After you have completed the implementation process, you can assess internal and
external controls, generate Plans of Action and Milestones, and manage change requests and
vulnerable items.
The Assess process is generally performed by a user other
than the system owner or the personnel who implemented the controls.The Assess state
adds
Control Assessments and
Risk
Summary related lists, as well as
POA&M,
Change Requests,
Security
Incidents, and
Vulnerable Items tabs to the
Authorization Package form.
Note: Performance issues have been observed in the
Continuous Authorization & Monitoring application when a high volume of
Change Request and/or Incident records are related to a single Authorization
Package. If you experience long transaction response times, consider performing
the workarounds detailed in
KB0861865.