, it's the beginning of the monitoring phase. This step establishes ongoing visibility into the system's security posture through a formal continuous monitoring program.

Key activities in the Monitor step include:

  • Continuous monitoring of controls — Automated and manual checks to confirm controls remain effective as the system evolves

  • Security status reporting — Regular reports to the AO on the system's security posture, open findings, and remediation progress

  • POA&M management — Tracking and closing open weaknesses over time

  • Change management — Assessing how changes to the system (patches, new functionality, architecture changes) affect the security baseline

Organizations implementing ISCM (Information Security Continuous Monitoring) use automated tools to collect and analyze security data in near-real time. Platforms like SafetyCulture support audit checklists, incident tracking, and risk assessment documentation with cybersecurity checklists designed for ongoing compliance checks and simplified monitoring.

Core NIST Standards: SP 800-37 and SP 800-53

Two NIST publications form the backbone of any RMF implementation. Understanding what each one does and how they work together is the first step toward applying the framework correctly.

NIST SP 800-37 Rev. 2 is the procedural guide. It defines the 7-step RMF process, the roles involved, and how risk management activities integrate with the system development lifecycle.

If SP 800-37 is the rulebook for how to run the process, then SP 800-53 is the catalog you draw from. NIST SP 800-53 Rev. 5 is the security and privacy controls catalog. During the Select step of the RMF, practitioners use SP 800-53 to choose a baseline of controls appropriate to their system's risk level.

SP 800-37 Rev. 2

SP 800-53 Rev. 5

Purpose

Defines the RMF process and steps

Defines the security and privacy controls catalog

Answers

How do I manage risk for this system?

Which controls do I select and implement?

Used in

All 7 RMF steps

Primarily in Steps 3 (Select) and 5 (Assess)

Applies to

Federal agencies and systems

Federal agencies; widely used in private sector

A common point of confusion: SP 800-37 tells you what to do. SP 800-53 tells you what to select. Neither replaces the other — you need both to run the RMF.

NIST RMF Roles and Responsibilities

The RMF assigns specific responsibilities to defined roles. Understanding who does what is critical for practitioners managing the authorization process.

Role

Responsibility

Authorizing Official (AO)

Senior executive who accepts organizational risk and makes the ATO/IATO/denial decision

Information System Owner (ISO)

Accountable for the day-to-day operations and security of the system; manages the SSP

Information System Security Officer (ISSO)

Ensures the system's security posture complies with organizational policies; supports the ISO

Security Control Assessor (SCA)

Independently assesses the effectiveness of security controls; produces the SAR

Common Control Provider

Responsible for controls inherited by multiple systems (e.g., network-level controls)

Risk Executive

Organization-wide role that ensures consistent risk management across all systems

In smaller organizations, some of these roles may be combined. In federal agencies, role separation — particularly between the system owner and the assessor — is a key integrity requirement. An assessor who also implemented the controls they're assessing is a common audit finding.

Why use SafetyCulture?

SafetyCulture is a workplace operations platform adopted across industries such as manufacturing, mining, construction, retail, and hospitality. It’s designed to equip leaders and working teams with the knowledge and tools to do their best work—to the safest and highest standard.

Promote a culture of accountability and transparency within your organization where every member takes ownership of their actions. Align governance practices, enhance risk management protocols, and ensure compliance with legal requirements and internal policies by streamlining and standardizing workflows through a unified platform.

✓ Save time and reduce costs 
✓ Stay on top of risks and incidents 
✓ Boost productivity and efficiency
✓ Enhance communication and collaboration
✓ Discover improvement opportunities
✓ Make data-driven business decisions

FAQs About NIST Risk Management Framework

GC

Article by

Gabrielle Cayabyab

SafetyCulture Content Specialist, SafetyCulture

View author profile