7.1 Determine impact of changes to information system and environment
7.2 Perform ongoing assessments/audits based on organizational requirements
7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency reports, etc.)
7.4 Actively participate in response planning and communication of a cyber event
7.5 Revise monitoring strategies based on changes to industry developments introduced through legal, regulatory, supplier, security and privacy updates
7.6 Keep designated officials updated about the risk posture for continuous authorization/approval
7.7 Decommission information system
Supplementary References