SP-RSK-001 Authorizing Official/Designating Representative

Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development.

Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).

Knowledges 39

Code Description Work Roles
K0001 Knowledge of computer networking concepts and protocols, and network security methodologies. 52
K0002 Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). 52
K0003 Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. 52
K0004 Knowledge of cybersecurity and privacy principles. 52
K0005 Knowledge of cyber threats and vulnerabilities. 52
K0006 Knowledge of specific operational impacts of cybersecurity lapses. 52
K0013 Knowledge of cyber defense and vulnerability assessment tools and their capabilities. 5
K0019 Knowledge of cryptography and cryptographic key management concepts 8
K0027 Knowledge of organization's enterprise information security architecture. 9
K0028 Knowledge of organization's evaluation and validation requirements. 8
K0037 Knowledge of Security Assessment and Authorization process. 5
K0038 Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. 6
K0040 Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). 5
K0044 Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 14
K0048 Knowledge of Risk Management Framework (RMF) requirements. 8
K0049 Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). 8
K0054 Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. 3
K0059 Knowledge of new and emerging information technology (IT) and cybersecurity technologies. 12
K0070 Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). 13
K0084 Knowledge of structured analysis principles and methods. 6
K0089 Knowledge of systems diagnostic tools and fault identification techniques. 3
K0101 Knowledge of the organization’s enterprise information technology (IT) goals and objectives. 8
K0126 Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161) 14
K0146 Knowledge of the organization's core business/mission processes. 10
K0168 Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. 11
K0169 Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. 14
K0170 Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. 12
K0179 Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). 19
K0199 Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]). 6
K0203 Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). 10
K0260 Knowledge of Personally Identifiable Information (PII) data security standards. 16
K0261 Knowledge of Payment Card Industry (PCI) data security standards. 17
K0262 Knowledge of Personal Health Information (PHI) data security standards. 17
K0267 Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. 8
K0295 Knowledge of confidentiality, integrity, and availability principles. 1
K0322 Knowledge of embedded systems. 10
K0342 Knowledge of penetration testing principles, tools, and techniques. 8
K0622 Knowledge of controls related to the use, processing, storage, and transmission of data. 6
K0624 Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) 13

Skills 2

Code Description Work Roles
S0034 Skill in discerning the protection needs (i.e., security controls) of information systems and networks. 6
S0367 Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 14

Abilities 11

Code Description Work Roles
A0028 Ability to assess and forecast manpower requirements to meet organizational objectives. 2
A0033 Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. 5
A0077 Ability to coordinate cyber operations with other organization functions or support activities. 4
A0090 Ability to identify external partners with common cyber operations interests. 5
A0094 Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. 6
A0111 Ability to work across departments and business units to implement organization’s privacy principles and programs, and align privacy objectives with security objectives. 3
A0117 Ability to relate strategy, business, and technology in the context of organizational dynamics. 3
A0118 Ability to understand technology, management, and leadership issues related to organization processes and problem solving. 5
A0119 Ability to understand the basic concepts and issues related to cyber and its organizational impact. 7
A0123 Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 15
A0170 Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. 11

Tasks 4

Code Description Work Roles
T0145 Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2). 2
T0221 Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. 2
T0371 Establish acceptable limits for the software application, network, or system. 2
T0495 Manage Accreditation Packages (e.g., ISO/IEC 15026-2). 2