A federal agency is deploying a new information system that will process, store, and transmit personally identifiable information (PII). According to the NIST Risk Management Framework (RMF), which of the following steps must be completed FIRST to determine the necessary level of security controls?
-
A
Implement a baseline set of security controls.
-
B
Authorize the system for operation.
-
C
Categorize the information system based on impact.
-
D
Assess the security controls for effectiveness.