CMMC RM.2.141 - Periodically Assess Risk to Organizational Operations

CMMC RM.2.141 - Periodically Assess Risk to Organizational Operations

Requirement text: RM.2.141: Periodically assess the risk to organizational operations (including
mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
Clearly defined system boundaries are a prerequisite for effective risk assessments. Such
risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational
operations, organizational assets, and individuals based on the operation and use of
organizational systems. Risk assessments also consider risk from external parties (e.g.,
service providers, contractor operating systems on behalf of the organization, individuals
accessing organizational systems, outsourcing entities). Risk assessments, either formal or
informal, can be conducted at the organization level, the mission or business process level,
or the system level, and at any phase in the system development life cycle.
NIST SP 800-30 provides guidance on conducting risk assessments.

CMMC CLARIFICATION
Risk arises from anything that can reduce an organization’s assurance of mission/business
success; cause harm to image or reputation; or harm individuals, other organizations, or the
Nation.

Organizations should assess the risk to their operations and assets at regular intervals.
Areas where weakness or vulnerabilities could lead to risk may include:
      • poorly designed and executed business processes;
      • inadvertent actions of people, such as disclosure or modification of information;
      • intentional actions of people, such as insider threat and fraud;
      • failure of systems to perform as intended;
      • failures of technology; and
      • external events, such as natural disasters, public infrastructure and supply chain
        failures.

An organization can perform a formal or an informal risk assessment. In a formal risk
assessment, you use established criteria and procedures. Formal risk assessments are
documented. It is important to note that risk assessments differ from vulnerability
assessments (See RM.2.142). A vulnerability assessment provides input to a risk assessment
along with other information such as results from likelihood analysis and analysis of
potential treat sources.

Example
You help manage IT for your employer. You and your team members are working on a big
government contract requiring you to store CUI. You assess the risk involved with storing
CUI. You consider storing that information with a cloud provider. You and your coworkers
discuss the pros and cons of this option. Then, you use these details to make the final
decision about using a cloud provider.

References
• NIST SP 800-171 Rev 1 3.11.1
• NIST CSF v1.1 ID.RA-1, ID.RA-4, DE.AE-4, RS.MI-3
• CERT RMM v1.2 RISK:SG4
• NIST SP 800-53 Rev 4 RA-3
    • Related Articles

    • Risk Assessment: SP 800-171 Security Family 3.11

      Companies are dependent upon information technology and associated systems. While the increasing number of information technology products used in various companies and industries can be beneficial, in some instances they may also introduce serious ...
    • CMMC RM.3.144 - Perform Risk Assessments Periodically

      Requirement text: RM.3.144: Periodically perform risk assessments to identify and prioritize risks according to the defined risk categories, risk sources, and risk measurement criteria. DISCUSSION FROM SOURCE: NIST CSF V1.1 The organization ...
    • CMMC CA.2.158 - Periodically Assess Effectiveness of Security Controls

      Requirement text: CA.2.158: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations assess security controls ...
    • CMMC CA.4.227 - Periodically Perform Red Teaming against Organizational Assets

      Requirement text: CA.4.227: Periodically perform red teaming against organizational assets in order to validate defensive capabilities. DISCUSSION FROM SOURCE: CMMC Red Teaming is a specialized type of assessment conducted against an organization’s ...
    • CMMC RM.3.146 - Implement Risk Mitigation Plans

      Requirement text: RM.3.146: Develop and implement risk mitigation plans. DISCUSSION FROM SOURCE: CERT RMM V1.2 When the consequences of risk exceed the organization’s risk thresholds and are determined to be unacceptable, the organization must act to ...