Nist SP 800-221a
Nist SP 800-221a
Nist SP 800-221a
NIST SP 800-221A
Stephen Quinn
Nahla Ivy
Julie Chua
Karen Scarfone
Matthew Barrett
Larry Feldman
Daniel Topper
Greg Witte
R. K. Gardner
November 2023
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by the National Institute of Standards and Technology (NIST), nor is it intended to imply that the
entities, materials, or equipment are necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST in
accordance with its assigned statutory responsibilities. The information in this publication, including concepts and
methodologies, may be used by federal agencies even before the completion of such companion publications. Thus,
until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain
operative. For planning and transition purposes, federal agencies may wish to closely follow the development of
these new publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback
to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
Authority
This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal
Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283.
NIST is responsible for developing information security standards and guidelines, including minimum requirements
for federal information systems, but such standards and guidelines shall not apply to national security systems
without the express approval of appropriate federal officials exercising policy authority over such systems. This
guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130.
Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding
on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be
interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or
any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and
is not subject to copyright in the United States. Attribution would, however, be appreciated by NIST.
Publication History
Approved by the NIST Editorial Review Board on 2023-10-18
Contact Information
ictrm@nist.gov
All comments are subject to release under the Freedom of Information Act (FOIA)
NIST SP 800-221A ICT Risk Outcomes
November 2023
Abstract
The increasing frequency, creativity, and severity of technology attacks means that all enterprises
should ensure that information and communications technology (ICT) risk is receiving
appropriate attention within their enterprise risk management (ERM) programs. Specific types of
ICT risk include, but are not limited to, cybersecurity, privacy, and supply chain. This document
provides a framework of outcomes that applies to all types of ICT risk. It complements NIST
Special Publication (SP) 800-221, Enterprise Impact of Information and Communications
Technology Risk, which focuses on the use of risk registers to communicate and manage ICT
risk.
Keywords
enterprise risk management (ERM); enterprise risk profile (ERP); enterprise risk register (ERR);
information and communications technology (ICT); ICT risk; ICT risk management (ICTRM);
ICT risk measurement; ICT Risk Outcomes Framework (ICT ROF); risk appetite; risk register;
risk tolerance.
Audience
The primary audience for this publication includes both Federal Government and non-Federal
Government professionals at all levels who understand ICT but may be unfamiliar with the
details of ERM. The secondary audience includes both Federal and non-Federal Government
corporate officers, high-level executives, ERM officers and staff members, and others who
understand ERM but may be unfamiliar with the details of ICT.
Acknowledgments
The authors wish to thank all individuals, organizations, and enterprises that contributed to the
creation of this document. This includes Jim Foti, Amy Mahn, Matt Scholl, Kevin Stine, and
Isabel Van Wyk of NIST and Mat Heyman of Impresa Management Solutions. The authors
appreciate the support of the United States Department of Health and Human Services and the
i
NIST SP 800-221A ICT Risk Outcomes
November 2023
Federal Cyber-ERM Community of Interest, including the following members who provided
specific comments: Cedric Carter Jr., L. Dix, Ken Hong Fong, Kim Isaac, Z. Kaptaine, Nnake
Nweke, Khairun Pannah, Katherine Polevitzky, Thom Richison, Nicole Rohloff, C. Rosu,
Stephanie Saravia, M. Sawyer, and Angelica Stanley. The authors also thank Joel Crook of
Consolidated Nuclear Security, LLC; Justin Perkins of CTIA; Kelly Hood of Optic Cyber
Solutions; and Matthew Smith of Seemless Transition, LLC; and individual commenters Simon
Burson and Chuck Shriver.
Document Conventions
For the purposes of this publication, “assets” are defined as technologies that may compose an
information or communications system. The term “asset” or “assets” is used in multiple
frameworks and documents. Examples include laptop computers, desktop computers, servers,
sensors, data, mobile phones, tablets, routers, and switches. In instances where the authors mean
“assets” as they appear on a balance sheet, the word “asset” will be preceded by words such as
“high-level,” “balance sheet,” or “Level 1” to differentiate context.
ii
NIST SP 800-221A ICT Risk Outcomes
November 2023
Table of Contents
Introduction ...................................................................................................................... 1
1.1 Purpose and Scope .................................................................................................... 1
1.2 Publication Contents ................................................................................................... 1
Information and Communications Technology Areas ................................................... 2
ICT Risk Outcomes Framework (ROF) ............................................................................ 3
References ..............................................................................................................................12
Appendix A. List of Symbols, Abbreviations, and Acronyms .......................................13
List of Tables
Table 1. Function and Category Unique Identifiers .................................................................... 4
Table 2. ICT Risk Outcomes Framework ................................................................................... 5
List of Figures
Fig. 1. ICTRM Process .............................................................................................................. 2
iii
NIST SP 800-221A ICT Risk Outcomes
November 2023
Introduction
The increasing frequency, creativity, and severity of attacks against technology means that all
enterprises should ensure that information and communications technology (ICT) risk is
receiving appropriate attention within their enterprise risk management (ERM) programs.
Specific types of ICT risk include, but are not limited to, cybersecurity, privacy, supply chain,
and artificial intelligence risk.
1
NIST SP 800-221A ICT Risk Outcomes
November 2023
2
NIST SP 800-221A ICT Risk Outcomes
November 2023
3
NIST SP 800-221A ICT Risk Outcomes
November 2023
o For MA.RA-1: Bayesian models, event tree analysis, or similar techniques are
used to determine the likelihood of a risk, and that information is recorded in the
Current Assessment – Likelihood field in a risk register.
o For MA.RM-4: KRIs are monitored to determine when risk exceeds risk
tolerance, resulting in updates to the risk register and planning of a revised risk
response, risk response type, risk response cost, and/or risk response description.
• Informative References are specific sections of standards, guidelines, and practices that
illustrate methods to achieve the outcomes associated with each Subcategory. The
Informative References are intended to be illustrative and not exhaustive. To avoid
having to re-release this publication every time an Informative Reference is added or
updated, Informative References are omitted from this publication. Instead, they will be
held in NIST’s Online Informative References (OLIR) Catalog.
For ease of use, each Function, Category, and Subcategory is assigned a unique identifier. Table
1 lists the identifiers for the Functions and Categories to show the framework’s overall structure.
Table 1. Function and Category Unique Identifiers
Function Category
GOVERN (GV) Context (GV.CT)
Roles and Responsibilities (GV.RR)
Policy (GV.PO)
Benchmarking (GV.BE)
Communication (GV.CO)
Adjustments (GV.AD)
Oversight (GV.OV)
MANAGE (MA) Risk Identification (MA.RI)
Risk Analysis (MA.RA)
Risk Prioritization (MA.RP)
Risk Response (MA.RR)
Risk Monitoring, Evaluation, and Adjustment (MA.RM)
Risk Communication (MA.RC)
Risk Improvement (MA.IM)
Table 2 defines the Functions, Categories, Subcategories, and Implementation Examples in the
ICT ROF and is available for browsing and download at the Cybersecurity and Privacy Tool
(CPRT) page. Table 2 includes only a subset of what an organization may need to do and
achieve. The information in the table is space-constrained; much more information can be found
from the Informative References in the NIST OLIR Catalog. Note that the order of the Functions,
Categories, and Subcategories in the table is not intended to imply the sequence of
implementation or the relative importance of any Function, Category, or Subcategory.
Please note that Implementation Examples are offered to provide clarification of the Subcategory.
The information in the Implementation Example field represents a way in which the Subcategory
might be satisfied but is not exhaustive of all possible ways.
4
NIST SP 800-221A ICT Risk Outcomes
November 2023
5
NIST SP 800-221A ICT Risk Outcomes
November 2023
6
NIST SP 800-221A ICT Risk Outcomes
November 2023
7
NIST SP 800-221A ICT Risk Outcomes
November 2023
8
NIST SP 800-221A ICT Risk Outcomes
November 2023
9
NIST SP 800-221A ICT Risk Outcomes
November 2023
10
NIST SP 800-221A ICT Risk Outcomes
November 2023
11
NIST SP 800-221A ICT Risk Outcomes
November 2023
References
[CSF] National Institute of Standards and Technology (2018) Framework for Improving
Critical Infrastructure Cybersecurity, Version 1.1. (National Institute of Standards
and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP)
NIST CSWP 6. https://doi.org/10.6028/NIST.CSWP.6
[PF] National Institute of Standards and Technology (2020) NIST Privacy Framework:
A Tool for Improving Privacy Through Enterprise Risk Management, Version
1.0. (National Institute of Standards and Technology, Gaithersburg, MD), NIST
Cybersecurity White Paper (CSWP) NIST CSWP 10.
https://doi.org/10.6028/NIST.CSWP.10
[SP800221] Quinn SD, Ivy N, Chua J, Barrett M, Feldman L, Topper D, Witte GA, Gardner
RK, Scarfone KA (2023) Enterprise Impact of Information and Communications
Technology Risk: Governing and Managing ICT Risk Programs Within an
Enterprise Risk Portfolio. (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-221.
https://doi.org/10.6028/NIST.SP.800-221
[SSDF] Souppaya M, Scarfone K, Dodson D (2022) Secure Software Development
Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of
Software Vulnerabilities. (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-218.
https://doi.org/10.6028/NIST.SP.800-218
12
NIST SP 800-221A ICT Risk Outcomes
November 2023
ERM
Enterprise Risk Management
ERP
Enterprise Risk Profile
ERR
Enterprise Risk Register
ICT
Information and Communications Technology
ICTRM
Information and Communications Technology Risk Management
ICT ROF
Information and Communications Technology Risk Outcomes Framework
KPI
Key Performance Indicator
KRI
Key Risk Indicator
OLIR
Online Informative References
SP
Special Publication
13