Risk Management
DETAIL

NIST SP 800-37 Rev. 2 — Risk Management Framework (RMF)

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

NIST SP 800-37Revision 2, known as the Risk Management Framework (RMF), is astructured risk management approach that guides organizations inselecting, implementing, and continuously monitoring cybersecurityand privacy controls to manage system and organizational risks. Theframework establishes a process for integrating security and privacyinto the system development life cycle, supporting compliance andrisk decision-making.

Published by theNational Institute of Standards and Technology (NIST), the RMF iswidely used by U.S. federal agencies, contractors, and organizationsseeking to align with government cybersecurity requirements. Itcovers risk assessment, security control selection, implementation,assessment, authorization, and continuous monitoring to enhance theprotection of information systems and data.

Organizationstypically adopt the NIST RMF by incorporating its steps into theircybersecurity programs, mapping controls to NIST SP 800-53 or otherstandards, and supporting audit readiness. The framework enablesconsistent risk-informed decisions, effective compliance management,and integration with broader regulatory, security, and privacyecosystems such as FISMA and FedRAMP.

Why it Matters

The NIST RiskManagement Framework equips organizations with a systematic processto integrate security and privacy throughout the system lifecycle.

Key benefitsinclude:

•  Strengthen risk-based decision-making

Enable moreconsistent, informed risk management choices aligned withorganizational priorities and operational requirements.

•  Enhance compliance support

Supportadherence to government and industry regulations by establishing adefensible, repeatable approach to cybersecurity and privacycontrols.

•  Promote continuous monitoring

Facilitateongoing assessment and mitigation of evolving threats by embeddingmonitoring practices in daily operations.

•  Increase audit readiness

Documentsecurity activities and controls in a structured way that simplifiesaudits and demonstrates due diligence to stakeholders.

•  Improve protection of sensitive data

Reduce thelikelihood and impact of data breaches by applying controls tailoredto protect critical assets and information.

How it Works

NIST SP 800-37Rev. 2 establishes the Risk Management Framework (RMF) as astructured, iterative lifecycle process. The RMF integrates a set ofsteps—categorize information systems, select security controls,implement controls, assess effectiveness, authorize operations, andmonitor controls—creating a continuous cycle for managingorganizational risk. This framework directly references controlcatalogs, such as those in NIST SP 800-53, to support effective riskmanagement and governance.

In practice,organizations apply the RMF by first classifying their assets anddetermining appropriate security controls based on risk assessments.Teams implement and document these controls, conduct securityassessments to evaluate control effectiveness, and maintaincompliance through ongoing authorization and monitoring activities.The RMF also facilitates alignment with broader governance programsand regulatory requirements by providing a repeatable structure forcompliance assessments and ongoing oversight of security practices.

Organizationscan operationalize the RMF using SmartSuite by leveraging integratedcontrol libraries, maintaining dynamic risk registers, and automatingpolicy governance processes. SmartSuite enables streamlined evidencecollection, compliance tracking, and remediation workflows,supporting audit readiness and continuous monitoring. Reportingdashboards further allow security and compliance teams to evaluaterisk management practices and monitor organizational security postureover time.

Key Elements

•  System Development Life Cycle Integration

Establishesalignment of security and privacy risk processes within theorganization’s system development methodology.

•  Risk Assessment and Categorization

Describescategorization of information systems based on potential impactlevels and initial risk analysis.

•  Security and Privacy Control Selection

Specifies theprocess for identifying, tailoring, and documenting safeguards fromestablished control baselines.

•  Control Implementation Architecture

Outlinesstructured deployment and configuration of approved security andprivacy measures within environments.

•  Assessment and Validation Activities

Detailsmechanisms for evaluating control effectiveness through testing,review, and analysis.

•  Authorization Process Structure

Defines formalprocedures for system authorization based on assessed risks andcompliance evidence.

•  Continuous Monitoring Framework

Describesongoing monitoring and reporting requirements to manage changes inrisk posture over time.

Framework Scope

NIST SP 800-37Rev. 2 — Risk Management Framework is implemented by federalagencies, government contractors, and organizations managingsensitive or regulated information systems. The framework governsrisk management processes for IT systems and cloud environments,typically during regulatory compliance, system development, or whenenhancing security governance and supporting assurance programs.

Framework Objectives

NIST SP 800-37Rev. 2 Risk Management Framework (RMF) provides a comprehensiveprocess for managing cybersecurity and privacy risks acrossinformation systems.

•  Enhance risk management practices to address evolvingcybersecurity and privacy threats

•  Establish effective security controls to protect critical dataand organizational assets

•  Strengthen governance and oversight of security and privacyprogram operations

•  Promote regulatory compliance through integration with federaland industry requirements

•  Improve operational resilience by enabling continuous monitoringand timely risk response

•  Support audit readiness with documented control assessment andrisk management actions NIST SP 800-37 Rev. 2 (RMF) provides arisk-based authorization process that maps to controls in NIST SP800-53 Rev. 5 and supports FedRAMP authorizations, while aligningwith the NIST Cybersecurity Framework and ISO/IEC 27001 forgovernance. Organizations apply RMF for federal accreditation,regulatory compliance, risk governance, and operational securityimprovements.

Common Framework Mappings

Organizationsmap NIST SP 800-37 Rev. 2 to complementary standards and controls tostreamline risk management, demonstrate compliance, and alignsecurity controls across governance, auditing, and cloudauthorization programs.

Mappedframeworks include:

CIS CriticalSecurity Controls

FedRAMP

ISO/IEC 27001

ISO/IEC 27002

ISO/IEC 27701

NISTCybersecurity Framework

NIST SP 800-30

NIST SP 800-53Rev. 5

At a Glance
NIST SP 800-37 Rev.2 – RMF
  • checklist
    Classicifation
    Category
    info
    Risk Management
    Domain
    info
    Risk Management
    Framework Family
    info
    NIST Special Publications
  • info
    Regulatory Context
    Type
    info
    Standard
    Legal Instrument
    info
    Framework
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    North America
    Region Detail
    info
    United States
    Publisher
    info
    National Institute of Standards and Technology (NIST)
  • published_with_changes
    Versioning
    Version
    info
    NIST SP 800-37 Revision 2
    Effective Date
    info
    December 2018
    Issue Date
    info
    December 2018
  • graph_3
    Adoption
    Adoption Model
    info
    Risk Management
    Implementation Complexity
    info
    High
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

NIST SP 800-37 is published by the National Institute of Standards and Technology and is publicly available through official NIST publications.

Official Resources
NIST Special Publication 800-37 Revision 2
Defines the Risk Management Framework for selecting and implementing cybersecurity controls.
chevron_forward
NIST Risk Management Framework Overview
Outlines the integration of security and privacy into the system development life cycle.
chevron_forward
NIST RMF Quick Start Guide
Provides guidance on starting with the Risk Management Framework implementation.
chevron_forward
NIST SP 800-53 Security Controls
Describes the security and privacy controls for federal information systems and organizations.
chevron_forward
SMARTSUITE

How SmartSuite Supports NIST 800-37 rev 2

Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.

RMF Step Library

Run Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor as connected work.

System Boundary and Scope Management

Define system scope, assets, and dependencies with clear traceability.

SSP and Control Implementation Statements

Maintain SSP content and evidence tied directly to control requirements.

Assessments and POA&Ms

Track findings, remediation actions, owners, retesting, and closure evidence.

Continuous Monitoring Cadence

Schedule recurring monitoring tasks and maintain repeatable evidence over time.

Authorization and Governance Reporting

Produce leadership-ready status reporting for ATO decisions and ongoing oversight.

Related frameworks

CIS Controls v8.1

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

Learn More
arrow_forward
FedRAMP Rev. 5

FedRAMP standardizes security requirements to assess, authorize, and continuously monitor cloud services that handle U.S. federal data.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27002:2022

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

Learn More
arrow_forward
ISO 27701

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For NIST SP 800-37 Rev. 2 (Risk Management Framework)

What is the NIST SP 800-37 Risk Management Framework (RMF) used for?

The NIST SP 800-37 RMF provides a structured methodology for organizations to manage risks to their information systems by selecting, implementing, and monitoring cybersecurity and privacy controls. It supports organizations in making informed risk decisions and helps align security practices with organizational objectives and regulatory requirements.

What is the scope of NIST SP 800-37 RMF in practice?

The RMF applies to all federal information systems, including those operated by contractors on behalf of agencies, and can be adapted by non-federal organizations. Its scope covers categorizing systems, selecting and implementing controls, assessing their effectiveness, authorizing systems for operation, and maintaining continuous oversight.

What are the key concepts and required artifacts of the RMF process?

Key concepts of the RMF include system categorization, control selection, implementation, assessment, authorization, and continuous monitoring. Required artifacts typically include system security plans, risk assessments, security assessment reports, plans of action and milestones (POA&Ms), and authorization packages.

How is the NIST SP 800-37 RMF implemented in organizations?

Organizations integrate the RMF into their system development lifecycle by classifying systems, conducting risk assessments, mapping applicable controls (often from NIST SP 800-53), and documenting implementation. Regular assessments are conducted to evaluate control effectiveness, with ongoing monitoring to ensure sustained compliance and risk mitigation.

How does NIST SP 800-37 RMF relate to other cybersecurity frameworks or regulations?

NIST SP 800-37 RMF aligns closely with frameworks such as NIST SP 800-53 (control catalog), FISMA (regulatory requirement), and FedRAMP (cloud authorization). It can also be mapped to broader governance programs and privacy regulations, supporting harmonization of security practices across multiple compliance obligations.

What are the ongoing compliance requirements under the RMF?

Ongoing RMF compliance requires continuous monitoring of controls, regular risk assessments, timely remediation of identified weaknesses, and maintenance of up-to-date security documentation. Organizations must provide evidence of ongoing oversight and take corrective actions to address new risks or changes in their threat landscape.

How would SmartSuite support NIST SP 800-37 RMF?

SmartSuite supports RMF management by centralizing risk tracking, facilitating control selection and implementation, and enabling streamlined evidence collection for compliance assessments. The platform provides automated compliance tracking, audit readiness workflows, and reporting dashboards to monitor risk posture and demonstrate ongoing adherence to RMF requirements.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward