The six steps that comprise the RMF include:
- System Categorization;
- Security Control Selection;
- Security Control Implementation;
- Security Control Assessment;
- System Authorization; and
- Security Control Monitoring
The six steps that comprise the RMF include: