Link Search Menu Expand Document

3.4 IMPLEMENT

Purpose

The purpose of the Implement step is to implement the controls in the security and privacy plans for the system and for the organization and to document in a baseline configuration, the specific details of the control implementation.

IMPLEMENT TASKS

Table 5 provides a summary of tasks and expected outcomes for the RMF Implement step. Applicable Cybersecurity Framework constructs are also provided.

TABLE 5: IMPLEMENT TASKS AND OUTCOMES

Tasks Outcomes
TASK I-1
CONTROL IMPLEMENTATION
• Controls specified in the security and privacy plans are implemented.
[Cybersecurity Framework: PR.IP-1]
• Systems security and privacy engineering methodologies are used to implement the controls in the system security and privacy plans.
[Cybersecurity Framework: PR.IP-2]
TASK I-2
UPDATE CONTROL IMPLEMENTATION INFORMATION
• Changes to the planned implementation of controls are documented.
[Cybersecurity Framework: PR.IP-1]
• The security and privacy plans are updated based on information obtained during the implementation of the controls.
[Cybersecurity Framework: Profile]

Quick link to summary table for RMF tasks, responsibilities, and supporting roles.


Table of contents