Risk Management Framework (RMF)
NIST SP 800-37 Rev. 2 defines the seven-step lifecycle for categorizing systems, selecting controls, and achieving Authorization to Operate. Petronella Technology Group uses AI-powered automation to compress the RMF timeline from 12-18 months to a fraction of that.
What Is the NIST Risk Management Framework?
The NIST Risk Management Framework (NIST SP 800-37 Rev. 2) is a seven-step lifecycle used by federal agencies and contractors to categorize systems, select and implement controls, and receive a formal Authorization to Operate (ATO) from an Authorizing Official. The output is an SSP, SAR, POA&M, and authorization decision package that FISMA, FedRAMP, CMMC, and DoD programs all rely on.
If you are reading this, there is a good chance you just learned that your next contract requires a NIST SP 800-37 Risk Management Framework process, and your first internet search turned up hundreds of pages that read like federal procurement regulations. That is because most of them are, essentially, federal procurement regulations. Petronella Technology Group has been implementing the RMF for agencies, contractors, and private-sector organizations since NIST first published SP 800-37 in 2004, and the most useful thing we can do on this page is translate what the RMF actually means for the team that has to make it work.
The RMF is a seven-step process that the National Institute of Standards and Technology developed to help federal agencies decide whether a given information system is secure enough to operate. The output of the RMF is a formal decision called an Authorization to Operate, or ATO, signed by an Authorizing Official. That decision is backed by a package of documents (System Security Plan, Security Assessment Report, Plan of Action and Milestones, and supporting artifacts) that together demonstrate you picked controls, implemented them, tested them, and have a plan for the gaps. The authoritative document is NIST SP 800-37 Revision 2, published in December 2018 and available at csrc.nist.gov/publications/detail/sp/800-37/rev-2/final.
The RMF is not just for federal agencies anymore. FISMA-regulated systems (federal civilian), DoD systems (through DoDI 8510.01 and the RMF transition from DIACAP), FedRAMP (which layers the RMF onto cloud authorization), CMMC (whose controls come from NIST 800-171, which is a subset of 800-53), StateRAMP (the state-government adaptation of FedRAMP), and many private-sector organizations that want a defensible, standards-based risk management process all use the RMF or a close derivative. If your contract references "NIST-aligned risk management" or "authorization to operate," the RMF is almost certainly what they mean.
The reason we wrote this page is that most organizations we meet have been told they need "an RMF" but have no framework for estimating how much work is involved. The short answer is: more than you think, but less than the consulting industry will quote you. The rest of this page walks through each step in plain language, with the real deliverables, the real timelines, and the real traps we see every engagement.
What Are the 7 Steps of the RMF?
Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor. The first six produce the authorization decision. The seventh runs for the life of the system. The RMF is the connective tissue between dozens of NIST publications for managing security and privacy risk throughout the system lifecycle.
Prepare
Categorize
Select Controls
Implement
Assess
Authorize
The seven steps are Prepare, Categorize, Select, Implement, Assess, Authorize, and Monitor. The first six produce the authorization decision. The seventh runs for the life of the system and is where most programs quietly degrade if they were not designed to be sustainable. Each step has defined inputs, defined outputs, and a set of roles responsible for producing them. The rest of this page walks through each step with the practical details that matter for getting from start to signed ATO without wasted effort.
Step 1: Prepare (Where Most Programs Start Wrong)
Rev. 2 added the Prepare step because NIST noticed that agencies were jumping straight to categorization without ever establishing the organizational context that made categorization decisions make sense. Prepare is about setting up the inputs to every downstream step: risk management strategy, risk tolerance, common control inheritance mappings, organizational roles and responsibilities, and a system registration process. Done well, Prepare takes 4 to 8 weeks at the beginning of an RMF implementation. Skipped, it results in a program where every system is categorized inconsistently and every authorization boundary is drawn differently.
We use Prepare to answer two questions for every client. First, what is the authorization boundary of the system in scope? That is the set of resources whose security posture is being authorized together. Drawing the boundary too wide makes the engagement unmanageable. Drawing it too narrow means the boundary cannot actually function in production. Second, what common controls are you inheriting from a parent organization or cloud provider? FedRAMP Authorized cloud services deliver a significant number of controls already, and cataloging the inheritance map before Step 3 saves weeks of duplicate work.
Step 2: Categorize (Low, Moderate, or High)
Categorization uses FIPS 199 and NIST SP 800-60 Vol. 1 and 2 to assign a security category to the system based on the types of information it processes. For each of the three security objectives (Confidentiality, Integrity, Availability), you assign a potential impact level of Low, Moderate, or High if the objective were compromised. The high-water mark across the three becomes the system's overall categorization. A system handling personally identifiable information typically comes out Moderate on Confidentiality at minimum. A system handling classified data is almost always High.
The categorization decision drives everything downstream. A Moderate categorization requires implementing the Moderate control baseline from NIST SP 800-53B, which includes hundreds of controls. A High categorization layers additional controls on top. Mis-categorizing as Low when the system is really Moderate will get the authorization rejected by the Authorizing Official. Mis-categorizing as High when Moderate would suffice will double the implementation effort and every ongoing operational cost.
Step 3: Select Controls and Tailor Them
Once categorized, you open NIST SP 800-53B, pull the control baseline matching your categorization, and walk through each control to decide how it applies. NIST calls this "tailoring." Some controls are inherited from a FedRAMP-authorized cloud. Some are common controls delivered by your organization's central IT. Some are hybrid (partial inheritance, partial system-specific). Some are system-specific and fully your responsibility. Some are not applicable and can be tailored out with written justification. The output of Step 3 is a control matrix that documents, for every control in the baseline, who is responsible for implementing it, what evidence will demonstrate implementation, and what the planned assessment method will be.
Tailoring is where skilled RMF consultants earn their fees. The default Moderate baseline has hundreds of controls, and a high percentage of them are inheritable from commodity cloud services or already delivered by your existing security stack. Done well, tailoring reduces the system-specific control count by 40 to 60 percent. Done poorly, you end up implementing controls you did not need to, at costs you did not need to absorb. We have seen tailored control matrices that were more than 100 pages. We have seen them that were 20. The difference is almost always the discipline of the tailoring process.
Step 4: Implement (Where the Budget Goes)
Implementation is the step where you actually put the controls into place. Multi-factor authentication on every privileged account. Encryption at rest on every data store. Centralized logging with retention meeting your control baseline. Configuration management through a version-controlled baseline with change control. Continuous vulnerability scanning with defined remediation timelines. Incident response procedures that have been tested. The list goes on, and every one of those controls is a real engineering project that a real team has to execute.
We do not try to implement every control for our clients. That would be uneconomic and in most cases counterproductive (you would be bolting on controls outside your existing engineering culture, which is a recipe for decay the moment we leave). Instead we work with your engineering and operations teams to design the controls so they integrate with your existing stack, and we provide Subject Matter Expert review as controls are implemented. Our Implement phase typically runs 4 to 9 months depending on the starting maturity of the organization and the size of the system.
Throughout Implementation we are also drafting the System Security Plan. The SSP is the central artifact of the authorization package. It describes the system, the boundary, the categorization rationale, the control implementation for every control in scope, and the responsible parties. A well-written SSP for a Moderate system is typically 150 to 300 pages. For a High system it can be 400-plus. The SSP is not a document you write at the end of the engagement. It is a living artifact that we build as controls are implemented, and by Step 5 Assess it is ready to hand to the assessor.
Steps 5, 6, 7: Assess, Authorize, Monitor
Assess is where an independent assessor, often a Third Party Assessment Organization (3PAO) for FedRAMP engagements or an agency-designated assessor for federal work, tests your control implementation and produces a Security Assessment Report (SAR). The SAR lists findings, severity, and the assessor's opinion on whether the control is satisfied. Findings that cannot be closed before authorization go into a Plan of Action and Milestones (POA&M) with a remediation owner and target date. A clean authorization package does not have zero findings, it has findings that are documented, prioritized, and on a realistic remediation path.
Authorize is where the Authorizing Official (an executive in your organization or a designated official at a customer agency) reviews the SSP, SAR, and POA&M and issues the Authorization to Operate. The ATO can be granted in full, granted conditionally, or denied. A conditional ATO usually comes with limitations on the scope of production use until specific findings are closed. A denial is rare and signals the package was not ready, which is why the readiness and assessment preparation work is so important.
Monitor is the ongoing step that runs for the life of the authorization. You operate the controls, you detect drift, you track vulnerabilities, you report to your Authorizing Official on the cadence they require (usually monthly or quarterly), and you close POA&M items as remediation completes. Rev. 2 leaned heavily into continuous monitoring with explicit reference to SP 800-137, and modern RMF programs use continuous ATO processes that shorten the re-authorization cycle significantly. We help clients implement continuous monitoring in a way that is sustainable for a small team and auditable by a larger one.
How Does the RMF Overlap With CMMC, FedRAMP, and FISMA?
CMMC Level 2 controls come from NIST 800-171, which was derived from 800-53 Moderate. FedRAMP wraps the RMF with a 3PAO and PMO continuous monitoring. FISMA requires the RMF for every covered federal system. One mature RMF engagement can satisfy multiple adjacent framework obligations at the same time.
A surprising amount of work on the RMF is reusable across adjacent frameworks, and that reuse is where the return on the investment comes from. If you are pursuing CMMC Level 2 and you have already implemented the NIST 800-171 controls, you have already implemented a large subset of the NIST 800-53 Moderate baseline, because 800-171 was derived from 800-53 Moderate with controls trimmed for non-federal systems. Our NIST 800-53 vs 800-171 explainer walks through the mapping. For clients pursuing CMMC and an RMF ATO in parallel, we structure the engagement so the same control implementations serve both.
If you are going to FedRAMP, the RMF is wrapped inside the FedRAMP process. FedRAMP adds the 3PAO requirement, the continuous monitoring submissions to the PMO, and the specific FedRAMP baselines that extend 800-53B. Moderate impact FedRAMP has 325-plus controls after FedRAMP-specific parameters are applied, versus the 285 of a vanilla 800-53B Moderate baseline. Knowing that difference up front changes how you scope Step 3.
If you are under FISMA, the RMF is the process by which you meet your FISMA obligation. Federal agencies do the RMF on every FISMA-covered system. Private-sector organizations with federal contracts that invoke FISMA-aligned security often inherit the RMF by reference. And if your customer is a federal agency that has asked for an ATO before go-live, the RMF is explicitly the path.
Why Petronella
Petronella Technology Group was founded in 2002 at 5540 Centerview Drive, Raleigh, North Carolina. We hold BBB A-plus accreditation continuously since 2003, CMMC Registered Practitioner Organization status (RPO number 1449, verifiable at cyberab.org/Member/RPO-1449-Petronella-Cybersecurity-And-Digital-Forensics), and our consulting team includes multiple CMMC-RP practitioners. Craig Petronella, the founder, holds CMMC-RP, CCNA, CWNE, and Licensed Digital Forensic Examiner (DFE number 604180) credentials.
We have run RMF engagements for federal systems integrators, defense primes, cloud service providers pursuing FedRAMP, and defense contractors pursuing CMMC Level 2. The engagement is priced custom per project because the variance between a single 800-171 Moderate system and a multi-tenant cloud platform pursuing FedRAMP High is enormous. For a scoped quote, call (919) 348-4912 or request a consultation. We will schedule a 30-minute intake with our team to understand the system in scope, the target authorization, and your timeline before we propose a fee.
What we do not do is promise to shortcut the RMF. The framework exists because systems that skipped these steps produced real breaches at real cost to real people. The right goal is not a faster RMF. The right goal is an RMF that fits the system and produces a security outcome you and your Authorizing Official can stand behind. That is what we build.
How the RMF Connects NIST Publications
SP 800-53 Controls
The master catalog of 1,000+ security and privacy controls selected during RMF Step 3.
Learn moreSP 800-53B Baselines
Defines Low, Moderate, and High control baselines that determine your starting control set.
Learn moreSP 800-30 Risk Assessment
The methodology used during categorization and throughout the RMF lifecycle.
Learn moreSP 800-137 Continuous Monitoring
Guides the ongoing Step 7 Monitor activities that maintain your authorization.
Learn moreSP 800-161 Supply Chain
Rev. 2 integrates supply chain risk management into every RMF step.
Learn moreNIST CSF 2.0
RMF activities map to CSF functions, connecting process-based and outcome-based approaches.
Learn moreWhat Changed in Revision 2
New Prepare Step
Establishes organizational context and risk tolerance before categorization begins.
Privacy Integration
Privacy risk management integrated throughout all seven steps alongside security.
Supply Chain Risk
C-SCRM explicitly incorporated into the RMF lifecycle at every step.
Expanded Authorizations
Joint and leveraged authorizations allow reusing assessment results across systems.
Built For
Common RMF Pitfalls We See Every Engagement
The first pitfall is drawing the authorization boundary too broadly. Teams new to the RMF often include every system that shares infrastructure with the target system, producing a boundary that takes 18 months to authorize when a tighter boundary would have taken 9. The second is underestimating the documentation burden. The SSP, SAR, POA&M, and supporting artifacts collectively run hundreds of pages for a Moderate system, and they must be internally consistent. Inconsistency between the SSP and the implemented control is a finding every time. The third is treating continuous monitoring as an afterthought. The ATO is not the finish line; the Monitor step is where reauthorization is either easy (because you kept the package current) or agonizing (because you didn't).
Our engagements are structured to surface these pitfalls in the first 30 days so we can course-correct before the investment gets too large to redirect. We run a pre-Prepare assessment that maps your current state against where we need you to be at the end of each step, and we build the schedule backward from the target ATO date rather than forward from kickoff. That backward scheduling is how we manage expectations around what is realistic versus what is aspirational, and it is the conversation every executive sponsor should have at the start of an RMF program.
Frequently Asked Questions
What is an Authorization to Operate (ATO)?
An ATO is the formal decision by an Authorizing Official that a system's security risk is acceptable. The RMF process produces the evidence (SSP, SAR, POA&M) needed for this decision.
How long does the RMF process typically take?
Traditional RMF implementations take 12-18 months. Petronella's AI-powered compliance platform compresses SSP drafting, control mapping, and gap analysis to reduce overall timelines significantly.
Do private-sector organizations need the RMF?
Any organization pursuing CMMC, FedRAMP, or NIST 800-171 compliance benefits from the RMF's structured approach. It provides the disciplined process that auditors and assessors expect.
What documents does the RMF produce?
Key artifacts include the System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action and Milestones (POA&M), and Authorization Package. Petronella's AI tools reduce SSP drafting time by 50-60%.
How Long Does RMF Authorization Really Take?
9 to 15 months for a mature organization pursuing a Moderate-impact ATO. 15 to 24 months for a less mature organization. 12 to 18 months for FedRAMP Moderate with 3PAO, plus 3 to 6 months of PMO queue time. High-impact systems add 50 percent to any of those numbers. Anyone promising 90 days to ATO on a greenfield system is either oversimplifying or working inside a very narrow scope.
The single most useful thing a client can get from a preliminary RMF conversation is a realistic timeline. Real RMF implementations for a mature organization with a Moderate-impact system typically run 9 to 15 months from initial Prepare to ATO signature. For a less mature organization, 15 to 24 months. For a FedRAMP Moderate with a 3PAO, 12 to 18 months with the FedRAMP PMO queue adding another 3 to 6 months on top before Authorized status. For a High-impact system, add 50 percent to any of those numbers. Anyone promising 90 days to ATO on a greenfield system is either telling you something you want to hear or is working with an agency that will accept a very limited scope.
Staffing matters too. An RMF program needs a designated Information System Security Officer (ISSO) on your side who owns the SSP, coordinates evidence collection, and interfaces with the assessor. It needs engineering time to implement controls (we estimate 0.5 to 1.5 full-time engineering equivalents during implementation for a Moderate system). It needs operations time to run continuous monitoring after authorization (typically 0.25 to 0.5 FTE ongoing). And it needs executive sponsorship, because the Authorizing Official's trust in the program is built on real executive ownership, not on paperwork.
Budget ranges are hard to publish because the variance is enormous. A Low-impact internal system might come in at a lower six-figure all-in cost. A Moderate-impact commercial SaaS pursuing FedRAMP can run high six or low seven figures including 3PAO fees, tooling, and engineering time. High-impact systems can exceed that significantly. What we can commit to is that our consulting fee is a small fraction of the total program cost, and we will be transparent in the proposal about what drives the number.
The other budget reality is continuous monitoring. An ATO is not a one-time event, it is the entry point to an ongoing program. Annual control assessments, continuous monitoring submissions, POA&M remediation, and reauthorization cycles all have recurring cost. We build the sustainable operational model into the initial program design so the post-ATO cost curve is known before you commit.
Ready to Navigate the RMF?
Petronella accelerates every step of the Risk Management Framework with AI-powered automation and 24+ years of expertise.