1 1 00:00:00,090 --> 00:00:01,530 In this section of the course 2 2 00:00:01,530 --> 00:00:03,360 we're going to cover some associated topics. 3 3 00:00:03,360 --> 00:00:04,530 They're going to help you implement 4 4 00:00:04,530 --> 00:00:07,140 the risk management framework in your organization, 5 5 00:00:07,140 --> 00:00:10,200 including how you can automate RMF, use web-based portals 6 6 00:00:10,200 --> 00:00:12,600 like eMASS to submit and track your packages, 7 7 00:00:12,600 --> 00:00:14,863 and how you can integrate RMF 8 8 00:00:14,863 --> 00:00:16,020 and then this cybersecurity framework together 9 9 00:00:16,020 --> 00:00:18,840 for additional efficiencies and effectiveness. 10 10 00:00:18,840 --> 00:00:20,640 As we move through this section of the course 11 11 00:00:20,640 --> 00:00:21,510 we're going to first look 12 12 00:00:21,510 --> 00:00:24,000 at the methods that are used to automate RMF. 13 13 00:00:24,000 --> 00:00:26,490 After all, the risk management framework can be a long 14 14 00:00:26,490 --> 00:00:29,520 and drawn out process, so anytime we can gain efficiencies 15 15 00:00:29,520 --> 00:00:31,980 and cut down on the time involved with a given step 16 16 00:00:31,980 --> 00:00:34,620 this can help shorten our overall timeline. 17 17 00:00:34,620 --> 00:00:36,990 When it comes to automation, there are many solutions 18 18 00:00:36,990 --> 00:00:39,120 on the market to help you through the process 19 19 00:00:39,120 --> 00:00:42,150 including commercial tools like Xacta 360, as well 20 20 00:00:42,150 --> 00:00:44,550 as some government off the shelf software that was developed 21 21 00:00:44,550 --> 00:00:47,190 by individual government agencies, such as the one built 22 22 00:00:47,190 --> 00:00:50,850 by the US Navy, the Department of Interior, and many others. 23 23 00:00:50,850 --> 00:00:53,190 Next, we're going to explore eMASS. 24 24 00:00:53,190 --> 00:00:56,370 eMASS is the Enterprise Mission Assurance Support Service 25 25 00:00:56,370 --> 00:00:58,680 and it's a government off the shelf software tool 26 26 00:00:58,680 --> 00:01:00,510 that was created by the Department of Defense 27 27 00:01:00,510 --> 00:01:02,910 to help organizations inventory their systems 28 28 00:01:02,910 --> 00:01:05,940 and provide configuration management capabilities as well. 29 29 00:01:05,940 --> 00:01:07,710 We're also going to be diving into an overview 30 30 00:01:07,710 --> 00:01:09,960 of how eMASS works and some of the main risks 31 31 00:01:09,960 --> 00:01:12,120 involved with using a system like eMASS 32 32 00:01:12,120 --> 00:01:13,920 within your organization to automate 33 33 00:01:13,920 --> 00:01:15,210 the risk management framework 34 34 00:01:15,210 --> 00:01:17,610 and all of its associated processes. 35 35 00:01:17,610 --> 00:01:19,020 Finally, we're going to discuss 36 36 00:01:19,020 --> 00:01:20,310 how the risk management framework 37 37 00:01:20,310 --> 00:01:23,370 and the cybersecurity framework are used in the real world. 38 38 00:01:23,370 --> 00:01:25,530 The benefits and use cases of each one 39 39 00:01:25,530 --> 00:01:27,720 and how they can be integrated together to provide you 40 40 00:01:27,720 --> 00:01:29,550 with more efficiencies and effectiveness 41 41 00:01:29,550 --> 00:01:30,690 than you could achieve by using 42 42 00:01:30,690 --> 00:01:33,720 either one or the other of these frameworks by themself. 43 43 00:01:33,720 --> 00:01:36,330 So with that said, let's jump into our coverage 44 44 00:01:36,330 --> 00:01:39,000 of some associated topics that are important to understand 45 45 00:01:39,000 --> 00:01:41,340 as you begin to implement the risk management framework 46 46 00:01:41,340 --> 00:01:44,290 within your own organization in this section of the course.