Create and Populate a New System

< All Topics
Print

Note: Completing the additional fields is optional but recommended to assist with risk
management.

  • Acronym, eMASS ID, ATO Expiration date, and End of Life date
  • Status: Change status to Unapproved if system is not authorized
  • Impact of Interruption: E.g., impact to mission, cost of interruption, and/or potential injury; information populates in Impact Description field of eMASS formatted POAM exports
  • Mitigations: Enter high-level vulnerability-level mitigations (e.g., System is behind a local firewall, has HBSS deployed, is only accessed by a few people) and System-level mitigations (will populate as the mitigation for eMASS formatted POAM exports)

Rysk Score is assigned by Ryskview.

The Authorization Type and A & A System fields allow you to link systems that are used
across multiple locations and Program Offices. More details are provided in the next section,
Multi System Management.
Authorization Effort entries:

  • Assess and Authorize(default): Use for typical Authorizations for Local Area Networks (LAN) or individual systems following the standard ATO Process
  • Baseline: Use for a baseline system that will have deployed systems linked to it
  • Deployment: Use for systems that will link to a baseline system
  • Assess and Incorporate: Use for systems that will integrate into a broader system with continuous improvement and adaptation.

The Attachments section allows user to attach system-related files.
Click the Upload File button to select, attach, and upload files:

  • Architecture Diagram
  • Hardware/Software (HW/SW) List
  • Memo of Agreement (MOA)

Table of Contents

Get Started Today with Rysk Management

Actively manage your IT risks.  Streamline GRC operations and leverage the data for Quantitative Risk Analysis.

Not Ready for a Demo?

Stay informed with our newsletter

Contact Us