<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>RMF process &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/rmf-process/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:45:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>RMF process &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Preparing for the Cybersecurity Maturity Model Certification onslaught</title>
		<link>https://www.steelcloud.com/preparing-for-the-cybersecurity-maturity-model-certification-onslaught/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 02 Mar 2021 20:03:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC AB]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[CMMC standards]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cybersecurity maturity model certification]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[nist 800171]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81210</guid>

					<description><![CDATA[Understanding the potential impact that CMMC will have outside of the DIB For the Defense Industrial Base (DIB), the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) compliance requirement is the hot news topic of 2021. In fact, across the DIB market, CMMC compliance will probably stay a focus through at least 2025. However, for ...]]></description>
		
		
		
			</item>
		<item>
		<title>CMMC Center of Excellence Announces Engagement Agreement with SteelCloud</title>
		<link>https://www.steelcloud.com/cmmc-center-of-excellence-announces-engagement-agreement-with-steelcloud-2/</link>
		
		<dc:creator><![CDATA[Jamie Coffey]]></dc:creator>
		<pubDate>Wed, 24 Feb 2021 21:35:27 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Press Releases]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC AB]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[CMMC standards]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[nist 800171]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81192</guid>

					<description><![CDATA[SteelCloud partners with CMMC Center of Excellence Automating Policy Compliance, Cloud Configuration Control and Security The Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE), hosted by the Information Technology Acquisition Advisory Council (IT-AAC), a public-private partnership serving the public and private sectors for more than 15 years, is excited to announce a partnership with SteelCloud, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Resilience Strategy to Mature Your Cybersecurity Posture</title>
		<link>https://www.steelcloud.com/cyber-resilience-strategy-to-mature-your-cybersecurity-posture/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 15 Feb 2021 17:04:41 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[CMMC standards]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[cyber resilience framework]]></category>
		<category><![CDATA[Cyber resilience strategy]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[nist 800171]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81120</guid>

					<description><![CDATA[Best practices for developing Cyber resilience strategy Today’s IT stack is increasingly complex. Companies now have on-premise, public cloud, private cloud, and hybrid infrastructures. The need to create an agile and secure environment is the only way to stay competitive. At the same time, malicious actors keep pounding corporate IT with credential theft, ransomware, and ...]]></description>
		
		
		
			</item>
		<item>
		<title>Addressing the Looming CMMC Standards for Government Contractors</title>
		<link>https://www.steelcloud.com/addressing-the-looming-cmmc-standards-for-government-contractors/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 18:50:16 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC AB]]></category>
		<category><![CDATA[cmmc audit]]></category>
		<category><![CDATA[CMMC certification]]></category>
		<category><![CDATA[CMMC standards]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[nist 800-53]]></category>
		<category><![CDATA[nist 800171]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81020</guid>

					<description><![CDATA[It&#8217;s happening: The CMMC, will replace a current system of DoD contractors by pledging their compliance to cybersecurity standards issued by the NIST On Friday, September 18, 2020, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to government agencies to patch all Windows server operating systems by Monday, September 21 to prevent ...]]></description>
		
		
		
			</item>
		<item>
		<title>Prepare now for a more agile and secure government environment</title>
		<link>https://www.steelcloud.com/prepare-now-for-a-more-agile-and-secure-government-environment/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 20:27:10 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<category><![CDATA[workforce transformation]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81010</guid>

					<description><![CDATA[How to be agile while embracing new technologies begins with being prepared. The use of on-premise technologies and the cloud continue to increase in the Federal space as agencies pursue modernization through digital and workforce transformation. But with those agile technologies evolving daily, threats and vulnerabilities have also increased. Even when the government uses the ...]]></description>
		
		
		
			</item>
		<item>
		<title>Gain control of CUI and secure our government engine</title>
		<link>https://www.steelcloud.com/gain-control-of-cui-and-secure-our-government-engine/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 25 Jan 2021 16:52:30 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Classified unclassified information]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[DIBCAC]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80997</guid>

					<description><![CDATA[ “We take the engine and we control the world.” Curtis ~ Snowpiercer Formerly known as “For Official Use Only” (FOUO) information, Controlled Unclassified Information (CUI) is gaining increased emphasis in the government contracting world. CUI is not classified information, rather it is government created or owned information that nonetheless requires safeguarding or dissemination controls. Because ...]]></description>
		
		
		
			</item>
		<item>
		<title>Access a “net-neutral” approach to cybersecurity</title>
		<link>https://www.steelcloud.com/access-a-net-neutral-approach-to-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 16 Jan 2021 02:23:33 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[net-neutral]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80984</guid>

					<description><![CDATA[Is a &#8220;net-neutral&#8221; concept truly open all? While there have always been divides in society, the digital divide is a relatively new chasm that has only grown deeper as technology expands. It used to be that the only way to access information was through your public library, which is equally free and open to all. ...]]></description>
		
		
		
			</item>
		<item>
		<title>Simplifying your adoption of the new NIST Cybersecurity Framework</title>
		<link>https://www.steelcloud.com/simplifying-your-adoption-of-the-new-nist-cybersecurity-framework/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 15:26:23 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[RPA]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80972</guid>

					<description><![CDATA[How easy is it to adopt the new NIST Cybersecurity Framework? New and changing regulations and guidelines are a mainstay in the cybersecurity field. Keeping up with the changes and more importantly, understanding and applying them is not for the faint of heart. So, here’s a breakdown of the new IoT Cybersecurity Law signed by ...]]></description>
		
		
		
			</item>
		<item>
		<title>NIST 800-53 Rev. 5: Outcome-based vs. Impact-based Controls</title>
		<link>https://www.steelcloud.com/nist-800-53-rev-5-outcome-based-vs-impact-based-controls/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 18:01:18 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[NIST 800-53 Rev 5]]></category>
		<category><![CDATA[NIST 800-53 Rev 5 Control Families]]></category>
		<category><![CDATA[NIST 800-53 Rev 5 RMF]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[SRG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[STIG tools]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80902</guid>

					<description><![CDATA[NIST 800-53 Rev. 5: Outcome-based vs. Impact-based Controls The standards set in NIST 800-53 can significantly impact your organization and how operations are conducted. These impacts are especially true when you have worked to be compliant with Rev. 4 of 800-53 and now must comply with Rev. 5. Below we will go over some key ...]]></description>
		
		
		
			</item>
		<item>
		<title>Get more done with Splunk Integration using STIG Compliance Software</title>
		<link>https://www.steelcloud.com/get-more-done-with-splunk-integration-using-stig-compliance-software/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:58 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Bots]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[ConfigOS]]></category>
		<category><![CDATA[Cybersecurity risk]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Mechanized]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[RMF process]]></category>
		<category><![CDATA[Secure baseline]]></category>
		<category><![CDATA[splunk integration]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<category><![CDATA[stig policy]]></category>
		<category><![CDATA[Vulnerabilty]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=80641</guid>

					<description><![CDATA[Tips for Splunk integration with STIG automation compliance software By Joe Montgomery If you have Splunk currently deployed in your environment, you should already be aware of the platform&#8217;s expansive capabilities, but if you have not integrated your reports with Splunk, there are some key benefits of integrating the two that could make your life ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
