7.1 Determine impact of changes to information system and environment
- Identify potential threat and impact to operation of information system and environment
- Analyze risk due to proposed changes accounting for organizational risk tolerance
- Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board) » Implement proposed changes
- Validate changes have been correctly implemented
- Ensure change management tasks are performed
7.2 Perform ongoing assessments/audits based on organizational requirements
- Monitor network, physical and personnel activities (e.g., unauthorized assets, personnel and related activities)
- Ensure vulnerability scanning activities are performed
- Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)
7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency reports, news reports)
7.4 Actively participate in response planning and communication of a cyber event
- Ensure response activities are coordinated with internal and external stakeholders
- Update documentation, strategies and tactics incorporating lessons learned
7.5 Revise monitoring strategies based on changes to industry developments introduced through legal, regulatory, supplier, security and privacy updates
7.6 Keep designated officials updated about the risk posture for continuous authorization/approval
- Determine ongoing information system risk
- Update risk register, risk treatment and remediation plan
7.7 Decommission information system
- Determine information system decommissioning require