RA.L2-3.11.3[c] – Determine if a risk assessment process is used.

This objective confirms that your organization’s risk assessment process isn’t just documented — it’s actively used to evaluate risks to Controlled Unclassified Information (CUI). You must demonstrate that your team follows the process consistently and that results lead to meaningful actions.

RA.L2-3.11.2[a] – Identify risk responses for identified risks.

This objective requires your organization to define how you will respond to each identified risk that could impact the processing, storage, or transmission of Controlled Unclassified Information (CUI). Risk responses must be intentional, documented, and appropriate to the severity of the risk.

RA.L2-3.11.2[c] – Determine if risk responses are implemented.

This objective confirms that your organization is not only documenting risk responses but actively carrying them out. Whether the decision was to mitigate, accept, transfer, or avoid a risk, this control verifies that those actions are being followed and tracked—especially for risks related to Controlled Unclassified Information (CUI).

RA.L2-3.11.4 – Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

This control requires your organization to create and maintain a System Security Plan (SSP) that documents key details about how Controlled Unclassified Information (CUI) is protected. The SSP must be reviewed and updated regularly to reflect changes in systems, operations, or security controls.

3.11.1 – Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI

This control requires organizations to conduct regular risk assessments to identify, evaluate, and document threats to systems and processes that store or handle Controlled Unclassified Information (CUI). Read the full blog breakdown of 3.11.1

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.