a. Categorize the system and information it processes, stores, and transmits; b. Document the security categorization results, including supporting rationale, in the security plan for the system; and c. Verify that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.
ID | Name | Description |
ID | Description |
Requirement |
---|
ID | Name | Description |
---|