NIST SP 800-37 Rev. 2 — Risk Management Framework (RMF)

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
NIST SP 800-37Revision 2, known as the Risk Management Framework (RMF), is astructured risk management approach that guides organizations inselecting, implementing, and continuously monitoring cybersecurityand privacy controls to manage system and organizational risks. Theframework establishes a process for integrating security and privacyinto the system development life cycle, supporting compliance andrisk decision-making.
Published by theNational Institute of Standards and Technology (NIST), the RMF iswidely used by U.S. federal agencies, contractors, and organizationsseeking to align with government cybersecurity requirements. Itcovers risk assessment, security control selection, implementation,assessment, authorization, and continuous monitoring to enhance theprotection of information systems and data.
Organizationstypically adopt the NIST RMF by incorporating its steps into theircybersecurity programs, mapping controls to NIST SP 800-53 or otherstandards, and supporting audit readiness. The framework enablesconsistent risk-informed decisions, effective compliance management,and integration with broader regulatory, security, and privacyecosystems such as FISMA and FedRAMP.
Why it Matters
The NIST RiskManagement Framework equips organizations with a systematic processto integrate security and privacy throughout the system lifecycle.
Key benefitsinclude:
• Strengthen risk-based decision-making
Enable moreconsistent, informed risk management choices aligned withorganizational priorities and operational requirements.
• Enhance compliance support
Supportadherence to government and industry regulations by establishing adefensible, repeatable approach to cybersecurity and privacycontrols.
• Promote continuous monitoring
Facilitateongoing assessment and mitigation of evolving threats by embeddingmonitoring practices in daily operations.
• Increase audit readiness
Documentsecurity activities and controls in a structured way that simplifiesaudits and demonstrates due diligence to stakeholders.
• Improve protection of sensitive data
Reduce thelikelihood and impact of data breaches by applying controls tailoredto protect critical assets and information.
How it Works
NIST SP 800-37Rev. 2 establishes the Risk Management Framework (RMF) as astructured, iterative lifecycle process. The RMF integrates a set ofsteps—categorize information systems, select security controls,implement controls, assess effectiveness, authorize operations, andmonitor controls—creating a continuous cycle for managingorganizational risk. This framework directly references controlcatalogs, such as those in NIST SP 800-53, to support effective riskmanagement and governance.
In practice,organizations apply the RMF by first classifying their assets anddetermining appropriate security controls based on risk assessments.Teams implement and document these controls, conduct securityassessments to evaluate control effectiveness, and maintaincompliance through ongoing authorization and monitoring activities.The RMF also facilitates alignment with broader governance programsand regulatory requirements by providing a repeatable structure forcompliance assessments and ongoing oversight of security practices.
Organizationscan operationalize the RMF using SmartSuite by leveraging integratedcontrol libraries, maintaining dynamic risk registers, and automatingpolicy governance processes. SmartSuite enables streamlined evidencecollection, compliance tracking, and remediation workflows,supporting audit readiness and continuous monitoring. Reportingdashboards further allow security and compliance teams to evaluaterisk management practices and monitor organizational security postureover time.
Key Elements
• System Development Life Cycle Integration
Establishesalignment of security and privacy risk processes within theorganization’s system development methodology.
• Risk Assessment and Categorization
Describescategorization of information systems based on potential impactlevels and initial risk analysis.
• Security and Privacy Control Selection
Specifies theprocess for identifying, tailoring, and documenting safeguards fromestablished control baselines.
• Control Implementation Architecture
Outlinesstructured deployment and configuration of approved security andprivacy measures within environments.
• Assessment and Validation Activities
Detailsmechanisms for evaluating control effectiveness through testing,review, and analysis.
• Authorization Process Structure
Defines formalprocedures for system authorization based on assessed risks andcompliance evidence.
• Continuous Monitoring Framework
Describesongoing monitoring and reporting requirements to manage changes inrisk posture over time.
Framework Scope
NIST SP 800-37Rev. 2 — Risk Management Framework is implemented by federalagencies, government contractors, and organizations managingsensitive or regulated information systems. The framework governsrisk management processes for IT systems and cloud environments,typically during regulatory compliance, system development, or whenenhancing security governance and supporting assurance programs.
Framework Objectives
NIST SP 800-37Rev. 2 Risk Management Framework (RMF) provides a comprehensiveprocess for managing cybersecurity and privacy risks acrossinformation systems.
• Enhance risk management practices to address evolvingcybersecurity and privacy threats
• Establish effective security controls to protect critical dataand organizational assets
• Strengthen governance and oversight of security and privacyprogram operations
• Promote regulatory compliance through integration with federaland industry requirements
• Improve operational resilience by enabling continuous monitoringand timely risk response
• Support audit readiness with documented control assessment andrisk management actions NIST SP 800-37 Rev. 2 (RMF) provides arisk-based authorization process that maps to controls in NIST SP800-53 Rev. 5 and supports FedRAMP authorizations, while aligningwith the NIST Cybersecurity Framework and ISO/IEC 27001 forgovernance. Organizations apply RMF for federal accreditation,regulatory compliance, risk governance, and operational securityimprovements.
Common Framework Mappings
Organizationsmap NIST SP 800-37 Rev. 2 to complementary standards and controls tostreamline risk management, demonstrate compliance, and alignsecurity controls across governance, auditing, and cloudauthorization programs.
Mappedframeworks include:
CIS CriticalSecurity Controls
FedRAMP
ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27701
NISTCybersecurity Framework
NIST SP 800-30
NIST SP 800-53Rev. 5
- ClassicifationCategoryRisk ManagementDomainRisk ManagementFramework FamilyNIST Special Publications
- Regulatory ContextTypeStandardLegal InstrumentFrameworkSectorCross-SectorIndustryCross-Industry
- Region / PublisherRegionNorth AmericaRegion DetailUnited StatesPublisherNational Institute of Standards and Technology (NIST)
- VersioningVersionNIST SP 800-37 Revision 2Effective DateDecember 2018Issue DateDecember 2018
- AdoptionAdoption ModelRisk ManagementImplementation ComplexityHigh
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
NIST SP 800-37 is published by the National Institute of Standards and Technology and is publicly available through official NIST publications.
How SmartSuite Supports NIST 800-37 rev 2
Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.
RMF Step Library
Run Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor as connected work.
System Boundary and Scope Management
Define system scope, assets, and dependencies with clear traceability.
SSP and Control Implementation Statements
Maintain SSP content and evidence tied directly to control requirements.
Assessments and POA&Ms
Track findings, remediation actions, owners, retesting, and closure evidence.
Continuous Monitoring Cadence
Schedule recurring monitoring tasks and maintain repeatable evidence over time.
Authorization and Governance Reporting
Produce leadership-ready status reporting for ATO decisions and ongoing oversight.
Related frameworks

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

FedRAMP standardizes security requirements to assess, authorize, and continuously monitor cloud services that handle U.S. federal data.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.
Frequently Asked Questions For NIST SP 800-37 Rev. 2 (Risk Management Framework)
The NIST SP 800-37 RMF provides a structured methodology for organizations to manage risks to their information systems by selecting, implementing, and monitoring cybersecurity and privacy controls. It supports organizations in making informed risk decisions and helps align security practices with organizational objectives and regulatory requirements.
The RMF applies to all federal information systems, including those operated by contractors on behalf of agencies, and can be adapted by non-federal organizations. Its scope covers categorizing systems, selecting and implementing controls, assessing their effectiveness, authorizing systems for operation, and maintaining continuous oversight.
Key concepts of the RMF include system categorization, control selection, implementation, assessment, authorization, and continuous monitoring. Required artifacts typically include system security plans, risk assessments, security assessment reports, plans of action and milestones (POA&Ms), and authorization packages.
Organizations integrate the RMF into their system development lifecycle by classifying systems, conducting risk assessments, mapping applicable controls (often from NIST SP 800-53), and documenting implementation. Regular assessments are conducted to evaluate control effectiveness, with ongoing monitoring to ensure sustained compliance and risk mitigation.
NIST SP 800-37 RMF aligns closely with frameworks such as NIST SP 800-53 (control catalog), FISMA (regulatory requirement), and FedRAMP (cloud authorization). It can also be mapped to broader governance programs and privacy regulations, supporting harmonization of security practices across multiple compliance obligations.
Ongoing RMF compliance requires continuous monitoring of controls, regular risk assessments, timely remediation of identified weaknesses, and maintenance of up-to-date security documentation. Organizations must provide evidence of ongoing oversight and take corrective actions to address new risks or changes in their threat landscape.
SmartSuite supports RMF management by centralizing risk tracking, facilitating control selection and implementation, and enabling streamlined evidence collection for compliance assessments. The platform provides automated compliance tracking, audit readiness workflows, and reporting dashboards to monitor risk posture and demonstrate ongoing adherence to RMF requirements.
Put CRI Profile into action with SmartSuite
Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.
